Cyber Security Procurement Support Tool: guidance for buyers
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Section A: Background
A (i): Cyber Security Procurement Support Tool (CSPST) Decision Making Support Tool – Overview
1. CSPST is a secure online cyber risk assessment and supplier assurance questionnaire tool. It is available to all Scottish public sector organisations[1]. It can be accessed here[2] and is signposted within PCS-t, PCS and in the Scottish Procurement Journey and Supplier Journey. It provides the following functionality:
- Scottish public sector buyers can make use of the tool to answer a pre-determined set of risk profile assessment questions at the information/cyber risk assurance stage of a procurement process[3].
- CSPST will then generate a risk profile for the contract in question. CSPST allows public sector organisations to adjust risk profiles to cater for their individual risk appetites and the risks involved in specific contracts, where they have the expertise to do so.
- The risk profiles in CSPST correspond with a set of recommended minimum security requirements that suppliers can be asked/required to meet. (NB: Where no cyber risk is present, this will be identified and no requirements will be generated.)
These minimum security requirements correspond broadly with those set out at Principle 5 of the NCSC Principles and associated use cases, thus promoting consistency with NCSC guidance as per Key Point 2 of the Guidance Note.
- On the basis of those minimum security requirements, a tailored Supplier Assurance Questionnaire (SAQ) is generated within CSPST. When going out to tender, buyers can include in their Invitation To Tender document a requirement for potential bidders to log onto CSPST and complete the SAQ in order to understand and demonstrate the extent to which they comply with the minimum cyber security requirements for that contract. Bidding suppliers can then be required to download an SAQ report and submit this along with their other tender documents for assessment by the contracting authority.
- To ensure proportionality, a compliance appetite stage in the CSPST tool allows buyers to opt not to exclude bidders that do not currently meet the minimum cyber security requirements. Instead, buyers can place a requirement on bidders who do not currently meet the minimum requirements to complete a Cyber Implementation Plan, which sets out how the supplier will work towards meeting minimum requirements over a certain timeframe. The recommended approach is for completed CIPs to be submitted alongside SAQ reports and all other tender documents.
- CSPST allows suppliers to save their answers against specific risk profiles, so that they can reuse information provided previously when bidding for any other public sector contracts with the same broad risk profiles. This can help minimise additional burdens on suppliers.
- CSPST allows buyers to build up an overview of cyber risks in their suppliers over time.
- CSPST has been designed to help “translate” the requirements of 3 key standards widely used in public and private sector procurement (Cyber Essentials, IASME Gold and ISO27001) into answers against the tool’s questions. This helps to minimise burdens on suppliers by reducing the total number of questions that bidding suppliers must answer.
2. For public sector organisations that do not wish to make use of CSPST as part of their procurement processes, the CSPST Question Set mirrors the online tool and is available here. Public sector organisations can adapt and incorporate this Question Set into existing processes if they wish to do so, to help drive greater consistency of practice across the Scottish public sector.
3. CSPST has been incorporated into Scottish Government procurement processes where appropriate. The standard terms and conditions for Scottish Government contracts, which can be adapted and used by all other public sector organisations, have been updated to facilitate use of the CSPST tool, and ensure best practice in respect of supplier cyber resilience. Some example wording for tendering and contractual processes is available in the Example Tender and Contract Wording document here.
Future development of CSPST
4. A public sector working group will oversee developments and improvements to the CSPST tool.
5. The Scottish Government would welcome feedback from contracting authorities and suppliers on the CSPST tool. Please send all feedback to cyberfeedback@gov.scot.
A (ii) Alignment of CSPST decision-making support tool with NCSC Principle 5
1. Use of CSPST can support effective implementation of a number of the NCSC Supply Chain Principles – see the Guidance Note, Key point 1, for further consideration of this.
2. CSPST is specifically designed to support implementation of NCSC Principle 5 (Set and Communicate Minimum Security Requirements for your Suppliers) in the following way:
Supplier Scenario |
Recommended approach |
---|---|
Use Case A: Protecting information shared with suppliers – see also overview diagram later in this guidance. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Use Case B: Specifying security requirements to a supplier |
|
|
NCSC guidance makes clear that you need absolute clarity about your security and functional needs. These must be described clearly and unambiguously to the supplier. If the supplier is delivering an IT system then it must meet the security requirements that have been specified.
|
|
|
Use Case C: Connecting a supplier’s systems to yours |
|
|
|
Use Case D: National security case – where targeting by, e.g. a hostile state is likely |
|
|
|
Diagram providing visual representation of the way in which CSPST supports implementation of NCSC Principle 5
Contact
Email: CyberResilience@gov.scot
There is a problem
Thanks for your feedback