Information on the Ministry of Defence Cyber Security Model (CSM), including the standards suppliersand mustguidance meetfor CSMsuppliers version3andhowto preparemeet forCSM version 4.
The Cyber Security Model (CSM) is how Defence builds cyber security into its supply chain. It is a risk-based proportionate approach which includes:
CSM Risk Assessments: MODMinistry of Defence (MOD) Delivery Teams complete an initial Risk Assessment. Assessment. This Thisdetermines a Cyber Risk Profile.
Cyber Security Standard for Defence Suppliers: Defence Standard 05-138 (Def Stan 05-138) lists the cyber security controls required for each Cyber Risk Profile. Suppliers are contractually required to meet DefenceDef StandardStan 05-138 controls.
Supplier Assurance Questionnaires:Questionnaires (SAQ): Suppliers self-assess against the CSM requirements using a Supplier Assurance Questionnaire.
Flow down: Where suppliers are sub-contracting the supplier will complete a Risk Assessment to generate a new Cyber Risk Profile. The sub-contractor completes the appropriate Supplier Assurance Questionnaire.
If a supplier cannot meet the requirements, (including whether compliance is certified under Defence Cyber Certification (DCC) - see below) they must submit a Cyber Implementation/ImprovementImprovement Plan (CIP).(CIP) detailing when they will meet the required level of compliance, together with associated timescales or reasons why they are unable to comply. The CIP template can be found here.
flowNew downopportunity: obligationsA beingRisk pausedAssessment forReference a(RAR) number and required Cyber Risk Profile of(CRP) “VeryLevel Low”,(Levels “Low”0-3) relevant to a new or existing MOD activity will be provided by the authority at the earliest market engagement, and “Moderate”
annualwill renewalusually obligationsbe beingfound pausedin the invitation to tender.
DEFCONComplete 658a isSAQ: If the supplier intends to bebid includedfor wherethis MODopportunity Identifiablewith informationthe isMOD, passedthe tosupplier must use the Supplier Cyber Protection Service and complete a sub-contractor,SAQ, evenself-assessing thoughagainst flowthe downCRP. hasPlease paused
requiringrefer submissionsto throughthe MicrosoftSupplier FormsCyber (below)Protection orService PDF
provideContract Maintenance: Annually, the supplier will complete a new onlineSAQ Supplierto Cyberdetermine Protectionif Servicethey forremain completioncompliant. ofIf Riskthe Assessmentssupplier andis Suppliernon-compliant, Assurancea QuestionnairesCIP will be considered.
Flow down guidance for defence suppliers
AsThe CSMv3information Cyberin Riskthis Profilesguidance cannotis maprelevant for both MOD personnel (authority) and current/prospect suppliers.
What is flow down?
Flow down is how MOD requests prime contractor requirements into lower-tier sub-contractor agreements. Flow down is required from the prime contractor to CSMv4their Cybersub-contractors Riskand Profiles,onwards newdown Riskthe Assessmentssub-contracting tiers to the end of the supply chain. The flow down process allows the MOD to monitor and Suppliergain Assuranceassurance Questionnaireson willits besupply required.chain.
CSMv4Who Transitionis responsible for flow down?
ThereSuppliers willare beresponsible for flow down. DEFCON 658 contains the contractual obligations that suppliers must place upon subcontractors.
Flow down example scenario:
A prime contractor, Company A, is bidding on a phasedMOD transitioncontract to CSMv4. build Untilmilitary then,drone organisationsparts. shouldCompany continueA expects to applyhire CSMv3.a sub-contractor, Company B, to help manufacture components, which Company B will sub-contract to Company C.
To
Company supportA organisationscompletes thata wishCSM Risk Assessment (RA) to preparedetermine the Cyber Risk Profile (CRP) level for CSMv4,their sub-contractor(s). This CSM RA completion automatically generates a Risk Assessment Reference (RAR).
Company A should pass this RAR to Company B to complete a SAQ to determine if they meet compliance with the CRP level required.
Company B can now commence the onwards flow down, following resourcesin haveCompany beenA’s releasedfootsteps by completing a CSM RA to determine the CRP level required for informationtheir only:
Learn how to use the Supplier Cyber Protection Service
PlannedThe Supplier Cyber Protection Service is a Public Beta. This demonstration video will show you how to use its current functionality. Alongside this, we are also exploring additional resources:features to make CSM v4 even more flexible and user-friendly.
The Defence Cyber Certification (DCC) has been created in partnership with industry and IASME, the scheme’s Certification Authority, as a way of independantly evidencing compliance with eachthe Cyber RiskSecurity Profile
guidanceModel.
Suppliers onshould flowexpect downto requirements
guidancesee increasing requirement to hold valid DCC certification for the duration of their contract with the MOD. this will be specified as a condition under tender following launch of the CSM.
Defence Cyber Certification (DCC) for the Cyber Security Model v4 (CSMv4).
Related resources for UK suppliers
Defence Supply Chain organisations in the UK are encouraged to sign up for free services provided by the UK National Cyber Security Centre (NCSC):
Active Cyber Defence and MyNCSC. Registered organisations can access Active Cyber Defence (ACD) tools such as ‘Early Warning’ and keep updated on new capabilities and offerings beneficial to their cyber resilience.