Security Audits

Comprehensive cyber security position assessment aligned with NCSC CAF v4.0

To provide a platform-agnostic Supply Chain Cyber Assurance offering, the following artefacts align with the NCSC Cyber Assessment Framework (CAF) v4.0—the binding baseline for the UK Cyber Security and Resilience Bill (CSRB)—and reflect the mandates of NIS2 and DORA.

1. Initial Audit Matrix: Assessment Scope

The initial audit identifies discrepancies between a vendor's current security posture and regulatory mandates. It evaluates both organisational policy and technical implementation.

CAF ObjectiveAssessment AreaFocus of Initial Audit
A: Managing Security RiskGovernance & AccountabilityBoard ownership of risk, appointment of Compliance Leads, and formal Risk Appetite Statements.
Risk ManagementThreat analysis methodology, attack scenario modelling (e.g., attack trees), and intelligence integration.
Asset ManagementAccuracy of asset inventory (data, people, systems) and mapping of infrastructure dependencies.
Supply Chain AssuranceNth-party risk visibility, Software Bill of Materials (SBOM) availability, and secure development lifecycle (SDL).
B: Protecting Against AttackIdentity & AccessMFA coverage, Joiner/Mover/Leaver (JML) efficiency, and "least privilege" enforcement.
Data SecurityData classification, encryption of data at rest/motion (TLS 1.3), and backup integrity.
System SecurityHardened baseline configurations, vulnerability management, and malware detection.
Resilient NetworksNetwork segmentation, DDoS protection, and tested failover mechanisms.
C: Detecting EventsSecurity MonitoringLog retention, alerting thresholds, and understanding of "normal" system behaviour.
Proactive DiscoveryStructured threat hunting capabilities and use of behavioural baselines to find abnormalities.
D: Minimising ImpactResponse & RecoveryDocumented RTOs/RPOs, incident reporting readiness (24h/72h windows), and BCP/DR testing.
Lessons LearnedPost-incident analysis processes and how insights feed back into governance.

2. Ongoing Monitoring: Architecture of Real-Time Validation

Once the initial audit is remediated, the service transitions to continuous scanning and telemetry collection to maintain "Compliance Velocity".

Detection & Response Velocity

Automated tracking of Mean Time to Detect (MTTD), Mean Time to Acknowledge (MTTA), and Mean Time to Remediate (MTTR).

Vulnerability Hygiene

Continuous monitoring of Patch Latency (days to apply critical patches) and count of End-of-Life (EOL) assets.

Identity Integrity

Real-time monitoring for Orphaned Accounts (aiming for < 5%) and MFA Coverage Rate.

External Attack Surface

Continuous discovery of Shadow IT, Domain Drift (typosquatting), and Leaked Credentials on the dark web.

Software Integrity

Automated SBOM scanning for new vulnerabilities in application dependencies (e.g., Log4j-style risks).

Near Miss Detection

Logging and reporting of significant events that were blocked (e.g., large-scale brute-force attempts) as required by CSRB.

3. Initial Audit Report & Traffic Light Protocol (RAG)

The report transforms technical telemetry into a board-level maturity roadmap. It uses the Red-Amber-Green (RAG) protocol defined by NCSC CAF IGPs.

StatusCAF v4.0 DefinitionExample Threshold/MetricBoard Action Required
GREEN (Achieved)All Indicators of Good Practice (IGPs) are present.100% MFA for privileged access; patch latency < 7 days.No action. Maintain monitoring.
AMBER (Partially Achieved)Measures provide worthwhile benefits, but gaps remain.Patch latency 8-30 days; measures apply to some but not all systems.Remediation Plan. Must be approved and tracked monthly.
RED (Not Achieved)Significant gaps; even one bad practice indicator is sufficient.Orphaned accounts > 5%; no data collection for monitoring; patch latency > 30 days.Immediate Escalation. Potential pause in onboarding/procurement.

4. Supply Chain Cyber Assurance Dashboard

The dashboard provides a tiered "pane of glass" for real-time risk oversight.

Strategic (Board-Level) View

  • Aggregate Risk Score: A 0-100 dial combining technical, operational, and supply chain factors.
  • Compliance Status by Regulation: RAG status cards for CSRB, NIS2, and DORA alignment.
  • Quantified Risk Exposure (£): Financial estimate of potential business loss from cyber incidents.
  • Maturity Trend Line: Historical CAF maturity growth over the last four quarters.

Operational (SOC-Level) View

  • Response Velocity (MTTD/MTTR): Line charts showing triage and recovery speed trends.
  • Critical Patch Compliance: Bar chart showing endpoints with critical vulnerabilities by age.
  • Identity Hygiene Monitor: Number of non-MFA accounts and unidentified devices on the network.
  • Recovery Gap: Deviation between documented Recovery Time Objectives (RTOs) and measured MTTR.

Summary of Strategic Value

Lacking real-time validation is now a marker of negligence. This framework transforms cyber resilience into a "Compliance Currency" that enables organisations to accelerate revenue by removing vetting bottlenecks.