Skip to content
Cybersecurity: Threats and Defences
17APR

UK 24-hour reporting bill at Report

4 min read
13:56UTC

The Cyber Security and Resilience Bill passed Public Bill Committee. ICO fined Capita £14m for missing PAM and AD tiering, citing NCSC guidance as the GDPR baseline.

TechnologyAssessed
Key takeaway

NCSC guidance has effectively become enforceable GDPR baseline in the UK through ICO precedent.

The UK Cyber Security and Resilience (CS&R) Bill reached Report Stage on 2 March 2026, after the Public Bill Committee concluded in February and a carry-over motion was passed; the bill is expected to reach the House of Lords in the next parliamentary session 1. The substantive provisions rewrite the operating model for UK in-scope organisations. Initial incident reports become due within 24 hours, full reports within 72 hours. Data centres are classified as essential services under joint oversight from the communications regulator Ofcom and the Department for Science, Innovation and Technology (DSIT). The definition of organisations covered by statutory cyber standards widens beyond the current Network and Information Systems (NIS) perimeter.

The 24-hour clock is the operational change. For UK-listed companies, board-level incident-escalation playbooks now have to land within a single trading day, which is a tighter cycle than most legal and communications teams have tested. Tabletop exercises run on a 72-hour assumption become out of date on the day the bill receives Royal Assent.

The enforcement template is already set. Per a decision by the UK Information Commissioner's Office (ICO), the information regulator fined outsourcing firm Capita £14 million in October 2025 for its 2023 breach, and the technical basis has become the 2026 template 2. The ICO cited Capita's absence of Privileged Access Management (PAM) controls, the tooling that gates and audits access to the highest-risk admin accounts, and the absence of Active Directory (AD) tiering, the Microsoft reference model for separating admin credentials by privilege level, as the General Data Protection Regulation (GDPR) security failures that enabled the attacker's privilege escalation. Precedent from Capita and the earlier Advanced Computer Software decision (£3.07m, March 2025) treats NCSC guidance as the GDPR technical baseline. For any organisation in ICO scope, NCSC cyber hygiene advice now carries the force of enforceable data-protection standard.

Deep Analysis

In plain English

The UK government is passing a law called the Cyber Security and Resilience Bill that will require certain organisations to report cyber attacks to the government within 24 hours, and provide a full report within 72 hours. Data centres will be classified as critical national infrastructure, meaning they will be regulated for security in the same way as power grids and water systems. Separately, the UK's privacy regulator (the ICO, Information Commissioner's Office) fined Capita, a large UK outsourcing company, £14 million for a 2023 data breach. The ICO said Capita failed to implement basic security controls that the NCSC (the UK's national cybersecurity agency) recommends: specifically, Privileged Access Management (which restricts who can access sensitive systems) and Active Directory tiering (which organises computer accounts by risk level). The ICO effectively said: if you ignore NCSC guidance and get breached, it is a legal breach of data protection law.

Deep Analysis
Root Causes

Data centres were excluded from the original Network and Information Systems (NIS) Regulations 2018 that implemented the EU NIS Directive in UK law. The CS&R Bill's essential-services classification for data centres corrects that structural gap, reflecting the fact that major cloud and co-location facilities now underpin critical infrastructure operations that the original regulations covered.

The ICO's decision to treat NCSC guidance as the GDPR technical baseline resolves a legal ambiguity that has existed since GDPR came into force: Article 32's 'appropriate technical and organisational measures' standard is deliberately non-prescriptive, and UK organisations have argued successfully in past ICO engagements that 'appropriate' is subjective.

The Capita decision operationalises NCSC guidance as the benchmark, converting a subjective standard into a specific published control catalogue.

What could happen next?
  • Consequence

    UK organisations in scope for the CS&R Bill must rebuild their incident-escalation procedures to guarantee board notification and regulator submission within a trading day, transforming cyber incident response from an IT function to a C-suite operational protocol.

  • Precedent

    The ICO Capita precedent means that any UK organisation that has not implemented PAM and AD tiering in line with NCSC guidance, and subsequently suffers a breach, faces a materially higher fine risk than before the October 2025 decision.

First Reported In

Update #1 · Stryker MDM wipe exposes identity perimeter

Skadden· 17 Apr 2026
Read original
Different Perspectives
CISA and FBI (US government)
CISA and FBI (US government)
CISA added nine KEV CVEs, confirmed Volt Typhoon in US CNI, and lost its counter-ransomware initiative under prior cuts; the FY27 budget proposes a further $707m cut and 860 jobs. An FBI official confirmed Salt Typhoon at 200+ companies across 80 countries is 'still very, very much ongoing'.
NCSC (UK)
NCSC (UK)
NCSC published attribution-backed advisories naming GRU Unit 26165 for SOHO router DNS hijacking and co-issued warnings with Dutch AIVD on FSB, APT31, and IRGC messaging-app targeting, in the same month the UK Cyber Security and Resilience Bill cleared its Public Bill Committee. The ICO's £14m Capita fine now treats NCSC guidance as the enforceable GDPR technical baseline.
European Commission
European Commission
The Commission published draft Cyber Resilience Act implementation guidance on 3 March with manufacturer reporting obligations beginning 11 September 2026, while running infringement proceedings against EU member states that have not transposed NIS2. Only 14 of 27 states had fully transposed by mid-2025; Germany's post-transposition registration compliance sat at roughly one-third.
Russian foreign ministry (GRU posture)
Russian foreign ministry (GRU posture)
The Russian foreign ministry has issued no formal response to the NCSC advisory attributing the SOHO router DNS-hijacking campaign to GRU Unit 26165; its standard position is that Western attribution claims are politically motivated fabrications. Russia denies state sponsorship of any offensive cyber operations against NATO infrastructure.
People's Republic of China
People's Republic of China
Tsinghua University's Center for International Security and Strategy characterised US Volt Typhoon 'sabotage pre-positioning' assessments as misrepresenting standard state signals intelligence, framing the attribution narrative as a US strategic communication exercise rather than a conclusion grounded in confirmed adversary intent. Beijing formally denies state involvement in Salt Typhoon and Volt Typhoon.
Handala
Handala
Handala publicly claimed the Stryker MDM wipe as retaliation for a February 2026 Iranian school missile strike, asserting 200,000 devices wiped and 50 terabytes exfiltrated. The public framing positions the operation as proportionate non-lethal retaliation, a characterisation no Western agency has formally attributed to IRGC command-and-control.