UK Cyber Security & Resilience Bill

runZero's exposure management platform addresses key requirements of the UK Cyber Security and Resilience Bill. The Bill upgrades the existing NIS Regulations 2018 and introduces stringent security requirements for operators of essential services (OES), managed service providers (MSPs), and critical suppliers.

Our Alignment

Key requirements of CSRB

What We Do

runZero delivers complete, real-time visibility across your entire attack surface — IT, OT, IoT, cloud, mobile, and remote. Using active scanning, passive discovery, and deep integrations, runZero creates a unified, continuously updated inventory with rich context, ownership, classifications, and network topology.


Your Outcome

A single source of truth for every asset you own (and potentially didn’t know you had), empowering you to meet requirements and eliminate blind spots before they become incidents.

What We Do

runZero helps you understand your supplier ecosystem by identifying exposed software, services, certificates, external connections, and third-party dependencies, along with automatic detection of end-of-life and unsupported systems.


Your Outcome

Gain visibility into risks lurking in your supply chain, strengthen oversight of critical suppliers, and stay ahead of regulatory duties for MSPs and other third-party providers.

What We Do

runZero identifies vulnerabilities, insecure configurations, missing controls, outdated systems, and risk-prone exposures across your environment. And we prioritize risk based on asset criticality and integrate with scanners, SIEMs, and ticketing tools for streamlined remediation.


Your Outcome

A proportionate, up-to-date vulnerability management program aligned with the CSRB security requirements and the ability to reduce risk faster with clear, actionable prioritization.

What We Do

runZero delivers instant asset context during investigations, complete service and communication mapping, historical asset data, and rapid data export for 24/72-hour reporting.


Your Outcome

Accelerated detection, triage, and investigation with the information you need to meet mandatory incident reporting timelines and limit the blast radius of attacks.

What We Do

runZero provides true multi-tenant visibility for MSPs, with isolated client environments, centralized management, granular role-based access, scalable discovery, automated reporting and API management. And we help MSPs enforce consistent security baselines, monitor exposures across clients, and meet the Bill’s new regulatory obligations for managed service providers.


Your Outcome

Confidently support every client environment, from small estates to massive networks, while meeting new compliance requirements, standardizing security operations and reducing the operational overhead of managing many customers at once.

What We Do

runZero provides OT-safe active scanning, passive discovery for fragile environments, broad protocol support, IT/OT segmentation validation, and visibility across hybrid and multi-cloud data centers.


Your Outcome

Compliance and resilience across newly in-scope critical infrastructure with safe, accurate discovery that protects the stability of high-value systems and ICS environments.

What We Do

runZero offers pre-built NCSC CAF-aligned dashboards, configurable compliance reports, audit trails, evidence collection, and easy exports for regulators and auditors.


Your Outcome

Simplified compliance workflows, maintain continuous regulatory readiness, and generate the documentation you need in minutes.

What We Do

runZero offers SaaS, self-hosted, and hybrid deployment options to meet data sovereignty, regulatory, and architectural requirements. Our agentless discovery and lightweight explorers make rollout fast, safe, and scalable across on-prem, cloud, and distributed environments.


Your Outcome

Deploy in the way that best fits your organization, without tradeoffs. Whether you require full on-prem control, cloud availability, or a hybrid mix, runZero adapts to your environment so you can meet security and compliance needs from day one.


Achieve Compliance

How runZero supports CSRB requirements

runZero's exposure management platform provides comprehensive capabilities to address the UK Cyber Security and Resilience Bill requirements. With complete visibility across IT, OT, IoT, cloud, and remote assets, organizations can meet NCSC CAF standards, manage supply chain risks, respond to incidents rapidly, and maintain continuous compliance.

Key benefits:

  • Comprehensive asset visibility: Discover and inventory all assets across hybrid environments
  • Supply chain transparency: Identify and monitor critical suppliers and dependencies
  • Rapid incident response: Meet 24/72 hour reporting requirements with complete asset context
  • MSP-ready: Multi-tenant architecture for the newly regulated MSP sector
  • OT/ICS safe: DoE-certified for critical infrastructure environments
  • NCSC CAF aligned: Pre-built reporting for regulatory compliance
  • Flexible deployment: SaaS, self-hosted, or hybrid to meet data sovereignty needs
  • Continuous compliance: Automated monitoring and reporting for ongoing compliance

Support Types:

Asset Discovery & Inventory

Complete visibility across IT, OT, IoT, cloud, mobile, and remote assets
Requirement Support How runZero Helps
OES must maintain accurate asset inventories to meet NCSC Cyber Assessment Framework (CAF) security requirements.
Direct
Asset Discovery
  • Active Scanning: Fast, accurate scanning across many protocols with support for IT, OT, IoT environments
  • Passive Discovery: Traffic sampling for always-on discovery without impacting fragile OT systems
  • API Integrations: Import asset data from cloud providers, CMDB, EDR, and endpoint management tools
  • Unified View: Single source of truth merging data from multiple sources
  • Real-time Updates: Continuous monitoring for new or changed assets
Asset Classification & Context
  • Automatic categorization of IT, OT, IoT, cloud, mobile, and remote assets
  • Asset ownership tracking and responsibility assignment
  • Location mapping and network topology visualization
  • Custom tagging and organizational structure support

Supply Chain Risk Management

Visibility into critical suppliers and third-party dependencies

Requirement Support How runZero Helps
OES must manage supply chain risks and meet duties regarding critical suppliers.
Indirect
Supplier & Vendor Visibility
  • Software Inventory: Complete catalog of network-exposed software and versions
  • Service Discovery: Identification of all network services and exposed endpoints
  • Certificate Management: Track SSL/TLS certificates including issuers and expiration
  • Third-Party Dependencies: Visibility into external connections and integrations
  • MSP Asset Tracking: Separate tracking for managed service provider environments
End-of-Life & Unsupported Systems
  • Automatic identification of EOL operating systems and software
  • Risk scoring for unsupported and vulnerable systems
  • Reporting on outdated infrastructure components
  • Integration with vulnerability databases for known issues

Vulnerability & Risk Management

Proactive identification and remediation of security exposures

Requirement Support How runZero Helps
Meet proportionate and up-to-date security requirements aligned with NCSC CAF.
Direct
Exposure & Vulnerability Detection
  • Vulnerability Identification: Detection of known vulnerabilities based on exposed software and services
  • Configuration Issues: Identify insecure configurations and misconfigurations
  • Integration with Scanners: Import vulnerability data from Tenable, Qualys, and other tools
  • Risk Prioritization: Asset-based risk scoring and prioritization
  • Control Gap Analysis: Identify missing security controls (EDR, patches, etc.)
Continuous Monitoring & Reporting
  • Real-time alerting on new vulnerabilities and exposures
  • Customizable dashboards and compliance reports
  • Trend analysis and risk metrics over time
  • Integration with SIEM and ticketing systems

Incident Detection & Response

Rapid identification and response to security incidents
Requirement Support How runZero Helps
Initial incident reporting within 24 hours, full report within 72 hours.
Indirect
24/72 Hour Incident Reporting Support
  • Asset Context: Immediate identification of affected assets and their criticality
  • Network Topology: Understand lateral movement paths and connected systems
  • Service Mapping: Identify all services running on compromised assets
  • Historical Data: Access to asset history and configuration changes
  • Export Capabilities: Rapid data extraction for incident reports (CSV, JSON)
Investigation & Forensics
  • Screenshot inventory of web services for visual inspection
  • Deep search capabilities across all asset attributes
  • Connection and communication mapping
  • Integration with EDR and SIEM platforms
  • Attack path visualization with BloodHound integration

Managed Service Provider (MSP) Compliance

Multi-tenant visibility and security for MSPs managing client environments
Requirement Support How runZero Helps
MSPs now regulated for the first time (900-1100 additional firms in scope).
Direct
MSP-Specific Features
  • Multi-Organization Support: Separate entities for different clients with isolated data
  • Centralized Management: Manage multiple client environments from single console
  • Role-Based Access: Granular permissions for MSP staff and client users
  • Client Reporting: Generate compliance and security reports per client
  • Scalability: Handle thousands to millions of assets across all clients
MSP Best Practices
  • Standardized security baselines across client environments
  • Automated compliance checking and reporting
  • Cross-client threat intelligence and anomaly detection
  • Efficient onboarding with agentless discovery

Data Center & Critical Infrastructure

Specialized capabilities for data centers and critical services
Requirement Support How runZero Helps
Data centers and systems managing electricity flow to smart appliances are now in scope.
Direct
OT & ICS Environments
  • Safe Scanning: DoE-certified safe for OT environments with no impact on ICS/SCADA
  • Passive Discovery: Traffic sampling for fragile environments where active scanning is restricted
  • Protocol Support: Extensive support for industrial protocols and legacy systems
  • Network Segmentation: Verify separation between IT and OT networks
  • Critical Asset Protection: Special handling for high-value and sensitive systems
Cloud & Hybrid Environments
  • Native integrations with Azure, AWS, GCP for cloud asset visibility
  • Hybrid environment support (on-premise + cloud)
  • Remote workforce asset discovery and tracking
  • Multi-cloud visibility and management

Compliance Reporting & Documentation

Automated reporting for regulatory compliance and audits
Requirement Support How runZero Helps
OES must meet security requirements drawn from the NCSC Cyber Assessment Framework.
Indirect
NCSC CAF Alignment
  • Compliance Dashboards: Pre-built reports aligned with regulatory frameworks
  • Custom Reporting: Configurable reports for specific compliance requirements
  • Audit Trail: Complete history of changes and security events
  • Evidence Collection: Automated gathering of compliance evidence
  • KPI Tracking: Monitor key security metrics and improvement over time
Export & Integration
  • CSV and JSON exports for external analysis
  • API access for custom integrations and automation
  • Integration with analytics platforms (Tableau, PowerBI)
  • Webhook support for real-time notifications
  • SIEM integration for centralized security management

Deployment Flexibility

Multiple deployment options to meet organizational requirements
Requirement Support How runZero Helps
Organizations may have data sovereignty and security requirements.
Direct
Flexible Architecture
  • SaaS Deployment: Fully managed cloud service for rapid deployment
  • Self-Hosted: On-premise deployment for complete control and data sovereignty
  • Hybrid Model: Mix of cloud console with on-premise explorers
  • Lightweight Agents: No heavy agents required - Explorer runs as lightweight service
  • Agentless Discovery: No endpoint software required for discovery
Free Community Edition
  • Fully functional version for environments with ≀100 assets
  • Ideal for small businesses, individuals, and security researchers
  • Includes active scanning, integrations, and passive discovery
  • Perfect for MSPs managing smaller client environments