Bank Suppliers and Cyber Essentials: The Six-Bank Commitment and FSQS

Bank Suppliers and Cyber Essentials: The Six-Bank Commitment and Financial Services Qualification System (FSQS)
The UK banking sector is moving towards requiring Cyber Essentials from its supply chain. Six of the UK's largest banks have publicly committed to it. The Financial Services Qualification System (FSQS) platforms that gate supplier access are asking about it. And the government has written to FTSE 350 CEOs telling them to adopt it.
If you supply goods or services to UK banks, this is the landscape you're working in.
The CE Supply Chain Commitment Joint Statement
Six major UK banks have signed the CE Supply Chain Commitment Joint Statement. They've publicly committed to promoting CE across their supply chains:
- Barclays
- Lloyds Banking Group
- Nationwide Building Society
- NatWest Group
- Santander UK
- Trustee Savings Bank (TSB)
These banks serve tens of millions of UK customers. By signing, they commit to encouraging, and over time requiring, Cyber Essentials from their suppliers.
This is not an informal tip but a public, documented commitment from named institutions. When a bank signs this kind of statement, procurement teams act on it. Questionnaires change, criteria tighten, and contract terms get updated.
What the data shows
The Department for Science, Innovation and Technology (DSIT) Cyber Security Breaches Survey and industry data show where the market is heading.
61% prefer CE-certified suppliers
Of organisations that factor cyber security into procurement, 61% prefer suppliers with CE. They don't auto-reject uncertified suppliers, but CE is a meaningful factor in the decision. (referenced in the cross-functional governance benchmarking report).
In a competitive bid where suppliers are scored on similar criteria, CE puts you ahead. When 61% of buyers state that preference, the commercial edge is real.
33% plan to mandate CE
Beyond preference, 33% of those surveyed plan to make CE mandatory for suppliers. In banking, with its strict rules on data protection and operational resilience, that figure is likely higher.
The gap between "prefer" and "mandate" is closing. Organisations that currently prefer CE are building procurement rules to require it. Suppliers who certify now are ready when the mandate lands. Those who wait face the same deadline pressure that government suppliers have dealt with since Procurement Policy Note (PPN) 014.
FSQS: 76 financial institutions, one qualification system
FSQS is the shared supplier qualification platform used by financial institutions across the UK. Managed by Hellios, it lets suppliers complete one assessment that many buyers accept.
Who uses FSQS
76 financial institutions use FSQS to qualify and monitor suppliers. This includes major banks, building societies, insurers, and financial services firms. For suppliers to the sector, FSQS registration is often the gateway to winning work.
How CE fits into FSQS
The FSQS assessment asks about information security and cyber security practices. It asks whether you hold Cyber Essentials or CE Plus.
CE is not an absolute FSQS requirement today, but the direction is unmistakable. Financial institutions using FSQS put more weight on cyber security certification each year. A supplier with CE scores higher than one without it, all else being equal.
If you want to work with multiple financial institutions, the best approach is simple. Get CE certified, then register on FSQS with your certificate as evidence. That single CE certificate strengthens every FSQS application across all 76 institutions.
The open letter to FTSE 350
The government's push for Cyber Essentials goes beyond the public sector. Six senior officials (four cabinet ministers plus the heads of the NCSC and National Crime Agency (NCA)) wrote an open letter to every FTSE 350 CEO, calling on them to act on cyber security.
The letter named Cyber Essentials as the baseline standard. It urged large organisations to certify themselves and to require CE from their suppliers. The signatories made clear that cyber security is a board-level duty. Requiring CE from suppliers is a reasonable step.
For banking, this backed up what the joint statement already signalled: the government expects large financial institutions to drive CE adoption through procurement.
The open letter and the joint statement send the same message from both government and industry. Banks aren't being asked to adopt CE. They've committed to it publicly, and the government is backing that commitment.
Why banks care about supplier security
Banks don't require CE out of general interest in standards. They do it because regulators expect them to manage supply chain risk. Supplier breaches directly affect their customers and operations.
Regulatory pressure
The FCA and Prudential Regulation Authority (PRA) expect financial institutions to manage third-party risk effectively. The FCA's resilience framework requires firms to spot and manage disruption risks, including those from suppliers. If a supplier breach disrupts banking services or exposes customer data, the bank faces the regulatory consequences, not just the supplier.
CE gives procurement teams a documented baseline to point to. When a compliance team needs to show they assess supplier cyber security, a CE requirement is clear evidence.
Operational resilience
The UK's operational resilience framework took full effect in March 2025. It requires financial institutions to identify key business services and set limits on how much disruption they can tolerate. Supply chain disruption is a known threat.
A CE-certified supplier has shown that five basic controls are in place: firewalls, secure configuration, user access control, malware protection, and patch management. These controls cut the risk of a supplier compromise that disrupts the bank.
Customer data protection
Banks hold vast amounts of personal and financial data. Suppliers who access or process that data fall under the bank's UK GDPR duties. A supplier breach that exposes customer data creates liability, regulatory scrutiny, and reputational damage for the bank.
CE does not guarantee a supplier won't be breached, but IASME data shows an 80% drop in claim likelihood for CE-certified organisations, which demonstrates that the controls cut real risk. Major UK cyber insurers (Aviva, Hiscox, American International Group (AIG), Chubb, and AXA) factor CE into their underwriting. AIG directly underwrites the free cover included with every CE certificate, and banks use CE as evidence that suppliers meet a reasonable baseline.
What this means for suppliers
If you already supply banks
Check whether your banking clients have updated their supplier rules. The six banks that signed the joint statement will tighten procurement criteria over time. If you don't hold CE yet, the question is not whether you'll need it, but when.
Getting certified before it becomes mandatory gives you time to fix any issues. It's better to find out your patching is behind or your MFA isn't enforced now, not during a supplier audit.
If you want to supply banks
CE is becoming a table stake for the financial services supply chain. If you're targeting banking clients, having CE shows you take security seriously before the conversation starts. It's one less objection in procurement and one more reason for the buyer to pick you.
For financial services, CE Plus is the stronger credential. Banks value independent technical testing over self-assessment. The gap between CE Basic (self-assessed) and CE Plus (tested by an independent assessor) matters to procurement teams that manage risk for a living.
The timeline
CE Basic starts at £320 + VAT with Net Sec Group. Standard turnaround is 48 hours, with 12-hour fast track available. CE Plus starts at £1,200 + VAT. The bundle combining both is £1,400 + VAT.
If you supply multiple financial institutions, one certification opens doors across the sector. A single CE certificate is valid for 12 months. Every bank, building society, and financial services firm that asks about it will accept it.
If you supply UK banks and want to get ahead of the CE requirement, contact us. We can scope your assessment and certify you within the procurement timeline.
Book CE Basic | Book CE Plus | Book the Bundle
Related articles
- Free Cyber Insurance with Cyber Essentials
- PPN 014: Which Government Contracts Require Cyber Essentials?
- What the Cyber Security and Resilience Bill Means for MSPs
- The Full Cyber Security Journey: CE Basic to Pen Testing
Get cybersecurity insights delivered
Join our newsletter for practical security guidance, Cyber Essentials updates, and threat alerts. No spam, just actionable advice for UK businesses.
Related Guides
DEFCON 658: Cyber Essentials Requirements for the Defence Supply Chain
MOD DEFCON 658 requires Cyber Essentials across the entire defence supply chain. CE minimum for all contracts, CE+ for most risk levels. Here's how it works, who it applies to, and what DEF STAN 05-138 means for suppliers.
G-Cloud 15: Cyber Essentials Will Be Required for All Suppliers
G-Cloud 15 makes Cyber Essentials mandatory for all supplier lots when it goes live in September 2026. CE+ is required for cloud hosting. Here's what changed and what suppliers need to do now.
NHS Suppliers: Cyber Essentials and CE+ Are Now Mandatory
NHS supply chain organisations handling patient data must now hold Cyber Essentials and CE+ certification. Here's what changed, who it affects, and how to get certified in under a week.
Ready to get certified?
Book your Cyber Essentials certification or check your readiness with a free quiz.