Blog
Compliance
ISO 27001
Cyber Essentials
NHS DSPT
April 16, 2026
Approx 8 min read

Multi-Framework Compliance Strategy: Save Time and Money

A healthcare SaaS company selling into NHS trusts typically needs six compliance frameworks before procurement will sign off: DSPT v8, ISO 27001, Cyber Essentials Plus, GDPR accountability documentation, DTAC version 2, and either DCB 0129 or DCB 0160 depending on whether they manufacture or deploy clinical risk software. A defence subcontractor bidding through a prime needs ISO 27001, Cyber Essentials Plus, DefStan 05-138, and Cyber Security Model version 4 certification. Financial services firms building operational resilience evidence under FCA PS21/3 need ISO 27001, GDPR documentation, and increasingly Cyber Essentials Plus as a supply chain condition.

For the compliance lead at any of these organisations, and often the founder or CTO wearing that hat part-time, the prospect of running each framework as a separate project is familiar. It is also the most expensive and time-consuming way to do it.

A multi-framework compliance strategy treats these overlapping standards as a single programme. Evidence gathered once maps across every applicable framework. The result is fewer audit cycles and lower costs, with controls that stay current instead of drifting between certifications.

The compliance pile-up facing UK businesses

The number of frameworks a typical service organisation must satisfy has grown steadily. Coalfire's annual compliance survey, an industry survey conducted across service organisations globally, found that roughly 70% now demonstrate compliance with at least six frameworks simultaneously (Coalfire, 2024). That figure tracks with what UK businesses experience across healthcare, defence, financial services, and enterprise software.

Running these frameworks sequentially creates a specific problem. A company that certifies to ISO 27001 in year one, then starts Cyber Essentials Plus in year two, and turns to DSPT in year three will find that the ISO controls documented 18 months earlier have drifted. Policies have been updated without reflecting changes in the ISMS. Staff have changed roles. Risk assessments reference systems that no longer exist. The sequential approach, where each framework is treated as a standalone project, typically takes 18 to 27 months to cover four or more standards. By the time the last one is complete, the first needs maintenance.

For the person at the end of this chain, the patient uploading records to an NHS app, the analyst logging into a defence supply chain portal, the customer authorising a payment, none of this administrative complexity should be visible. Their experience should be the same regardless of which framework sits behind it: fast and private. A multi-framework compliance strategy makes that more likely by keeping all controls current in a single system, rather than letting them decay across disconnected projects.

Where the frameworks actually overlap

The commercial case for a multi-framework approach rests on one fact: UK compliance frameworks share far more controls than they add uniquely. The evidence you build for one transfers directly to others.

ISO 27001 and Cyber Essentials

Cyber Essentials assesses five technical controls: firewalls, secure configuration, user access control, malware protection, and security update management. All five sit within ISO 27001:2022's 93 Annex A controls. Organisations that hold ISO 27001 certification have already documented and evidenced the controls that Cyber Essentials requires. The gap analysis for CE or CE+ after ISO 27001 is minimal, typically focused on the specific technical testing that CE+ adds rather than new policy work.

ISO 27001 and DSPT v8

NHS England designed DSPT version 8 to align with the National Data Guardian's ten data security standards, which map structurally to ISO 27001 principles. NHS England confirms that achieving ISO 27001 certification auto-completes a significant number of applicable DSPT items (dsptoolkit.nhs.uk). For healthcare suppliers approaching both, starting with ISO 27001 and mapping evidence into DSPT reduces the DSPT audit scope substantially. Our [DSPT v8 deadline guide] covers the specific timeline pressures ahead of the 30 June 2026 deadline.

ISO 27001 and GDPR

ISO 27001 directly supports GDPR compliance across Articles 5 (processing principles), 25 (data protection by design), 32 (security of processing), and 35 (data protection impact assessments). The ISMS documentation, risk assessment methodology, and access control evidence required for ISO 27001 form the technical backbone of a GDPR accountability framework. ISO 27701 extends the ISMS into a privacy information management system, providing a formal bridge between the two standards.

Cyber Essentials and DSPT

Historically, Cyber Essentials Plus certification covered several DSPT evidence items, particularly around multi-factor authentication. DSPT v8 removed the direct MFA equivalence that CE+ previously satisfied (evidence item 4.5.3), so organisations should not assume automatic completion. The overlap remains in areas like patching, access control, and malware protection, but each framework now requires its own specific evidence submission.

GDPR and DSPT

The DSPT embeds GDPR accountability requirements directly. The National Data Guardian and NHS England published a joint statement in September 2024 confirming that the DSPT is designed to cover the data protection obligations that health and care organisations owe under UK GDPR. Organisations that maintain thorough GDPR documentation, including records of processing activities, DPIAs, and breach response procedures, will find significant portions of their DSPT submission already addressed.

DefStan 05-138 and ISO 27001

The Ministry of Defence published an official mapping document between DefStan 05-138 Issue 4 and ISO 27001:2022, explicitly enabling evidence reuse between the two frameworks (GOV.UK). The mapping states that organisations can "re-use existing compliance evidence where appropriate", reducing the burden for defence suppliers who already hold ISO 27001 certification. DEFCON 658 flows these security requirements down through the supply chain. Our [MOD Secure by Design supplier guide] covers the full defence compliance picture.

NCSC CAF v4.0 cross-mappings

The National Cyber Security Centre published the Cyber Assessment Framework version 4.0 with official mappings to ISO 27001, Cyber Essentials, CIS Controls, and the UK Cyber Governance Code (NCSC, 2025). These mappings formalise what compliance teams have been doing informally: using evidence from one framework to satisfy requirements in another. For organisations operating across critical national infrastructure sectors, the CAF mappings provide a government-endorsed starting point for a multi-framework approach.

What your sector requires

The specific framework stack varies by vertical. Knowing exactly which standards apply prevents both gaps and unnecessary work.

Healthcare: six frameworks, one evidence base

NHS suppliers selling clinical software or handling patient data typically need DSPT v8, ISO 27001, Cyber Essentials Plus, GDPR accountability documentation, DTAC version 2, and DCB 0129 (for manufacturers) or DCB 0160 (for deployers). That is six frameworks. Run sequentially, they represent two to three years of compliance work and repeated evidence gathering. Run as a single programme with shared evidence, the timeline compresses substantially. Our [CSO requirements and DCB 0129] guide covers the clinical safety obligations in detail.

Defence: four frameworks with supply chain flow-down

Defence suppliers need ISO 27001, Cyber Essentials Plus, DefStan 05-138, and Cyber Security Model version 4 certification through IASME's Defence Cyber Certification scheme. DEFCON 658 means these requirements flow down to subcontractors, not just prime contractors. The MOD's published ISO/DefStan mapping makes the evidence reuse pathway official.

Financial services: regulatory resilience plus security standards

Firms regulated by the FCA or PRA need ISO 27001, GDPR accountability documentation, and operational resilience evidence under PS21/3. Firms with EU operations may also need to address DORA (Digital Operational Resilience Act) requirements, though DORA's scope centres on EU-regulated entities. ISO 27001 and GDPR evidence covers many of the same risk management and incident reporting principles that DORA requires. Naq does not currently offer a standalone DORA module, but the platform's ISO 27001 and GDPR coverage provides a foundation for firms assessing their DORA readiness. Our [PRA/FCA operational resilience blog] covers the specific UK regulatory expectations.

SaaS and enterprise technology: market access through certification

Enterprise buyers increasingly require ISO 27001 and Cyber Essentials Plus as procurement prerequisites. SOC 2 originates from the AICPA's Trust Services Criteria framework and shares approximately 80% control overlap with ISO 27001, based on published AICPA Trust Services Criteria mapping documents. Organisations selling into both UK and US markets can build their ISO 27001 ISMS and extend the evidence to satisfy SOC 2 requirements. Naq plans to extend its platform to include SOC 2 mapping in a future release. GDPR documentation rounds out the stack for any company processing personal data.

The "assure once, use many times" principle

Multi-framework evidence reuse is not a workaround. It is official policy across multiple UK regulators and standards bodies.

NHS England and the Health Research Authority explicitly use the phrase "assure once, use many times" as a design principle for their compliance frameworks. The intent is to reduce duplicated assurance burden on suppliers without weakening the standards themselves.

The NCSC designed the Cyber Assessment Framework to be mappable to other standards. The version 4.0 cross-mappings to ISO 27001, Cyber Essentials, and CIS Controls formalise this intent (NCSC, 2025).

BSI's integrated management systems approach recognises that ISO 27001, ISO 9001, and ISO 14001 share the same Annex SL high-level structure. Organisations implementing multiple ISO standards build their management system once and extend it, rather than starting from scratch each time.

The MOD's DefStan 05-138 mapping to ISO 27001 uses the specific language of "allowing organisations to re-use existing compliance evidence where appropriate" (GOV.UK).

Procurement Policy Note 014 states that security controls applied to government suppliers must be "relevant and proportionate" and should not "over-burden suppliers or deter SMEs" (Cabinet Office, PPN 014). The Procurement Act 2023, Section 56, goes further by requiring contracting authorities to accept equivalent certifications where they meet the same standard. Both provisions support the principle that compliance evidence should be assessed on its substance, not on which specific framework label it carries.

The cost of doing it one framework at a time

Running frameworks sequentially creates compounding costs that go beyond the direct expenses of each certification.

ISO 27001 certification for an organisation with fewer than 50 staff typically costs between 10,000 and 25,000 pounds in the first year, covering gap analysis, ISMS implementation, internal audit, and the external certification audit (BSI and UKAS-accredited certification body fee schedules, 2024-2025). Each additional framework run as a separate project adds its own gap analysis, its own evidence gathering cycle, and its own audit fees.

The hidden cost is controls drift. An organisation that achieved ISO 27001 in January and starts DSPT preparation in September will often find that access control documentation, risk registers, and incident response procedures have fallen out of alignment with what was certified nine months earlier. Staff changes, system updates, and policy revisions accumulate. The DSPT preparation then becomes partly a re-implementation exercise for ISO controls that should already be current.

ISMS.online's 2024 State of Information Security report, a vendor-conducted survey rather than independent research, found that 32% of compliance professionals report burnout related to increasing compliance workloads (ISMS.online, 2024). Sequential audit preparation cycles are a primary driver. Staff are pulled into preparing evidence packs, answering auditor queries, and remediating findings repeatedly, often for controls they have already demonstrated under a different framework label.

A parallel approach changes the economics. A single discovery phase identifies all applicable frameworks. Evidence is collected once and mapped across every standard. Gap analysis covers all frameworks simultaneously, so remediation work addresses every requirement in one pass. Based on Naq platform data, organisations running four or more frameworks in parallel typically reach full compliance in 6 to 12 months, compared to 18 to 27 months for a sequential approach.

The business case beyond the certificate

Compliance certification creates commercial value that extends well past the certificate itself.

The NCSC's "Cyber Essentials: The Cross-Sector Impact" report (2023) found that organisations holding Cyber Essentials certification experience 92% fewer insurance claims related to cyber incidents. In financial services supply chains, the NCSC Supply Chain Playbook published in December 2025 documented an 80% reduction in incidents across a supply chain of 2,800 businesses that adopted standardised security frameworks (NCSC, 2025).

Procurement access is the most direct commercial benefit. PPN 014 makes Cyber Essentials a condition for government contracts involving the handling of certain types of information. NHS Supply Chain mandates DSPT compliance for health sector suppliers. Six major UK banks, Barclays, Lloyds Banking Group, Nationwide, NatWest, Santander UK, and TSB, committed publicly to requiring Cyber Essentials from their supply chains (GOV.UK, Cyber Essentials Supply Chain Commitment, October 2024). Each additional framework certification opens a new procurement channel without requiring a separate business development effort.

Arnold Bouwman, co-founder of Vormats, a compliance automation company operating in the enterprise software sector, achieved ISO 27001 certification through Naq and reported a shortened sales cycle as a direct result. Procurement conversations that previously stalled on security questionnaires moved to commercial terms once the certification was in place.

Gartner projects that legal and compliance functions will increase their spending on governance, risk, and compliance platforms by 50% by 2026 (Gartner, 2024). More frameworks, more supply chain requirements, and more procurement gates tied to certification are already arriving. The UK Government's Cyber Security and Resilience Bill, currently progressing through Parliament, will expand supply chain security obligations further.

Organisations that build a multi-framework evidence base now will be positioned to absorb new requirements as they emerge, rather than starting from scratch each time a regulator or procurement team adds a condition.

How Naq automates multi-framework compliance

Naq's platform is built around the principle that evidence collected once should map across every applicable framework. The platform automates compliance across 20 or more frameworks from a single dashboard, with more than 300 integrations pulling evidence directly from the tools organisations already use.

Rather than running separate projects for ISO 27001, Cyber Essentials, DSPT, GDPR, and sector-specific standards, the platform identifies which frameworks apply, maps the control overlaps, and collects evidence once. When a policy document satisfies requirements in both ISO 27001 and DSPT, it is recorded once and referenced in both framework submissions.

Based on Naq platform data, organisations save more than 200 hours per additional standard by eliminating duplicated evidence gathering and manual cross-referencing. Compared to engaging a traditional compliance consultancy for each framework separately, that represents more than 20,000 pounds in savings. Pricing starts from 249 pounds per month.

The Cyber Security and Resilience Bill will add new supply chain obligations when it passes. Organisations already running multi-framework compliance on Naq will absorb those requirements through the same platform, the same evidence base, and the same controls they have already built. For their end users, the patients, customers, and service members whose data flows through these systems, the protection stays current without gaps between certification cycles.

Book a demo to see how Naq maps your existing evidence across every framework you need.

Written by
The Naq Team