MSPs are increasingly the attack vector in supply chain breaches. The 2021 Kaseya / REvil incident remains the canonical example: a single MSP RMM tool compromise affected 1,500 downstream organisations. The RFP requirement is not just that the MSP follows good security practice but that they operate against a recognised framework with auditable evidence.
SEC-01
NIST CSF 2.0 alignment
MSP maps their operating practices to the six NIST CSF functions (Govern, Identify, Protect, Detect, Respond, Recover). They provide a self-assessment scorecard against each function and disclose where they are externally audited vs self-attest. The 2024 update to CSF added Govern as an explicit function; require the MSP's mapping to use the 2.0 version.
SEC-02
CIS Controls v8 evidence
Top 18 CIS Controls operationalised across the MSP's tool stack. Particularly important: Control 5 (account management), Control 6 (access control), Control 8 (audit log management). Ask for the MSP's CIS Controls Self-Assessment Tool output for the past 12 months.
SEC-03
RMM tool security posture
The MSP's remote monitoring and management tool is the attack surface that matters most. Ask: which RMM (ConnectWise Automate, NinjaOne, Datto RMM, Atera, etc.), the MFA enforcement on RMM admin access, the privileged-access management for technician credentials, and the most recent vulnerability disclosure response time for their RMM vendor.
SEC-04
SOC 2 Type II report
MSP carries a SOC 2 Type II report covering the period including the past 6 months minimum. Provided under NDA. Particularly relevant trust service criteria: Security (mandatory), Availability (relevant given the SLA commitments), Confidentiality (relevant given client data access).
SEC-05
Incident response plan
MSP's documented IR plan including: detection capability (EDR, SIEM, logs), escalation matrix, customer notification SLA (typically 24 hours for security incidents affecting client data), and the post-incident review process. Plan tested annually (tabletop exercise or full simulation).
SEC-06
Backup + recovery testing
Specific to client data and infrastructure managed by the MSP: backup frequency, retention, encryption, off-site copies, and quarterly restore testing. The MSP should restore a sample restore monthly as a routine practice, not just on incident.