Secure Innovation

Secure Innovation

Secure Innovation

Five Eyes Launch Shared Security Advice Campaign for Tech Startups

FVEY Logo

Today, members of the Five Eyes intelligence partnership launched Secure Innovation, shared security guidance to help protect emerging technology companies from a range of threats, particularly those from nation-state actors.

The launch of this joint protective security guidance aimed at protecting the tech sector from national security threats follows last October's unprecedented summit which brought together the heads of the domestic security and intelligence agencies from Australia, Canada, New Zealand, the UK, and the U.S. to announce Five Shared Principles to protect technology companies.

Secure Innovation provides the tech sector with a set of cost-effective measures that companies can take from day one to better protect their ideas, reputation, and future success.

This announcement demonstrates the increased commitment from all Five Eyes nations to work collaboratively against this shared threat. Businesses in Australia, Canada, New Zealand, the UK, and the U.S. can take advantage of a collection of Secure Innovation resources, guidance, and products now available across all Five Eyes countries.

This means companies can benefit from consistent and consolidated advice reflecting both the globalized and interconnected tech startup ecosystem as well as the global nature of the security threats startups face.

"The Five Eyes partners face unprecedented threats to our emerging tech ecosystems. So, today we're arming tech firms across our nations with guidance on how to secure the innovation so critical to our future," said Mike Casey, Director of the National Counterintelligence and Security Center (NCSC). "This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks."

Secure Innovation for Companies

Competition to succeed in emerging technology can be intense. This guidance outlines cost-effective recommendations you can adopt from day one to better protect your ideas, reputation, and future success. Good security practices can protect your competitive advantage, making your company more attractive to investors and customers.

Principles for Companies

NCSC Safeguarding Our Future

Safeguarding Our Future

These bulletins provide an overview of a specific foreign intelligence threat and mitigation steps.

The U.S. emerging technology ecosystem is an attractive target for state actors looking to steal technology, competitors seeking commercial advantage, and criminals looking to profit. Emerging technology companies of all sizes – particularly those with weak security – are targeted by actors seeking to steal technology to fast-track their technological capability, to undermine your competitive edge, to repress their own people to prevent dissent or political opposition, or to increase their military advantage over other countries. There are many ways hostile actors can target assets:

  • Insiders – People are your greatest asset but, in some cases, they can pose an insider risk
  • Cyber – Insecure IT can provide an easy way for your business to be exploited
  • Physical – Your assets could be stolen via physical access
  • International Travel – Hostile actors can operate more easily overseas than in the U.S.
  • Investment – Investment can be used to gain access to, and influence over, your company
  • Overseas Jurisdictions – International expansion can expose you to risk from foreign laws and business practices
  • Supply Chain – Vulnerable or malicious suppliers could compromise your business

Identifying those assets most critical to your company's success is an ideal starting point for your security planning. Completing a risk assessment will help you identify vulnerabilities and the potential impact of exploitation of those assets. Consider establishing a process to monitor evolving counterintelligence and security threats and implementing the following mitigations to help reduce risk to a level you find acceptable.

NCSC Safeguarding Science

Safeguarding Science

An outreach initiative for protecting research and innovation in emerging technologies.

  • Establish a security strategy for your business based on your critical assets, the risks they face, and the risks you are willing to tolerate.
  • Regularly review security policies and procedures, so they evolve with the threats to the business.
  • Establish security responsibilities with any new employees, contractors, or suppliers.

Build in security measures to protect your critical assets from the start.

  • Place barriers around the assets you prioritized for protection. These could be physical barriers, such as an access-controlled room, or virtual barriers such as a firewall.
  • Limit access to these assets to only those employees who need it and are trusted to use it securely.
  • Implement measures to detect unauthorized activity. Early identification of unauthorized or unusual access to an asset will help avoid or limit a security incident.

Intellectual Asset (IA) and Intellectual Property (IP) management strategies are essential for any business, and are an integral part of your business plans. Understanding the assets you have and what you want to do with them will help determine what actions are required. Know:

  • What you need to protect
  • How you need to protect it
  • The laws of the countries in which you are operating

Legal protections for your IA and IP do not mean they are completely secure. Continuously track and review who has access to your most sensitive information and how you ensure it remains secure. Ensure staff take an active role in IA and IP management. Consider adding IP clauses to employee contracts to help manage the risk to your IA and IP from current and former employees. The best security decisions are taken holistically and consider personnel, information, physical, and cyber risks together.

Partnerships are often essential to the success of a business, but they may also increase a company's information and data exposure. Know the "Three W's"

  1. Why are you collaborating? Clearly articulate the desired outcomes, as well as the benefits and risks associated with the partnership.
  2. Who are you working with? Conduct due diligence on prospective partners:
    • Do they have organizational structures or relationships that could compromise their independence or integrity?
    • Do they have links to foreign militaries, police, or security services?
    • Do you know the source of funds for any proposed transaction, whether direct or indirect?
    • Do they operate under a legal regime that could compel them to share your data or cooperate with their host government?
      • Is there publicly available information that raises concerns about their intentions or values?
      • Are they subject to U.S. sanctions, export controls, or similar designations in countries where you may consider doing business in the future?
      • Is there information that suggests a lack of transparency from the partner?
      • Could the partnership affect future investors, your global business, and long-term intentions?
      • Does their approach to managing data, security breaches, or incidents align with your own?
  3. What are you sharing? Help manage the risks associated with business collaborations by:
    • Determining early what data is appropriate to share and implementing measures to limit access to just that data.
    • Designing your architecture so your more sensitive systems are independent from those accessible to the wider organization and external parties.
    • Taking steps to ensure that third parties are handling sensitive data appropriately and securely.
    • Considering how you will regain your data and IP at the end of the collaboration, or if the partner reneges on a deal.

When working with international partners, consider the implications of local laws and regulations in foreign countries. Some legal regimes could compel overseas partners to release data or cooperate with state organizations.

  1. How are you protecting your innovation? Consider including protections for your assets and data and security requirements within contracts. Check that these requirements are understood and adhered to. Non-disclosure agreements (NDAs) and confidentiality agreements can allow you to put additional legal protections in place, usually for a defined length of time. An NDA can help restrict the use of your ideas and information to a specific permitted purpose. Nevertheless, NDAs do not replace good protective security measures. They can be a useful deterrent and fallback after an incident has occurred, but are unlikely to prevent intentionally hostile actors.
  2. Is this a secure investment? Investments into your company introduce both opportunities and risks. You may be able to benefit from your investors' experience to improve your business and security practices. However, investment can be used to gain access to, and influence over, your company. Early assessments of prospective investments to determine whether they raise security concerns will allow you to be better informed about possible outcomes and may also help you have a stronger negotiating position. Taking a security-minded approach from the start will enable you to make well-informed investment decisions. Consider the following steps:
    • Conduct due diligence on prospective investors
    • Be strategic when considering how much data or proprietary information you share with potential investors, both before and after any investment – what could you lose if an investor backs out of the deal?
    • Reflect on the following questions and implement appropriate mitigations before in-depth engagement with prospective investors:
      • Have you included provisions in your legal investment documentation to protect key operations, information, and data?
      • Have you considered how effective a legal or contractual agreement would be if you were relying on enforcement in an overseas jurisdiction?
      • Have you implemented a governance and reporting structure that ensures the risk management strategy remains effective over time?
  3. Supply Chain Risk Management

    Supply Chain Risk Management

    NCSC works to raise awareness about supply chain threats, while providing resources to mitigate risks.

    Is there a supply chain risk? Your supply chain could expose you to potentially damaging security threats. Supply chain attacks can compromise entire organizations and pose a potentially terminal risk to businesses. Carefully consider your decision to outsource, when it may provide another organization with access to your critical assets. Consider how to reduce unnecessarily sharing sensitive data or access to sensitive systems. Assess the impact on your business if your supplier is compromised. Use this assessment to determine appropriate security measures to include within the contract.
    • Conduct independent due diligence on suppliers and seek security assurances from them. Consider building diversity and resilience into your supply chain if you are reliant on one supplier. Security clauses in contracts can help hold suppliers accountable for their security responsibilities. As your company grows, you may be able to take more control of your supply chain security by demanding greater security assurances from your suppliers.
    • Include security as part of your service. It could give your business a competitive edge. Depending on your sector or customer, there may be a requirement to meet further standards. If this is the case, make sure you understand why a particular standard is needed, and how you can meet future requirements.

Expand safely into new markets.

  • As you grow, there may be more need for employees to travel internationally. Consider whether planned travel is likely to introduce additional risks and build in appropriate steps to mitigate them.
  • When expanding into new markets, you will need to be aware of U.S. export controls. Certain products, software, or technology (including the intangible transfer of critical, technical knowledge) are ‘controlled' and therefore may require an export license. It is the exporter's responsibility to check whether items require an export license.
  • Understand the local laws in the countries where you plan to operate. Different countries have different export control laws, as well as laws regarding the handling and storage of IP and data. National security laws in foreign countries may allow that country's government to access data or information stored in, or transmitted via, that country. Understanding local laws will help ensure you are legally compliant and that you better understand the additional security risks involved in expansion into new markets.
  • Many IP rights are territorial and only give protection in the countries in which they were granted or registered. IP legal frameworks can also differ by country. If you are considering trading internationally, familiarize yourself with the IP framework and enforcement processes in that market. Register your IP rights in advance of entering the market and ensure you are resourced to defend those rights, if required.
  • National security laws in foreign countries may allow that country's government to access data stored in, or transmitted via, that country.
    • China's National Intelligence Law allows China's intelligence agencies to compel individuals and organizations to support and cooperate with state intelligence work. Intelligence work could capture any information to protect China's national interests, be that military, political, economic, social, technological, cultural interests. The law does not allow individuals or organizations to refuse to provide access, information, or support if requested.
    • Russia has an extensive lawful intercept capability, known as the System of Operative Search Measures (SORM). SORM allows Russia's Federal Security Service (FSB), to covertly monitor communications to, within, and out of Russia. The FSB can also compel individuals and organizations to share data stored in Russia with the Russian government and can prevent the data holder from informing the data owner about the disclosure. All communication service providers operating in Russia are obliged to install equipment to enable the FSB to monitor communications.
  • Understand U.S. laws and regulations regarding data protection and transfers abroad, as well as data laws in the countries in which you are operating.
  • As your company grows, you may no longer be able to rely primarily on personal relationships to ensure trust. It is vital that you can trust your workforce to protect your assets and information, and to deter, detect, and report potential security incidents. As you recruit more employees, it is important that you screen potential candidates who wish to be part of your business and access your critical assets. Security checks could include:
    • Confirmation of identity
    • Nationality and immigration status
    • Employment and education history
    • Criminal records check
    • Financial records check
    • Personal references
    • Open-source environment
    • National security vetting (for access to government classified information)
  • Foster a culture in which employees are confident they can speak openly about security concerns; that the organization will likely improve as a result; and that any actions will be reviewed fairly. It should be easy and routine for employees to report concerns. Handling those concerns should be done sensitively and without apportioning blame. Keeping those involved informed of both the progress and benefits of any resulting actions will help reinforce confidence in reporting.
  • Consider providing security training for all employees (permanent, temporary, or contracted) to maintain your security culture. Effective education and training help individuals understand the policies, standards, and procedures in place to maintain security. Individuals should also understand the threats facing your business; their security responsibilities; and how to report security concerns.
    Security education and training should start at the time of hiring and continue as employees move internally between jobs. Leaders should set an example and reinforce good security practices. Tailored education and training should be provided for job roles with specific security responsibilities: security managers across business areas, security officers and guards, line managers, IT professionals and developers, etc.
  • Consider providing additional support to high-risk roles. Role-based security risk assessments help keep your security measures proportionate and effective. Assessments of risks to your business and critical assets should provide you with a foundation for determining which roles have a higher risk exposure and require more comprehensive security training and support.
  • Prepare for incidents by creating an incident management plan that contains:
    • Contact details for anyone you would need to contact to help you identify an incident. These may include a web hosting provider, IT support services or insurance company.
    • Clearly defined responsibilities and an escalation criteria and process for critical decisions. This should ideally include contact details and contingencies in case a key member of staff is unavailable.
    • A coordination function to track and document findings and actions. A good record of the incident is useful for post-incident reviews and determining where it is necessary to report the incident.
    • Use lessons learned from post-incident reviews to update your response plan and security practices.
  • Monitor your IT to spot anomalies, which may reveal security incidents. Monitoring user activity, in accordance with privacy and civil liberty laws, can help identify any unauthorized or accidental misuse of systems or data by users. As elsewhere, understanding the risks you are most concerned about will enable you to focus your monitoring to collect information relevant to your needs.
  • Recognize potential risk indicators of an insider who feels disgruntled and potentially motivated to harm the organization. A response designed to help the employee overcome challenges or concerning behavior can improve the employee's relationship with the company, thereby reducing risk to your organization. Potential indicators may include:
    • Changes in work patterns
    • Conflicts at work
    • Decline in performance
    • Drug or alcohol abuse
    • Aggressive behavior
    • Mishandling sensitive data
    • Debt
    • Unexplained wealth

Companies Resources (downloadable documents)

  1. Security Advice for Emerging Technology Companies (PDF)
  2. Scenarios and Mitigating Actions (PDF)
  3. Travel Guidance (PDF)
  4. Due Diligence Guidance (PDF)
  5. Companies Summary (PDF)

Secure Innovation for Investors

Competition to succeed in emerging technology can be intense. This guidance offers recommendations to help you empower the companies you invest in to protect their innovation, business, and profitability. Good security practices are also good investment practices.

Principles for Investors

NCSC Safeguarding Our Future

Safeguarding Our Future

These bulletins provide an overview of a specific foreign intelligence threat and mitigation steps.

Investors are not the only people interested in emerging technology companies. Because the U.S. is a global leader in research and development and has a vibrant startup ecosystem, innovative U.S. companies are attractive targets for hostile actors looking to steal technology, competitors seeking commercial advantage, and criminals looking to profit. Companies with weak security are especially at risk from hostile actors trying to fast-track their technological capability (undermining your competitive edge); repress their own people to prevent dissent or political opposition (damaging your reputation); or increase their military advantage over other countries (risking our national security).

These activities pose a terminal risk to those businesses, jeopardizing your investment returns. There are many ways hostile actors could try to acquire your portfolio companies' assets:

  • Insiders – People are a business' greatest asset but, in some cases, they can pose an insider risk
  • Cyber – Insecure IT can provide an easy way for your portfolio companies to be exploited
  • Physical – Your portfolio companies' assets could be stolen via physical access
  • International Travel – State-backed actors can operate more easily overseas than in the U.S.
  • Investment – Investment can be used to gain access to, and influence over, your portfolio companies
  • Overseas Jurisdictions – International expansion exposes businesses to jurisdictional risk from foreign laws and business practices
  • Supply Chain – Vulnerable or malicious suppliers could compromise your returns

Pre-Investment: Consider security risks during your pre-investment due diligence on the company and other investors involved. The following questions will help you weigh counterintelligence and security issues that could affect the chances of your investment being a financial and reputational success.

  • Does the company have any investors that pose significant risks?
  • Could the involvement of other investors inhibit future fundraising or sale of the company because of legal, ethical, or compliance issues? For instance, are other investors subject to U.S. sanctions, export controls, or similar designations?

Post-Investment: Startups struggling to establish themselves may find it difficult to prioritize security. As an investor, you may have a unique opportunity to inform your portfolio companies' attitudes toward security to help them succeed and protect your investment. Consider building certain security requirements into your funding agreement with the company.

Secure Innovation for Companies provides guidance to emerging technology companies on cost-effective measures they can take to lay the foundations for strong security from day one. It is based on an approach to security that focuses on identifying the companies' most valuable assets, assessing the risks to those assets, and putting mitigations in place. The following questions follow this approach. They are intended to help your early conversations with prospective ventures, both as part of your due diligence and to support their growth into secure and prosperous companies developing cutting-edge technology.

  • Is security discussed and owned at the Board level?
  • Has the company identified its most valuable assets?
  • Is security included in the company's risk register?
  • Are security measures centered around the company's critical assets?
NCSC Safeguarding Science

Safeguarding Science

An outreach initiative for protecting research and innovation in emerging technologies.

Enduring roles and responsibilities for security should be established early. One of the first things that can indicate a company is taking security seriously is clear accountability at the top. This may mean the company has identified a senior leader with the authority and responsibility to ensure that security risks are considered along with other risks to the business. By incorporating security risks into the company's risk register, they are demonstrating an awareness and commitment to managing the risks they face.

Your early involvement can help shape the company's culture to be one in which security, and security incidents, are openly discussed so the company can learn from experience. A good security culture at a startup level is a critical component of a robust security regime. By making security part of your due diligence process and having an open security dialogue, you will help reinforce the message that security is an important component of doing business.

The return on your investment may depend on the startup understanding which assets form the basis of their competitive advantage and ensuring those assets are protected. These assets could include the company's personnel, premises, products, services, information, and technology. It is not always possible to protect everything against every threat, especially for small companies with limited resources. However, security protections can cost less than expected, and will usually pay long term dividends. Security decisions should be prioritized, proportionate to the threat, and based on a thorough understanding of what is most important to the survival and success of the startup – and your investment. Below are questions you might ask of the company you are investing in:

  • What are the company's goals and priorities?
  • What are their most critical assets?
  • What are the threats to those critical assets?
  • What is the likeliness and consequence of a threat impacting the company?

The security of any technology products the startup produces will likely be central to the success of the product and the company. Technology is more secure when security has been built in from the start and based on a combination of information, physical, personnel, and cyber security measures.

How an organization plans, manages, and protects their ideas should be a crucial feature in their business planning. A company should have the appropriate Intellectual Asset (IA) and Intellectual Property (IP) protections in place (whether through registered rights or contractual terms and conditions) for the jurisdictions in which they want to operate. You don't want to invest time and money in a business to later find their IP belongs to someone else or is ineligible for IP protection.

However, having the right legal protections for IP in place does not mean it is no longer at risk. Access to a company's most sensitive information should be actively tracked, reviewed, and managed to ensure it remains protected. Questions to ask:

  • Have they built security into their products from the beginning?
  • Do they have a strategy to identify and manage their IP?

As an investor, partnerships are a way of growing your investment by attracting more customers and collaborators. However, it is also worth informing the company that their choice of third parties may impact your, and potential customers', ability or willingness to do business with them.

Investment – The identity of other investors involved with your portfolio companies may impact you too, especially when considering the following:

  • The investor's reputation and track record
  • The source of their funds (because some hostile investors may seek to obfuscate their involvement)
  • Any implications of the legal regime they are subject to (especially for an overseas investor)
  • Whether they have any unexpected or undisclosed commercial, political, or military ties
  • Whether they are on the entity or sanctions list of other countries, particularly those countries the startup is, or may consider, doing business with.

Collaboration – Regardless of the collaboration partner, companies should always ensure that any risks they are exposed to are managed in accordance with their risk appetite (and your own as the investor). The following questions will help you discuss these risks with companies you are investing in:

  • Has the company limited the data, information, and knowledge it shares to only what is necessary and within its risk tolerance?
  • Are the values and objectives of the parties that the company wishes to collaborate with aligned to your own?
  • Are their networks segregated?
  • Are there appropriate technical and policy protections to ensure that data shared with partners (customers, investors, etc.) is limited to what is necessary?
  • Do partners' approaches to managing data and security breaches or incidents align with your own?
Supply Chain Risk Management

Supply Chain Risk Management

NCSC works to raise awareness about supply chain threats, while providing resources to mitigate risks.

Supply Chain – Many startups outsource certain functions to external providers with special expertise. To reduce risks from these external providers, companies can seek suppliers whose security meets their requirements. However, as an investor, you should always assess how a company's suppliers affect their risk profile.

Supply chains present complex security risks for startups, so considering them should be a part of your due diligence process. A series of high-profile attacks on companies has demonstrated that attackers have both the intent and ability to exploit vulnerabilities in supply chain security, often having detrimental consequences for the success of the company. A few relevant questions:

  • Has the company considered security at each stage of the procurement process?
  • Has the company conducted due diligence on its suppliers?
  • Has the company used suppliers whose security arrangements meet the company's requirements?
  • Does the company have a risk assessment process for external suppliers?

The risks you take on as an investor are not always static: a company's resilience against security threats will likely change over time. As the startup evolves, so do the threats and the company's resources to deal with them. You should continue to discuss and champion security for the duration of your involvement with the company.

Expanding into New Markets – Exports may be subject to U.S. and international sanctions or export control regulations, particularly when items may have military as well as civilian applications. Different countries have different export control laws, as well as laws regarding the handling and storage of IP and data (possibly including requirements to install certain hardware or allow configuration to permit remote access to data by governments). National security laws in foreign countries may allow that country's government to access data or information stored in, or transmitted via, that country. Understanding local laws of foreign nations will help ensure that you understand the additional security risks involved in expansion into new markets.

Foreign Travel – Foreign travel by employees of the startup could increase their exposure to security risks. Certain foreign countries are actively targeting U.S. innovation. Travel to those countries, or to third-party countries where threat actors can operate easily, could put the employees and the startup's innovation at risk. Questions to ask:

  • Has the company put in place proportionate and effective security practices for international travel?
  • Is the company compliant with U.S. and international export laws?
  • Are you and the company aware of local laws in countries in which they are expanding, and how they could affect their business?

Security for a Growing Team – As the company grows, it is likely to hire new employees, contractors, and suppliers, and may no longer be able to rely primarily on personal relationships to establish trust. Companies operating in sensitive sectors should effectively screen new recruits and staff moving into sensitive roles. Staff access controls should be role-specific, with access to sensitive assets restricted to only those individuals who need it and are trusted to use it securely. Furthermore, an established security training package and willingness to openly discuss security will help ensure that everyone shares responsibility for security.

Preparing for Security Incidents – You cannot protect against all eventualities, but the damage caused to your investment by a breach can be reduced through a well-planned and executed response. This means the company needs to establish and test an incident management plan and processes to detect and explore unexpected behavior.

Questions to ask:

  • Has the company implemented and tested an incident management plan?
  • Does the company detect and investigate unexpected behavior in IT and staff?

Investors Resources (downloadable documents)

  1. Security Advice for Emerging Technology Investors (PDF)
  2. Due Diligence Guidance (PDF)
  3. Investors Summary (PDF)

* * *  NOTE  * * *


The information contained in this document is accurate on the date it was created and is intended as general guidance only. Consider the enclosed information within the context of existing laws, regulations, authorities, agreements, policies, or procedures and consult with independent experts. To the fullest extent permitted by law, NCSC accepts no liability whatsoever for any loss or damage incurred or arising because of any error or omission in the guidance or arising from any person acting, relying upon, or otherwise using this guidance. References in this product to any specific commercial product, process, or service or the use of any corporate name herein is for informational purposes only and does not constitute an endorsement, recommendation, or disparagement of that product, process, service, or corporation on behalf of the Intelligence Community.

National Counterintelligence and Security Center