Security Aspects Letters (SAL): a practical guide for Defence, Government and CNI suppliers
News and information from the Advent IM team.
Security Aspects Letters can look dry until you realise they govern classified work, site access, vetting, and the rules of engagement for handling OFFICIAL-SENSITIVE, SECRET and above. Get the SAL wrong and you risk delays, mis-scoped controls, or rework mid-contract. Get it right and you create a clear, auditable bridge between policy and practice.
What a SAL does
A SAL sets out the sensitive elements of a specific contract and the security conditions to protect them. In plain terms: it tells you what needs protecting, why, and the minimum measures required, often by pointing to standard MOD contract clauses and associated security conditions. Buyers across Defence and government use SALs to mark which requirements attract extra controls.
Where SALs sit in the policy stack
JSP 440 underpins protective security in Defence. Rather than giving suppliers the entire manual, the contracting authority distils what you need via the SAL and linked security conditions. Treat the SAL as the operational extract you actually deliver against. Defence digital and Secure-by-Design principles still apply, and programmes should appoint appropriate security leads to interpret the SAL in context with other JSPs and assurance processes.
Who needs to care (and why)
What good looks like in a SAL
A well-crafted SAL should:
Common pitfalls that trip suppliers
GRC implications: turning a letter into lived control
In Defence and CNI, this discipline is the difference between passing a gate review and watching your delivery plan drift.
What you cover in SAL training
Why this matters now
Contracting authorities increasingly rely on SALs to make security requirements explicit without drowning suppliers in policy. If you’re bidding or delivering in Defence or adjacent public-safety domains, SAL fluency reduces bid risk, accelerates mobilisation and hardens supply-chain posture.
A SAL isn’t a bureaucratic speed bump; it’s the contract’s security blueprint. Put it on equal footing with technical architecture and commercial terms and you’ll save time, avoid grief and walk into assurance boards with confidence.
Written by Ellie Hurst, Commercial Director.