The Cyber Essentials requirements have undergone numerous updates over the last year, which have impacted both the overall scope of the assessment, as well as each of the key controls.
Get Your 'Vulnerability Management Template' FREE!
Your Vulnerability Management Template Includes:
Secure your organisation today by completing the form for your Vulnerability Management Template.
Download the, 'How to secure Microsoft Office Desktop Deployments Technical Guide' - FREE
Complete the form to download your free technical guide and secure your organisation today.
Download the Cyber Essentials Template Policy Pack - FREE
Complete the form to download your FREE Cyber Essentials Template Pack today, including:
Download the Microsoft 365 Security Guide - FREE
Complete the form to download your FREE Microsoft 365 Security Guide today, including:
Sign up on the form and receive the guide instantly.
The Cyber Essentials requirements have undergone numerous updates over the last year, which have impacted both the overall scope of the assessment, as well as each of the key controls.
The following guidance can help to ensure that each of the five key controls have been suitably applied to your devices and user accounts.
If you are considering the Cyber Essentials assessment for the first time, the following guidance can help to establish processes and controls which may not currently be in place. Additionally we have provided a preparation form, which can help you baseline any areas of your organisation which currently meet the requirements and highlight those which require updates.
Where any current documentation may be incomplete, We have provided template documents which can be used in establishing policies and processes.
The Cyber Essentials scope is intended to apply to an entire organisations set of assets, and most devices will fall under the defined scope.
Devices which will be considered in scope are:
Devices which do not need to be considered for the scope of Cyber Essentials:
Within Cyber Essentials there are also options to only define a subset of your organisation within scope rather than the organisation as a whole.
When segmenting your organisation into sections which are in-scope and sections which are out-of-scope, it is important to ensure that the two segments have a clearly defined network boundary, for example by Firewalls, Subnets or VLAN’s.
When defining a subset, the same scope definition requirements will apply to the segment of the organisation which is in scope and will always need to include some form of end user devices.
The Cyber Essentials assessment contains five key control areas:
Preparation can help reduce costs and improve your chances of passing successfully the first time.
Work through our free Cyber Essentials Plus Checklist to get a full gap analysis report and expert recommendations. This will make sure your organisation meets all of the Cyber Essentials requirements and Cyber Essentials Plus requirements ahead of certification.
Your organisations firewall will likely act as your gateway device to the internet and provide your devices with a level of protection from being directly targeted by internet-borne attackers. The firewall should be carefully configured and managed, as a misconfiguration can inadvertently result in devices or services being directly accessible via the internet and an increased threat from attacks, such as Denial of Service, Brute Force Password Attacks and targeted attacks against known vulnerabilities in exposed services.
Regardless of whether your devices are protected by a network firewall or a software firewall, there should be a considered management strategy in place to ensure a set of consistent and key security controls are in place, including:
To manage organisation Firewalls in line with the Cyber Essentials requirements, the following documentation will apply if not already in place:
All devices which are in use within the organisation and under the Scope of Cyber Essentials will need to be configured to a secure standard. It is often the case that devices have a number of default settings in place which are not configured to the most secure standard available.
Software can be preinstalled on devices, which is not necessary for business use, and devices often have default accounts setup for initial access, often with default and known credentials in use.
For any device which is being utilised by the organisation, a standard build process should be adhered to, ensuring that default and insecure options are removed. Although the specifics for each device may vary, the following key principles should always be in place:
To manage the Secure Configuration of devices in line with the Cyber Essentials requirements, the following documentation will apply.
For any account which is created, updated or removed, whether this is a user account, service account, or accounts provided to 3rd parties and contractors, a core set of security principles should be in place to reduce any potential for compromise.
Additionally, the permissions for each user account should be carefully considered with a principle of least privilege in place.
The following key security controls should be implemented for the management of all user accounts in use throughout the organisation:
To securely manage User Accounts in line with the Cyber Essentials requirements, the following documentation will apply.
Ensuring Malware Protection solutions are in place for your devices helps to prevent a large percentage of common attacks.
The Cyber Essentials requirements define three methods of securing devices against Malware:
For the secure setup and management of Malware Protection solutions in line with the Cyber Essentials requirements, the following documentation will apply.
For any device which is being utilised by the organisation, a standard patch management process should be adhered to, ensuring that the latest available updates are applied. This may be applied through automated updates, patch management solutions or manual updates, but should always be applied within 14 days, or sooner, of patch release, to avoid the potential exploitation from automated or targeted attacks.
To manage the secure patch management of devices in line with the Cyber Essentials requirements, the following documentation will apply.
Precursor have established a short readiness quiz which will help you identify your organisations current security status and if there is any room for improvement within your organisations current processes.
For anything else related to Cyber Essentials and security, please contact Precursor Security and our team will be happy to offer our help and services.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
It’s important to know what you’re getting, what’s not included and what else is available. This starts with understanding a SOC and it’s critical functions. CREST has recently published a guide to the critical functions of a SOC which aligns with the CREST SOC standard.
Enter your details here and to get the complete guide instantly sent to your inbox.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
Precursor Security
Welcome to Precursor Security, where the forefront of cybersecurity and penetration testing expertise meets unmatched dedication and innovation. We are the architects of robust digital defences, committed to safeguarding the online realm.