Cyber Essentials - Requirements for IT Infrastructure v3.2
Cyber Essentials - Requirements for IT Infrastructure v3.2
2
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
3
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
B. Definitions
• Software includes operating systems, commercial off-the-shelf
applications, extensions, interpreters, scripts, libraries, network
software and firewall and router firmware.
• Devices includes all types of hosts, networking equipment, servers,
networks, and end user devices such as desktop computers, laptop
computers, thin clients, tablets and smartphones — whether physical
or virtual.
• Applicant refers to your organisation which is seeking certification, or
sometimes the individual who is acting as the main point of contact,
depending on context.
• A corporate VPN is a virtual private network that connects back to
your office location, or to a virtual or cloud firewall. You must
administer the VPN so you can apply the firewall controls.
• Organisational data includes any electronic data belonging to your
organisation, for example, emails, documents, database data,
financial data.
• Organisational service includes any software applications, cloud
applications, cloud services, user interactive desktops and mobile
device management (MDM) solutions that your organisation owns or
subscribes to. For example: web applications, Microsoft 365, Google
Workspace, mobile device management containers, Citrix Desktop,
Virtual Desktop solutions or IP telephony.
• A sub-set is part of the organisation whose network is segregated
from the rest of the organisation by a firewall or VLAN.
• Servers are devices that provide organisational data or services to
other devices as part of your organisation’s business.
• Vulnerability fixes include patches, updates, registry fixes,
configuration changes, scripts or any other mechanism approved by
the vendor to fix a known vulnerability.
• Licensed and supported software is software that you have a legal
right to use and that a vendor has committed to support by
providing regular vulnerability fixes. The vendor must provide the
future date when they will stop providing these. (Note that the vendor
doesn’t need to have created the software originally, but they must
be able to now modify the original software to create fixes).
4
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
5
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
C. Scope
Scope overview
Your assessment and certification should cover the whole of the IT
infrastructure used to carry out your organisation’s business, or if
necessary, a well-defined and separately managed sub-set. Either way,
you must clearly define the scope boundary, namely: the business unit
managing it, the network boundary and physical location. You must agree
the scope with the Certification Body before assessment begins.
A sub-set can be used to define what is in scope or what is out of scope for
your Cyber Essentials certification.
Please note: Organisations that choose a scope which includes their whole
IT infrastructure achieve the best protection and maximise their customers'
confidence.
The requirements apply to all devices and software in scope and which
meet any of these conditions:
• can accept incoming network connections from untrusted internet-
connected hosts
• can establish user-initiated outbound connections to devices via the
internet
• control the flow of data between any of the above devices and the
internet
6
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
7
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
For further information and advice on the use of BYOD please see the
NCSC’s guidance.
All other routers are out of scope which means you need to apply Cyber
Essentials firewall controls (such as a software firewall) on users' devices.
If the home/remote worker is using a corporate VPN, their internet
boundary is on the company firewall or virtual/cloud firewall.
8
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Who implements the controls will vary, depending how the cloud service is
designed. Table 1 explains who might typically be expected to implement
each control:
9
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
User access
Your organisation Your organisation Your organisation
control
In cases where the cloud provider implements one of the controls on your
behalf, you must make sure that the cloud provider has committed to
implementing this via contractual clauses or documents referenced by
contract, such as security statements or privacy statements. Cloud
providers will often explain how they implement security in documents
published in their trust centres, referencing a ‘shared responsibility model.’
All accounts your organisation owns are in scope, even when those
accounts are used by a third party, such as a supplier, contractor or
Managed Service Provider (MSP) to manage or support your infrastructure.
10
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
All end user devices your organisation owns that are loaned to a third party
must be included in the assessment scope.
For devices not owned by your organisation, Table 2 explains what is in and
out of scope:
Employee ✓ N/A ✓
Volunteer ✓ N/A ✓
Trustee ✓ N/A ✓
University
research assistant
✓ N/A ✓
Student ✓ N/A
MSP administrator ✓
Third party
contractor
✓
Customer ✓
Table 2: what is in and out of scope for devices not owned by your organisation
components of web applications are out of scope. The best way to mitigate
vulnerabilities in applications is robust development and testing in line with
commercial best practice, such as the OWASP Application Security
Verification Standard | OWASP Foundation.
12
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
D. Requirements by technical
control theme
1. Firewalls
Applies to: boundary firewalls, desktop computers, laptops, routers, servers,
IaaS, PaaS, SaaS.
Aim
To make sure that only secure and necessary network services can be
accessed from the internet.
Introduction
All devices run network services to allow them to communicate with other
devices and services. By restricting access to these services, you reduce
your exposure to attacks. You can do this using firewalls or network devices
with firewall functionality. For cloud services, you can achieve this using
data flow policies.
A boundary firewall is a network device which can restrict the inbound and
outbound network traffic to services on its network of computers and
mobile devices. It can help protect against cyber attacks by implementing
restrictions, known as ‘firewall rules,’ which can allow or block traffic
depending on its source, destination and type of communication protocol.
13
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Requirements
You must protect every device in scope with a correctly configured firewall
(or network device with firewall functionality).
Information: Most desktop and laptop operating systems now come with a
software firewall pre-installed, we advise that these are turned on in
preference to a third-party firewall application.
For all firewalls (or network devices with firewall functionality), your
organisation must:
• change default administrative passwords to a strong and unique
password (see password-based authentication) – or disable remote
administrative access entirely
• prevent access to the administrative interface (used to manage
firewall configuration) from the internet, unless there is a clear and
documented business need, and the interface is protected by one of
the following controls:
o multi-factor authentication (see MFA details below)
o an IP allow list that limits access to a small range of trusted
addresses combined with a properly managed password
authentication approach
• block unauthenticated inbound connections by default
• ensure inbound firewall rules are approved and documented by an
authorised person, and include the business need in the
documentation
• remove or disable unnecessary firewall rules, when they are no
longer needed
Make sure you use a software firewall on devices which are used on
untrusted networks, such as public wifi hotspots.
14
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
2. Secure configuration
Applies to: servers, desktop computers, laptops, tablets, mobile phones,
thin clients, IaaS, PaaS, SaaS.
Aim
Ensure that computers and network devices are properly configured to:
• reduce vulnerabilities
• provide only the services required to fulfil their role
Introduction
Requirements
15
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
When the vendor doesn't allow you to configure the above, use the vendor’s
default setting.
16
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Aim
Ensure that devices and software are not vulnerable to known security
issues for which fixes are available.
Introduction
Any device that runs software can contain security flaws, known as
vulnerabilities.
Requirements
You must make sure that all software in scope is kept up to date. All
software on in-scope devices must:
• be licensed and supported
• removed from devices when it becomes unsupported or removed
from scope by using a defined sub-set that prevents all traffic to /
from the internet
• have automatic updates enabled where possible
• be updated, including vulnerability fixes, within 14 days* of release,
where:
17
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Please note: For optimum security we strongly recommend (but it’s not
mandatory) that all released updates are applied within 14 days of release.
Caution: Some vendors release security updates for multiple issues with
differing severity levels as a single update. If such an update covers any
‘critical’ or ‘high risk’ issues then it must be installed within 14 days.
18
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Aim
Introduction
All types of administrators will have this kind of account, including domain
administrators and local administrators.
19
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Requirements
Your organisation must be in control of your user accounts and the access
privileges that allow access to your organisational data and services. It’s
important to note that this also includes third party accounts – for example
accounts used by your support services. You also need to understand how
user accounts authenticate and manage the authentication accordingly.
20
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
Password-based authentication
Where this is carried out using a password, you should put in place the
following protective measures:
• Passwords are protected against brute-force password guessing by
implementing at least one of:
o multi-factor authentication (see below)
o ‘throttling' the rate of attempts, so that the length of time the
user must wait between attempts increases with each
unsuccessful attempt – you shouldn’t allow more than 10
guesses in 5 minutes
o locking devices after no more than 10 unsuccessful attempts
Information: SMS is not the most secure type of MFA, but still offers a huge
advantage over not using any MFA at all. Any multi-factor authentication is
better than not having it at all. However, if there are alternatives available
that will work for your situation, we recommend you use these instead of
SMS.
Passwordless authentication
22
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
This helps to avoid many of the problems with traditional passwords which
can be forgotten, stolen, or brute-forced.
23
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
5. Malware protection
Applies to: servers, desktop computers, laptops, tablets, mobile phones,
IaaS, PaaS, SaaS.
Aim
Introduction
Requirements
You must make sure that a malware protection mechanism is active on all
devices in scope. For each device, you must use at least one of the options
listed below. In most modern products these options are built into the
software supplied. Alternatively, you can purchase products from a third-
24
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
party provider. In all cases the software must be active, kept up to date in
accordance with the vendors instructions, and configured to work as
detailed below:
25
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
E. Further guidance
Backing up your data
Backing up means creating a copy of your information and saving it to
another device or to cloud storage (online).
Backing up regularly means you will always have a recent version of your
information saved. This will help you recover quicker if your data is lost or
stolen.
You can also turn on automatic backup. This will regularly save your
information into cloud storage, without you having to remember.
26
All material is UK Crown Copyright ©
Cyber Essentials: Requirements for IT infrastructure v3.2
April 2025
27
All material is UK Crown Copyright ©
© Crown copyright 2024. Photographs and infographics may include material under
licence from third parties and are not available for re-use. Text content is licenced for
re-use under the Open Government Licence v3.0.
National Cyber
NCSC.GOV.UK @NCSC @CYBERHQ @CYBERHQ
Security Centre