0% found this document useful (0 votes)
5 views39 pages

Cyber-Essentials-Preparation-Booklet-v14-Montpellier-Example

The document is a Cyber Essentials Self-Assessment Preparation Booklet, providing guidance and sample answers for organizations seeking certification. It outlines the necessary steps to complete the assessment, including organizational details, scope of assessment, and IT infrastructure requirements. The booklet emphasizes the importance of compliance with the Cyber Essentials standard and offers contact information for assistance during the process.

Uploaded by

Milos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views39 pages

Cyber-Essentials-Preparation-Booklet-v14-Montpellier-Example

The document is a Cyber Essentials Self-Assessment Preparation Booklet, providing guidance and sample answers for organizations seeking certification. It outlines the necessary steps to complete the assessment, including organizational details, scope of assessment, and IT infrastructure requirements. The booklet emphasizes the importance of compliance with the Cyber Essentials standard and offers contact information for assistance during the process.

Uploaded by

Milos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

CONFIDENTIAL WHEN COMPLETED

Cyber Essentials
Self-Assessment
Preparation Booklet

Version 14
January 2023
Montpellier
This document comprises a completed version of the preparation booklet with
guidance and sample answers, prepared by ID Cyber Solutions in June 2023.
Introduction
This booklet contains the question set for the Cyber Essentials information assurance
standard:

Cyber Essentials is a government-backed scheme focussing on five important technical


security controls.
Further guidance on the Cyber Essentials scheme can be found at
https://www.cyberessentials.ncsc.gov.uk

Answering the questions


The booklet is intended to help you understand the questions and take notes on the current
setup in your organisation. In order to complete the assessment, you must enter your
answers via IASME’s online assessment platform.
You must answer all questions in order to achieve certification.
Your answers must be approved by a Board level representative, business owner or the
equivalent; otherwise, certification cannot be awarded.

Need help?
If you need help with understanding the questions, get in contact with IASME on +44 (0)3300
882752 or email [email protected]
Alternatively, IASME has a network of Certification Bodies who are skilled information
assurance companies who can provide advice on the standards and who can help you make
changes to your setup in order to achieve compliance. Visit the IASME website at
www.iasme.co.uk to find your nearest Certification Body.
Your Company

In this section we need to know a little about how your organisation is set up so we
can ask you the most appropriate questions.

A1.1. What is your organisation's name (for companies: as registered with


Companies House)?
The answer given in A1.1 is the name that will be displayed on your Cyber Essentials Certificate and
has a character limit of 150.

Where an organisation wishes to certify subsidiary companies on the same certificate, the
organisation can certify as a group and can include the subsidiaries' name on the certificate as long as
the board member signing off the certificate has authority over all certified organisations.

For example:
The Stationary Group, incorporating The Paper Mill and The Pen House

It is also possible to list on a certificate where organisations are trading as other names.

For example:
The Paper Mill trading as The Pen House.

[Write your answer.]


ABC Ltd

A1.2. What type of organisation are you?


“LTD” – Limited Company (Ltd or PLC)
“LLP” – Limited Liability Partnership (LLP)
“CIC” – Community Interest
Company (CIC) “COP” –
Cooperative
“MTL” – Other Registered Mutual (Community Benefit Society, Credit Union, Building Society,
Friendly Society) “CHA” – Registered Charity
“GOV” – Government Agency or Public Body
“SOL” – Sole Trader
“PRT” – Other Partnership
“SOC” – Other Club/ Society
“OTH” – Other Organisation

[Select from the dropdown.]


“Ltd” – Limited Company (Ltd or PLC)
A1.3. What is your organisation's registration number (if you have one)?
If you are a UK limited company, your registration number will be provided by Companies House, in the
Republic of Ireland, this will be provided by Companies Registration Office. Charities, partnerships, and
other organisations should provide their registration number if applicable.
If a client is applying for certification for more than one registered company, just one registration
number can be entered to represent the entire group.

[Write your answer.]


12345678

A1.4. What is your organisation's address (for companies: as registered with


Companies House)?
Please provide the legal registered address for your organisation, if different from the main operating location.

[Write your answer.]


123 Smith St
Glasgow
G1 1AA

A1.5. What is your main business?


Please summarise the main occupation of your organisation.

Academia - Pre Schools Defence Hospitality - Hotels Other (please describe)


Academia - Primary Schools Diplomacy IT Pharmaceuticals
Academia - Secondary Schools Emergency Services Intelligence Political
Academia - Academies Energy - Electricity Law Enforcement (Serious & Postal Services
Academia - Colleges Energy - Gas Organised Crime) Property
Academia - Universities Energy - Oil Legal R&D
Aerospace Engineering Leisure Retail
Agriculture, Forestry and Environmental Managed Services - IT Managed Telecoms
Fishing Finance Services Transport - Aviation
Automotive Food Managed Services - Other Transport - Maritime
Charities His Majesty's Government Managed Services Transport - Rail
Chemicals (HMG) Manufacturing Transport - Road
Civil Nuclear Health Media Waste Management
Construction Hospitality - Food Membership Organisations Water
Consultancy Hospitality - Accommodation Mining Overseas

[Select from the dropdown.]


Construction
A1.6. What is your website address?
Please provide your website address (if you have one). This can be a Facebook/LinkedIn page if you
prefer.

[Write your answer.]


www.abc.com

A1.7. Is this application a renewal of an existing certification or is it the first time you
have applied for certification?
If you have previously achieved Cyber Essentials, please select "Renewal". If you have not previously
achieved Cyber Essentials, please select "First Time Application".

[Select from the dropdown.]


Renewal

A1.8. What is your primary reason for applying for certification?


Please let us know the primary reason why you are applying for certification. This helps us to
understand how people are using our certifications.

[Select from the dropdown. Note that certain answers will trigger additional
questions.]
To Generally Improve Our Security

A1.8.1 What is your secondary reason for applying for certification?


Please let us know the secondary reason why you are applying for certification. This helps us to
understand how people are using our certifications.

[Select from the dropdown. Note that certain answers will trigger additional
questions.]
To Give Confidence To Our Customers
A1.9. Have you read the 'Cyber Essentials Requirements for IT Infrastructure'
document?
Document is available on the NCSC Cyber Essentials website and should be read before completing this
question set.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-
2023.pdf

[Select from the dropdown.]


Yes

A1.10. Can IASME and their expert partners contact you if you experience a cyber
breach?
We would like feedback on how well the controls are protecting organisations. If you agree to this we
will provide you with a contact email and ask that you let us know if you do experience a cyber breach.
IASME and expert partners will then contact you to find out a little more but all information will be
kept confidential

[Select from the dropdown.]


Yes
Scope of Assessment

In this section, you need to describe the elements of your organisations IT system
that you want to be covered by the Cyber Essentials certification. The scope should
be either the whole organisation or an organisational sub-set (for example, the UK
operation of a multinational company).

You will also need to answer questions regarding the computers, laptops, servers,
mobile phones, tablets and firewalls/routers that can access the internet and are
used by the whole organisation or organisational sub-set to access organisational
data or services. All locations that are owned or operated by this organisation or
sub-set, whether in the UK or internationally, should be considered "in-scope".

The level of detail required for devices is as follows:


'With the exception of network devices (such as firewalls and routers), all user
devices declared within the scope of the certification only require the make and
operating system to be listed. We have removed the requirement for the applicant to
list the model of the device. This change will be reflected in the self-assessment
question set, rather than the requirements document'

A scope that does not include end user devices is not acceptable.

Further guidance can be found here https://iasme.co.uk/articles/scope/


A2.1. Does the scope of this assessment cover your whole organisation? Please
note: Your organisation is only eligible for free cyber insurance if your
assessment covers your whole company. If you answer "No" to this question
you will not be invited to apply for insurance.

Your whole organisation includes all divisions, people and devices which access your organisation's
data and services.

[Select from the dropdown.]


No

A2.2. If you are not certifying your whole organisation, then what scope description
would you like to appear on your certificate and website?
Your scope description should provide details of any areas of your business that have internet access
and have been excluded from the assessment.

You will need to have a clear excluding statement within your scope description, for example, "whole
organisation excluding development network".

[Write your answer. This question is only triggered if you answer ‘Yes’ to A2.1.]
Whole organisation excluding engineering network

A2.3. Please describe the geographical locations of your business which are in the
scope of this assessment.
You should provide either a broad description (i.e., All UK offices) or simply list the locations in scope
(i.e., Manchester and Glasgow retail stores).

[Write your answer.]


Glasgow office
A2.4. Please list the quantities and operating systems for your laptops, desktops
and virtual desktops within the scope of this assessment.
You need to provide a summary of all laptops, computers, virtual desktops and their operating systems
that are used for accessing organisational data or services and have access to the internet.

For example, “We have 25 DELL laptops running Windows 10 Professional version 20H2 and 10
MacBook laptops running MacOS Ventura".

Please note, the edition and feature version of your Windows operating systems are required.

This applies to both your corporate and user owned devices (BYOD).

You do not need to provide serial numbers, mac addresses or further technical information.

Please Note: You must include make and operating system versions for all devices. All user devices
declared within the scope of the certification only require the make and operating system to be
listed. We have removed the requirement for the applicant to list the model of the device.

Devices that are connecting to cloud services must be included. A scope that does not include end
user devices is not acceptable.

[Write your answer. Ensure you read the question carefully — make and OS is
required; model is not. If Windows, both edition and feature version are required
(Edition: Pro, Enterprise, etc. Feature: 22H2, etc.]
5 x DELL devices running Windows 11 Pro 22H2
3 x Apple devices running Ventura

A2.4.1 Please list the quantity of thin clients within scope of this assessment. Please
include make and operating systems.
Please provide a summary of all the thin clients in scope that are connecting to organisational data or
services (Definitions of which are in the 'CE Requirements for Infrastructure document' linked in
question A1.9).

Thin clients are commonly used to connect to a Virtual Desktop Solution.

Thin clients are a type of very simple computer holding only a base operating system which are
often used to connect to virtual desktops. Thin clients can connect to the internet, and it is possible
to modify some thin clients to operate more like PCs, and this can create security complications.
Cyber Essentials requires thin clients be supported and receiving security updates.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-
2023.pdf.pdf

[Write your answer.]


None
A2.5. Please list the quantity of servers, virtual servers, and virtual server hosts
(hypervisor). You must include the operating system.
Please list the quantity of all servers within scope of this assessment.

For example, 2 x VMware ESXI 6.7 hosting 8 virtual windows 2016 servers; 1 x MS Server 2019; 1 x
Redhat Enterprise Linux 8.3

[Write your answer.]


2 x VMware ESXI 8.0 hosting 8 x virtual Windows Server 2019

A2.6. Please list the quantities of tablets and mobile devices within scope of this
assessment.
All tablets and mobile devices that are used for accessing organisational data or services and have
access to the internet must be included in the scope of the assessment. This applies to both corporate
and user owned devices (BYOD).

You are not required to list any serial numbers, mac addresses or other technical information.

Please Note: You must include make and operating system versions for all devices. All user devices
declared within the scope of the certification only require the make and operating system to be listed.
We have removed the requirement for the applicant to list the model of the device.

Devices that are connecting to cloud services must be included.

A scope that does not include end user devices is not acceptable.

[Write your answer. Only device make (e.g., Samsung) and major version numbers
(e.g., iOS 16) are required.]
3 x Apple devices running iOS 16
4 x Samsung devices running Android 13
A2.7. Please provide a list of your networks that will be in the scope for this
assessment.
You should include details of each network used in your organisation including its name, location, and
its purpose (i.e., Main Network at Head Office for administrative use, Development Network at
Malvern Office for testing software, (home workers network - based in UK). You do not need to provide
IP addresses or other technical information.

For further guidance see the Home Working section in the 'CE Requirements for Infrastructure
Document'. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-
January-2023.pdf

[Write your answer.]


Main network at Glasgow office for administrative use
Home workers network – based in UK

A2.7.1 How many staff are home workers?


Any employee that has been given permission to work at home for any period of time at the time of
the assessment, needs to be classed as working from home for Cyber Essentials

For further guidance see the Home Working section in the 'CE Requirements for Infrastructure
Document'. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-
January-2023.pdf

[Write your answer. You must provide a specific number.]


4

A2.8. Please provide a list of network equipment that will be in scope for this
assessment (including firewalls and routers). You must include make and
model of each device listed.
You should include all equipment that controls the flow of data, this will be your routers and firewalls.
You do not need to include switches or wireless access points that do not contain a firewall or do not
route internet traffic.
If you don't have an office and do not use network equipment, instead you are relying on software
firewalls please describe in the notes field.
You are not required to list any IP addresses, MAC addresses or serial numbers.

[Write your answer. You do not need to include firmware versions.]


Draytek Vigor 2862n
A2.9. Please list all of your cloud services that are in use by your organisation and
provided by a third party.
You need to include details of all your cloud services. This includes all types of services – IaaS, PaaS,
and SaaS. Definitions of the different types of cloud services are provided in the ‘CE Requirements for
Infrastructure Document’ https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf.
Please note cloud services cannot be excluded from the scope of CE.

[Write your answer. Please ensure you also include any cloud services you list in
A6.2.3 and A6.2.4.]
Google workspace
MS365

A2.10. Please provide the name and role of the person who is responsible for
managing your IT systems in the scope of this assessment.
This should be the person in your organisation who influences and makes decisions about the
computers, laptops, servers, tablets, mobile phones and network equipment.
This person must be a member of your organisation and cannot be a person employed by your
outsourced IT provider.

[Write your answer.]


Mary Jones – Operations Director
Insurance

All organisations with a head office domiciled in the UK or Crown Dependencies and
a turnover of less than £20 million get automatic cyber insurance if they achieve
Cyber Essentials certification. The insurance is free of charge, but you can opt out of
the insurance element if you choose. This will not change the price of the
assessment package. If you want the insurance, then we do need to ask some
additional questions and these answers will be forwarded to the broker. The
answers to these questions will not affect the result of your Cyber Essentials
assessment. It is important that the insurance information provided is as accurate as
possible and that the assessment declaration is signed by a senior person at Board
level or equivalent, to avoid any delays to the insurance policy being issued.

A3.1. Is your head office domiciled in the UK or Crown Dependencies and is your
gross annual turnover less than £20m?
This question relates to the eligibility of your organisation for the included cyber insurance.

[Select from the dropdown. This question will not appear if the full organisation is
not in scope.]

A3.2. If you have answered “yes” to the last question, then your organisation is
eligible for the included cyber insurance if you gain certification. If you do not
want this insurance element, please opt out here.
There is no additional cost for the insurance. You can see more about it at https://iasme.co.uk/cyber-
essentials/cyberliability-insurance/

[Select from the dropdown. This question will not appear if the full organisation is
not in scope or if you answer ‘No’ to A3.1.]

A3.3. What is your total gross revenue? Please provide figure to the nearest £100K.
You only need to answer this question if you are taking the insurance.
The answer to this question will be passed to the insurance broker in association with the cyber
insurance you will receive at certification. Please be as accurate as possible - figure should be to the
nearest £100K.

[Write your answer. This question will not appear if the full organisation is not in
scope or if you answer ‘No’ to A3.1.]
A3.4. What is the organisation email contact for the insurance documents? You only
need to answer this question if you are taking the insurance.
The answer to this question will be passed to the insurance broker in association with the cyber
insurance you will receive at certification, and they will use this to contact you with your insurance
documents and renewal information.

[Write your answer. This question will not appear if the full organisation is not in
scope or if you answer ‘No’ to A3.1.]
Firewalls

Firewall is the generic name for a piece of software or a hardware device which
provides technical protection between your network devices and the Internet,
referred to in the question set as boundary firewalls. Your organisation will have
physical, virtual or software firewalls at your internet boundaries. Software firewalls
are included within all major operating systems for laptops, desktops and servers
and need to be configured to meet compliance. Firewalls are powerful devices,
which need to be configured correctly to provide effective security.

Questions in this section apply to: boundary firewalls; desktop computers; laptops;
routers; servers; IaaS; PaaS; SaaS.

Further guidance can be found here https://iasme.co.uk/articles/firewalls/

A4.1. Do you have firewalls at the boundaries between your organisation’s internal
networks, laptops, desktops, servers, and the internet?
You must have firewalls in place between your office network and the internet.

[Select from the dropdown.]


Yes

A4.1.1 When your devices (including computers used by homeworkers) are being
used away from your workplace (for example, when they are not connected to
your internal network), how do you ensure they are protected?
You should have firewalls in place for home-based workers. If those users are not using a Corporate
Virtual Private Network (VPN) connected to your office network, they will need to rely on the software
firewall included in the operating system of their device.

[Write your answer.]


All devices are protected by software firewalls and users connect to the office
network via VPN when working from home.
A4.2. When you first receive an internet router or hardware firewall device, it may
have had a default password on it. Have you changed all the default
passwords on your boundary firewall devices?
The default password must be changed on all routers and firewalls, including those that come with a
unique password pre-configured (i.e. BT Business Hub, Draytek Vigor 2865ac).

When relying on software firewalls included as part of the operating system of your end user devices,
the password to access the device will need to be changed.

[Select from the dropdown.]


Yes

A4.2.1 Please describe the process for changing your firewall password?
Home routers not supplied by your organisation are not included in this
requirement.
You need to understand how the password on your firewall(s) is changed.

Please provide a brief description of how this is achieved.

[Write your answer. Please note that if you do not have a physical device and are
instead relying on software firewalls, your answer should describe how you
change the default admin password on your end user devices.]
We log into the admin panel via a web browser and change the default password
in line with our password policy.
A4.3. Is your new firewall password configured to meet the ‘Password-based
authentication’ requirements?

Please select the option being used

A. Multi-factor authentication, with a minimum password length 8 characters and


no maximum length

B. Automatic blocking of common passwords, with a minimum password length


8 characters and no maximum length

C. A password minimum length of 12 characters and no maximum length

D. None of the above, please describe


Acceptable technical controls that you can use to manage the quality of your passwords are outlined in
the new section about Password-based authentication in the ‘Cyber Essentials Requirements for IT
Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf

[Select from the multiple choice options.]


A. Multi-factor authentication, with a minimum password length 8 characters and no
maximum length

A4.4. Do you change your firewall password when you know or suspect it has been
compromised?
Passwords may be compromised if there has been a virus on your system or if the manufacturer
notifies you of a security weakness in their product. You should be aware of this and know how to
change the password if this occurs.

When relying on software firewalls included as part of the operating system of your end user devices,
the password to access the device will need to be changed.

[Select from the dropdown.]


Yes
A4.5. Do you have any services enabled that can be accessed externally from your
internet router, hardware firewall or software firewall?
At times your firewall may be configured to allow a system on the inside to become accessible from the
internet (for example: a VPN server, a mail server, an FTP server, or a service that is accessed by your
customers). This is sometimes referred to as "opening a port". You need to show a business case for
doing this because it can present security risks. If you have not enabled any services, answer "No". By
default, most firewalls block all services.

[Select from the dropdown.]


Yes

A4.5.1 Do you have a documented business case for all of these services?
The business case should be documented and recorded. A business case must be signed off at board
level and associated risks reviewed regularly.

[Select from the dropdown. This question will not appear if you answer ‘No’ to
A4.5.]
Yes

A4.6. If you do have services enabled on your firewall, do you have a process to
ensure they are disabled in a timely manner when they are no longer
required? A description of the process is required.
If you no longer need a service to be enabled on your firewall, you must remove it to reduce the risk
of compromise. You should have a process that you follow to do this (i.e. when are services reviewed,
who decides to remove the services, who checks that it has been done).

[Write your answer.]


Yes, we have a procedure in which an authorised individual (our Operations
Director) disables any rules as soon as they are considered unnecessary. Although
we aim to inform the OD as soon as a rule is no longer required, as a catch-all the
OD also reviews all firewall rules at least once every two months.

A4.7. Have you configured your boundary firewalls so that they block all other
services from being advertised to the internet?
By default, most firewalls block all services from inside the network from being accessed from the
internet, but you need to check your firewall settings.

[Select from the dropdown.]


Yes
A4.8. Are your boundary firewalls configured to allow access to their configuration
settings over the internet?
Sometimes organisations configure their firewall to allow other people (such as an IT support
company) to change the settings via the internet.

If you have not set up your firewalls to be accessible to people outside your organisations or your
device configuration settings are only accessible via a VPN connection, then answer "no" to this
question.

[Select from the dropdown.]


Yes

A4.9. If you answered yes in question A4.8, is there a documented business


requirement for this access?
When you have made a decision to provide external access to your routers and firewalls, this decision
must be documented (for example, written down).

[Select from the dropdown. This question will not appear if you answer ‘No’ to
A4.8.]
Yes

A4.10. If you answered yes in question A4.8, is the access to your firewall settings
protected by either multi-factor authentication or by only allowing trusted IP
addresses combined with managed authentication to access the settings?
If you allow direct access to configuration settings via your router or firewall's external interface, this
must be protected by one of the two options.

Please explain which option is used.

[Write your answer. This question will not appear if you answer ‘No’ to A4.8.]
Yes, the configuration interface is protected by MFA.
A4.11. Do you have software firewalls enabled on all of your desktop computers,
laptops and servers?
Your software firewall must be configured and enabled at all times, even when sitting behind a
physical/virtual boundary firewall in an office location. You can check this setting on Macs in the
Security & Privacy section of System Preferences. On Windows laptops you can check this by going to
Settings and searching for "Windows firewall". On Linux try "ufw status".

[Select from the dropdown.]


Yes

A4.12. If you answered no to question A4.11, is this because software firewalls are
not installed by default as part of the operating system you are using? Please
list the operating systems.
Only very few operating systems do not have software firewalls available. Examples might include
embedded Linux systems or bespoke servers. For the avoidance of doubt, all versions of Windows,
macOS and all common Linux distributions such as Ubuntu do have software firewalls available.

[This question will not appear if you answer ‘Yes’ to 4.11. Software firewalls must
be enabled if they are available for the operating systems in use.]
Secure Configuration

Computers and cloud services are often not secure upon default installation or setup. An
‘out-of-the-box’ set-up can often include an administrative account with a standard,
publicly known default password, one or more unnecessary user accounts enabled
(sometimes with special access privileges ) and pre-installed but unnecessary applications
or services. All of these present security risks.

Questions in this section apply to: servers, desktop computers, laptops, thin clients,
tablets, mobile phones, IaaS, PaaS and SaaS.

Further guidance can be found here https://iasme.co.uk/articles/secure-configuration/

A5.1. Where you are able to do so, have you removed or disabled all the software
and services that you do not use on your laptops, desktop computers, thin
clients, servers, tablets, mobile phones and cloud services? Describe how
you achieve this.
You must remove or disable all applications, system utilities and network services that are not needed
in day-to-day use. You need to check your cloud services and disable any services that are not
required for day-to-day use. To view your installed applications

1. Windows by right-clicking on Start → Apps and Features


2. macOS open Finder -> Applications
3. Linux open your software package manager (apt, rpm, yum)

[Write your answer.]


Yes, we use a standard build that has had all unnecessary software and services
removed.

A5.2. Have you ensured that all your laptops, computers, servers, tablets, mobile
devices and cloud services only contain necessary user accounts that are
regularly used in the course of your business?
You must remove or disable any user accounts that are not needed in day-to-day use on all devices and
cloud services.
You can view your user accounts

1. Windows by right-clicking on Start -> Computer Management -> Users


2. macOS in System Preferences -> Users & Groups
3. Linux using "cat /etc/passwd"

[Select from the dropdown.]


Yes
A5.3. Have you changed the default password for all user and administrator
accounts on all your desktop computers, laptops, thin clients, servers, tablets
and mobile phones that follow the Password-based authentication
requirements of Cyber Essentials?
A password that is difficult to guess will be unique and not be made up of common or predictable
words such as "password" or "admin”, or include predictable number sequences such as "12345".

[Select from the dropdown.]


Yes

A5.4. Do you run external services that provide access to data (that shouldn't be
made public) to users across the internet?
Your business might run software that allows staff or customers to access information across the
internet to an external service hosted on the internal network, cloud data centre or IaaS cloud service.
This could be a VPN server, a mail server, or an internally hosted internet application (SaaS or PaaS)
that you provide to your customers as a product. In all cases, these applications provide information
that is confidential to your business and your customers and that you would not want to be publicly
accessible.

[Select from the dropdown.]


Yes

A5.5. If yes to question A5.4, which option of password-based authentication do you


use

A. Multi-factor authentication, with a minimum password length 8 characters and


no maximum length
B. Automatic blocking of common passwords, with a minimum password length
8 characters and no maximum length
C. A password minimum length of 12 characters and no maximum length
D. None of the above, please describe

Acceptable technical controls that you can use to manage the quality of your passwords are outlined in
the section about ‘Password-based authentication’ in the ‘Cyber Essentials Requirements for IT
Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf

[Select from the multiple choice options. This question will not appear if you
answer ‘No’ to A5.4.]
A. Multi-factor authentication, with a minimum password length 8 characters and
no maximum length
A5.6. Describe the process in place for changing passwords on your external
services when you believe they have been compromised.
Passwords may be compromised if there has been a virus on your system or if the manufacturer
notifies you of a security weakness in their product. You should know how to change the password if
this occurs.

[Write your answer. This question will not appear if you answer ‘No’ to A5.4.]
The suspected compromise is reported to the Operations Director. The OD resets
the password using the admin portal and the user is signed out of any active
sessions.

A5.7. When not using multi-factor authentication, which option are you using to
protect your external service from brute force attacks?

A. Throttling the rate of attempts


B. Locking accounts after 10 unsuccessful attempts
C. None of the above, please describe
The external service that you provide must be set to slow down or stop attempts to log in if the wrong
username and password have been tried a number of times. This reduces the opportunity for cyber
criminals to keep trying different passwords (brute-forcing) in the hope of gaining access.

[Select from the multiple choice options. This question will not appear if you
answer ‘No’ to A5.4.]
B. Locking accounts after 10 unsuccessful attempts

A5.8. Is "auto-run" or "auto-play" disabled on all of your systems?


This is a setting on your device which automatically runs software on external media or downloaded
from the internet.

It is acceptable to choose the option where a user is prompted to make a choice about what action will
occur each time they insert a memory stick. If you have chosen this option, you can answer yes to this
question.

[Select from the dropdown.]


Yes
Device Locking
A5.9. When a device requires a user to be present, do you set a locking mechanism
on your devices to access the software and services installed?
Device locking mechanisms such as biometric, password or PIN, need to be enabled to prevent
unauthorised access to devices accessing organisational data or services.

[Select from the dropdown.]


Yes

A5.10. Which method do you use to unlock the devices?


Please refer to Device Unlocking Credentials paragraph found under Secure Configuration in the Cyber
Essentials
Requirements for IT Infrastructure document for further information.
https://www.ncsc.gov.uk/files/Cyber-EssentialsRequirements-for-Infrastructure-v3-1-January-2023.pdf
The use of a PIN with a length of at least six characters can only be used where the credentials are just
to unlock a device and does not provide access to organisational data and services without further
authentication.

[Write your answer. Please be aware that a biometric test or a password/PIN of 6


characters is only compliant if this method provides access only to the device, with
further authentication for accessing data and services. If there is no further
authentication, you must meet one of these three criteria:
- MFA supported by an 8 character password
- Minimum password length of 8 characters supported by a deny list
- Passwords with a minimum length of 12 characters]
Devices are unlocked with an 8 digit passcode and biometrics. This provides
access only to the devices, with further authentication required to access data and
services.
Security update management

To protect your organisation, you should ensure that all your software is always up
to date with the latest security updates. If any of your in-scope devices are using an
operating system which is no longer supported (For example Microsoft Windows
XP/Vista/2003/Windows 7/Server 2008, MacOS High Sierra, Ubuntu 17.10), and
you are not being provided with regular updates from the vendor, then you will not
be awarded certification. Mobile phones and tablets are in-scope and must also use
an operating system that is still supported by the manufacturer.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, routers, firewalls, IaaS and PaaS cloud services.

Further guidance can be found here https://iasme.co.uk/articles/security-update-


management/

A6.1. Are all operating systems on your devices supported by a vendor that
produces regular security updates?

If you have included firewall or router devices in your scope, the firmware of
these devices is considered to be an operating system and needs to meet
this requirement.
Older operating systems that are out of regular support include Windows 7/XP/Vista/ Server 2003,
mac OS Mojave, iOS 12, iOS 13, Android 8 and Ubuntu Linux 17.10.

It is important you keep track of your operating systems and understand when they have gone end of
life (EOL). Most major vendors will have published EOL dates for their operating systems and firmware.

[Select from the dropdown. Please note that the assessor will check the operating
systems reported in A2.4–2.6. Unsupported OS will result in an automatic fail.]
Yes

A6.2. Is all the software on your devices supported by a supplier that produces
regular fixes for any security problems?
All software used by your organisation must be supported by a supplier who provides regular security
updates. Unsupported software must be removed from your devices. This includes frameworks and
plugins such as Java, Adobe Reader and .NET.

[
[Select from the dropdown. Please note that the assessor will check the software
reported in A6.2.1–A6.2.4. Unsupported software will result in a major non-
compliance.]
Yes
A6.2.1 Please list your internet browser(s)
The version is required.
Please list all internet browsers installed on your devices, so that the Assessor can understand your
setup and verify that they are in support.
For example: Chrome Version 102, Safari Version 15.

[Write your answer. You only need to provide the major version (e.g., Chrome
114).]
Chrome 114
Edge 114

A6.2.2 Please list your malware protection software


The version is required
Please list all malware protection and versions you use so that the Assessor can understand your setup
and verify that they are in support.
For example: Sophos Endpoint Protection V10, Windows Defender, Bitdefender Internet Security 2020.

[Write your answer. You only need to provide the major version (if relevant).]
Windows Defender

A6.2.3 Please list your email applications installed on end user devices and server.
The version is required.
Please list all email applications and versions you use so that the Assessor can understand your setup
and verify that they are in support.
For example: MS Exchange 2016, Outlook 2019.

[Write your answer.]


Outlook via MS 365

A6.2.4 Please list all office applications that are used to create organisational data.
The version is required
Please list all office applications and versions you use so that the Assessor can understand your setup
and verify that they are in support.
For example: MS 365; Libre office, Google workspace, Office 2016.

[Write your answer.]


MS 365
A6.3. Is all software licensed in accordance with the publisher’s recommendations?
All software must be licensed. It is acceptable to use free and open source software as long as you
comply with any licensing requirements.

Please be aware that for some operating systems, firmware and applications, if annual licensing is not
purchased, they will not be receiving regular security updates.

[Select from the dropdown.]


Yes

A6.4. Are all high-risk or critical security updates for operating systems and router
and firewall firmware installed within 14 days of release?
You must install all high and critical security updates within 14 days in all circumstances. If you cannot
achieve this requirement at all times, you will not achieve compliance to this question. You are not
required to install feature updates or optional updates in order to meet this requirement.

This requirement includes the firmware on your firewalls and routers.

[Select from the dropdown.]


Yes

A6.4.1 Are all updates applied for operating systems by enabling auto updates?
Most devices have the option to enable auto updates. This must be enabled on any device where
possible.

[Select from the dropdown.]


Yes

A6.4.2 Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all operating systems and firmware on firewall and
routers are applied within 14 days of release?
It is not always possible to apply auto updates, this is often the case when you have critical systems or
servers and you need to be in control of the updating process.

Please describe how any updates are applied when auto updates are not configured.

If you only use auto updates, please confirm this in the notes field for this question.

[Write your answer.]


We use automatic updates in all cases.
A6.5. Are all high-risk or critical security updates for applications (including any
associated files and any plugins such as Java, Adobe Reader and .Net.)
installed within 14 days of release?
You must install any such updates within 14 days in all circumstances.

If you cannot achieve this requirement at all times, you will not achieve compliance to this question.

You are not required to install feature updates or optional updates in order to meet this requirement,
just high-risk or critical security updates.

[Select from the dropdown.]


Yes

A6.5.1 Are all updates applied on your applications by enabling auto updates?
Most devices have the option to enable auto updates. Auto updates should be enabled where possible.

[Select from the dropdown.]


Yes

A6.5.2 Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all applications are applied within 14 days of
release?
It is not always possible to apply auto updates, this is often the case when you have critical systems or
applications and you need to be in control of the updating process.

Please describe how any updates are applied when auto updates are not configured.

If you only use auto updates, please confirm this in the notes field for this question.

[Write your answer.]


We use automatic updates in all cases.

A6.6. Have you removed any software installed on your devices that is no longer
supported and no longer receives regular updates for security problems?
You must remove older software from your devices when it is no longer supported by the
manufacturer. Such software might include older versions of web browsers, operating systems,
frameworks such as Java and Flash, and all application software.

[Select from the dropdown.]


Yes
A6.7. Where you have a business need to use unsupported software, have you
moved the devices and software out of scope of the assessment? Please
explain how you achieve this.
Software that is not removed from devices when it becomes un-supported will need to be placed onto
its own sub-set with no internet access.

If the out-of-scope subset remains connected to the internet, you will not be able to achieve whole
company certification and an excluding statement will be required in question A2.2.

A sub-set is defined as a part of the organisation whose network is segregated from the rest of the
organisation by a firewall or VLAN.

[Write your answer. For this question, you should demonstrate you understand the
need to remove unsupported software by segregating it from your network.]
We currently do not use unsupported software. However, if the need arose, we
would segregate it from our network and remove internet access.
User Access Control
It is important to only give users access to the resources and data necessary for
their roles, and no more. All users need to have unique accounts and should not be
carrying out day-to-day tasks such as invoicing or dealing with e-mail whilst logged
on as a user with administrator privileges which allow significant changes to the way
your computer systems work.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS

Further guidance can be found here https://iasme.co.uk/articles/user-access-control/

A7.1. Are users only provided with user accounts after a process has been followed
to approve their creation? Describe the process.
You must ensure that user accounts (such as logins to laptops and accounts on servers) are only
provided after they have been approved by a person with a leadership role in the business.

[Write your answer. We are especially looking to see that someone with a
leadership role in the organisation approves any account creation.]
Yes, the Operations Director approves the creation of any account and emails our
IT Provider to request the setup.

A7.2. Are all user and administrative accounts accessed by entering a unique
username and password?
You must ensure that no devices can be accessed without entering a username and password.
Accounts must not be shared.

[Select from the dropdown.]


Yes

A7.3. How do you ensure you have deleted, or disabled, any accounts for staff who
are no longer with your organisation?
When an individual leaves your organisation you need to stop them accessing any of your systems.

[Write your answer.]


The Operations Director emails our IT Provider to advise of last working day and
request the account closure. Our IT Provider confirms by email when this has been
done. As a failsafe, our Operations Director conducts a yearly audit of all accounts.
A7.4. Do you ensure that staff only have the privileges that they need to do their
current job? How do you do this?
When a staff member changes job role you may also need to change their permissions to only access
the files, folders, and applications that they need to do their day-to-day work.

[Write your answer.]


Our IT Provider manages user accounts in accordance with our agreed protocols.
Permissions are determined according to role within the organisation. Only files
and folders required for the individual role are visible. This is reviewed if a staff
member changes role.

Administrative Accounts

User accounts with special access privileges (e.g. administrative accounts) typically
have the greatest level of access to information, applications and computers. When
these privileged accounts are accessed by attackers they can cause the most
amount of damage because they can usually perform actions such as install
malicious software and make changes. Special access includes privileges over and
above those of normal users.

It is not acceptable to work on a day-to-day basis in a privileged “administrator”


mode.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS

A7.5. Do you have a formal process for giving someone access to systems at an
“administrator” level and can you describe this process?
You must have a process that you follow when deciding to give someone access to systems at
administrator level. This process might include approval by a person who is an
owner/director/trustee/partner of the organisation.

[Write your answer.]


Yes, we have a formal written-down process. Our Operations Director signs off the
provision of any admin account.
A7.6. How does your organisation make sure that separate accounts are used to
carry out administrative tasks (such as installing software or making
configuration changes)?
You must use a separate administrator account from the standard user account, when carrying out
administrative tasks such as installing software. Using administrator accounts all-day-long exposes the
device to compromise by malware. Cloud service administration must be carried out through separate
accounts.

[Write your answer.]


The members of the IT team each have an admin account and a separate
standard user account. Each use of their admin account is logged in an automatic
register. We also use separate accounts for all cloud service administration.

A7.7. How does your organisation prevent administrator accounts from being used
to carry out every day tasks like browsing the web or accessing email?
This question relates to the activities carried out when an administrator account is in use.
You must ensure that administrator accounts are not used to access websites or download email.
Using such accounts in this way exposes the device to compromise by malware. Software and update
downloads should be performed as a standard user and then installed as an administrator. You may
not need a technical solution to achieve this, it could be based on good policy, procedure and regular
training for staff.

[Write your answer.]


The admin accounts have no access to email or browsers. All members of the IT
team are additionally trained not to use their accounts for everyday tasks.

A7.8. Do you formally track which users have administrator accounts in your
organisation?
You must track all people that have been granted administrator accounts.

[Select from the dropdown.]


Yes

A7.9. Do you review who should have administrative access on a regular basis?
You must review the list of people with administrator access regularly. Depending on your business,
this might be monthly, quarterly, or annually. Any users who no longer need administrative access to
carry out their role should have it removed.

[Select from the dropdown.]


Yes
Password-Based Authentication
All accounts require the user to authenticate. Where this is done using a password
the following protections should be used:
• Passwords are protected against brute-force password guessing.
• Technical controls are used to manage the quality of passwords.
• People are supported to choose unique passwords for their work accounts.
• There is an established process to change passwords promptly if the
applicant knows or suspects the password or account has been
compromised.

A7.10. Describe how you protect accounts from brute-force password guessing in
your organisation.
A brute-force attack is an attempt to discover a password by systematically trying every possible
combination of letters, numbers, and symbols until you discover the one correct combination that
works.
Information on how to protect against brute-force password guessing can be found in the Password-
based authentication section, under the User Access Control section in the ‘Cyber Essentials
Requirements for IT Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-
Requirements-for-Infrastructure-v3-1January-2023.pdf

[Write your answer. We need you to be specific. Compliant methods are:


- Using multi-factor authentication
- Throttling the rate of attempts, allowing no more than 10 guesses in 5 minutes
- Locking accounts after no more than 10 unsuccessful attempts]
Accounts are locked after 5 unsuccessful attempts and we enforce MFA.

A7.11. Which technical controls are used to manage the quality of your passwords
within your organisation?
Acceptable technical controls that you can use to manage the quality of your passwords are outlined in
the new section about Password-based authentication in the ‘Cyber Essentials Requirements for IT
Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf

[Write your answer. We need you to be specific. Compliant controls are:


- Using multi-factor authentication
- A minimum password length of at least 12 characters, with no maximum length
restrictions
- A minimum password length of at least 8 characters, with no maximum length
restrictions and use automatic blocking of common passwords using a deny
list]
We use MFA and have a minimum password length of 12 characters, with no max
length restrictions.
A7.12. Please explain how you encourage people to use unique and strong
passwords.
You need to support those that have access to your organisational data and services by informing them
of how they should pick a strong and unique password.
Further information can be found in the Password-based authentication section, under the User Access
Control, section in the ‘Cyber Essentials Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/CyberEssentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

[Write your answer.]


We provide advice on password storage, including supplying staff with a password
manager. We provide training every six months on choosing a strong password,
including how to avoid common or discoverable passwords and encouraging
longer passwords by using Three Random Words.

A7.13. Do you have a process for when you believe the passwords or accounts
have been compromised?
You must have an established process that details how to change passwords promptly if you believe or
suspect a password or account has been compromised.

[Select from the dropdown.]


Yes

A7.14. Do all of your cloud services have multi-factor authentication (MFA) available
as part of the service?
Where your systems and cloud services support multi-factor authentication (MFA), for example, a text
message, a one time access code, notification from an authentication app, then you must enable for all
users and administrators. For more information see the NCSC’s guidance on MFA.

Where a cloud service does not have its own MFA solution but can be configured to link to another
cloud service to provide MFA, the link will need to be configured.

A lot of cloud services use another cloud service to provide MFA. Examples of cloud services that can be
linked to are Azure, MS365, Google Workspace.

[Select from the dropdown.]


Yes
A7.15. If you have answered ‘No’ to question A7.14, please provide a list of your
cloud services that do not provide any option for MFA.
You must provide a list of cloud services that are in use by your organisation that do not provide any
option for MFA.

[Write your answer. This question will not appear if you answer ‘Yes to A7.14. You
must list any cloud services that do not provide MFA. If it transpires that the
services do offer MFA, you will be awarded a non-compliance in A7.16 and A7.17.]

A7.16. Has MFA been applied to all administrators of your cloud services?
It is required that all administrator accounts on cloud service must apply multi-factor authentication in
conjunction with a password of at least 8 characters.

[Select from the dropdown.]


Yes

A7.17. Has MFA been applied to all users of your cloud services?
All users of your cloud services must use MFA in conjunction with a password of at least 8 characters.

[Select from the dropdown.]


Yes
Malware protection

Malware (such as computer viruses) is generally used to steal or damage


information. Malware is often used in conjunction with other kinds of attack such as
‘phishing’ (obtaining information by confidence trickery) and social network sites
(which can be mined for information useful to a hacker) to provide a focussed attack
on an organisation. Anti-malware solutions (including antivirus) are available from
commercial suppliers, some free, but usually as complete software and support
packages.

Malware is continually evolving, so it is important that the supplier includes detection


facilities which are updated as frequently as possible. Anti-malware products can
also help confirm whether websites you visit are malicious.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS

Further guidance can be found here https://iasme.co.uk/articles/malware-protection/

A8.1. Are all of your desktop computers, laptops, tablets and mobile phones
protected from malware by either:
A – Having anti-malware software installed
And/or
B – Limiting installation of applications by application allow listing (For
example, using an app store and a list of approved applications, using a
Mobile Device Management(MDM solution)) or
C – None of the above, please describe

Please select all the options that are in use in your organisation across all your devices. Most
organisations that use smartphones and standard laptops will need to select both option A and B.

Option A - option for all in-scope devices running Windows or macOS including servers, desktop
computers, laptop computers

Option B - option for all in-scope devices

Option C - none of the above, explanation notes will be required.

[Select from the multiple choice options. Please note that we expect to see both
Option A and B selected if you have computers and mobile devices in scope.]
A. Having anti-malware software installed
B. Limiting installation of applications by application allow listing
A8.2. If Option A has been selected: Where you have anti-malware software
installed, is it set to update in line with the vendor’s guidelines and prevent
malware from running on detection?
This is usually the default setting for anti-malware software. You can check these settings in the
configuration screen for your anti-malware software. You can use any commonly used anti-malware
product, whether free or paid-for as long as it can meet the requirements in this question. For the
avoidance of doubt, Windows Defender is suitable for this purpose.

[Select from the dropdown. This question will only appear if you select A in A8.1.]
Yes

A8.3. If Option A has been selected: Where you have anti-malware software
installed, is it set to scan web pages you visit and warn you about accessing
malicious websites?
Your anti-malware software or internet browser should be configured to prevent access to known
malicious websites. On Windows 10, SmartScreen can provide this functionality.

[Select from the dropdown. This question will only appear if you select A in A8.1.]
Yes

A8.4. If Option B has been selected: Where you use an app-store or application
signing, are users restricted from installing unsigned applications?
Some operating systems which include Windows S, Chromebooks, mobile phones and tablets restrict
you from installing unsigned applications. Usually you have to "root" or "jailbreak" a device to allow
unsigned applications.

[Select from the dropdown. This question will only appear if you select B in A8.1.]
Yes
A8.5. If Option B has been selected” Where you use an app-store or application
signing, do you ensure that users only install applications that have been
approved by your organisation and do you maintain this list of approved
applications?
You must create a list of approved applications and ensure users only install these applications on their
devices. This includes employee-owned devices. You may use Mobile Device Management (MDM)
software to meet this requirement, but you are not required to use MDM software if you can meet the
requirements using good policy, processes, and training of staff.

[Select from the dropdown. This question will only appear if you select B in A8.1.]
Yes

Achieving compliance with the Cyber Essentials profile indicates that your organisation has
taken the steps set out in the HMG Cyber Essentials Scheme documents. It does not amount
to an assurance that the organisation is free from cyber vulnerabilities and neither IASME
Consortium Limited nor the Certification Body accepts any liability to certified organisations or
any other person or body in relation to any reliance they might place on the certificate.

You might also like