Cyber-Essentials-Preparation-Booklet-v14-Montpellier-Example
Cyber-Essentials-Preparation-Booklet-v14-Montpellier-Example
Cyber Essentials
Self-Assessment
Preparation Booklet
Version 14
January 2023
Montpellier
This document comprises a completed version of the preparation booklet with
guidance and sample answers, prepared by ID Cyber Solutions in June 2023.
Introduction
This booklet contains the question set for the Cyber Essentials information assurance
standard:
Need help?
If you need help with understanding the questions, get in contact with IASME on +44 (0)3300
882752 or email [email protected]
Alternatively, IASME has a network of Certification Bodies who are skilled information
assurance companies who can provide advice on the standards and who can help you make
changes to your setup in order to achieve compliance. Visit the IASME website at
www.iasme.co.uk to find your nearest Certification Body.
Your Company
In this section we need to know a little about how your organisation is set up so we
can ask you the most appropriate questions.
Where an organisation wishes to certify subsidiary companies on the same certificate, the
organisation can certify as a group and can include the subsidiaries' name on the certificate as long as
the board member signing off the certificate has authority over all certified organisations.
For example:
The Stationary Group, incorporating The Paper Mill and The Pen House
It is also possible to list on a certificate where organisations are trading as other names.
For example:
The Paper Mill trading as The Pen House.
A1.7. Is this application a renewal of an existing certification or is it the first time you
have applied for certification?
If you have previously achieved Cyber Essentials, please select "Renewal". If you have not previously
achieved Cyber Essentials, please select "First Time Application".
[Select from the dropdown. Note that certain answers will trigger additional
questions.]
To Generally Improve Our Security
[Select from the dropdown. Note that certain answers will trigger additional
questions.]
To Give Confidence To Our Customers
A1.9. Have you read the 'Cyber Essentials Requirements for IT Infrastructure'
document?
Document is available on the NCSC Cyber Essentials website and should be read before completing this
question set.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-
2023.pdf
A1.10. Can IASME and their expert partners contact you if you experience a cyber
breach?
We would like feedback on how well the controls are protecting organisations. If you agree to this we
will provide you with a contact email and ask that you let us know if you do experience a cyber breach.
IASME and expert partners will then contact you to find out a little more but all information will be
kept confidential
In this section, you need to describe the elements of your organisations IT system
that you want to be covered by the Cyber Essentials certification. The scope should
be either the whole organisation or an organisational sub-set (for example, the UK
operation of a multinational company).
You will also need to answer questions regarding the computers, laptops, servers,
mobile phones, tablets and firewalls/routers that can access the internet and are
used by the whole organisation or organisational sub-set to access organisational
data or services. All locations that are owned or operated by this organisation or
sub-set, whether in the UK or internationally, should be considered "in-scope".
A scope that does not include end user devices is not acceptable.
Your whole organisation includes all divisions, people and devices which access your organisation's
data and services.
A2.2. If you are not certifying your whole organisation, then what scope description
would you like to appear on your certificate and website?
Your scope description should provide details of any areas of your business that have internet access
and have been excluded from the assessment.
You will need to have a clear excluding statement within your scope description, for example, "whole
organisation excluding development network".
[Write your answer. This question is only triggered if you answer ‘Yes’ to A2.1.]
Whole organisation excluding engineering network
A2.3. Please describe the geographical locations of your business which are in the
scope of this assessment.
You should provide either a broad description (i.e., All UK offices) or simply list the locations in scope
(i.e., Manchester and Glasgow retail stores).
For example, “We have 25 DELL laptops running Windows 10 Professional version 20H2 and 10
MacBook laptops running MacOS Ventura".
Please note, the edition and feature version of your Windows operating systems are required.
This applies to both your corporate and user owned devices (BYOD).
You do not need to provide serial numbers, mac addresses or further technical information.
Please Note: You must include make and operating system versions for all devices. All user devices
declared within the scope of the certification only require the make and operating system to be
listed. We have removed the requirement for the applicant to list the model of the device.
Devices that are connecting to cloud services must be included. A scope that does not include end
user devices is not acceptable.
[Write your answer. Ensure you read the question carefully — make and OS is
required; model is not. If Windows, both edition and feature version are required
(Edition: Pro, Enterprise, etc. Feature: 22H2, etc.]
5 x DELL devices running Windows 11 Pro 22H2
3 x Apple devices running Ventura
A2.4.1 Please list the quantity of thin clients within scope of this assessment. Please
include make and operating systems.
Please provide a summary of all the thin clients in scope that are connecting to organisational data or
services (Definitions of which are in the 'CE Requirements for Infrastructure document' linked in
question A1.9).
Thin clients are a type of very simple computer holding only a base operating system which are
often used to connect to virtual desktops. Thin clients can connect to the internet, and it is possible
to modify some thin clients to operate more like PCs, and this can create security complications.
Cyber Essentials requires thin clients be supported and receiving security updates.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-
2023.pdf.pdf
For example, 2 x VMware ESXI 6.7 hosting 8 virtual windows 2016 servers; 1 x MS Server 2019; 1 x
Redhat Enterprise Linux 8.3
A2.6. Please list the quantities of tablets and mobile devices within scope of this
assessment.
All tablets and mobile devices that are used for accessing organisational data or services and have
access to the internet must be included in the scope of the assessment. This applies to both corporate
and user owned devices (BYOD).
You are not required to list any serial numbers, mac addresses or other technical information.
Please Note: You must include make and operating system versions for all devices. All user devices
declared within the scope of the certification only require the make and operating system to be listed.
We have removed the requirement for the applicant to list the model of the device.
A scope that does not include end user devices is not acceptable.
[Write your answer. Only device make (e.g., Samsung) and major version numbers
(e.g., iOS 16) are required.]
3 x Apple devices running iOS 16
4 x Samsung devices running Android 13
A2.7. Please provide a list of your networks that will be in the scope for this
assessment.
You should include details of each network used in your organisation including its name, location, and
its purpose (i.e., Main Network at Head Office for administrative use, Development Network at
Malvern Office for testing software, (home workers network - based in UK). You do not need to provide
IP addresses or other technical information.
For further guidance see the Home Working section in the 'CE Requirements for Infrastructure
Document'. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-
January-2023.pdf
For further guidance see the Home Working section in the 'CE Requirements for Infrastructure
Document'. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-
January-2023.pdf
A2.8. Please provide a list of network equipment that will be in scope for this
assessment (including firewalls and routers). You must include make and
model of each device listed.
You should include all equipment that controls the flow of data, this will be your routers and firewalls.
You do not need to include switches or wireless access points that do not contain a firewall or do not
route internet traffic.
If you don't have an office and do not use network equipment, instead you are relying on software
firewalls please describe in the notes field.
You are not required to list any IP addresses, MAC addresses or serial numbers.
[Write your answer. Please ensure you also include any cloud services you list in
A6.2.3 and A6.2.4.]
Google workspace
MS365
A2.10. Please provide the name and role of the person who is responsible for
managing your IT systems in the scope of this assessment.
This should be the person in your organisation who influences and makes decisions about the
computers, laptops, servers, tablets, mobile phones and network equipment.
This person must be a member of your organisation and cannot be a person employed by your
outsourced IT provider.
All organisations with a head office domiciled in the UK or Crown Dependencies and
a turnover of less than £20 million get automatic cyber insurance if they achieve
Cyber Essentials certification. The insurance is free of charge, but you can opt out of
the insurance element if you choose. This will not change the price of the
assessment package. If you want the insurance, then we do need to ask some
additional questions and these answers will be forwarded to the broker. The
answers to these questions will not affect the result of your Cyber Essentials
assessment. It is important that the insurance information provided is as accurate as
possible and that the assessment declaration is signed by a senior person at Board
level or equivalent, to avoid any delays to the insurance policy being issued.
A3.1. Is your head office domiciled in the UK or Crown Dependencies and is your
gross annual turnover less than £20m?
This question relates to the eligibility of your organisation for the included cyber insurance.
[Select from the dropdown. This question will not appear if the full organisation is
not in scope.]
A3.2. If you have answered “yes” to the last question, then your organisation is
eligible for the included cyber insurance if you gain certification. If you do not
want this insurance element, please opt out here.
There is no additional cost for the insurance. You can see more about it at https://iasme.co.uk/cyber-
essentials/cyberliability-insurance/
[Select from the dropdown. This question will not appear if the full organisation is
not in scope or if you answer ‘No’ to A3.1.]
A3.3. What is your total gross revenue? Please provide figure to the nearest £100K.
You only need to answer this question if you are taking the insurance.
The answer to this question will be passed to the insurance broker in association with the cyber
insurance you will receive at certification. Please be as accurate as possible - figure should be to the
nearest £100K.
[Write your answer. This question will not appear if the full organisation is not in
scope or if you answer ‘No’ to A3.1.]
A3.4. What is the organisation email contact for the insurance documents? You only
need to answer this question if you are taking the insurance.
The answer to this question will be passed to the insurance broker in association with the cyber
insurance you will receive at certification, and they will use this to contact you with your insurance
documents and renewal information.
[Write your answer. This question will not appear if the full organisation is not in
scope or if you answer ‘No’ to A3.1.]
Firewalls
Firewall is the generic name for a piece of software or a hardware device which
provides technical protection between your network devices and the Internet,
referred to in the question set as boundary firewalls. Your organisation will have
physical, virtual or software firewalls at your internet boundaries. Software firewalls
are included within all major operating systems for laptops, desktops and servers
and need to be configured to meet compliance. Firewalls are powerful devices,
which need to be configured correctly to provide effective security.
Questions in this section apply to: boundary firewalls; desktop computers; laptops;
routers; servers; IaaS; PaaS; SaaS.
A4.1. Do you have firewalls at the boundaries between your organisation’s internal
networks, laptops, desktops, servers, and the internet?
You must have firewalls in place between your office network and the internet.
A4.1.1 When your devices (including computers used by homeworkers) are being
used away from your workplace (for example, when they are not connected to
your internal network), how do you ensure they are protected?
You should have firewalls in place for home-based workers. If those users are not using a Corporate
Virtual Private Network (VPN) connected to your office network, they will need to rely on the software
firewall included in the operating system of their device.
When relying on software firewalls included as part of the operating system of your end user devices,
the password to access the device will need to be changed.
A4.2.1 Please describe the process for changing your firewall password?
Home routers not supplied by your organisation are not included in this
requirement.
You need to understand how the password on your firewall(s) is changed.
[Write your answer. Please note that if you do not have a physical device and are
instead relying on software firewalls, your answer should describe how you
change the default admin password on your end user devices.]
We log into the admin panel via a web browser and change the default password
in line with our password policy.
A4.3. Is your new firewall password configured to meet the ‘Password-based
authentication’ requirements?
A4.4. Do you change your firewall password when you know or suspect it has been
compromised?
Passwords may be compromised if there has been a virus on your system or if the manufacturer
notifies you of a security weakness in their product. You should be aware of this and know how to
change the password if this occurs.
When relying on software firewalls included as part of the operating system of your end user devices,
the password to access the device will need to be changed.
A4.5.1 Do you have a documented business case for all of these services?
The business case should be documented and recorded. A business case must be signed off at board
level and associated risks reviewed regularly.
[Select from the dropdown. This question will not appear if you answer ‘No’ to
A4.5.]
Yes
A4.6. If you do have services enabled on your firewall, do you have a process to
ensure they are disabled in a timely manner when they are no longer
required? A description of the process is required.
If you no longer need a service to be enabled on your firewall, you must remove it to reduce the risk
of compromise. You should have a process that you follow to do this (i.e. when are services reviewed,
who decides to remove the services, who checks that it has been done).
A4.7. Have you configured your boundary firewalls so that they block all other
services from being advertised to the internet?
By default, most firewalls block all services from inside the network from being accessed from the
internet, but you need to check your firewall settings.
If you have not set up your firewalls to be accessible to people outside your organisations or your
device configuration settings are only accessible via a VPN connection, then answer "no" to this
question.
[Select from the dropdown. This question will not appear if you answer ‘No’ to
A4.8.]
Yes
A4.10. If you answered yes in question A4.8, is the access to your firewall settings
protected by either multi-factor authentication or by only allowing trusted IP
addresses combined with managed authentication to access the settings?
If you allow direct access to configuration settings via your router or firewall's external interface, this
must be protected by one of the two options.
[Write your answer. This question will not appear if you answer ‘No’ to A4.8.]
Yes, the configuration interface is protected by MFA.
A4.11. Do you have software firewalls enabled on all of your desktop computers,
laptops and servers?
Your software firewall must be configured and enabled at all times, even when sitting behind a
physical/virtual boundary firewall in an office location. You can check this setting on Macs in the
Security & Privacy section of System Preferences. On Windows laptops you can check this by going to
Settings and searching for "Windows firewall". On Linux try "ufw status".
A4.12. If you answered no to question A4.11, is this because software firewalls are
not installed by default as part of the operating system you are using? Please
list the operating systems.
Only very few operating systems do not have software firewalls available. Examples might include
embedded Linux systems or bespoke servers. For the avoidance of doubt, all versions of Windows,
macOS and all common Linux distributions such as Ubuntu do have software firewalls available.
[This question will not appear if you answer ‘Yes’ to 4.11. Software firewalls must
be enabled if they are available for the operating systems in use.]
Secure Configuration
Computers and cloud services are often not secure upon default installation or setup. An
‘out-of-the-box’ set-up can often include an administrative account with a standard,
publicly known default password, one or more unnecessary user accounts enabled
(sometimes with special access privileges ) and pre-installed but unnecessary applications
or services. All of these present security risks.
Questions in this section apply to: servers, desktop computers, laptops, thin clients,
tablets, mobile phones, IaaS, PaaS and SaaS.
A5.1. Where you are able to do so, have you removed or disabled all the software
and services that you do not use on your laptops, desktop computers, thin
clients, servers, tablets, mobile phones and cloud services? Describe how
you achieve this.
You must remove or disable all applications, system utilities and network services that are not needed
in day-to-day use. You need to check your cloud services and disable any services that are not
required for day-to-day use. To view your installed applications
A5.2. Have you ensured that all your laptops, computers, servers, tablets, mobile
devices and cloud services only contain necessary user accounts that are
regularly used in the course of your business?
You must remove or disable any user accounts that are not needed in day-to-day use on all devices and
cloud services.
You can view your user accounts
A5.4. Do you run external services that provide access to data (that shouldn't be
made public) to users across the internet?
Your business might run software that allows staff or customers to access information across the
internet to an external service hosted on the internal network, cloud data centre or IaaS cloud service.
This could be a VPN server, a mail server, or an internally hosted internet application (SaaS or PaaS)
that you provide to your customers as a product. In all cases, these applications provide information
that is confidential to your business and your customers and that you would not want to be publicly
accessible.
Acceptable technical controls that you can use to manage the quality of your passwords are outlined in
the section about ‘Password-based authentication’ in the ‘Cyber Essentials Requirements for IT
Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf
[Select from the multiple choice options. This question will not appear if you
answer ‘No’ to A5.4.]
A. Multi-factor authentication, with a minimum password length 8 characters and
no maximum length
A5.6. Describe the process in place for changing passwords on your external
services when you believe they have been compromised.
Passwords may be compromised if there has been a virus on your system or if the manufacturer
notifies you of a security weakness in their product. You should know how to change the password if
this occurs.
[Write your answer. This question will not appear if you answer ‘No’ to A5.4.]
The suspected compromise is reported to the Operations Director. The OD resets
the password using the admin portal and the user is signed out of any active
sessions.
A5.7. When not using multi-factor authentication, which option are you using to
protect your external service from brute force attacks?
[Select from the multiple choice options. This question will not appear if you
answer ‘No’ to A5.4.]
B. Locking accounts after 10 unsuccessful attempts
It is acceptable to choose the option where a user is prompted to make a choice about what action will
occur each time they insert a memory stick. If you have chosen this option, you can answer yes to this
question.
To protect your organisation, you should ensure that all your software is always up
to date with the latest security updates. If any of your in-scope devices are using an
operating system which is no longer supported (For example Microsoft Windows
XP/Vista/2003/Windows 7/Server 2008, MacOS High Sierra, Ubuntu 17.10), and
you are not being provided with regular updates from the vendor, then you will not
be awarded certification. Mobile phones and tablets are in-scope and must also use
an operating system that is still supported by the manufacturer.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, routers, firewalls, IaaS and PaaS cloud services.
A6.1. Are all operating systems on your devices supported by a vendor that
produces regular security updates?
If you have included firewall or router devices in your scope, the firmware of
these devices is considered to be an operating system and needs to meet
this requirement.
Older operating systems that are out of regular support include Windows 7/XP/Vista/ Server 2003,
mac OS Mojave, iOS 12, iOS 13, Android 8 and Ubuntu Linux 17.10.
It is important you keep track of your operating systems and understand when they have gone end of
life (EOL). Most major vendors will have published EOL dates for their operating systems and firmware.
[Select from the dropdown. Please note that the assessor will check the operating
systems reported in A2.4–2.6. Unsupported OS will result in an automatic fail.]
Yes
A6.2. Is all the software on your devices supported by a supplier that produces
regular fixes for any security problems?
All software used by your organisation must be supported by a supplier who provides regular security
updates. Unsupported software must be removed from your devices. This includes frameworks and
plugins such as Java, Adobe Reader and .NET.
[
[Select from the dropdown. Please note that the assessor will check the software
reported in A6.2.1–A6.2.4. Unsupported software will result in a major non-
compliance.]
Yes
A6.2.1 Please list your internet browser(s)
The version is required.
Please list all internet browsers installed on your devices, so that the Assessor can understand your
setup and verify that they are in support.
For example: Chrome Version 102, Safari Version 15.
[Write your answer. You only need to provide the major version (e.g., Chrome
114).]
Chrome 114
Edge 114
[Write your answer. You only need to provide the major version (if relevant).]
Windows Defender
A6.2.3 Please list your email applications installed on end user devices and server.
The version is required.
Please list all email applications and versions you use so that the Assessor can understand your setup
and verify that they are in support.
For example: MS Exchange 2016, Outlook 2019.
A6.2.4 Please list all office applications that are used to create organisational data.
The version is required
Please list all office applications and versions you use so that the Assessor can understand your setup
and verify that they are in support.
For example: MS 365; Libre office, Google workspace, Office 2016.
Please be aware that for some operating systems, firmware and applications, if annual licensing is not
purchased, they will not be receiving regular security updates.
A6.4. Are all high-risk or critical security updates for operating systems and router
and firewall firmware installed within 14 days of release?
You must install all high and critical security updates within 14 days in all circumstances. If you cannot
achieve this requirement at all times, you will not achieve compliance to this question. You are not
required to install feature updates or optional updates in order to meet this requirement.
A6.4.1 Are all updates applied for operating systems by enabling auto updates?
Most devices have the option to enable auto updates. This must be enabled on any device where
possible.
A6.4.2 Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all operating systems and firmware on firewall and
routers are applied within 14 days of release?
It is not always possible to apply auto updates, this is often the case when you have critical systems or
servers and you need to be in control of the updating process.
Please describe how any updates are applied when auto updates are not configured.
If you only use auto updates, please confirm this in the notes field for this question.
If you cannot achieve this requirement at all times, you will not achieve compliance to this question.
You are not required to install feature updates or optional updates in order to meet this requirement,
just high-risk or critical security updates.
A6.5.1 Are all updates applied on your applications by enabling auto updates?
Most devices have the option to enable auto updates. Auto updates should be enabled where possible.
A6.5.2 Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all applications are applied within 14 days of
release?
It is not always possible to apply auto updates, this is often the case when you have critical systems or
applications and you need to be in control of the updating process.
Please describe how any updates are applied when auto updates are not configured.
If you only use auto updates, please confirm this in the notes field for this question.
A6.6. Have you removed any software installed on your devices that is no longer
supported and no longer receives regular updates for security problems?
You must remove older software from your devices when it is no longer supported by the
manufacturer. Such software might include older versions of web browsers, operating systems,
frameworks such as Java and Flash, and all application software.
If the out-of-scope subset remains connected to the internet, you will not be able to achieve whole
company certification and an excluding statement will be required in question A2.2.
A sub-set is defined as a part of the organisation whose network is segregated from the rest of the
organisation by a firewall or VLAN.
[Write your answer. For this question, you should demonstrate you understand the
need to remove unsupported software by segregating it from your network.]
We currently do not use unsupported software. However, if the need arose, we
would segregate it from our network and remove internet access.
User Access Control
It is important to only give users access to the resources and data necessary for
their roles, and no more. All users need to have unique accounts and should not be
carrying out day-to-day tasks such as invoicing or dealing with e-mail whilst logged
on as a user with administrator privileges which allow significant changes to the way
your computer systems work.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS
A7.1. Are users only provided with user accounts after a process has been followed
to approve their creation? Describe the process.
You must ensure that user accounts (such as logins to laptops and accounts on servers) are only
provided after they have been approved by a person with a leadership role in the business.
[Write your answer. We are especially looking to see that someone with a
leadership role in the organisation approves any account creation.]
Yes, the Operations Director approves the creation of any account and emails our
IT Provider to request the setup.
A7.2. Are all user and administrative accounts accessed by entering a unique
username and password?
You must ensure that no devices can be accessed without entering a username and password.
Accounts must not be shared.
A7.3. How do you ensure you have deleted, or disabled, any accounts for staff who
are no longer with your organisation?
When an individual leaves your organisation you need to stop them accessing any of your systems.
Administrative Accounts
User accounts with special access privileges (e.g. administrative accounts) typically
have the greatest level of access to information, applications and computers. When
these privileged accounts are accessed by attackers they can cause the most
amount of damage because they can usually perform actions such as install
malicious software and make changes. Special access includes privileges over and
above those of normal users.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS
A7.5. Do you have a formal process for giving someone access to systems at an
“administrator” level and can you describe this process?
You must have a process that you follow when deciding to give someone access to systems at
administrator level. This process might include approval by a person who is an
owner/director/trustee/partner of the organisation.
A7.7. How does your organisation prevent administrator accounts from being used
to carry out every day tasks like browsing the web or accessing email?
This question relates to the activities carried out when an administrator account is in use.
You must ensure that administrator accounts are not used to access websites or download email.
Using such accounts in this way exposes the device to compromise by malware. Software and update
downloads should be performed as a standard user and then installed as an administrator. You may
not need a technical solution to achieve this, it could be based on good policy, procedure and regular
training for staff.
A7.8. Do you formally track which users have administrator accounts in your
organisation?
You must track all people that have been granted administrator accounts.
A7.9. Do you review who should have administrative access on a regular basis?
You must review the list of people with administrator access regularly. Depending on your business,
this might be monthly, quarterly, or annually. Any users who no longer need administrative access to
carry out their role should have it removed.
A7.10. Describe how you protect accounts from brute-force password guessing in
your organisation.
A brute-force attack is an attempt to discover a password by systematically trying every possible
combination of letters, numbers, and symbols until you discover the one correct combination that
works.
Information on how to protect against brute-force password guessing can be found in the Password-
based authentication section, under the User Access Control section in the ‘Cyber Essentials
Requirements for IT Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-
Requirements-for-Infrastructure-v3-1January-2023.pdf
A7.11. Which technical controls are used to manage the quality of your passwords
within your organisation?
Acceptable technical controls that you can use to manage the quality of your passwords are outlined in
the new section about Password-based authentication in the ‘Cyber Essentials Requirements for IT
Infrastructure’ document. https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-
Infrastructure-v3-1-January-2023.pdf
A7.13. Do you have a process for when you believe the passwords or accounts
have been compromised?
You must have an established process that details how to change passwords promptly if you believe or
suspect a password or account has been compromised.
A7.14. Do all of your cloud services have multi-factor authentication (MFA) available
as part of the service?
Where your systems and cloud services support multi-factor authentication (MFA), for example, a text
message, a one time access code, notification from an authentication app, then you must enable for all
users and administrators. For more information see the NCSC’s guidance on MFA.
Where a cloud service does not have its own MFA solution but can be configured to link to another
cloud service to provide MFA, the link will need to be configured.
A lot of cloud services use another cloud service to provide MFA. Examples of cloud services that can be
linked to are Azure, MS365, Google Workspace.
[Write your answer. This question will not appear if you answer ‘Yes to A7.14. You
must list any cloud services that do not provide MFA. If it transpires that the
services do offer MFA, you will be awarded a non-compliance in A7.16 and A7.17.]
A7.16. Has MFA been applied to all administrators of your cloud services?
It is required that all administrator accounts on cloud service must apply multi-factor authentication in
conjunction with a password of at least 8 characters.
A7.17. Has MFA been applied to all users of your cloud services?
All users of your cloud services must use MFA in conjunction with a password of at least 8 characters.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin
clients, mobile phones, IaaS, PaaS and SaaS
A8.1. Are all of your desktop computers, laptops, tablets and mobile phones
protected from malware by either:
A – Having anti-malware software installed
And/or
B – Limiting installation of applications by application allow listing (For
example, using an app store and a list of approved applications, using a
Mobile Device Management(MDM solution)) or
C – None of the above, please describe
Please select all the options that are in use in your organisation across all your devices. Most
organisations that use smartphones and standard laptops will need to select both option A and B.
Option A - option for all in-scope devices running Windows or macOS including servers, desktop
computers, laptop computers
[Select from the multiple choice options. Please note that we expect to see both
Option A and B selected if you have computers and mobile devices in scope.]
A. Having anti-malware software installed
B. Limiting installation of applications by application allow listing
A8.2. If Option A has been selected: Where you have anti-malware software
installed, is it set to update in line with the vendor’s guidelines and prevent
malware from running on detection?
This is usually the default setting for anti-malware software. You can check these settings in the
configuration screen for your anti-malware software. You can use any commonly used anti-malware
product, whether free or paid-for as long as it can meet the requirements in this question. For the
avoidance of doubt, Windows Defender is suitable for this purpose.
[Select from the dropdown. This question will only appear if you select A in A8.1.]
Yes
A8.3. If Option A has been selected: Where you have anti-malware software
installed, is it set to scan web pages you visit and warn you about accessing
malicious websites?
Your anti-malware software or internet browser should be configured to prevent access to known
malicious websites. On Windows 10, SmartScreen can provide this functionality.
[Select from the dropdown. This question will only appear if you select A in A8.1.]
Yes
A8.4. If Option B has been selected: Where you use an app-store or application
signing, are users restricted from installing unsigned applications?
Some operating systems which include Windows S, Chromebooks, mobile phones and tablets restrict
you from installing unsigned applications. Usually you have to "root" or "jailbreak" a device to allow
unsigned applications.
[Select from the dropdown. This question will only appear if you select B in A8.1.]
Yes
A8.5. If Option B has been selected” Where you use an app-store or application
signing, do you ensure that users only install applications that have been
approved by your organisation and do you maintain this list of approved
applications?
You must create a list of approved applications and ensure users only install these applications on their
devices. This includes employee-owned devices. You may use Mobile Device Management (MDM)
software to meet this requirement, but you are not required to use MDM software if you can meet the
requirements using good policy, processes, and training of staff.
[Select from the dropdown. This question will only appear if you select B in A8.1.]
Yes
Achieving compliance with the Cyber Essentials profile indicates that your organisation has
taken the steps set out in the HMG Cyber Essentials Scheme documents. It does not amount
to an assurance that the organisation is free from cyber vulnerabilities and neither IASME
Consortium Limited nor the Certification Body accepts any liability to certified organisations or
any other person or body in relation to any reliance they might place on the certificate.