Question Set Cyber Essentials v14 Montpellier
Question Set Cyber Essentials v14 Montpellier
ry
go
te
ry
n
tio
go
Ca
s
te
b-
ue
o.
Ca
Su
Q
N
Organisation Your
Organisation
A1.1
A1.2
A1.3
A1.4
A1.5
A1.5
A1.6
A1.7
A1.8
A1.8.1
A1.9
A1.10
Scope of
Assessment
A2.1
A2.2
A2.3
A2.4
A2.4.1
A2.5
A2.6
A2.7
A2.7.1
A2.8
A2.9
A2.10
Insurance
A3.1
A3.2
A3.3
A3.4
Firewalls
A4.1
A4.1.1
A4.2
A4.2.1
A4.3
A4.4
A4.5
A4.5.1
A4.6
A4.7
A4.8
A4.9
A4.10
A4.11
A4.12
Secure
configuration
A5.1
A5.2
A5.3
A5.4
A5.5
A5.6
A5.7
A5.8
Device
Locking
A5.9
A5.10
Security
update
management
A6.1
A6.2
A6.2.1
A6.2.2
A6.2.3
A6.2.4
A6.3
A6.4
A6.4.1
A6.4.2
A6.5
A6.5.1
A6.5.2
A6.6
A6.7
User Access
Control A7.1
A7.2
A7.3
A7.4
Administrativ
e Accounts A7.5
A7.6
A7.7
A7.8
A7.9
Password-
Based
Authentication
A7.10
A7.11
A7.12
A7.13
A7.14
A7.15
A7.16
A7.17
Malware
protection
A8.1
A8.2
A8.3
A8.4
A8.5
Cyber Essentials Question Set - Montpellier - January 2023
ce
n
tio
an
s
d
ue
ui
Q
G
In this section we need to know a little about how your organisation is set up so we can ask
you the most appropriate questions.
What is your organisation's name (for companies: as registered with Companies House)?
What is your organisations address (for companies: as registered with Companies House)?
What is your main business?
What is your main business?
Is this application a renewal of an existing certification or is it the first time you have applied
for certification?
What is your primary reason for applying for certification?
What is your secondary reason for applying for certification?
Have you read the 'Cyber Essentials Requirements for IT Infrastructure' document?
Can IASME and their expert partners contact you if you experience a cyber breach?
In this section, you need to describe the elements of your organisations IT system that you
want to be covered by the Cyber Essentials certification. The scope should be either the whole
organisation or an organisational sub-set (for example, the UK operation of a multinational
company).
You will also need to answer questions regarding the computers, laptops, servers, mobile
phones, tablets and firewalls/routers that can access the internet and are used by the whole
organisation or organisational sub-set to access organisational data or services. All locations
that are owned or operated by this organisation or sub-set, whether in the UK or
internationally, should be considered "in-scope".
The level of detail required for devices is as follows: 'With the exception of network devices
(such as firewalls and routers), all user devices declared within the scope of the certification
only require the make and operating system to be listed. We have removed the requirement
for the applicant to list the model of the device. This change will be reflected in the self-
assessment question set, rather than the requirements document'
A scope that does not include end user devices is not acceptable.
https://iasme.co.uk/articles/scope/
Does the scope of this assessment cover your whole organisation? Please note: Your
organisation is only eligible for free cyber insurance if your assessment covers your whole
company, if you answer "No" to this question you will not be invited to apply for insurance.
If it is not the whole organisation, then what scope description would you like to appear on
your certificate and website?
Please describe the geographical locations of your business which are in the scope of this
assessment.
Please list the quantities and operating systems for your laptops, desktops and virtual
desktops within the scope of this assessment.
Please Note: You must include make and operating system versions for all devices. All user
devices declared within the scope of the certification only require the make and operating
system to be listed. We have removed the requirement for the applicant to list the model of
the device.
A scope that does not include end user devices is not acceptable.
Please list the quantity of thin clients within scope of this assessment. Please include make
and operating systems.
Please list the quantity of servers, virtual servers and virtual server hosts (hypervisor). You
must include the operating system.
Please list the quantities of tablets and mobile devices within the scope of
this assessment.
Please Note: You must include make and operating system versions for all
devices. All user devices declared within the scope of the certification only
require the make and operating system to be listed. We have removed the
requirement for the applicant to list the model of the device.
A scope that does not include end user devices is not acceptable.
Please provide a list of your networks that will be in the scope for this
assessment.
Please list all of your cloud services that are in use by your organisation and
provided by a third party.
Please provide the name and role of the person who is responsible for managing your IT
systems in the scope of this assessment.
What is your total gross revenue? Please provide figure to the nearest £100K. You only need
to answer this question if you are taking the insurance.
What is the organisation email contact for the insurance documents? You only need to answer
this question if you are taking the insurance.
Firewall is the generic name for a piece of software or a hardware device which provides
technical protection between your network devices and the Internet, referred to in the
question set as boundary firewalls. Your organisation will have physical, virtual or software
firewalls at your internet boundaries. Software firewalls are included within all major
operating systems for laptops, desktops and servers and need to be configured to meet
compliance. Firewalls are powerful devices, which need to be configured correctly to provide
effective security.
Questions in this section apply to: boundary firewalls; desktop computers; laptops; routers;
servers; IaaS; PaaS; SaaS.
Further guidance can be found here
https://iasme.co.uk/articles/firewalls/
Do you have firewalls at the boundaries between your organisation’s internal networks,
laptops, desktops, servers and the internet?
When your devices (including computers used by homeworkers) are being used away from
your workplace (for example, when they are not connected to your internal network), how do
you ensure they are protected?
When you first receive an internet router or hardware firewall device, it may have had a
default password on it. Have you changed all the default passwords on your boundary firewall
devices?
Do you change your firewall password when you know or suspect it has
been compromised?
Do you have any services enabled that can be accessed externally through your internet
router, hardware firewall or software firewall?
If you do have services enabled on your firewall, do you have a process to ensure they are
disabled in a timely manner when they are no longer required? A description of the
process is required.
Have you configured your boundary firewalls so that they block all other services from being
advertised to the internet?
Are your boundary firewalls configured to allow access to their configuration settings over the
internet?
If you answered yes in question A4.8, is there a documented business requirement for this
access?
If you answered yes in question A4.8, is the access to your firewall settings protected by either
multi-factor authentication or by only allowing trusted IP addresses combined with managed
authentication to access the settings?
Do you have software firewalls enabled on all of your computers, laptops and servers?
If you answered no to question A4.11, is this because software firewalls are not installed by
default as part of the operating system you are using? Please list the operating systems.
Computers and cloud services are often not secure upon default installation or setup. An
‘out-of-the-box’ set-up can often include an administrative account with a standard, publicly
known default password, one or more unnecessary user accounts enabled (sometimes with
special access privileges ) and pre-installed but unnecessary applications or services. All of
these present security risks.
Questions in this section apply to: servers, desktop computers, laptops, thin clients, tablets,
mobile phones, IaaS, PaaS and SaaS.
https://iasme.co.uk/articles/secure-configuration/
Where you are able to do so, have you removed or disabled all the software
and services that you do not use on your laptops, desktop computers, thin
clients, servers, tablets, mobile phones and cloud services? Describe how
you achieve this.
Have you ensured that all your laptops, computers, servers, tablets, mobile devices and cloud
services only contain necessary user accounts that are regularly used in the course of your
business?
Have you changed the default password for all user and administrator accounts on all your
desktop computers, laptops, thin clients, servers, tablets and mobile phones that follow the
Password-based authentication requirements of Cyber Essentials?
Do you run external services that provides access to data (that shouldn't be
made public) to users across the internet?
Describe the process in place for changing passwords on your external services when you
believe they have been compromised.
When not using multi-factor authentication, which option are you using to protect your
external service from brute force attacks?
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, routers, firewalls, IaaS and PaaS cloud services.
https://iasme.co.uk/articles/security-update-management/
Are all operating systems on your devices supported by a vendor that produces regular
security updates?
If you have included firewall or router devices in your scope, the firmware of these devices is
considered to be an operating system and needs to meet this requirement.
Is all the software on your devices supported by a supplier that produces regular fixes for any
security problems?
Please list your email applications installed on end user devices and server.
The version is required.
Please list all office applications that are used to create organisational data.
The version is required.
Are all high-risk or critical security updates for operating systems and router and firewall
firmware installed within 14 days of release?
Are all updates applied for operating systems by enabling auto updates ?
Where auto updates are not being used, how do you ensure all high-risk or critical security
updates of all operating systems and firmware on firewalls and routers are applied within 14
days of release?
Are all high-risk or critical security updates for applications (including any associated files and
any plugins such as Java, Adobe Reader and .Net.) installed within 14 days of release?
Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all applications are applied within 14 days of
release?
Have you removed any software installed on your devices that is no longer supported and no
longer receives regular updates for security problems?
Where you have a business need to use unsupported software, have you moved the devices
and software out of scope of this assessment? Please explain how you achieve this.
It is important to only give users access to the resources and data necessary for their roles,
and no more. All users need to have unique accounts and should not be carrying out day-to-
day tasks such as invoicing or dealing with e-mail whilst logged on as a user with administrator
privileges which allow significant changes to the way your computer systems work.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS
Further guidance can be found here
https://iasme.co.uk/articles/user-access-control/
Are users only provided with user accounts after a process has been followed to approve their
creation? Describe the process.
Are all user and administrative accounts accessed by entering a unique username and
password?
How do you ensure you have deleted, or disabled, any accounts for staff who are no longer
with your organisation?
Do you ensure that staff only have the privileges that they need to do their current job? How
do you do this?
User accounts with special access privileges (e.g. administrative accounts) typically have the
greatest level of access to information, applications and computers. When these privileged
accounts are accessed by attackers they can cause the most amount of damage because they
can usually perform actions such as install malicious software and make changes. Special
access includes privileges over and above those of normal users.
Questions in this section applies to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS
Do you have a formal process for giving someone access to systems at an “administrator” level
and can you describe this process?
How does your organisation make sure that separate accounts are used to carry out
administrative tasks (such as installing software or making configuration changes)?
How does your organisation prevent administrator accounts from being used to carry out
every day tasks like browsing the web or accessing email?
Do you formally track which users have administrator accounts in your organisation?
All accounts require the user to authenticate. Where this is done using a password the
following protections should be used:
• People are supported to choose unique passwords for their work accounts.
Describe how you protect accounts from brute-force password guessing in your organisation?
Which technical controls are used to manage the quality of your passwords within your
organisation?
Please explain how you encourage people to use unique and strong passwords.
Do you have a documented password policy that includes a process for when you believe that
passwords or accounts have been compromised?
Do all of your cloud services have multi-factor authentication(MFA) available as part of the
service?
If you have answered ‘No’ to question A7.14, please provide a list of your cloud services that
do not provide any option for MFA.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS
https://iasme.co.uk/articles/malware-protection/
Are all of your desktop computers, laptops, tablets and mobile phones protected from
malware by either:
and/or
B - Limiting installation of applications by application allow listing (For example, using an app
store and a list of approved applications, using a Mobile Device Management(MDM solution))
or
If Option A has been selected: Where you have anti-malware software installed, is it set to
update in line with the vendor's guidelines and prevent malware from running on detection?
If Option A has been selected: Where you have anti-malware software installed, is it set to
scan web pages you visit and warn you about accessing malicious websites?
If Option B has been selected: Where you use an app-store or application signing, are users
restricted from installing unsigned applications?
If Option B has been selected: Where you use an app-store or application signing, do you
ensure that users only install applications that have been approved by your organisation and
do you maintain this list of approved applications?
es tip -
/N le
/ Y ul e
ce / M yp
o
oi s r T
Ch ote e
N ns w
ce
an
A
d
ui
G
The answer given in A1.1 is the name that will be displayed on your
Cyber Essentials Certificate and has a character limit of 150.
For example:
The Stationary Group, incorporating The Paper Mill and The Pen House
For example:
The Paper Mill trading as The Pen House.
If you are a UK limited company, your registration number will be provided by Companies
House, in the Republic of Ireland, this will be provided by Companies Registration Office.
Charities, partnerships and other organisations should provide their registration number if
applicable.
If a client is applying for certification for more than one registered company, just one
registration number can be entered to represent the entire group.
Please provide the legal registered address for your organisation, if different from the main
operating location.
Please summarise the main occupation of your organisation.
Academia - Pre Schools
Academia - Primary Schools
Academia - Secondary Schools
Academia - Academies
Academia - Colleges
Academia - Universities
Aerospace
Agriculture, Forestry and Fishing
Automotive
Charities
Chemicals
Civil Nuclear
Construction
Consultancy
Defence
Diplomacy
Emergency Services
Energy - Electricity
Energy - Gas
Energy - Oil
Engineering
Environmental
Finance
Food
His Majesty's Government (HMG)
Health
Hospitality - Food
Hospitality - Accommodation
Hospitality - Hotels
IT
Intelligence
Law Enforcement (Serious & Organised Crime)
Legal
Leisure
Managed Services - IT Managed Services
Managed Services - Other Managed Services
Manufacturing
Media
Membership Organisations
Mining
Other (please describe)
Pharmaceuticals
Political
Postal Services
Property
R&D
Retail
Telecoms
Transport - Aviation
Transport - Maritime
Transport - Rail
Transport - Road
Waste Management
Water
Overseas
Food
His Majesty's Government (HMG)
Health
Hospitality - Food
Hospitality - Accommodation
Hospitality - Hotels
IT
Intelligence
Law Enforcement (Serious & Organised Crime)
Legal
Leisure
Managed Services - IT Managed Services
Managed Services - Other Managed Services
Manufacturing
Media
Membership Organisations
Mining
Other (please describe)
Pharmaceuticals
Political
Postal Services
Property
R&D
Retail
Telecoms
Transport - Aviation
Transport - Maritime
Transport - Rail
Transport - Road
Waste Management
Water
Overseas
Please provide your website address (if you have one). This can be a Facebook/LinkedIn
page if you prefer.
Document is available on the NCSC Cyber Essentials website and should be read before
completing this question set.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
We would like feedback on how well the controls are protecting organisations. If you agree
to this we will provide you with a contact email and ask that you let us know if you do
experience a cyber breach. IASME and expert partners will then contact you to find out a
little more but all information will be kept confidential
Your whole organisation includes all divisions, people and devices which access your
organisations data and services.
Your scope description should provide details of any areas of your business that have
internet access and have been excluded from the assessment.
You will need to have a clear excluding statement within your scope description, for
example, "whole organisation excluding development network".
You should provide either a broad description (i.e. All UK offices) or simply list the locations
in scope (i.e. Manchester and Glasgow retail stores).
You need to provide a summary of all laptops, computers, virtual desktops and their
operating systems that are used for accessing organisational data or services and have
access to the internet.
For example, “We have 25 DELL laptops running Windows 10 Professional version 20H2
and 10 MacBook laptops running MacOS Ventura".
Please note, the edition and feature version of your Windows operating systems are
required.
This applies to both your corporate and user owned devices (BYOD).
You do not need to provide serial numbers, mac addresses or further technical information.
Please provide a summary of all the thin clients in scope that are connecting to
organisational data or services (Definitions of which are in the 'CE Requirements for
Infrastructure document' linked in question A1.9).
Thin clients are a type of very simple computer holding only a base operating system
which are often used to connect to virtual desktops. Thin clients can connect to the
internet, and it is possible to modify some thin clients to operate more like PCs, and this
can create security complications. Cyber Essentials requires thin clients be supported
and receiving security updates.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
Please list the quantity of all servers within scope of this assessment.
For example, 2 x VMware ESXI 6.7 hosting 8 virtual windows 2016 servers; 1 x MS Server
2019; 1 x Redhat Enterprise Linux 8.3
All tablets and mobile devices that are used for accessing organisational
data or services and have access to the internet must be included in the
scope of the assessment. This applies to both corporate and user owned
devices (BYOD).
You are not required to list any serial numbers, mac addresses or other
technical information.
You should include details of each network used in your organisation including its name,
location and its purpose (i.e. Main Network at Head Office for administrative use,
Development Network at Malvern Office for testing software, home workers network
- based in UK).
For further guidance see the Home Working section in the 'CE
Requirements for Infrastructure Document'.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
Any employee that has been given permission to work at home for any period of time at
the time of the assessment, needs to be classed as working from home for Cyber Essentials
For further guidance see the Home Working section in the 'CE Requirements for
Infrastructure Document'.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
You should include all equipment that controls the flow of data, this will be your routers
and firewalls.
You do not need to include switches or wireless access points that do not contain a firewall
or do not route internet traffic.
If you don't have an office and do not use network equipment, instead you are relying on
software firewalls please describe in the notes field.
You are not required to list any IP addresses, MAC addresses or serial numbers.
You need to include details of all of your cloud services. This includes all types of services -
IaaS, PaaS and SaaS. Definitions of the different types of cloud services are provided in the
'CE Requirements for Infrastructure Document'.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
This question relates to the eligibility of your organisation for the included cyber
insurance
There is no additional cost for the insurance. You can see more about it
at https://iasme.co.uk/cyber-essentials/cyber-liability-insurance/
The answer to this question will be passed to the insurance broker in association with the
cyber insurance you will receive at certification. Please be as accurate as possible - figure
should be to the nearest £100K.
The answer to this question will be passed to the insurance broker in association with the
cyber insurance you will receive at certification and they will use this to contact you with
your insurance documents and renewal information.
You must have firewalls in place between your office network and the internet.
You should have firewalls in place for home-based workers. If those users are not using a
Corporate Virtual Private Network (VPN) connected to your office network, they will need
to rely on the software firewall included in the operating system of their device.
The default password must be changed on all routers and firewalls, including those that
come with a unique password pre-configured (i.e. BT Business Hub, Draytek Vigor 2865ac).
When relying on software firewalls included as part of the operating system of your end
user devices, the password to access the device will need to be changed.
Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the new section about password-based authentication in the ‘Cyber
Essentials Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
Passwords may be compromised if there has been a virus on your system or if the
manufacturer notifies you of a security weakness in their product. You should be aware of
this and know how to change the password if this occurs.
When relying on software firewalls included as part of the operating system of your end
user devices, the password to access the device will need to be changed.
At times your firewall may be configured to allow a system on the inside to become
accessible from the internet (for example: a VPN server, a mail server, an FTP server or a
service that is accessed by your customers). This is sometimes referred to as "opening a
port". You need to show a business case for doing this because it can present security risks.
If you have not enabled any services, answer "No". By default, most firewalls block all
services.
The business case should be documented and recorded. A business case must be signed off
at board level and associated risks reviewed regularly.
If you no longer need a service to be enabled on your firewall, you must remove it to
reduce the risk of compromise. You should have a process that you follow to do this (i.e.
when are services reviewed, who decides to remove the services, who checks that it has
been done?)
By default, most firewalls block all services from inside the network from being accessed
from the internet, but you need to check your firewall settings.
If you have not set up your firewalls to be accessible to people outside your organisations
or your device configuration settings are only accessible via a VPN connection, then answer
"no" to this question.
When you have made a decision to provide external access to your routers and firewalls,
this decision must be documented (for example, written down).
If you allow direct access to configuration settings via your router or firewall's external
interface, this must be protected by one of the two options.
Please explain which option is used.
Your software firewall needs be configured and enabled at all times, even when sitting
behind a physical/virtual boundary firewall in an office location. You can check this setting
on Macs in the Security & Privacy section of System Preferences. On Windows laptops you
can check this by going to Settings and searching for "Windows firewall". On Linux try "ufw
status".
Only very few operating systems do not have software firewalls available. Examples might
include embedded Linux systems or bespoke servers. For the avoidance of doubt, all
versions of Windows, macOS and all common Linux distributions such as Ubuntu do have
software firewalls available.
You must remove or disable all applications, system utilities and network services that are
not needed in day-to-day use. You need to check your cloud services and disable any
services that are not required for day-to-day use.
To view your installed applications
You must remove or disable any user accounts that are not needed in day-to-day use on all
devices and cloud services.
You can view your user accounts
A password that is difficult to guess will be unique and not be made up of common or
predictable words such as "password" or "admin” or include predictable number sequences
such as "12345".
Your business might run software that allows staff or customers to access information
across the internet to an external service hosted on the internal network, cloud data centre
or IaaS cloud service. This could be a VPN server, a mail server, or an internally hosted
internet application(SaaS or PaaS) that you provide to your customers as a product. In all
cases, these applications provide information that is confidential to your business and your
customers and that you would not want to be publicly accessible.
Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the section about ‘Password-based authentication’ in the ‘Cyber Essentials
Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
Passwords may be compromised if there has been a virus on your system or if the
manufacturer notifies you of a security weakness in their product. You should know how to
change the password if this occurs.
The external service that you provide must be set to slow down or stop attempts to log in if
the wrong username and password have been tried a number of times. This reduces the
opportunity for cyber criminals to keep trying different passwords (brute-forcing) in the
hope of gaining access.
Please refer to Device Unlocking Credentials paragraph found under Secure Configuration
in the Cyber Essentials Requirements for IT Infrastructure document for further
information.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
The use of a PIN with a length of at least six characters can only be used where the
credentials are just to unlock a device and does not provide access to organisational data
and services without further authentication.
Older operating systems that are out of regular support include Windows 7/XP/Vista/
Server 2003, mac OS Mojave, iOS 12, iOS 13, Android 8 and Ubuntu Linux 17.10.
It is important you keep track of your operating systems and understand when they have
gone end of life(EOL). Most major vendors will have published EOL dates for their
operating systems and firmware.
All software used by your organisation must be supported by a supplier who provides
regular security updates. Unsupported software must be removed from your devices. This
includes frameworks and plugins such as Java, Adobe Reader and .NET.
Please list all internet browsers installed on your devices, so that the Assessor can
understand your setup and verify that they are in support.
Please list all malware protection and versions you use so that the Assessor can
understand your setup and verify that they are in support.
For example: Sophos Endpoint Protection V10, Windows Defender, Bitdefender Internet
Security 2020.
Please list all email applications and versions you use so that the Assessor can understand
your setup and verify that they are in support.
Please list all office applications and versions you use so that the Assessor can understand
your setup and verify that they are in support.
For example: MS 365; Libre office, Google workspace, Office 2016.
All software must be licensed. It is acceptable to use free and open source software as long
as you comply with any licensing requirements.
Please be aware that for some operating systems, firmware and applications, if annual
licensing is not purchased, they will not be receiving regular security updates.
You must install all high and critical security updates within 14 days in all circumstances. If
you cannot achieve this requirement at all times, you will not achieve compliance to this
question. You are not required to install feature updates or optional updates in order to
meet this requirement.
Most devices have the option to enable auto updates. This must be
enabled on any device where possible.
It is not always possible to apply auto updates, this is often the case when you have critical
systems or servers and you need to be in control of the updating process.
Please describe how any updates are applied when auto updates are not configured.
If you only use auto updates, please confirm this in the notes field for this question.
You must install any such updates within 14 days in all circumstances.
If you cannot achieve this requirement at all times, you will not achieve compliance to this
question.
You are not required to install feature updates or optional updates in order to meet this
requirement, just high-risk or critical security updates.
Most devices have the option to enable auto updates. Auto updates should be enabled
where possible.
It is not always possible to apply auto updates, this is often the case when you have critical
systems or applications and you need to be in control of the updating process.
Please describe how any updates are applied when auto updates are not configured.
If you only use auto updates, please confirm this in the notes field for this question.
You must remove older software from your devices when it is no longer supported by the
manufacturer. Such software might include older versions of web browsers, operating
systems, frameworks such as Java and Flash, and all application software.
Software that is not removed from devices when it becomes un-
supported will need to be placed onto its own sub-set with no internet
access.
If the out-of-scope subset remains connected to the internet, you will not
be able to achieve whole company certification and an excluding
statement will be required in question A2.2.
You must ensure that user accounts (such as logins to laptops and accounts on servers) are
only provided after they have been approved by a person with a leadership role in the
business.
You must ensure that no devices can be accessed without entering a username and
password. Users cannot share accounts.
Accounts must not be shared.
When an individual leaves your organisation you need to stop them accessing any of your
systems.
When a staff member changes job role, you may also need to change their permissions to
only access the files, folders and applications that they need to do their day to day work.
You must have a process that you follow when deciding to give someone access to systems
at administrator level. This process might include approval by a person who is an
owner/director/trustee/partner of the organisation.
You must use a separate administrator account from the standard user account, when
carrying out administrative tasks such as installing software. Using administrator accounts
all-day-long exposes the device to compromise by malware. Cloud service administration
must be carried out through separate accounts.
This question relates to the activities carried out when an administrator account is in use.
You must ensure that administrator accounts are not used to access websites or download
email. Using such accounts in this way exposes the device to compromise by malware.
Software and update downloads should be performed as a standard user and then
installed as an administrator. You may not need a technical solution to achieve this, it
could be based on good policy, procedure and regular training for staff.
You must track all people that have been granted administrator accounts.
You must review the list of people with administrator access regularly. Depending on your
business, this might be monthly, quarterly or annually. Any users who no longer need
administrative access to carry out their role should have it removed.
Information on how to protect against brute-force password guessing can be found in the
Password-based authentication section, under the User Access Control section in the
‘Cyber Essentials Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the new section about password-based authentication in the ‘Cyber
Essentials Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
You need to support those that have access to your organisational data and services by
informing them of how they should pick a strong and unique password.
Further information can be found in the password-based authentication section, under the
User Access Control section in the Cyber Essentials Requirements for IT Infrastructure
document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
You must have an established process that details how to change passwords promptly if
you believe or suspect a password or account has been compromised.
Where your systems and cloud services support multi-factor authentication (MFA), for
example, a text message, a one time access code, notification from an authentication app,
then you must enable for all users and administrators. For more information see the
NCSC’s guidance on MFA.
Where a cloud service does not have its own MFA solution but can be configured to link to
another cloud service to provide MFA, the link will need to be configured.
A lot of cloud services use another cloud service to provide MFA. Examples of cloud
services that can be linked to are Azure, MS365, Google Workspace.
You must provide a list of cloud services that are in use by your organisation that do not
provide any option for MFA.
It is required that all administrator accounts on cloud service must apply multi-factor
authentication in conjunction with a password of at least 8 characters.
All users of your cloud services must use MFA in conjunction with a password of at least 8
characters.
Please select all the options that are in use in your organisation across all your devices.
Most organisations that use smartphones and standard laptops will need to select both
option A and B.
Option A - option for all in-scope devices running Windows or macOS including servers,
desktop computers, laptop computers
This is usually the default setting for anti-malware software. You can check these settings
in the configuration screen for your anti-virus software. You can use any commonly used
anti-virus product, whether free or paid-for as long as it can meet the requirements in this
question. For the avoidance of doubt, Windows Defender is suitable for this purpose.
Some operating systems which include Windows S, Chromebooks, mobile phones and
tablets restrict you from installing unsigned applications. Usually you have to "root" or
"jailbreak" a device to allow unsigned applications.
You must create a list of approved applications and ensure users only install these
applications on their devices. This includes employee-owned devices. You may use mobile
device management (MDM) software to meet this requirement but you are not required to
use MDM software if you can meet the requirements using good policy, processes and
training of staff.
A
N ns w
Ch ote e
Notes
Notes
Notes
oi s r T
ce / M yp
/ Y ul e
Multiple choice
es tip -
/N le
o
Q
ue
s tio
n
Lo
gi
c
Multiple choice
Multiple choice
Notes
Yes/No
Yes/No
Yes/No
Notes
Notes
Notes
Notes
Notes
Notes
Notes
Notes
Notes
Notes
Notes
Yes/No
Notes
Options A, B, C, or D.
Yes/No
Yes/No
Yes/No
Yes/No
Notes
Yes/No
Yes/No
Yes/No
Options A, B, C, or D option
Options A, B or C
If yes to question A5.4
Option C requires a 'notes
field'
Yes/No
Yes/No
Yes/No
Notes
Notes
Notes
Notes
Yes/No
Yes/No
Yes/No
Notes
Yes/No
Yes/No
Notes
Yes/No
Notes
Notes
Yes/No
Notes
Notes
Notes
Notes
Notes
Yes/No
Yes/No
Notes
Notes
Notes
Yes/No
Yes/No
Notes If no to A7.14
Yes/No
Yes/No
Options:
Multiple choice A - anti-malware
software
Applicants need to have B - limiting installation
the option to select both, of applications by
and answer the associated "application allow
questions. listing" from an
approved app store
Option C requires a 'notes C- None of the above
field' and requires notes field
to provide description
Yes/No
Yes/No
Yes/No
Yes/No
©The IASME Consortium Limited 2023
This document is made available under the Creative Commons BY-NC-ND license. To view a copy of this license, visit
https://creativecommons.org/licenses/by-nc-nd/4.0/
You are free to share the material for any purpose under the following terms:
Attribution — You must give appropriate credit to The IASME Consortium Limited, provide a link to the license, and indi
any reasonable manner, but not in any way that suggests The IASME Consortium Limited endorses you or your us
Consortium Limited)
Non-Commercial — Unless your organisation is a licensed IASME Certification Body or IASME Product Assurance Partne
commercial purposes
No Derivatives — If you remix, transform, or build upon the material, you may not distribute the modified material
Information contained in this document is believed to be accurate at the time of publication but no liability whatsoever
Limited arising out of any use made of this information. Compliance with this standard does not infer immunity fr
complete information security.
A "pass" under the GDPR assessment does not mean that you are assessed as being legally compliant. It indicates only
pathway to compliance and is committed to ensuring 'privacy by design'. You should ensure that your organisatio
as on any other data protection issue. This GDPR assessment is not legal advice and must not be relied upon as s
damage suffered as a result of reliance on views expressed here.
Revisions:
Date: Version Details
Initial release due to new release of NCSC CE
March 2021 12
requirements document.
e a link to the license, and indicate if changes were made. You may do so in
mited endorses you or your use (unless separately agreed with The IASME
SME Product Assurance Partner, you may not use the material for
Author
NF
BF
NF
JE
JE
NF