0% found this document useful (0 votes)
66 views

Question Set Cyber Essentials v14 Montpellier

Uploaded by

russ.junk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Question Set Cyber Essentials v14 Montpellier

Uploaded by

russ.junk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 66

Cyber Essentials Question Set - Montpellier - January 2023

ry
go
te
ry

n
tio
go

Ca

s
te

b-

ue
o.
Ca

Su

Q
N
Organisation Your
Organisation

A1.1

A1.2

A1.3

A1.4
A1.5
A1.5

A1.6

A1.7
A1.8
A1.8.1

A1.9
A1.10

Scope of
Assessment

A2.1

A2.2

A2.3

A2.4
A2.4.1

A2.5

A2.6

A2.7

A2.7.1
A2.8

A2.9

A2.10

Insurance

A3.1

A3.2

A3.3

A3.4

Firewalls
A4.1

A4.1.1

A4.2

A4.2.1

A4.3

A4.4

A4.5

A4.5.1

A4.6
A4.7

A4.8

A4.9

A4.10

A4.11

A4.12

Secure
configuration

A5.1

A5.2

A5.3
A5.4

A5.5

A5.6

A5.7

A5.8

Device
Locking

A5.9

A5.10
Security
update
management

A6.1

A6.2

A6.2.1

A6.2.2

A6.2.3

A6.2.4

A6.3

A6.4

A6.4.1
A6.4.2

A6.5

A6.5.1

A6.5.2

A6.6

A6.7

User Access
Control A7.1

A7.2

A7.3

A7.4
Administrativ
e Accounts A7.5

A7.6

A7.7

A7.8

A7.9

Password-
Based
Authentication

A7.10

A7.11
A7.12

A7.13

A7.14

A7.15

A7.16

A7.17
Malware
protection
A8.1

A8.2

A8.3

A8.4

A8.5
Cyber Essentials Question Set - Montpellier - January 2023

ce
n
tio

an
s

d
ue

ui
Q

G
In this section we need to know a little about how your organisation is set up so we can ask
you the most appropriate questions.

What is your organisation's name (for companies: as registered with Companies House)?

What type of organisation are you?

What is your organisations registration number (if you have one)?

What is your organisations address (for companies: as registered with Companies House)?
What is your main business?
What is your main business?

What is your website address?

Is this application a renewal of an existing certification or is it the first time you have applied
for certification?
What is your primary reason for applying for certification?
What is your secondary reason for applying for certification?

Have you read the 'Cyber Essentials Requirements for IT Infrastructure' document?
Can IASME and their expert partners contact you if you experience a cyber breach?

In this section, you need to describe the elements of your organisations IT system that you
want to be covered by the Cyber Essentials certification. The scope should be either the whole
organisation or an organisational sub-set (for example, the UK operation of a multinational
company).

You will also need to answer questions regarding the computers, laptops, servers, mobile
phones, tablets and firewalls/routers that can access the internet and are used by the whole
organisation or organisational sub-set to access organisational data or services. All locations
that are owned or operated by this organisation or sub-set, whether in the UK or
internationally, should be considered "in-scope".

The level of detail required for devices is as follows: 'With the exception of network devices
(such as firewalls and routers), all user devices declared within the scope of the certification
only require the make and operating system to be listed. We have removed the requirement
for the applicant to list the model of the device. This change will be reflected in the self-
assessment question set, rather than the requirements document'

A scope that does not include end user devices is not acceptable.

Further guidance can be found here

https://iasme.co.uk/articles/scope/

Does the scope of this assessment cover your whole organisation? Please note: Your
organisation is only eligible for free cyber insurance if your assessment covers your whole
company, if you answer "No" to this question you will not be invited to apply for insurance.

If it is not the whole organisation, then what scope description would you like to appear on
your certificate and website?

Please describe the geographical locations of your business which are in the scope of this
assessment.

Please list the quantities and operating systems for your laptops, desktops and virtual
desktops within the scope of this assessment.
Please Note: You must include make and operating system versions for all devices. All user
devices declared within the scope of the certification only require the make and operating
system to be listed. We have removed the requirement for the applicant to list the model of
the device.

Devices that are connecting to cloud services must be included.

A scope that does not include end user devices is not acceptable.
Please list the quantity of thin clients within scope of this assessment. Please include make
and operating systems.

Please list the quantity of servers, virtual servers and virtual server hosts (hypervisor). You
must include the operating system.

Please list the quantities of tablets and mobile devices within the scope of
this assessment.

Please Note: You must include make and operating system versions for all
devices. All user devices declared within the scope of the certification only
require the make and operating system to be listed. We have removed the
requirement for the applicant to list the model of the device.

Devices that are connecting to cloud services must be included.

A scope that does not include end user devices is not acceptable.

Please provide a list of your networks that will be in the scope for this
assessment.

How many staff are home workers?


Please provide a list of network equipment that will be in scope for this assessment (including
firewalls and routers). You must include make and model of each device listed.

Please list all of your cloud services that are in use by your organisation and
provided by a third party.

Please note cloud services cannot be excluded from the scope of


CE.

Please provide the name and role of the person who is responsible for managing your IT
systems in the scope of this assessment.

All organisations with a head office domiciled in the UK or Crown


Dependencies and a turnover of less than £20 million get automatic cyber
insurance if they achieve Cyber Essentials certification. The insurance is free
of charge but you can opt out of the insurance element if you choose. This
will not change the price of the assessment package. If you want the
insurance then we do need to ask some additional questions and these
answers will be forwarded to the broker. The answers to these questions
will not affect the result of your Cyber Essentials assessment. It is important
that the insurance information provided is as accurate as possible and that
the assessment declaration is signed by a senior person at Board level or
equivalent, to avoid any delays to the insurance policy being issued.
Is your head office domiciled in the UK or Crown Dependencies and is your gross annual
turnover less than £20m?
If you have answered "yes" to the last question then your organisation is eligible for the
included cyber insurance if you gain certification. If you do not want this insurance element
please opt out here.

What is your total gross revenue? Please provide figure to the nearest £100K. You only need
to answer this question if you are taking the insurance.

What is the organisation email contact for the insurance documents? You only need to answer
this question if you are taking the insurance.

Firewall is the generic name for a piece of software or a hardware device which provides
technical protection between your network devices and the Internet, referred to in the
question set as boundary firewalls. Your organisation will have physical, virtual or software
firewalls at your internet boundaries. Software firewalls are included within all major
operating systems for laptops, desktops and servers and need to be configured to meet
compliance. Firewalls are powerful devices, which need to be configured correctly to provide
effective security.

Questions in this section apply to: boundary firewalls; desktop computers; laptops; routers;
servers; IaaS; PaaS; SaaS.
Further guidance can be found here

https://iasme.co.uk/articles/firewalls/
Do you have firewalls at the boundaries between your organisation’s internal networks,
laptops, desktops, servers and the internet?

When your devices (including computers used by homeworkers) are being used away from
your workplace (for example, when they are not connected to your internal network), how do
you ensure they are protected?

When you first receive an internet router or hardware firewall device, it may have had a
default password on it. Have you changed all the default passwords on your boundary firewall
devices?

Please describe the process for changing your firewall password?


Home routers not supplied by your organisation are not included in this requirement.

Is your new firewall password configured to meet the ‘Password-based authentication’


requirements?

Please select the option being used

A. Multi-factor authentication, with a minimum password length 8 characters and no


maximum length

B. Automatic blocking of common passwords, with a minimum password length 8 characters


and no maximum length

C. A password minimum length of 12 characters and no maximum length

D. None of the above, please describe

Do you change your firewall password when you know or suspect it has
been compromised?

Do you have any services enabled that can be accessed externally through your internet
router, hardware firewall or software firewall?

Do you have a documented business case for all of these services?

If you do have services enabled on your firewall, do you have a process to ensure they are
disabled in a timely manner when they are no longer required? A description of the
process is required.
Have you configured your boundary firewalls so that they block all other services from being
advertised to the internet?

Are your boundary firewalls configured to allow access to their configuration settings over the
internet?

If you answered yes in question A4.8, is there a documented business requirement for this
access?

If you answered yes in question A4.8, is the access to your firewall settings protected by either
multi-factor authentication or by only allowing trusted IP addresses combined with managed
authentication to access the settings?

Do you have software firewalls enabled on all of your computers, laptops and servers?

If you answered no to question A4.11, is this because software firewalls are not installed by
default as part of the operating system you are using? Please list the operating systems.

Computers and cloud services are often not secure upon default installation or setup. An
‘out-of-the-box’ set-up can often include an administrative account with a standard, publicly
known default password, one or more unnecessary user accounts enabled (sometimes with
special access privileges ) and pre-installed but unnecessary applications or services. All of
these present security risks.

Questions in this section apply to: servers, desktop computers, laptops, thin clients, tablets,
mobile phones, IaaS, PaaS and SaaS.

Further guidance can be found here

https://iasme.co.uk/articles/secure-configuration/

Where you are able to do so, have you removed or disabled all the software
and services that you do not use on your laptops, desktop computers, thin
clients, servers, tablets, mobile phones and cloud services? Describe how
you achieve this.

Have you ensured that all your laptops, computers, servers, tablets, mobile devices and cloud
services only contain necessary user accounts that are regularly used in the course of your
business?

Have you changed the default password for all user and administrator accounts on all your
desktop computers, laptops, thin clients, servers, tablets and mobile phones that follow the
Password-based authentication requirements of Cyber Essentials?
Do you run external services that provides access to data (that shouldn't be
made public) to users across the internet?

If yes to question A5.4, which option of password-based authentication do you use?


A. Multi-factor authentication, with a minimum password length 8 characters and no
maximum length

B. Automatic blocking of common passwords, with a minimum password length 8 characters


and no maximum length

C. A password minimum length of 12 characters and no maximum length

D. None of the above, please describe

Describe the process in place for changing passwords on your external services when you
believe they have been compromised.

When not using multi-factor authentication, which option are you using to protect your
external service from brute force attacks?

A. Throttling the rate of attempts


B. Locking accounts after 10 unsuccessful attempts

C. None of the above, please describe

Is "auto-run" or "auto-play" disabled on all of your systems?

When a device requires a user to be present, do you set a locking


mechanism on your devices to access the software and services installed?

Which method do you use to unlock the devices?


To protect your organisation, you should ensure that all your software is always up to date
with the latest security updates. If any of your in-scope devices are using an operating system
which is no longer supported (For example Microsoft Windows XP/Vista/2003/Windows
7/Server 2008, MacOS High Sierra, Ubuntu 17.10), and you are not being provided with
regular updates from the vendor, then you will not be awarded certification. Mobile phones
and tablets are in-scope and must also use an operating system that is still supported by the
manufacturer.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, routers, firewalls, IaaS and PaaS cloud services.

Further guidance can be found here

https://iasme.co.uk/articles/security-update-management/

Are all operating systems on your devices supported by a vendor that produces regular
security updates?

If you have included firewall or router devices in your scope, the firmware of these devices is
considered to be an operating system and needs to meet this requirement.

Is all the software on your devices supported by a supplier that produces regular fixes for any
security problems?

Please list your internet browser(s)


The version is required.

Please list your malware Protection software


The version is required.

Please list your email applications installed on end user devices and server.
The version is required.

Please list all office applications that are used to create organisational data.
The version is required.

Is all software licensed in accordance with the publisher’s recommendations?

Are all high-risk or critical security updates for operating systems and router and firewall
firmware installed within 14 days of release?

Are all updates applied for operating systems by enabling auto updates ?
Where auto updates are not being used, how do you ensure all high-risk or critical security
updates of all operating systems and firmware on firewalls and routers are applied within 14
days of release?

Are all high-risk or critical security updates for applications (including any associated files and
any plugins such as Java, Adobe Reader and .Net.) installed within 14 days of release?

Are all updates applied on your applications by enabling auto updates?

Where auto updates are not being used, how do you ensure all high-risk or
critical security updates of all applications are applied within 14 days of
release?

Have you removed any software installed on your devices that is no longer supported and no
longer receives regular updates for security problems?

Where you have a business need to use unsupported software, have you moved the devices
and software out of scope of this assessment? Please explain how you achieve this.

It is important to only give users access to the resources and data necessary for their roles,
and no more. All users need to have unique accounts and should not be carrying out day-to-
day tasks such as invoicing or dealing with e-mail whilst logged on as a user with administrator
privileges which allow significant changes to the way your computer systems work.
Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS
Further guidance can be found here

https://iasme.co.uk/articles/user-access-control/

Are users only provided with user accounts after a process has been followed to approve their
creation? Describe the process.

Are all user and administrative accounts accessed by entering a unique username and
password?

How do you ensure you have deleted, or disabled, any accounts for staff who are no longer
with your organisation?

Do you ensure that staff only have the privileges that they need to do their current job? How
do you do this?
User accounts with special access privileges (e.g. administrative accounts) typically have the
greatest level of access to information, applications and computers. When these privileged
accounts are accessed by attackers they can cause the most amount of damage because they
can usually perform actions such as install malicious software and make changes. Special
access includes privileges over and above those of normal users.

It is not acceptable to work on a day-to-day basis in a privileged “administrator” mode.

Questions in this section applies to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS

Do you have a formal process for giving someone access to systems at an “administrator” level
and can you describe this process?

How does your organisation make sure that separate accounts are used to carry out
administrative tasks (such as installing software or making configuration changes)?

How does your organisation prevent administrator accounts from being used to carry out
every day tasks like browsing the web or accessing email?

Do you formally track which users have administrator accounts in your organisation?

Do you review who should have administrative access on a regular basis?

All accounts require the user to authenticate. Where this is done using a password the
following protections should be used:

• Passwords are protected against brute-force password guessing.

• Technical controls are used to manage the quality of passwords.

• People are supported to choose unique passwords for their work accounts.

• There is an established process to change passwords promptly if the applicant knows or


suspects the password or account has been compromised.

Describe how you protect accounts from brute-force password guessing in your organisation?

Which technical controls are used to manage the quality of your passwords within your
organisation?
Please explain how you encourage people to use unique and strong passwords.

Do you have a documented password policy that includes a process for when you believe that
passwords or accounts have been compromised?

Do all of your cloud services have multi-factor authentication(MFA) available as part of the
service?

If you have answered ‘No’ to question A7.14, please provide a list of your cloud services that
do not provide any option for MFA.

Has MFA been applied to all administrators of your cloud services?

Has MFA been applied to all users of your cloud services?

Malware (such as computer viruses) is generally used to steal or damage information.


Malware is often used in conjunction with other kinds of attack such as ‘phishing’ (obtaining
information by confidence trickery) and social network sites (which can be mined for
information useful to a hacker) to provide a focussed attack on an organisation. Anti-malware
solutions (including anti-virus) are available from commercial suppliers, some free, but usually
as complete software and support packages.
Malware is continually evolving, so it is important that the supplier includes detection facilities
which are updated as frequently as possible. Anti-malware products can also help confirm
whether websites you visit are malicious.

Questions in this section apply to: servers, desktop computers, laptops, tablets, thin clients,
mobile phones, IaaS, PaaS and SaaS

Further guidance can be found here

https://iasme.co.uk/articles/malware-protection/
Are all of your desktop computers, laptops, tablets and mobile phones protected from
malware by either:

A - Having anti-malware software installed

and/or

B - Limiting installation of applications by application allow listing (For example, using an app
store and a list of approved applications, using a Mobile Device Management(MDM solution))

or

C - None of the above, please describe

If Option A has been selected: Where you have anti-malware software installed, is it set to
update in line with the vendor's guidelines and prevent malware from running on detection?

If Option A has been selected: Where you have anti-malware software installed, is it set to
scan web pages you visit and warn you about accessing malicious websites?

If Option B has been selected: Where you use an app-store or application signing, are users
restricted from installing unsigned applications?

If Option B has been selected: Where you use an app-store or application signing, do you
ensure that users only install applications that have been approved by your organisation and
do you maintain this list of approved applications?
es tip -
/N le
/ Y ul e
ce / M yp

o
oi s r T
Ch ote e
N ns w
ce
an

A
d
ui
G

The answer given in A1.1 is the name that will be displayed on your
Cyber Essentials Certificate and has a character limit of 150.

Where an organisation wishes to certify subsidiary companies on the


same certificate, the organisation can certify as a group and can include
the subsidiaries' name on the certificate as long as the board member
signing off the certificate has authority over all certified organisations.

For example:
The Stationary Group, incorporating The Paper Mill and The Pen House

It is also possible to list on a certificate where organisations are trading


as other names.

For example:
The Paper Mill trading as The Pen House.

“LTD” – Limited Company (Ltd or PLC)


“LLP” – Limited Liability Partnership (LLP)
“CIC” – Community Interest Company (CIC)
“COP” – Cooperative
“MTL” – Other Registered Mutual (Community Benefit Society, Credit Union, Building
Society, Friendly Society)
“CHA” – Registered Charity
“GOV” – Government Agency or Public Body
“SOL” – Sole Trader
“PRT” – Other Partnership
"SOC” – Other Club/ Society
“OTH” – Other Organisation

If you are a UK limited company, your registration number will be provided by Companies
House, in the Republic of Ireland, this will be provided by Companies Registration Office.
Charities, partnerships and other organisations should provide their registration number if
applicable.
If a client is applying for certification for more than one registered company, just one
registration number can be entered to represent the entire group.

Please provide the legal registered address for your organisation, if different from the main
operating location.
Please summarise the main occupation of your organisation.
Academia - Pre Schools
Academia - Primary Schools
Academia - Secondary Schools
Academia - Academies
Academia - Colleges
Academia - Universities
Aerospace
Agriculture, Forestry and Fishing
Automotive
Charities
Chemicals
Civil Nuclear
Construction
Consultancy
Defence
Diplomacy
Emergency Services
Energy - Electricity
Energy - Gas
Energy - Oil
Engineering
Environmental
Finance
Food
His Majesty's Government (HMG)
Health
Hospitality - Food
Hospitality - Accommodation
Hospitality - Hotels
IT
Intelligence
Law Enforcement (Serious & Organised Crime)
Legal
Leisure
Managed Services - IT Managed Services
Managed Services - Other Managed Services
Manufacturing
Media
Membership Organisations
Mining
Other (please describe)
Pharmaceuticals
Political
Postal Services
Property
R&D
Retail
Telecoms
Transport - Aviation
Transport - Maritime
Transport - Rail
Transport - Road
Waste Management
Water
Overseas
Food
His Majesty's Government (HMG)
Health
Hospitality - Food
Hospitality - Accommodation
Hospitality - Hotels
IT
Intelligence
Law Enforcement (Serious & Organised Crime)
Legal
Leisure
Managed Services - IT Managed Services
Managed Services - Other Managed Services
Manufacturing
Media
Membership Organisations
Mining
Other (please describe)
Pharmaceuticals
Political
Postal Services
Property
R&D
Retail
Telecoms
Transport - Aviation
Transport - Maritime
Transport - Rail
Transport - Road
Waste Management
Water
Overseas

Please provide your website address (if you have one). This can be a Facebook/LinkedIn
page if you prefer.

If you have previously achieved Cyber Essentials, please select


"Renewal". If you have not previously achieved Cyber Essentials, please
select "First Time Application".
Please let us know the primary reason why you are applying for certification. This helps us
to understand how people are using our certifications.
Please let us know the secondary reason why you are applying for certification. This helps
us to understand how people are using our certifications.

Document is available on the NCSC Cyber Essentials website and should be read before
completing this question set.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
We would like feedback on how well the controls are protecting organisations. If you agree
to this we will provide you with a contact email and ask that you let us know if you do
experience a cyber breach. IASME and expert partners will then contact you to find out a
little more but all information will be kept confidential

Your whole organisation includes all divisions, people and devices which access your
organisations data and services.

Your scope description should provide details of any areas of your business that have
internet access and have been excluded from the assessment.

You will need to have a clear excluding statement within your scope description, for
example, "whole organisation excluding development network".
You should provide either a broad description (i.e. All UK offices) or simply list the locations
in scope (i.e. Manchester and Glasgow retail stores).

You need to provide a summary of all laptops, computers, virtual desktops and their
operating systems that are used for accessing organisational data or services and have
access to the internet.
For example, “We have 25 DELL laptops running Windows 10 Professional version 20H2
and 10 MacBook laptops running MacOS Ventura".
Please note, the edition and feature version of your Windows operating systems are
required.
This applies to both your corporate and user owned devices (BYOD).

You do not need to provide serial numbers, mac addresses or further technical information.
Please provide a summary of all the thin clients in scope that are connecting to
organisational data or services (Definitions of which are in the 'CE Requirements for
Infrastructure document' linked in question A1.9).

Thin clients are commonly used to connect to a Virtual Desktop Solution.

Thin clients are a type of very simple computer holding only a base operating system
which are often used to connect to virtual desktops. Thin clients can connect to the
internet, and it is possible to modify some thin clients to operate more like PCs, and this
can create security complications. Cyber Essentials requires thin clients be supported
and receiving security updates.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

Please list the quantity of all servers within scope of this assessment.

For example, 2 x VMware ESXI 6.7 hosting 8 virtual windows 2016 servers; 1 x MS Server
2019; 1 x Redhat Enterprise Linux 8.3

All tablets and mobile devices that are used for accessing organisational
data or services and have access to the internet must be included in the
scope of the assessment. This applies to both corporate and user owned
devices (BYOD).

You are not required to list any serial numbers, mac addresses or other
technical information.

You should include details of each network used in your organisation including its name,
location and its purpose (i.e. Main Network at Head Office for administrative use,
Development Network at Malvern Office for testing software, home workers network
- based in UK).

You do not need to provide IP addresses or other technical information.

For further guidance see the Home Working section in the 'CE
Requirements for Infrastructure Document'.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

Any employee that has been given permission to work at home for any period of time at
the time of the assessment, needs to be classed as working from home for Cyber Essentials

For further guidance see the Home Working section in the 'CE Requirements for
Infrastructure Document'.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
You should include all equipment that controls the flow of data, this will be your routers
and firewalls.

You do not need to include switches or wireless access points that do not contain a firewall
or do not route internet traffic.

If you don't have an office and do not use network equipment, instead you are relying on
software firewalls please describe in the notes field.

You are not required to list any IP addresses, MAC addresses or serial numbers.

You need to include details of all of your cloud services. This includes all types of services -
IaaS, PaaS and SaaS. Definitions of the different types of cloud services are provided in the
'CE Requirements for Infrastructure Document'.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

This should be the person in your organisation who influences and


makes decisions about the computers, laptops, servers, tablets, mobile
phones and network equipment.

This person must be a member of your organisation and cannot be a


person employed by your outsourced IT provider.

This question relates to the eligibility of your organisation for the included cyber
insurance

There is no additional cost for the insurance. You can see more about it
at https://iasme.co.uk/cyber-essentials/cyber-liability-insurance/

The answer to this question will be passed to the insurance broker in association with the
cyber insurance you will receive at certification. Please be as accurate as possible - figure
should be to the nearest £100K.
The answer to this question will be passed to the insurance broker in association with the
cyber insurance you will receive at certification and they will use this to contact you with
your insurance documents and renewal information.
You must have firewalls in place between your office network and the internet.

You should have firewalls in place for home-based workers. If those users are not using a
Corporate Virtual Private Network (VPN) connected to your office network, they will need
to rely on the software firewall included in the operating system of their device.

The default password must be changed on all routers and firewalls, including those that
come with a unique password pre-configured (i.e. BT Business Hub, Draytek Vigor 2865ac).

When relying on software firewalls included as part of the operating system of your end
user devices, the password to access the device will need to be changed.

You need to understand how the password on your firewall(s) is changed.


Please provide a brief description of how this is achieved.

Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the new section about password-based authentication in the ‘Cyber
Essentials Requirements for IT Infrastructure’ document.
https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

Passwords may be compromised if there has been a virus on your system or if the
manufacturer notifies you of a security weakness in their product. You should be aware of
this and know how to change the password if this occurs.
When relying on software firewalls included as part of the operating system of your end
user devices, the password to access the device will need to be changed.

At times your firewall may be configured to allow a system on the inside to become
accessible from the internet (for example: a VPN server, a mail server, an FTP server or a
service that is accessed by your customers). This is sometimes referred to as "opening a
port". You need to show a business case for doing this because it can present security risks.
If you have not enabled any services, answer "No". By default, most firewalls block all
services.

The business case should be documented and recorded. A business case must be signed off
at board level and associated risks reviewed regularly.

If you no longer need a service to be enabled on your firewall, you must remove it to
reduce the risk of compromise. You should have a process that you follow to do this (i.e.
when are services reviewed, who decides to remove the services, who checks that it has
been done?)
By default, most firewalls block all services from inside the network from being accessed
from the internet, but you need to check your firewall settings.

Sometimes organisations configure their firewall to allow other people (such as an IT


support company) to change the settings via the internet.

If you have not set up your firewalls to be accessible to people outside your organisations
or your device configuration settings are only accessible via a VPN connection, then answer
"no" to this question.

When you have made a decision to provide external access to your routers and firewalls,
this decision must be documented (for example, written down).

If you allow direct access to configuration settings via your router or firewall's external
interface, this must be protected by one of the two options.
Please explain which option is used.

Your software firewall needs be configured and enabled at all times, even when sitting
behind a physical/virtual boundary firewall in an office location. You can check this setting
on Macs in the Security & Privacy section of System Preferences. On Windows laptops you
can check this by going to Settings and searching for "Windows firewall". On Linux try "ufw
status".

Only very few operating systems do not have software firewalls available. Examples might
include embedded Linux systems or bespoke servers. For the avoidance of doubt, all
versions of Windows, macOS and all common Linux distributions such as Ubuntu do have
software firewalls available.

You must remove or disable all applications, system utilities and network services that are
not needed in day-to-day use. You need to check your cloud services and disable any
services that are not required for day-to-day use.
To view your installed applications

1. Windows by right clicking on Start → Apps and Features

2. macOS open Finder -> Applications


3. Linux open your software package manager (apt, rpm, yum)

You must remove or disable any user accounts that are not needed in day-to-day use on all
devices and cloud services.
You can view your user accounts

1. Windows by righting-click on Start -> Computer Management -> Users

2. macOS in System Preferences -> Users & Groups

3. Linux using "cat /etc/passwd"

A password that is difficult to guess will be unique and not be made up of common or
predictable words such as "password" or "admin” or include predictable number sequences
such as "12345".
Your business might run software that allows staff or customers to access information
across the internet to an external service hosted on the internal network, cloud data centre
or IaaS cloud service. This could be a VPN server, a mail server, or an internally hosted
internet application(SaaS or PaaS) that you provide to your customers as a product. In all
cases, these applications provide information that is confidential to your business and your
customers and that you would not want to be publicly accessible.

Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the section about ‘Password-based authentication’ in the ‘Cyber Essentials
Requirements for IT Infrastructure’ document.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

Passwords may be compromised if there has been a virus on your system or if the
manufacturer notifies you of a security weakness in their product. You should know how to
change the password if this occurs.

The external service that you provide must be set to slow down or stop attempts to log in if
the wrong username and password have been tried a number of times. This reduces the
opportunity for cyber criminals to keep trying different passwords (brute-forcing) in the
hope of gaining access.

This is a setting on your device which automatically runs software on


external media or downloaded from the internet.

It is acceptable to choose the option where a user is prompted to make a


choice about what action will occur each time they insert a memory
stick. If you have chosen this option, you can answer yes to this
question.

Device locking mechanisms such as biometric, password or PIN, need to


be enabled to prevent unauthorised access to devices accessing
organisational data or services.

Please refer to Device Unlocking Credentials paragraph found under Secure Configuration
in the Cyber Essentials Requirements for IT Infrastructure document for further
information.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

The use of a PIN with a length of at least six characters can only be used where the
credentials are just to unlock a device and does not provide access to organisational data
and services without further authentication.
Older operating systems that are out of regular support include Windows 7/XP/Vista/
Server 2003, mac OS Mojave, iOS 12, iOS 13, Android 8 and Ubuntu Linux 17.10.

It is important you keep track of your operating systems and understand when they have
gone end of life(EOL). Most major vendors will have published EOL dates for their
operating systems and firmware.

All software used by your organisation must be supported by a supplier who provides
regular security updates. Unsupported software must be removed from your devices. This
includes frameworks and plugins such as Java, Adobe Reader and .NET.
Please list all internet browsers installed on your devices, so that the Assessor can
understand your setup and verify that they are in support.

For example: Chrome Version 102, Safari Version 15.

Please list all malware protection and versions you use so that the Assessor can
understand your setup and verify that they are in support.

For example: Sophos Endpoint Protection V10, Windows Defender, Bitdefender Internet
Security 2020.

Please list all email applications and versions you use so that the Assessor can understand
your setup and verify that they are in support.

For example: MS Exchange 2016, Outlook 2019.

Please list all office applications and versions you use so that the Assessor can understand
your setup and verify that they are in support.
For example: MS 365; Libre office, Google workspace, Office 2016.

All software must be licensed. It is acceptable to use free and open source software as long
as you comply with any licensing requirements.
Please be aware that for some operating systems, firmware and applications, if annual
licensing is not purchased, they will not be receiving regular security updates.

You must install all high and critical security updates within 14 days in all circumstances. If
you cannot achieve this requirement at all times, you will not achieve compliance to this
question. You are not required to install feature updates or optional updates in order to
meet this requirement.

This requirement includes the firmware on your firewalls and routers.

Most devices have the option to enable auto updates. This must be
enabled on any device where possible.
It is not always possible to apply auto updates, this is often the case when you have critical
systems or servers and you need to be in control of the updating process.
Please describe how any updates are applied when auto updates are not configured.

If you only use auto updates, please confirm this in the notes field for this question.

You must install any such updates within 14 days in all circumstances.
If you cannot achieve this requirement at all times, you will not achieve compliance to this
question.

You are not required to install feature updates or optional updates in order to meet this
requirement, just high-risk or critical security updates.

Most devices have the option to enable auto updates. Auto updates should be enabled
where possible.

It is not always possible to apply auto updates, this is often the case when you have critical
systems or applications and you need to be in control of the updating process.

Please describe how any updates are applied when auto updates are not configured.

If you only use auto updates, please confirm this in the notes field for this question.

You must remove older software from your devices when it is no longer supported by the
manufacturer. Such software might include older versions of web browsers, operating
systems, frameworks such as Java and Flash, and all application software.
Software that is not removed from devices when it becomes un-
supported will need to be placed onto its own sub-set with no internet
access.

If the out-of-scope subset remains connected to the internet, you will not
be able to achieve whole company certification and an excluding
statement will be required in question A2.2.

A sub-set is defined as a part of the organisation whose network is


segregated from the rest of the organisation by a firewall or VLAN.

You must ensure that user accounts (such as logins to laptops and accounts on servers) are
only provided after they have been approved by a person with a leadership role in the
business.
You must ensure that no devices can be accessed without entering a username and
password. Users cannot share accounts.
Accounts must not be shared.
When an individual leaves your organisation you need to stop them accessing any of your
systems.

When a staff member changes job role, you may also need to change their permissions to
only access the files, folders and applications that they need to do their day to day work.
You must have a process that you follow when deciding to give someone access to systems
at administrator level. This process might include approval by a person who is an
owner/director/trustee/partner of the organisation.
You must use a separate administrator account from the standard user account, when
carrying out administrative tasks such as installing software. Using administrator accounts
all-day-long exposes the device to compromise by malware. Cloud service administration
must be carried out through separate accounts.

This question relates to the activities carried out when an administrator account is in use.

You must ensure that administrator accounts are not used to access websites or download
email. Using such accounts in this way exposes the device to compromise by malware.
Software and update downloads should be performed as a standard user and then
installed as an administrator. You may not need a technical solution to achieve this, it
could be based on good policy, procedure and regular training for staff.

You must track all people that have been granted administrator accounts.
You must review the list of people with administrator access regularly. Depending on your
business, this might be monthly, quarterly or annually. Any users who no longer need
administrative access to carry out their role should have it removed.

A brute-force attack is an attempt to discover a password by systematically trying every


possible combination of letters, numbers, and symbols until you discover the one correct
combination that works.

Information on how to protect against brute-force password guessing can be found in the
Password-based authentication section, under the User Access Control section in the
‘Cyber Essentials Requirements for IT Infrastructure’ document.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

Acceptable technical controls that you can use to manage the quality of your passwords
are outlined in the new section about password-based authentication in the ‘Cyber
Essentials Requirements for IT Infrastructure’ document.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf
You need to support those that have access to your organisational data and services by
informing them of how they should pick a strong and unique password.
Further information can be found in the password-based authentication section, under the
User Access Control section in the Cyber Essentials Requirements for IT Infrastructure
document.

https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-Infrastructure-v3-1-January-2023.pdf

You must have an established process that details how to change passwords promptly if
you believe or suspect a password or account has been compromised.

Where your systems and cloud services support multi-factor authentication (MFA), for
example, a text message, a one time access code, notification from an authentication app,
then you must enable for all users and administrators. For more information see the
NCSC’s guidance on MFA.
Where a cloud service does not have its own MFA solution but can be configured to link to
another cloud service to provide MFA, the link will need to be configured.
A lot of cloud services use another cloud service to provide MFA. Examples of cloud
services that can be linked to are Azure, MS365, Google Workspace.

You must provide a list of cloud services that are in use by your organisation that do not
provide any option for MFA.
It is required that all administrator accounts on cloud service must apply multi-factor
authentication in conjunction with a password of at least 8 characters.
All users of your cloud services must use MFA in conjunction with a password of at least 8
characters.
Please select all the options that are in use in your organisation across all your devices.
Most organisations that use smartphones and standard laptops will need to select both
option A and B.

Option A - option for all in-scope devices running Windows or macOS including servers,
desktop computers, laptop computers

Option B - option for all in-scope devices

Option C - none of the above, explanation notes will be required.

This is usually the default setting for anti-malware software. You can check these settings
in the configuration screen for your anti-virus software. You can use any commonly used
anti-virus product, whether free or paid-for as long as it can meet the requirements in this
question. For the avoidance of doubt, Windows Defender is suitable for this purpose.

Your anti-malware software or internet browser should be configured to prevent access to


known malicious websites. On Windows 10, SmartScreen can provide this functionality.

Some operating systems which include Windows S, Chromebooks, mobile phones and
tablets restrict you from installing unsigned applications. Usually you have to "root" or
"jailbreak" a device to allow unsigned applications.

You must create a list of approved applications and ensure users only install these
applications on their devices. This includes employee-owned devices. You may use mobile
device management (MDM) software to meet this requirement but you are not required to
use MDM software if you can meet the requirements using good policy, processes and
training of staff.
A
N ns w
Ch ote e

Notes
Notes
Notes
oi s r T
ce / M yp
/ Y ul e

Multiple choice
es tip -
/N le
o

Q
ue
s tio
n
Lo
gi
c
Multiple choice
Multiple choice

Notes

Select either "Renewal" or


"First Time Application"
When the option
“required for
commercial contract”
has been selected, the
applicant will need to
answer:
Please provide the
name of the contracting
organisation.
When the option
“required for
government contract”
has been selected, the
applicant will need to
Multiple Choice + notes
answer:
field:
Please provide the
"required for a commercial
contract number and
contract",
the contracting
"required for government
organisation.
contract",
When the option
"to give confidence to our
“required for a grant”
customers",
has been selected, the
"required by insurer",
applicant will need to
"required by regulator",
answer:
"required for a grant",
"to generally improve our
Please provide details
security",
of the grant issuing
"other"
authority.
When the option
“required by regulator”
has been selected, the
applicant will need to
answer
Please provide details
of the regulator.
When the option
“other” has been
selected, the applicant
will need to answer
Please provide a
description.
When the option
“required for
commercial contract”
has been selected, the
applicant will need to
answer:
Please provide the
name of the contracting
organisation.
When the option
“required for
government contract”
has been selected, the
applicant will need to
Multiple Choice + notes
answer:
field:
Please provide the
"required for a commercial
contract number and
contract", "required for
the contracting
government contract",
organisation.
"to give confidence to our
When the option
customers",
“required for a grant”
"required by insurer",
has been selected, the
"required by regulator",
applicant will need to
"required for a grant",
answer:
"to generally improve our
Please provide details
security",
of the grant issuing
"other"
authority.
When the option
“required by regulator”
has been selected, the
applicant will need to
answer
Please provide details
of the regulator.
When the option
“other” has been
selected, the applicant
will need to answer
Please provide a
description.

Yes/No
Yes/No

Yes/No

Notes If no to question A2.1

Notes

Notes
Notes

Notes

Notes

Notes

Notes
Notes

Notes

Notes

Only show if yes to A3.1

If not opted out in A3.2

If not opted out in A3.2


Yes/No

Notes

Yes/No

Notes

Options A, B, C, or D.

Option must be available


to select all four options

Please note additional


option D has been added.

'Notes field' required to


provide additional
information for option D

Yes/No

Yes/No

Yes/No If yes to question A4.5

Notes If yes to question A4.5


Yes/No

Yes/No

Yes/No If yes to question A4.8

Notes If yes to question A4.8

Yes/No

Notes If no to question A4.11

Notes

Yes/No

Yes/No
Yes/No

Options A, B, C, or D option

Please note additional


option D has been added
and requires a notes field. If yes to question A5.4

'Notes field' required to


provide additional
information for option D

Notes If yes to question A5.4

Options A, B or C
If yes to question A5.4
Option C requires a 'notes
field'

Yes/No

Yes/No

Notes If yes to Question A5.9.


Yes/No

Yes/No

Notes

Notes

Notes

Notes

Yes/No

Yes/No

Yes/No
Notes

Yes/No

Yes/No

Notes

Yes/No

Notes

Notes

Yes/No

Notes

Notes
Notes

Notes

Notes

Yes/No

Yes/No

Notes

Notes
Notes

Yes/No

Yes/No

Notes If no to A7.14

Yes/No

Yes/No
Options:
Multiple choice A - anti-malware
software
Applicants need to have B - limiting installation
the option to select both, of applications by
and answer the associated "application allow
questions. listing" from an
approved app store
Option C requires a 'notes C- None of the above
field' and requires notes field
to provide description

Yes/No

Yes/No

Yes/No

Yes/No
©The IASME Consortium Limited 2023

This document is made available under the Creative Commons BY-NC-ND license. To view a copy of this license, visit
https://creativecommons.org/licenses/by-nc-nd/4.0/

You are free to share the material for any purpose under the following terms:

Attribution — You must give appropriate credit to The IASME Consortium Limited, provide a link to the license, and indi
any reasonable manner, but not in any way that suggests The IASME Consortium Limited endorses you or your us
Consortium Limited)
Non-Commercial — Unless your organisation is a licensed IASME Certification Body or IASME Product Assurance Partne
commercial purposes
No Derivatives — If you remix, transform, or build upon the material, you may not distribute the modified material

Information contained in this document is believed to be accurate at the time of publication but no liability whatsoever
Limited arising out of any use made of this information. Compliance with this standard does not infer immunity fr
complete information security.

A "pass" under the GDPR assessment does not mean that you are assessed as being legally compliant. It indicates only
pathway to compliance and is committed to ensuring 'privacy by design'. You should ensure that your organisatio
as on any other data protection issue. This GDPR assessment is not legal advice and must not be relied upon as s
damage suffered as a result of reliance on views expressed here.

Revisions:
Date: Version Details
Initial release due to new release of NCSC CE
March 2021 12
requirements document.

May 2021 12 Update to URL in A3.1

November 2021 13 Update to Evendine


Janurary 2022 13 Size of organisation removed was (what was A1.7)
A3.4 & A3.5 Removed
April 2022 13 Updated business types A1.5
Clarification to wording
Janurary 2023 14 Updated to Montpellier
mited 2023

opy of this license, visit

e a link to the license, and indicate if changes were made. You may do so in
mited endorses you or your use (unless separately agreed with The IASME

SME Product Assurance Partner, you may not use the material for

ute the modified material

ion but no liability whatsoever can be accepted by The IASME Consortium


ard does not infer immunity from legal proceeding nor does it guarantee

ally compliant. It indicates only that your organisation is starting on the


d ensure that your organisation obtains specialist legal advice on the GDPR
d must not be relied upon as such and IASME accepts no liability for loss or

Author

NF

BF
NF
JE

JE
NF

You might also like