What Are the Cyber Essentials Requirements?

Cyber Essentials requires organisations to implement five specific technical controls: boundary firewalls, secure configuration, user access control, malware protection, and patch management. All five must be in place across every in-scope device for certification to be awarded.

See the Five Controls

Direct Answer

Cyber Essentials covers five technical controls: boundary firewalls, secure configuration, access control, malware protection, and patch management. All in-scope devices must meet these requirements. From 2023, the scope was extended to include cloud services and home working devices, making the certification more demanding than previous versions.

The Five Cyber Essentials Technical Controls

Each control has specific sub-requirements defined in the Cyber Essentials technical specification, updated annually by IASME.

Boundary Firewalls

All internet-facing services must be protected by a properly configured firewall or equivalent control. Default-deny rules are required, and unused ports and services must be blocked.

Secure Configuration

Devices must have default passwords changed, unnecessary software and accounts removed, auto-run disabled, and automatic screen lock enabled. This applies to laptops, desktops, servers, and mobile devices in scope.

User Access Control

Users must have only the permissions they need (least privilege). Admin accounts must be separate from standard accounts and must not be used for email or general browsing.

Malware Protection

Anti-malware software or application allowlisting must be active and up to date on all in-scope devices. Real-time or on-access scanning must be enabled.

Patch Management

High and critical patches must be applied within 14 days of release. Software that is no longer supported and cannot be updated must be removed from scope or have a documented risk acceptance.

Common Compliance Gaps vs Requirements

The controls most organisations struggle with, and what a compliant posture looks like.

Feature
Common GapTypical SME starting point
CE CompliantRequired for certificationRecommended
Firewall with default-deny rulesDefault-allow or consumer gradeManaged firewall, default-deny
Default passwords changed
Separate admin accounts
Patches within 14 days
Anti-malware on all devicesPartial coverageAll in-scope devices
Unsupported software removed
MFA on internet-facing services

MFA was added as a requirement for cloud-based services in the January 2022 update to the Cyber Essentials technical specification.

Frequently Asked Questions

Find Out If You're Ready to Certify

AMVIA's gap assessment reviews your current environment against the five Cyber Essentials controls and produces a remediation plan. Most clients certify within four weeks.