Cyber Essentials Resources

Learn more about Cyber Essentials certification, requirements, and recommended practices.

What is cyber essentials?

Cyber Essentials is a UK government-backed certification scheme designed to help organisations protect themselves against common cyber threats. It defines a set of basic technical controls that all organisations should implement.

The scheme is operated by IASME Consortium and endorsed by the National Cyber Security Centre (NCSC). It’s suitable for organisations of all sizes and sectors, providing a foundation of basic cyber hygiene.

There are two levels of certification:

Benefits of Certification

Protection

Guards against approximately 80% of common cyber attacks by implementing basic security controls.

Government Contracts

Required for many UK government contracts involving handling certain information or providing certain services.

Customer Confidence

Demonstrates to customers, suppliers, and partners that you take cybersecurity seriously.

Risk Reduction

Required for many UK government contracts involving handling certain information or providing certain services.

The Five Technical Controls

Cyber Essentials focuses on five key technical control areas. Explore each area below for detailed requirements.

Firewall & Boundary Protection

Firewalls create a buffer zone between your IT network and other networks, like the internet. They are a key protection against unauthorised access to your network.

Key Requirements:

Best Practice: Use a combination of hardware and software firewalls. Hardware firewalls protect the network perimeter, while software firewalls on individual devices provide additional protection.

Computers and network devices should be configured to minimise vulnerabilities and provide only the services required to fulfil their role.

Key Requirements:

Best Practice: Maintain a documented standard for securely configuring systems and regularly audit systems against this standard.

Ensure user accounts are assigned appropriate access privileges and are controlled effectively.

Key Requirements:

Best Practice: Implement the principle of least privilege - users should only have access to the specific information and resources necessary for their legitimate purpose.

Protect your organisation from malware by implementing appropriate controls.

Key Requirements:

Best Practice: Use a layered approach to malware protection, including email filtering, web filtering, application whitelisting, and user education.

Keep your devices and software updated to address known vulnerabilities.

Key Requirements:

Best Practice: Implement an automated patch management system and regularly audit systems to ensure patches have been successfully applied.

Ready to assess your organisation against these controls?

Frequently asked questions

What is cyber essentials?

Cyber Essentials is a UK government-backed certification scheme designed to help organisations protect themselves against common cyber threats. It defines a set of basic technical controls that all organisations should implement.

The scheme is operated by IASME Consortium and endorsed by the National Cyber Security Centre (NCSC). It’s suitable for organisations of all sizes and sectors, providing a foundation of basic cyber hygiene.

There are two levels of certification:

Any organisation that wants to improve its cybersecurity posture can benefit from Cyber Essentials. It’s particularly relevant for:

  • Organisations working with the UK government or in supply chains
  • Small and medium-sized businesses looking to implement baseline security
  • Organisations handling customer data or sensitive information
  • Companies wanting to demonstrate their commitment to cybersecurity

The Cyber Essentials certification cost varies depending on the size of your organisation and whether you’re pursuing basic Cyber Essentials or Cyber Essentials Plus. Basic Cyber Essentials certification typically starts around £300, while Cyber Essentials Plus (which includes technical verification) starts from approximately £1,500.

Check with IASME certification bodies for current pricing.

For basic Cyber Essentials, the process typically takes 1-3 weeks from starting the assessment to receiving certification. This includes time for completing the self-assessment questionnaire and implementing any necessary controls. Cyber Essentials Plus can take longer, as it involves scheduling and completing technical verification by an external assessor.

The Cyber Essentials certification is valid for 12 months (one year) from the date of issue and must be renewed annually to maintain certification and listing on the National Cyber Security Centre’s certified list. The renewal ensures that security controls remain effective as threats evolve.

Cyber Essentials is a self-assessment where you answer questions about your security controls. Cyber Essentials Plus includes everything in Cyber Essentials but adds hands-on technical verification by an external certifying body. This includes vulnerability scanning, testing for insecure configurations, and testing access controls. Cyber Essentials Plus provides a higher level of assurance that controls are effectively implemented.

Yes, you need to implement all the required security controls to achieve certification. However, the scheme recognises that organisations may have different setups, and provides some flexibility in how controls are implemented. The focus is on achieving the security outcomes rather than prescribing specific technologies.

Our cyber risk assessment tool helps you prepare for Cyber Essentials certification by:

  • Evaluating your current security posture against Cyber Essentials requirements
  • Identifying gaps that need to be addressed before applying for certification
  • Providing recommendations for improvement
  • Helping you understand the requirements in plain language

While our assessment isn’t an official certification, it’s designed to help you prepare for the official certification process.

The five control areas in cyber security are Identify, Protect, Detect, Respond, and Recover. Here’s the explanation:

  1. Identify: This is about understanding and managing the risks to your systems, data, and assets. It involves creating a complete inventory of all hardware and software, and identifying business priorities and potential threats.

  2. Protect: This area focuses on implementing safeguards to ensure the delivery of critical services. It includes access control, data encryption, staff training, and maintaining secure configurations.

  3. Detect: This involves developing and implementing measures to identify cyber security events. It includes continuous monitoring, anomaly detection, and having robust detection processes in place.

  4. Respond: This is about having a plan to deal with a detected cyber security incident. It includes having a clear response plan, communication strategies, and mitigation measures to limit the impact of the event.

  5. Recover: This final area focuses on restoring normal operations after an incident has occurred. This includes recovery planning, improvements based on lessons learned from the incident, and restoring any compromised data or services.