Cyber Essentials technical requirements updated for April 2023

News and information from the Advent IM team.

  • by Olivia Lawlor-Blackburn
  • General

In April 2023, the NCSC and its Cyber Essentials delivery partner IASME will update the technical requirements for Cyber Essentials. This update is part of a regular review of the scheme’s technical controls, ensuring that it continues to help UK organisations guard against the most common cyber threats.

After a major update last year – the biggest update to the scheme since it was first set up in 2014 – the 2023 update will be lighter touch, providing a number of clarifications, alongside some important new guidance. This includes:

  • User devices. With the exception of network devices (such as firewalls and routers), all user devices declared within the scope of the certification only require the make and operating system to be listed. We have removed the requirement for the applicant to list the model of the device. This change will be reflected in the self-assessment question set, rather than the requirements document.
  • Clarification on firmware. All firmware is currently included in the definition of ‘software’, and so must be kept up to date and supported. Following feedback that this information can be difficult to find, we are changing this to include just router and firewall firmware.
  • Third party devices. More information and a new table that clarify how third-party devices, such as contractor or student devices, should be treated in your application.
  • Device unlocking. We have made a change here to mitigate some issues around default settings in devices being unconfigurable (such as the number of unsuccessful login attempts before the device is locked). Where that is the case, it’s now acceptable for applicants to use those default settings.
  • Malware protection. Anti-malware software will no longer need to be signature based and we have clarified which mechanism is suitable for different types of devices. Sandboxing is removed as an option.
  • New guidance on zero trust architecture for achieving CE and a note on the importance of asset management.
  • Style and language. Several language and format changes have been made to make the document easier to read.
  • Structure updated. The technical controls have been reordered to align with the updated self-assessment question set.
  • CE+ testing. The CE+ Illustrative Test Specification document has been updated to align with the requirements changes. The biggest change here is a refreshed set of Malware Protection tests, to simplify the process for both applicants and assessors.

Find out more here.

We can help you through the process of Cyber Essentials., find out more about our support here.

Share this Post