Introduction

Cyber Essentials Plus (Level Two) is a technical audit of IT systems. It’s based on the same technical requirements of Cyber Essentials (Level One) and is a way to verify the controls are in place and operating effectively. It can provide more assurance to organisations regarding the risks associated with internet-based threats. The audit for Cyber Essentials Plus covers a representative set of user devices, internet gateways, servers with services accessible to the internet, and cloud services.

 

Cyber Essentials (Level One) and Cyber Essentials Plus (Level Two)

Details of the differences between the two levels of Cyber Essentials can be found in a previous blog located here. In summary

 

Testing for Cyber Essentials Plus

Five key tests are carried out for Cyber Essentials Plus:

  1. Remote vulnerability assessment – whether an internet based attacker could hack into systems using typical low-skill methods
  2. Vulnerability Fixes – identifying missing patches and security weaknesses that could be exploited by an attacker
  3. Malicious software protection – checking devices benefit from a basic level of protection when emailing and web browsing
  4. Multi-factor authentication – whether cloud service are configured for MFA / 2FA
  5. Account Separation – checking that a standard user account doesn’t have administrator privileges assigned

 

Types of devices being tested for Cyber Essentials Plus

Testing focuses on the following devices:

  1. External internet based IP addresses / hosts – including infrastructure and as service
  2. A representative sample of end user devices
  3. Servers
  4. Cloud services

 

Prerequisites to Cyber Essentials Plus testing

 

Who does the testing, and are there specific tools required

 

What to expect during the testing

  1. Remote vulnerability assessment – external IP addresses are scanned through the ASV tool to identify weaknesses
  2. Patching – a vulnerability scanning agent is deployed on devices to identify weaknesses and whether fixes are available
  3. Malicious software protection – devices are checked for running appropriate software (where possible), testing is also carried out to check that browsers and email are configured to block/prevent malicious software
  4. Multi-factor authentication – checks are carried out on the setup of cloud services, to ensure accounts are set up with multi-factor authentication
  5. Account Separation – devices are checked to ensure standard accounts (used for web browsing and email) don’t have special/administrative privileges

Key note:

 

How We Help

At RB Consultancy Ltd we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:

 

Conclusion – What the audit involves for Cyber Essentials Plus

Cyber Essentials Plus provides more reassurance that the technical controls designed to prevent common / internet-based attacks are in place and operational – there are five main tests carried out for the Cyber Essentials Plus audit. Testing is on external devices, a sample of end-user devices, servers, and cloud. Before testing can begin, prerequisites must be completed. Testing is carried out by certified assessors who work for certification bodies. Specific software is required for some testing (vulnerability assessments). Email accounts/web browsers used by organisations form part of the testing too. More details on the testing can be found in a Cyber Essentials Plus Test Specification document, which has been created by the National Cyber Security Centre (NCSC). RB Consultancy Ltd help organisations with Cyber Essentials and Cyber Essentials Plus certification. If you would like assistance, contact us for support.

 

 

Written by Remo Belisari, Managing Director of RB Consultancy Ltd, an experienced cyber security professional cyber advisor. Remo holds certifications relating to CISSP, ISSAP, ISO 27001, Cyber Essentials, IASME Cyber Assurance, and has many years experience in IT and cyber security. Remo has a history of supporting organisations from all over the world – including a Fortune 500 in USA and over 100 organisations across the UK. The views expressed in this blog are those of the author and do not necessarily reflect the views of RB Consultancy Ltd, its clients, partners, or affiliated organisations. The content is intended for general information only.