Introduction
Cyber Essentials Plus (Level Two) is a technical audit of IT systems. It’s based on the same technical requirements of Cyber Essentials (Level One) and is a way to verify the controls are in place and operating effectively. It can provide more assurance to organisations regarding the risks associated with internet-based threats. The audit for Cyber Essentials Plus covers a representative set of user devices, internet gateways, servers with services accessible to the internet, and cloud services.
Cyber Essentials (Level One) and Cyber Essentials Plus (Level Two)
Details of the differences between the two levels of Cyber Essentials can be found in a previous blog located here. In summary
- Cyber Essentials is a verified self-assessment of technical controls aimed at protecting organisations from common internet-based threats
- Cyber Essentials Plus takes it a step further and validates these controls as being in place and operational through independent testing by a qualified expert. This involves detailed testing and vulnerability assessments.
Testing for Cyber Essentials Plus
Five key tests are carried out for Cyber Essentials Plus:
- Remote vulnerability assessment – whether an internet based attacker could hack into systems using typical low-skill methods
- Patching – identifying missing vulnerability fixes that could be exploited by an attacker
- Malicious software protection – checking devices benefit from a basic level of protection when emailing and web browsing
- Multi-factor authentication – whether cloud service are configured for MFA / 2FA
- Account Separation – checking that a standard user account doesn’t have administrator privileges assigned
Types of devices being tested for Cyber Essentials Plus
Testing focuses on the following devices:
- External internet based IP addresses / hosts – including infrastructure and as service
- A representative sample of end user devices
- Servers
- Cloud services
Prerequisites to Cyber Essentials Plus testing
- Cyber Essentials certification – issued within the last 3 months
- Written permission from the organisation requesting the testing
- Scope verification – that Cyber Essentials Plus matches Cyber Essentials (Level One)
- Agreement on the scope boundary
- Confirmation that any subsets have been effectively segregated
- Samples to be tested
- When the testing will take place
- Access to the organisation site location – if required
- Appropriate people (from the organisation and certification body) to support the testing
- Email client(s) and web browser(s) to facilitate the testing
- Sending/receiving of emails – an organisation (account) applying for certification
Who does the testing, and are there specific tools required
- People: Cyber Essentials Plus Assessors have completed the IASME Cyber Essentials Plus Assessor Workshop, passed the course examination and are licensed by a Certification Body
- Organisation: Cyber Essentials Plus Certification Body, authorised to assess and certify against the Cyber Essentials Plus standard, based on training and licencing through IASME (the delivery partner appointed by the National Cyber Security Centre)
- Tools: Vulnerability assessments must be carried out using an approved tool – PCI Approved Scanning Vendors (ASV) – which include software from Tenable (Nessus), Rapid7, and Qualys
What to expect during the testing
- Remote vulnerability assessment – external IP addresses are scanned through the ASV tool to identify weaknesses
- Patching – a vulnerability scanning agent is deployed on devices to identify weaknesses and whether fixes are available
- Malicious software protection – devices are checked for running appropriate software (where possible), testing is also carried out to check that browsers and email are configured to block/prevent malicious software
- Multi-factor authentication – checks are carried out on the setup of cloud services, to ensure accounts are set up with multi-factor authentication
- Account Separation – devices are checked to ensure standard accounts (used for web browsing and email) don’t have special/administrative privileges
Key note:
- A Cyber Essentials Plus Test Specification is available for more details – created by the National Cyber Security Centre (NCSC), which is part of the GCHQ
How We Help
At RB Consultancy Ltd we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:
- NCSC Assured Cyber Advisor – we help organisations understand and implement technical controls
- IASME Cyber Essentials Plus Assessor – we assess organisations against the requirements
- IASME Cyber Essentials Plus Certification Body – we issue organisations with certifications
Conclusion
- Cyber Essentials Plus provides more reassurance that the technical controls designed to prevent common / internet-based attacks are in place and operational
- There are five main tests carried out for the Cyber Essentials Plus audit
- Testing is on external devices, a sample of end-user devices, servers, and cloud
- Before testing can begin, prerequisites must be completed
- Testing is carried out by certified assessors who work for certification bodies
- Specific software is required for some testing (vulnerability assessments)
- Email accounts/web browsers used by organisations form part of the testing too
- More details on the testing can be found in a Cyber Essentials Plus Test Specification document, which has been created by the National Cyber Security Centre (NCSC)
If you would like assistance, contact us for support.