Introduction

Cyber Essentials Plus (Level Two) is a technical audit of IT systems. It’s based on the same technical requirements of Cyber Essentials (Level One) and is a way to verify the controls are in place and operating effectively. It can provide more assurance to organisations regarding the risks associated with internet-based threats. The audit for Cyber Essentials Plus covers a representative set of user devices, internet gateways, servers with services accessible to the internet, and cloud services.

 

Cyber Essentials (Level One) and Cyber Essentials Plus (Level Two)

Details of the differences between the two levels of Cyber Essentials can be found in a previous blog located here. In summary

 

Testing for Cyber Essentials Plus

Five key tests are carried out for Cyber Essentials Plus:

  1. Remote vulnerability assessment – whether an internet based attacker could hack into systems using typical low-skill methods
  2. Patching – identifying missing vulnerability fixes that could be exploited by an attacker
  3. Malicious software protection – checking devices benefit from a basic level of protection when emailing and web browsing
  4. Multi-factor authentication – whether cloud service are configured for MFA / 2FA
  5. Account Separation – checking that a standard user account doesn’t have administrator privileges assigned

 

Types of devices being tested for Cyber Essentials Plus

Testing focuses on the following devices:

  1. External internet based IP addresses / hosts – including infrastructure and as service
  2. A representative sample of end user devices
  3. Servers
  4. Cloud services

 

Prerequisites to Cyber Essentials Plus testing

 

Who does the testing, and are there specific tools required

 

What to expect during the testing

  1. Remote vulnerability assessment – external IP addresses are scanned through the ASV tool to identify weaknesses
  2. Patching – a vulnerability scanning agent is deployed on devices to identify weaknesses and whether fixes are available
  3. Malicious software protection – devices are checked for running appropriate software (where possible), testing is also carried out to check that browsers and email are configured to block/prevent malicious software
  4. Multi-factor authentication – checks are carried out on the setup of cloud services, to ensure accounts are set up with multi-factor authentication
  5. Account Separation – devices are checked to ensure standard accounts (used for web browsing and email) don’t have special/administrative privileges

Key note:

 

How We Help

At RB Consultancy Ltd we support organisations looking to implement controls and/or certify to Cyber Essentials and Cyber Essentials Plus requirements:

 

Conclusion

 

If you would like assistance, contact us for support.

Leave a Reply

Your email address will not be published. Required fields are marked *