Your Cyber Essentials Roadmap

Everything you need to achieving basic Cyber Essentials certification.

This guide walks you through every step required to achieve Cyber Essentials certification through self-assessment. We’ve created this to help you understand the full scope of work involved, the technical knowledge required, and what’s needed to complete the process properly.

Note: Cyber Essentials certification is valid for 12 months and must be renewed annually.

Understanding the Work Required

The amount of work required to prepare for Cyber Essentials certification varies significantly based on your organisation’s size, the number of internet-connected devices, the number of individuals using those devices, and the complexity of your IT infrastructure.

Below is a general overview of what each aspect of the roadmap covers, allowing you to navigate through the process in accordance with your current needs and progress towards certification.

Organisation Profile

Estimated Working Hours

Small & Simple
20-50 computers, single office location, few cloud services, strong existing security controls.

8-20 Hours

Medium Complexity
50-100 computers, remote workers, multiple cloud services, some security gaps.

20-40 hours

Large or Complex
100-200+ computers, multiple locations, extensive cloud usage, BYOD, significant remediation needed.

40-80+ hours

Key Factors Affecting Time Required:

• Number of devices: Each computer, server, mobile device, and network appliance must be assessed and configured correctly.

• Number of users: More users means more accounts to manage, more access controls to configure, and more training required

• Current security posture: Organisations with weak or non-existent security controls will require significantly more remediation work

• IT infrastructure complexity: Multiple locations, remote workers, BYOD policies, and extensive cloud service usage all increase complexity

• Technical expertise: Lack of in-house IT security knowledge will extend the time needed to understand and implement requirements

These estimates are based on industry experience from UK cyber security providers and represent the actual work time required, not elapsed calendar time. The certification process itself (assessor review) typically takes 1-3 working days after submission.

Important: The 2025 Updates

As of 28 April 2025, all Cyber Essentials applications use the new ‘Willow’ Question Set and must comply with Requirements for IT Infrastructure Version 3.2. Key changes include enhanced requirements for passwordless authentication, updated terminology for remote working (now “home and remote working”), and stricter verification processes for Cyber Essentials Plus assessments.

The Cyber Essentials Roadmap

1. Initial Assessment & Scoping

Download Official Documentation
Access the Willow Question Set and Requirements for IT Infrastructure v3.2 from the IASME website. These documents are mandatory reading before you begin.

Define Your Scope (REQUIRED)
Your assessment and certification should cover the whole of the IT infrastructure used to carry out your organisation’s business, or if necessary, a well-defined and separately managed sub-set. You must clearly define the scope boundary: the business unit managing it, the network boundary and physical location. You must agree the scope with the Certification Body before assessment begins. A scope that doesn’t include end user devices isn’t acceptable.

Inventory Your IT Estate
Create a comprehensive list of all devices and software in scope that meet any of these conditions: can accept incoming network connections from untrusted internet-connected hosts; can establish user-initiated outbound connections to devices via the internet; control the flow of data between any of the above devices and the internet. This includes: all end user devices, servers (on-premise and cloud), network equipment, software applications, cloud services, and home and remote working arrangements.

Identify Current Security Controls
Document what security measures you already have in place across the five control areas.

2. Gap Analysis Against the Five Controls

Review each of the five Cyber Essentials controls against your current setup to identify what needs to be implemented:

Control Area

Key Requirements (from NCSC v3.2)

1. Firewalls

You must protect every device in scope with a correctly configured firewall. Must: change default administrative passwords; prevent access to administrative interface from the internet (unless protected by MFA or IP allow list); block unauthenticated inbound connections by default; ensure inbound firewall rules are approved and documented.

2. Secure Configuration

You must regularly: remove and disable unnecessary user accounts; change any default or guessable account passwords; remove or disable unnecessary software; disable any auto-run feature; ensure users are authenticated before allowing access to organisational data or services.

3. User Access Control

You must: have a process to create and approve user accounts; authenticate users with unique credentials; remove or disable accounts when no longer required; implement MFA where available (authentication to cloud services must always use MFA); use separate accounts for administrative activities only.

4. Malware Protection

A malware protection mechanism must be active on all devices in scope. For Windows/MacOS: anti-malware must be updated in line with vendor recommendations and must prevent malware from running, prevent execution of malicious code, and prevent connections to malicious websites.

5. Security Update Management

All software must: be licensed and supported; be removed when unsupported; have automatic updates enabled where possible; be updated within 14 days of release for critical/high risk vulnerabilities (CVSS v3 base score of 7 or above).

  • Can you clearly define your network boundary and physical location?
  • Do you have an accurate, up-to-date inventory of all devices that connect to the internet?
  • Can you identify all cloud services (IaaS, PaaS, SaaS) your organisation uses?
  • Do you know which devices are used for home and remote working?
  • Can you identify devices owned by your organisation versus BYOD (Bring Your Own Device)?

3. Remediation and Implementation

This phase typically requires the most work, as you must implement all required controls that are currently missing or incorrectly configured. The time required scales directly with the number of devices and users in your organisation.

Configure Boundary Firewalls

You must protect every device in scope with a correctly configured firewall. For all firewalls, you must: change default administrative passwords to a strong and unique password; prevent access to the administrative interface from the internet (unless protected by MFA or IP allow list with properly managed password authentication); block unauthenticated inbound connections by default; ensure inbound firewall rules are approved and documented; remove or disable unnecessary firewall rules.

Harden All Systems

You must proactively manage your computers and network devices. You must regularly: remove and disable unnecessary user accounts (such as guest accounts and administrative accounts that won’t be used); change any default or guessable account passwords; remove or disable unnecessary software; disable any auto-run feature which allows file execution without user authorisation; ensure users are authenticated before allowing them access to organisational data or services.

Implement Access Controls

Your organisation must: have in place a process to create and approve user accounts; authenticate users with unique credentials before granting access; remove or disable user accounts when they’re no longer required; implement MFA where available (authentication to cloud services must always use MFA); use separate accounts to perform administrative activities only (no emailing, web browsing or other standard user activities); remove or disable special access privileges when no longer required.

Deploy & Configure Malware Protection

You must make sure that a malware protection mechanism is active on all devices in scope. For Windows or MacOS devices using anti-malware software, it must be configured to: be updated in line with vendor recommendations; prevent malware from running; prevent the execution of malicious code; prevent connections to malicious websites over the internet.

Establish Patch Management

All software on in-scope devices must: be licensed and supported; be removed from devices when it becomes unsupported (or removed from scope); have automatic updates enabled where possible; be updated, including vulnerability fixes, within 14 days of release for critical or high risk vulnerabilities (CVSS v3 base score of 7 or above, or identified by vendor as critical/high risk).

Address Cloud Services

If your organisation’s data or services are hosted on cloud services, these services must be in scope. For cloud services, the applicant organisation is always responsible for ensuring all controls are implemented, but some controls can be implemented by the cloud service provider. You must make sure that the cloud provider has committed to implementing relevant controls via contractual clauses or documents referenced by contract.

4. Documentation and Evidence Gathering

Required by assessors:

You might be required to supply evidence before your certification body can award certification at the level for which you’re applying (NCSC Requirements for IT Infrastructure v3.2).

You must clearly define the scope boundary, namely: the business unit managing it, the network boundary and physical location. You must agree the scope with the Certification Body (NCSC v3.2).

If using externally managed services (such as remote administration), you must be able to confirm that the Cyber Essentials technical controls are being met, and be able to demonstrate this in your assessment answers (NCSC v3.2).

Industry best practice:

Create Configuration Documentation: Document all security configurations, policies, and procedures. While not explicitly required for basic Cyber Essentials, this documentation is essential if you plan to pursue Cyber Essentials Plus, which requires evidence to be retained by the Certifying Body for at least the lifetime of the certificate.

Gather Screenshots & Evidence: Collect evidence of your implementations such as firewall rules, anti-malware status, update policies, and access control configurations. This can help respond to any assessor queries quickly.

Document Scope Decisions: If you’ve limited scope to a subset, document how you’ve segregated the boundary between in-scope and out-of-scope systems.

  • Do you have the technical skills to configure firewall rules correctly?
  • Can you identify and remove unnecessary services across different operating systems?
  • Are you able to configure Group Policy or equivalent for consistent security settings?
  • Can you implement and test multi-factor authentication across all cloud services?
  • Do you understand how to configure malware protection correctly for your environment?
  • Can you establish a patch management process that meets the 14-day requirement?
  • Are you able to verify cloud provider security commitments in contracts?

5. Complete the Self-Assessment Questionnaire

Purchase Certification
When you are ready, you will need to register for certification and make a payment. Register with an IASME-accredited Certification Body and pay the assessment fee. Note this is a yearly fee paid directly to the accrediting body.

Answer All Questions Accurately
Cyber Essentials is self assessment, with organisations completing a questionnaire. Once your application and payment have been received, you will receive your online assessment portal log-in details so that you can enter your answers into the online assessment platform. The questionnaire covers your scope, devices, locations, and detailed questions on each of the five controls. Some of the Cyber Essentials self-assessment questions can be difficult to understand if you do not have a technical IT background or have a complex company structure.

Obtain Board-Level Sign-Off
A senior member of the board or equivalent from your organisation must e-sign a document to verify that all the answers are true (GOV.UK PPN 014).

Submit for Assessment
The questionnaire is then verified by an independent certification body to assess whether the appropriate standard has been achieved, and certification can be awarded. A qualified external Assessor will mark the answers. Once you have submitted your assessment for marking, your Assessor may send you feedback.

6. Assessor Review & Certification

Respond to Assessor Queries
Cyber Essentials Assessors work for a Certification Body. They are trained and licensed by IASME to assess whether an organisation meets the criteria required for Cyber Essentials certification. They will also be able to help you understand the assessment questions and how they relate to your company. Your assessor may send you feedback or request clarification on specific answers.

Receive Your Certificate
If successful, this results in the award of a certificate valid for one year. You will be listed on the directory of certified organisations and can display your digital Cyber Essentials certificate on your website and email footer.

  • Do you have the technical knowledge to answer detailed questions about your security controls?
  • Can you accurately describe your firewall configurations?
  • Are you able to confirm MFA status across all cloud services?
  • Can you verify software licensing status for all in-scope applications?
  • Do you understand the technical terminology used in the questionnaire?

Post-Certification: Ongoing Maintenance

Your Cyber Essentials certificate is valid for 12 months. Suppliers must recertify every 12 months in order to maintain a valid certificate. Failure to do so renders the supplier uncertified (GOV.UK PPN 014).

During that year, you must maintain compliance with all five controls, including:

  • Continuing to apply security updates within 14 days for critical/high risk vulnerabilities
  • Maintaining firewall configurations
  • Managing user access and privileges
  • Ensuring all new devices meet security standards
  • Updating configurations when you add new cloud services or software

Are you ready for your assessment?

We work with over 100 Kent businesses to achieve and maintain Cyber Essentials certification. Our cybersecurity team handles the technical complexity while you focus on running your business.

Cyber Essentials logo

What we provide:

Complete gap analysis and remediation

Ongoing consultation and strategy

Rapid-response security support and monitoring

Obtaining Cyber Essentials is a technical process, and we want to provide businesses with everything they need to improve their cybersecurity and potential.

If you have any questions, or would like to enquire about some of our services, book a free discovery call with our Managing Director to start your Cyber Essentials journey.

BCS IT Support Managing Director Martin Hynes headshot over a green and blue gradient.