United Kingdomstandard

Cyber Essentials Plus

Without Cyber Essentials certification, your firm is excluded from UK government contracts involving sensitive data and faces higher insurance premiums.

Mapped to Microsoft controls
Effective DateOngoing (NCSC scheme)
Enforcement BodyIASME Consortium (on behalf of NCSC)
Penalty FrameworkCyber Essentials is a voluntary certification, there are no direct fines. However, failure to hold certification excludes organisations from UK government contracts involving sensitive data (mandated since 2014). The NCSC reports that CE-certified organisations are 80% less likely to make a cyber insurance claim. Insurance premium reductions of 10-25% are commonly available to certified organisations. CE+ certification requires an independent technical verification, so failures result in re-assessment costs and delayed certification.

Cyber Essentials is a UK government-backed scheme operated by the National Cyber Security Centre (NCSC) through the IASME Consortium. It defines five technical controls that, when properly implemented, protect against the most common internet-based attacks.

Cyber Essentials Plus adds a hands-on technical verification conducted by an accredited assessor, who tests the controls in your live environment. The Plus certification is increasingly required for UK government contracts, defence supply chain participation, and as a baseline expectation for regulated industries.

The five control themes - firewalls, secure configuration, user access control, malware protection, and security update management - map directly to Microsoft 365 and Intune capabilities. StremarControl engineers and operates the Microsoft-native controls required for Cyber Essentials compliance, implementing these controls as enforceable policies rather than manual configurations and maintaining compliance assurance between annual assessments.

Why This Matters Now

Cyber Essentials is not optional for UK government supply chain participants, it is a mandatory requirement for contracts involving the handling of certain sensitive or personal information. The Ministry of Defence, NHS, and most local authorities now require CE or CE+ as a minimum. Beyond procurement, CE+ certification demonstrates to clients and insurers that your organisation has implemented baseline technical controls that defeat the most common attack vectors. For M365 tenants, the five control themes map directly to Intune compliance policies, Defender configurations, and Conditional Access - making the certification achievable and maintainable through programmatic enforcement.

Scope & Applicability

Cyber Essentials applies to any UK organisation seeking to demonstrate baseline cybersecurity hygiene. The scope covers all internet-facing IT infrastructure, including cloud services like Microsoft 365. For CE+, the assessor selects a sample of devices for hands-on technical verification. Organisations must include all devices that access organisational data - laptops, desktops, mobile phones, and tablets. Servers providing services to untrusted users must also be in scope. Cloud services must be configured according to the provider's security recommendations.

Core Obligations

01

Firewalls

Ensure all devices that connect to the internet are protected by a properly configured firewall or equivalent network device. Default passwords must be changed.

02

Secure Configuration

Remove unnecessary software, change default settings, and disable auto-run. Systems must be configured to minimise vulnerabilities.

03

User Access Control

Control access to systems through user accounts with appropriate privileges. Use MFA where available. Remove or disable accounts that are no longer needed.

04

Malware Protection

Protect against malware using at least one of: anti-malware software, application whitelisting, or sandboxing.

05

Security Update Management

Keep all software up to date. Apply critical and high-severity patches within 14 days of release.

Microsoft 365 Control Mapping

How each obligation maps to enforceable Microsoft 365 controls and the evidence they produce.

Obligation

Firewalls

M365 Control

Windows Firewall profiles enforced via Intune endpoint security policies. Network protection enabled in Defender for Endpoint. Attack surface reduction rules blocking known attack vectors.

Evidence

Intune firewall policy compliance report, Defender network protection logs, ASR rule audit.

Obligation

Secure Configuration

M365 Control

Intune Security Baselines applied across all managed endpoints. Configuration profiles disable auto-run, enforce screen lock, restrict removable media. CIS Benchmark alignment validated.

Evidence

Security baseline compliance report, device configuration status, non-compliant device list with remediation status.

Obligation

User Access Control

M365 Control

Conditional Access enforcing phishing-resistant MFA (FIDO2/WHfB). Entra ID role assignments follow least-privilege. Stale account detection and automated disablement after 90 days inactivity.

Evidence

MFA registration report, stale account audit, Conditional Access evaluation logs, privilege escalation alerts.

Obligation

Malware Protection

M365 Control

Defender for Endpoint with real-time protection, cloud-delivered protection, and automatic sample submission. Tamper protection enabled to prevent disablement.

Evidence

Defender health report, threat detection summary, tamper protection status audit.

Obligation

Patch Management

M365 Control

Windows Update for Business with Intune update rings: pilot (7 days), broad (14 days), critical (expedited to 48 hours). Third-party patch management via Intune Win32 app deployment.

Evidence

Update compliance report, patch deployment timeline, devices outside SLA report.

Implementation Timeline

June 2014
Cyber Essentials scheme launched by UK Government
January 2022
Major update: cloud services, home working, and multi-factor authentication requirements added
April 2023
IASME takes over as sole delivery partner from multiple certification bodies
Annually
Certification valid for 12 months - annual re-certification required

Related Frameworks

Ready to get Cyber Essentials-ready?

Start with a fixed-scope sprint. We assess your Microsoft 365 controls against Cyber Essentials requirements, close gaps, and produce audit-ready evidence.