Adhering to the Cyber Essentials framework

Cyber Essentials is a program introduced by the Indian government and overseen by national cybersecurity authorities. In India, where cyber threats can take diverse forms and evolve rapidly, this initiative plays a crucial role. While the complexity of cyberattacks varies, many of them remain basic and foreseeable. The Cyber Essentials scheme is designed to address these common cyber threats by advocating the implementation of five essential security controls.

Get in touch

Trusted By

Why should your organization consider obtaining Cyber Essentials certification?

01
To provide confidence to your customers that your organization has implemented fundamental cybersecurity measures to protect against cyber threats.
02
To enhance eligibility for government contracts by demonstrating your commitment to cybersecurity best practices.
03
To acquire valuable insights into your organization's overall cybersecurity readiness and identify areas for improvement.
04
To streamline compliance with various security standards, including certifications such as ISO 27001.

What's new in the Cyber Essentials 2022 revision?

In light of technological advancements and shifts in work patterns due to the pandemic, the NCSC updated the Cyber Essentials scheme in January 2022. Organizations are given a 12-month transition period to integrate these new changes. The foundational five technical controls remain consistent, but there are new stipulations for BYOD, cloud services, remote work environments, password protocols, and multi-factor authentication for both on-site and cloud services.

The revised Cyber Essentials now evaluates devices used for remote work, cloud-based Platform as a Service and Software as a Service solutions, thin clients, servers, user-end devices such as smartphones, laptops, desktops, and internet-operated wireless devices.

Furthermore, Cyber Essentials has introduced a scaled pricing model, which varies based on the organization's size, as gauged by the number of employees.

Security controls under Cyber Essentials

Secure Configuration

Implementing secure settings for your devices and software to reduce vulnerabilities. This includes keeping systems up to date, changing default passwords, and disabling unnecessary features.

User Access Control

Managing user access privileges, ensuring that only authorized individuals have access to sensitive information and systems. This control helps prevent unauthorized access and data breaches.

Malware Protection

Installing and maintaining antivirus and anti-malware software to detect and remove malicious software that could compromise your organization's data and systems.

Patch Management

Keeping all software and operating systems up to date with the latest security patches and updates to address known vulnerabilities and weaknesses.

Align with Cyber Essentials Security Controls with ManageEngine

Explore how ManageEngine's comprehensive suite of IT management solutions can empower your organization to align with the requirements of the Cyber Essentials security controls. By downloading ManageEngine's Cyber Essentials guide, you'll gain access to:

01
An extensive overview of the Cyber Essentials scheme, including its various certification levels and the advantages of achieving certification.
02
Valuable insights and guidance on implementing the right processes and leveraging advanced technologies to successfully attain Cyber Essentials certification.
03
A deep dive into how ManageEngine's cybersecurity solutions can assist you in achieving compliance with the five critical security controls necessary for Cyber Essentials certification

Featured On

Have you implemented the appropriate security practises?
Talk to us→