Skip to main content

💼 UK Cyber Essentials

  • Contextual name: 💼 UK Cyber Essentials
  • ID: /frameworks/uk-cyber-essentials-v3.1

Description

Empty...

Similar

  • Internal
    • ID: dec-a-afea92d6

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 1 Firewalls6
    💼 1.1 Change default administrative passwords
    💼 1.2 Prevent access to the administrative interface from the internet3537
    💼 1.3 Block unauthenticated inbound connections by default23
    💼 1.4 Ensure inbound firewall rules are approved and documented
    💼 1.5 Remove or disable unnecessary firewall rules
    💼 1.6 Make sure you use a software firewall on devices which are used on untrusted networks.
💼 2 Secure configuration2
    💼 2.1 Computers and network devices6
        💼 2.1.1 Remove and disable unnecessary user accounts
        💼 2.1.2 Change any default or guessable account passwords23
        💼 2.1.3 Remove or disable unnecessary software
        💼 2.1.4 Disable any auto-run feature which allows file execution without user authorization
        💼 2.1.5 Ensure users are authenticated before allowing them access to organizational data or services33
        💼 2.1.6 Ensure appropriate device locking controls for users that are physically present
    💼 2.2 Device unlocking credentials3
        💼 2.2.1 A credential such as a biometric, password or PIN must be in place before a user can gain access to the services.
        💼 2.2.2 You must protect your chosen authentication method against brute-force attacks2
            💼 2.2.2.1 Shouldn’t allow more than 10 guesses in 5 minutes
            💼 2.2.2.2 Lock devices after more than 10 unsuccessful attempts.
        💼 2.2.3 Technical controls must be used to manage the quality of credentials.
💼 3 Security update management4
    💼 3.1 All software on in-scope devices must be licensed and supported55
    💼 3.2 All software on in-scope devices must be removed from devices when it becomes unsupported
    💼 3.3 All software on in-scope devices must have automatic updates enabled where possible11
    💼 3.4 All software on in-scope devices must be updated within 14 days of an update being released
💼 4 User access control6
    💼 4.1 Have in place a process to create and approve user accounts
    💼 4.2 Authenticate users with unique credentials before granting access to applications or devices4
        💼 4.2.1 Passwords are protected against brute-force password guessing
        💼 4.2.2 Use technical controls to manage the quality of passwords.23
        💼 4.2.3 Support users to choose unique passwords for their work accounts11
        💼 4.2.4 The password element of the multi-factor authentication23
    💼 4.3 Remove or disable user accounts when they're no longer required
    💼 4.4 Implement MFA, where available
    💼 4.5 Use separate accounts to perform administrative activities only
    💼 4.6 Remove or disable special access privileges when no longer required
💼 5 Malware protection2
    💼 5.1 Anti-malware software4
        💼 5.1.1 Anti-malware software must be configured to be updated in line with vendor recommendations
        💼 5.1.2 Anti-malware software must be configured to prevent malware from running
        💼 5.1.3 Anti-malware software must be configured to prevent the execution of malicious code
        💼 5.1.4 Anti-malware software must be configured to prevent connections to malicious websites over the internet.
    💼 5.2 Application allow listing2
        💼 5.2.1 Must actively approve such applications before deploying them to devices
        💼 5.2.2 Must maintain a current list of approved applications