Cyber Essentials certification comes in 2 flavours: the basic Cyber Essentials certification, and the enhanced Cyber Essentials Plus. The non-plus version requires an organization to complete a self-assessment (though you are required to provide evidence as to your responses), whereas the Plus variant requires the same basic self assessment, which then goes through a hands-on technical validation by an assessor from the IASME consortium. There are no extra controls required for Plus certification, only the validation method differs.
If you would like to bid for UK central government contracts which involve handling sensitive and personal information or the provision of certain technical products and services, you will require Cyber Essentials Certification. In doing this, the UK Government aims to reduce risk throughout it’s supply chain.
Cyber Essentials provides guidance that can be broken down into 5 technical control themes:
- Firewalls – as the majority of attacks originate from the internet, ensuring a trusted and secure border is important
- Secure Configuration – this includes minimizing attack surfaces, disabling unused services, using TLS certificates where possible and using secure vs plaintext protocols
- User Access Control – covering things like ensuring least privilege, having admins login with regular accounts and escalate privileges only when required. Granting Domain Admin access to all and sundry will trip you up here, and rightly so!
- Malware Protection – Malware protection throughout your organization, including end-user devices, servers and and the internet boundary
- Security Update Management – plainly put: patching. Making sure that you’re closing vulnerability gaps by applying patches in a timely and organized fashion.
The process of checking for compliance within your VMware environments can be arduous and costly, and any kind of manual checks are subject to human error, so it is important to automate as much as possible.