Skip to Main Content
Cyber Essentials Plus Certification

Cyber Essentials Plus Certification

SKU: 5567
Format: Certification (online purchases only)

This service will help you achieve IASME-licensed Cyber Essentials Plus certification. It is conducted online and includes:

  • A precheck of your Cyber Essentials questionnaire answers by one of our security experts, to ensure you have addressed all compliance requirements.
  • Access to the IASME portal where you will submit your self-assessment.
  • An on-site assessment; and internal vulnerability scans;
  • External vulnerability scans; and
  • Your Cyber Essentials and Cyber Essentials Plus certificates.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

Preis: 2.339,00 €
Ohne Mehrwertsteuer
Description

Cyber Essentials Plus Certification

This service is for organisations that have a high degree of knowledge of all five security controls and are comfortable carrying out all the preparations for certification themselves.


What’s included?

  • A precheck of your Cyber Essentials questionnaire answers by one of our security experts, to ensure you have addressed all compliance requirements.
  • Access to the IASME portal where you will submit your self-assessment.
  • External vulnerability scans;
  • Internal vulnerability scans;
  • A certification guarantee; 
  • An on-site assessment; and
  • Your Cyber Essentials and Cyber Essentials Plus certificates.

How the service works

  • We send you access details for the IASME Cyber Essentials portal via email.
  • You log onto the IASME portal where you will define your scope for testing and certification using your knowledge of the scheme.
  • You complete and submit the IASME SAQ (self-assessment questionnaire).
  • We review your assessment and inform you if the SAQ meets the requirements of the Cyber Essentials scheme.
  • Subject to a positive outcome, we issue your Cyber Essentials certificate.
  • Once you are Cyber Essentials certified, you schedule your on-site assessment, which will include the internal vulnerability scan.
  • We conduct the internal assessment and perform the necessary internal scan on a sample of your Internet-facing devices. · We provide the results of the internal assessment and scan. If there are nonconformities, we will also provide feedback to help you understand how to close these gaps and achieve certification.
  • We schedule your external vulnerability scan.
  • Subject to a positive outcome, you receive your Cyber Essentials Plus certificate and report.

Is this service right for you?

  • You are confident in defining the scope of your assessment encompassing the entire organisation;
  • You own and operate your entire scope of IT infrastructure;
  • You are familiar with the five key controls covered in the Cyber Essentials questionnaire and how to meet them; or
  • You have previously certified and are looking to renew and your scope has not changed.
Benefits

Benefits of Cyber Essentials Plus certification

Secure the supply chain

The ICO (Information Commissioner’s Office), whose job it is to uphold the EU GDPR in the UK, recommends Cyber Essentials as “A good starting point” for the cyber security of the IT you rely on to hold and process personal data.

Secure more business

If you would like to bid for central government contracts that involve handling sensitive and personal information or the provision of certain technical products and services, you will require Cyber Essentials certification.

Work with the UK government & MoD

Cyber Essentials Plus will give you the opportunity to work with the UK government and MoD.

Reduce cyber insurance premiums

Cyber insurance agencies look more favourably on organisations that have achieved Cyber Essentials certification.

Conditions

Conditions

Cyber Essentials Plus involves a technical audit of the systems that are in scope for Cyber Essentials. This includes a representative set of workstations, mobile devices and build types used by the organisation’s end users to complete their day-to-day duties. The number of builds is defined by the number of configurations of operating system and software suites installed. If more than one browser or Office suite is used, each variant will need to be tested. If they are installed on the same build, this is acceptable.

  • This package includes on-site testing at one location, of one type of user account, on up to ten sample devices. Additional workstations, mobile devices and build types may need to be tested to meet the sampling requirements of the scheme. If you require more than ten end-user workstations to be tested, you will need to purchase Cyber Essentials Plus Additional Device Testing. This testing can be conducted remotely in some instances.
  • The package includes a free vulnerability scan for up to 16 IP addresses. If you have more than 16 IP addresses, you will need to purchase additional IP packages in packs of 16. If you fail your external scan, a rescan will need to be purchased, plus any additional IP packages that you need to cover only the failing IP addresses if completed with 14 days of the first passing element.
  • If your business is located outside mainland UK or Northern Ireland, additional expenses will be charged to accommodate our consultant’s travel time and costs for the on-site assessment. These will be billed separately.
  • If you are not successful on your first submission for Cyber Essentials, you have two working days to submit a further attempt for certification. If you are not successful on your second submission, you will be required to wait one month before reattempting at the cost of a new application.
  • If your Cyber Essentials Plus application is unsuccessful, your Cyber Essentials certification may also be revoked.

Pre-test requirements

  • All user devices are subject to testing and will be agreed upon before the testing date, including mobile and BYOD (bring your own device), and must be available for testing.
  • All devices within the scope of testing must be user devices and cannot be built specifically for testing.
  • A local user account with username and password must be available for each user group in scope.
  • Devices must have Internet access, allow emails from our test domain and be accessible by our test web server (https://ces.itgovernance.co.uk).
  • You must provide details of a user email account per user group being assessed.
  • Workstation builds must be configured to allow an authenticated vulnerability scan that will determine patch and version numbers of installed software, and you must provide details of the user account to be used.
  • Remote registry must be enabled on the workstation builds, and no global policies that block the authenticated vulnerability scan are permitted.

Kundenbewertungen

(0# der Bewertungen:)
oben
This website uses cookies. View our cookie policy.
Laden....