Cyber Essentials Requirements Update

|
|
|
PUBLISHED on
07
November
2025
SUMMARY

In this blog, we explore the recent updates to the Cyber Essentials ‘Requirements for IT Infrastructure’ document, released by IASME on 3 November 2025 and effective from April 2026.  We break down the changes, looking at how they tighten the requirements for multi-factor authentication (MFA) and provide clarity on the definition of cloud services and on previously ambiguous scoping rules.  We also explain changes to web applications guidance, the user access control section, and a stronger emphasis on the critical role of data backups.

On 3 November 2025, IASME released the latest update to the 'Requirements for IT Infrastructure' document, which details the five technical controls that must be implemented and the requirements that must be met to obtain Cyber Essentials certification.  The document has been made public now so that applicants can review the changes and prepare for future assessment, but it will not come into effect until April 2026.

Those familiar with Cyber Essentials will be aware of the annual changes to the scheme, as IASME strives to continuously update and maintain its effectiveness against the threat of cyber-attacks on businesses, and the constant evolution of technology and threat actors.  The updates, as always, are modest but impactful.

Below, we have highlighted the key changes and their implications for you as applicants.

Multi-Factor Authentication (MFA)

The requirement for MFA is already a part of Cyber Essentials, however this latest update introduces a shift in expectations in that, if a cloud service offers MFA, it must be enabled or an automatic failure will be given.  Under the current guidelines, if MFA is not implemented a major noncompliance will be awarded, but the assessment can still be passed.

From April, if you do not implement MFA on cloud services that offer it, whether native to the cloud service, free, connected through another service, or as a fee-paying option, you will be unable to pass the Cyber Essentials assessment.

Definition of Cloud Services

IASME has provided an updated definition of cloud services, with the aim of enhancing clarity and removing the ambiguity that most applicants currently struggle with when assessing what counts as a cloud service and whether the cloud services they use are scope.  It also reinforces the requirement that cloud services cannot be excluded from scope.  The new definition is as follows:

Cloud service – A cloud service is an on-demand, scalable service, hosted on shared infrastructure, and accessible via the internet. For the purposes of Cyber Essentials a cloud service will be accessed via an account (which may be credentials issued by your organisation, or an email address used for business purposes), and will store or process data for your organisation.

If your organisation’s data or services are hosted on cloud services, these services must be in scope. Cloud services cannot be excluded from scope.

For applicants that use any form of cloud service, it will be important to ensure that all services are listed in your response to question A2.9.

Scoping

The new ‘Requirements for IT Infrastructure’ document updates another area that has previously been considered ambiguous and constantly challenged, i.e., the scoping requirements.  Currently, the document is worded in such a way that there is a grey area around untrusted internet-connected hosts and user-initiated outbound connections to devices via the internet.  The updates look to provide clarity on which devices are in scope by removing complex wording and simplifying these statements.

Any organisations that have previously removed devices from scope because they were classed as not establishing user-initiated outbound connections, or because the device they accepted internet connections from was 'trusted', will no longer be able to descope these.  The incoming guidelines confirm that the requirements apply to all devices that meet the following criteria:

  • Can accept incoming network connections from internet-connected devices
  • Can establish outbound connections to devices via the internet
  • Control the flow of data between any of the above devices and the internet.

Web Applications

The guidance for web applications has been updated and now refers to the UK Government’s Software Security Code of Practice rather than OWASP, and has also been renamed to ‘Application Development’ rather than web applications.  The Software Security Code of Practice consists of 14 principles, and software vendors are expected to implement these to establish a consistent baseline of software security and resilience across the market.

It should be noted that this is only guidance, and the requirements for what is in scope of Cyber Essentials has not changed.  Apps developed in-house and bespoke or custom components of web applications that are not publicly available commercial web applications are still out of scope.

User Access Control (UAC)

This section has been updated to increase emphasis on passwordless authentication and MFA with the promotion of passkeys, which the National Cyber Security Centre (NCSC) would like to become the default authentication recommendation.  The changes also include a paragraph detailing common examples of passwordless authentication.

Passwordless authentication has been on the horizon for a while, with Bill Gates predicting the phase-out of passwords as far back as 2004 and declaring that they are a weakness and could not be relied upon.  For many applicants, the switch to passwordless will be ongoing.  UAC is a complex topic and, with users often having an increasingly large number of devices and accounts, the management of passwords is becoming a significant burden.

Guidance on backups

Nothing has changed in the wording of this section, but it has been repositioned within the guidance document to emphasise the importance of having backups in place, as this enables organisations to recover quickly in the event of a cyber incident.  Whilst backing up organisational data is still not a mandatory requirement of Cyber Essentials, recent high-profile cyber attacks have demonstrated just how devastating the lack of backups can be.

Conclusion

The latest update to the Cyber Essentials requirements reflects IASME’s ongoing commitment to ensuring the scheme remains relevant and effective in the face of evolving cyber threats.  With the new requirements coming into effect in April 2026, now is the time to identify gaps and plan any necessary adjustments.  Staying ahead of these updates not only allows you to maintain compliance, but also strengthen your organisation’s overall security posture.

Read the full ‘Requirements for IT Infrastructure’ document.

How URM Can Help

If your organisation would benefit from tailored advice and support with its Cyber Essentials or Cyber Essentials Plus certification, URM is ideally-positioned to provide this.  As an accredited certification body, URM has been trained and licensed to certify organisations against the scheme and, in this capacity, has provided Cyber Essentials support to countless organisations and facilitated hundreds of assessments, providing us with a wealth of knowledge and experience around the Scheme.  As an Assured Service Provider under the NCSC’s Cyber Advisor scheme, our team of Cyber Advisors (Cyber Essentials) can offer you reliable advice to guide your implementation of the Cyber Essentials security controls and achieve a seamless and successful certification.  

We can conduct a gap analysis prior to your assessment where we identify any areas of noncompliance in your existing policies and controls, and advise on how these can be remediated.  When you feel ready for assessment, we can also provide a Cyber Essentials Application Review service, where URM’s assessor can either work through the questions with you before you complete the questionnaire, enabling you to successfully fill out the answers yourself, or check your already completed questionnaire before it is submitted.  If you decide to go for Cyber Essentials Plus, we can conduct a technical pre-assessment on a smaller, but still significant, sample of systems, following which we will explain and provide recommendations for eliminating any areas of noncompliance.

In addition to our consultancy services, URM will be delivering a free, 1-hour webinar on Cyber Essentials and CE Plus: Certification Success & Ongoing Compliance.  Register for the webinar on 26 November at 11am, where we will explore these recent changes to the scheme in greater detail, and offer practical advice on achieving and maintaining Cyber Essentials certification.

Get practical guidance on preventing common cyber-attacks

Get practical guidance on how to prepare for and achieve Cyber Essentials and Cyber Essentials Plus certification, and protect your organisation against these attacks.
Thumbnail of the Blog Illustration
Cyber Security
Published on
12/12/2024
Mitigating Cyber Risks: Why Cyber Essentials Matters More Than Ever

URM’s blog highlights the growing threat to cyber security in the UK and the importance of the Cyber Essentials scheme in mitigating these risks.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
7/10/2025
Building Cyber Security Resilience Against Phishing

URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
5/3/2024
Complying with Cyber Essentials and Cyber Essentials Plus

URM’s blog answers key technical questions about Cyber Essentials and Cyber Essentials Plus, what’s in scope, CE compliant use of BYOD, and more.

Read more
Moving from our existing Pen Testers after 10 years was a difficult decision but I am really glad we did. It's been a pleasure working with you. The Pen Testing was extremely thorough and as hoped you were open to a collaborative deeper delve, far beyond what we were required to do for PCI DSS, which has been very useful.
Payment Service Provider
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.