Cyber Essentials Plus Secure Configuration Requirement

Lets take a look at the secure config technical control required to pass Cyber Essentials Plus

Written by: David Henderson on Jan 02, 2023

Cyber Essentials Plus helps businesses safeguard themselves from the most common types of cyber threats. From Ransomware to Malware, it helps you to protect your data from malicious actors seeking to exploit weaknesses in your cyber security.

Included in the Cyber Essentials 5 key technical controls is the incredibly important element of Secure Configuration. In this article, we look at the importance of secure configuration and what is required to pass Cyber Essentials Plus.

What Is Secure Configuration?

Secure configuration simply put is a term that refers to the practice of configuring computers, devices, software applications and much more in a way that minimises vulnerabilities and reduces the risk during a security breach.

For example, it is common for certain computers and network devices to come with out-of-the-box standard configurations that are publicly known weaknesses such as default passwords, unnecessary pre-enabled user accounts and pre-installed software or services.

Having such devices with default settings such as this is an easy way to grant potential bad actors access to your organisation's sensitive data.

Cyber Essentials Plus Requirement for Secure Configuration

Cyber Essentials requirements dictate that you must have properly implemented secure configuration for devices in your organisation. The scope of this requirement spans email, web and application servers, desktop computers, laptop computers, tablets, mobile phones, firewalls and routers.

Correctly configuring computers and network devices will help you to reduce the level of inherent vulnerabilities and provide only the services required to fulfil their role. Hence the importance placed on doing this under the Cyber Essentials certification.

Furthermore, the Cyber Essentials Plus secure configuration requirement will require you to follow these best practices:

  • Remove and disable unnecessary user accounts (such as guest accounts and administrative accounts that won’t be used)
  • Change any default or guessable account passwords to something non-obvious
  • Remove or disable unnecessary software (including applications, system utilities and network services)
  • Disable any auto-run feature which allows file execution without user authorisation (such as when they are downloaded from the Internet)
  • Authenticate users before allowing Internet-based access to commercially or personally sensitive data, or data which is critical to the running of the organisation

Need help?

Email Us
email hidden; JavaScript is required

Or send us a quick message

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.