The following will appear on the Refined page at
Excerpt | ||
---|---|---|
| ||
Assessment and certification should cover the whole of the IT infrastructure used to perform the business of the applicant, or if necessary, a well-defined and separately managed sub-set. A sub-set is defined as a part of the organisation whose network is segregated from the rest of the organisation by a firewall or VLAN. This means that we would expect if an applicant chooses not to scope their whole organisation as part of an assessment, we would expect to see a scope description in A2.2 that declares what is being excluded which is described as sub-sets (or Networks). The eaisest way to apply scoping is to think that everything is in scope, unless it is specifically excluded in a sub-set.
Scenario 1 - Excluding networks The applicant wishes to only scope part of their organisation. This could be because some devices can not meet the requirements, or just because they only want to scope a small part of their organisation (For example a global company).
|
...
Excerpt | ||
---|---|---|
| ||
Scenario 3 - Cloud Services Introduction A common question that we have is an assessor or applicant asking If we de-scope devices by moving them to the a sub-set, does interacting with a cloud service not bring them back into scope again? The Requirements state: In addition to mobile or remote devices owned by the organisation, user-owned devices which access organisational data or services (as defined above) are in scope. This is true, but does not bring de-scoped devices back into scope again (In the same way that in scenario 1 the laptop on the dev network accessing the production server, does not bring that into scope again). De-scoping the infrastructure is carried through the use of sub-sets, interacting with a cloud service would not change this as they sit the other side of the firewall and are not in the boundary of the sub-set. As mentioned above - everything is in scope, unless it is specifically excluded using in a sub-set. Cloud services can not be de-scoped from Cyber Essentials but there are as always a couple of exceptions or edge cases that may need to be applied.
|
...
Excerpt | ||
---|---|---|
| ||
Scenario 4 - Student BYOD Exception Student BYOD is the one exception that is currently in place for Cyber Essentials and is in place to allow a pragmatic approach to the scheme that came into place to help Universities and Higher Education establishments achieve Cyber Essentials, due to the high volume of student BYOD that was in use and outside of their control. It was decided that students would be treated like customers.
All of the bullet points above are pretty much the same rules that apply to scenario one. The exception given for student BYOD is that when they are de-scoped, whole organisation can still be achieved. |