Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties
hiddentrue

Document number:

DOC-XXX-XXXXX

Document type:

Guidance

Responsibility for implementation & training:

Cyber Essentials Manager

CB contract doc/ schedule:

No

Scope:

Cyber Essentials

Reason for change:

Initial version

Approved by:

Approved date:

Next review:

Review and consultation process:

Reviewed Monthly by Cyber Essentials Manager

Associated documentation:

Distribution:

Controlled in Confluence Quality Management System.

Refined Knowledge Hub

https://iasme.atlassian.net/wiki/spaces/CEKH/pages/2576842897/Secure + Configuration + - +FAQ#FAQ

Page Properties
idNavigation_Page
LastReview

Subject

SecureConfiguration

Type

FAQ

Last Update

24/01/24

Reviewed

24/01/24

Reviewer

NF/JC

The below will appear on the Refined page athttps://iasme.atlassian.net/wiki/spaces/CEKH/pages/2576842897/Secure + Configuration + - +FAQ#FAQ

Excerpt
nameM_FAQ_SecureConfig

QUESTION

ANSWER

Why do I need to remove unused software or apps from my devices?

Unused software is less likely to be kept updated and may contain vulnerabilities that make your system less secure.

What is a brute force attack?

A brute force attack can discover a password by trying every combination of characters until the correct one is found.

What is throttling?

Throttling is a way of protecting against brute force attacks by increasing the time between each attempt at entering a password, slowing down the rate at which combinations can be tried. For Cyber Essentials, no more than 10 guesses in 5 minutes are allowed.

What does device locking apply to?

Device locking applies when someone has physical access to a device which is used to access your organisation’s data or services and means that you must enter a password, PIN or biometric data to use the device.

What is a default account and why does it matter?

A default account will often have an easily-discoverable default password (or empty password) meaning that anybody could use it to access a device.

What is the minimum length of a PIN number or password for Cyber Essentials?

When unlocking a device, 6 characters. Where common passwords are blocked automatically, or MFA is in use, 8 characters. In all other cases, 12 characters.

Who counts as a user?

If they are accessing organisational data and services using an account, they will count as a user. This would include employees, students, customers and anyone else accessing your systems.

How is secure configuration managed when assets are supplied and managed by a third party?

In this case the controls would need to be applied by the third party because they would have the access to carry out the administration of the devices. This is a fairly common scenario - but you would still be responsible for making sure that the controls have been applied to the devices.  In IaaS, PaaS or SaaS scenarios, both your organisation and the cloud provider are responsible for implementing the controls.

Does the requirement to disable or remove unused software also apply to contractors – if so how do we ensure this? Is it enough to ask them to do it?

There are many different ways you can ensure this, ranging from technical implementation to a written policy. For contractors a good suggestion might be to add it in as part of the SLA or contract. If you move onto a CE Plus a sample of these devices would be tested by an assessor. You could always follow this same approach and look at a sample as part of your management checks.

Is having a Mobile Device Management tool such as MS InTune a requirement for Cyber Essentials Plus certification?

There is no requirement for using MDM in Cyber Essentials.
We do not dictate how you implement the controls, this can be done through a combination of technical implementation, policy or procedure - although it is expected that a technical solution would be used.