Page Properties |
---|
hidden | true |
---|
id | KH_PropertyPage |
---|
|
Area | Five ControlsSecure Configuration |
---|
Page Type | Content |
---|
Page Name | Secure Configuration : FAQ |
---|
Last Updated | 2904/0411/24 |
---|
Update Notes | |
---|
Reviewed | 2904/0411/24 |
---|
Reviewer | JC |
---|
Next Review | 04/11/25 |
---|
|
The below will appear on the Refined page at Secure Configuration - FAQ
Excerpt |
---|
|
QUESTION | ANSWER |
---|
Why do I need to remove unused software or apps from my devices? | Unused software is less likely to be kept updated and may contain vulnerabilities that make your system less secure. | What is a brute force attack? | A brute force attack can discover a password by trying every combination of characters until the correct one is found. | What is throttling? | Throttling is a way of protecting against brute force attacks by increasing the time between each attempt at entering a password, slowing down the rate at which combinations can be tried. For Cyber Essentials, no more than 10 guesses in 5 minutes are allowed. | What does device locking apply to? | Device locking applies when someone has physical access to a device which is used to access your organisation’s data or services and means that you must enter a password, PIN or biometric data to use the device. | What is a default account and why does it matter? | A default account will often have an easily-discoverable default password (or empty password) meaning that anybody could use it to access a device. | What is the minimum length of a PIN number or password for Cyber Essentials? | When unlocking a device, 6 characters. Where common passwords are blocked automatically, or MFA is in use, 8 characters. In all other cases, 12 characters. | Who counts as a user? | If they are accessing organisational data and services using an account, they will count as a user. This would include employees, students, customers and anyone else accessing your systems. | What should be done in the case of a developer who may need admin permissions to carry out their work? | It’s been established that admin is not always a necessity for developers. There are some situations where admin is required but this is not universally the case. It’s a good idea for organisations to have a separate, segregated network or networks for development, not only because this mitigates the problem of admin rights for developers, but also because test versions of software may themselves contain vulnerabilities that could be exploited. | How is secure configuration managed when assets are supplied and managed by a third party? | In this case the controls would need to be applied by the third party because they would have the access to carry out the administration of the devices. This is a fairly common scenario - but you would still be responsible for making sure that the controls have been applied to the devices. In IaaS, PaaS or SaaS scenarios, both your organisation and the cloud provider are responsible for implementing the controls. | Does the requirement to disable or remove unused software also apply to contractors – if so how do we ensure this? Is it enough to ask them to do it? | There are many different ways you can ensure this, ranging from technical implementation to a written policy. For contractors a good suggestion might be to add it in as part of the SLA or contract. If you move onto a CE Plus a sample of these devices would be tested by an assessor. You could always follow this same approach and look at a sample as part of your management checks. | Is having a Mobile Device Management tool such as MS InTune a requirement for Cyber Essentials Plus certification? | There is no requirement for using MDM in Cyber Essentials. We do not dictate how you implement the controls, this can be done through a combination of technical implementation, policy or procedure - although it is expected that a technical solution would be used. |
|