Page Properties | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||
|
The following will appear on the Refined page at
Excerpt | ||||
---|---|---|---|---|
| TEST||||
Assessment and certification should cover the whole of the IT infrastructure used to perform the business of the applicant, or if necessary, a well-defined and separately managed sub-set. A sub-set is defined as a part of the organisation whose network is segregated from the rest of the organisation by a firewall or VLAN. This means that we would expect if an applicant chooses not to scope their whole organisation as part of an assessment, we would expect to see a scope description in A2.2 that declares what is being excluded which is described as sub-sets (or Networks). The eaisest way to apply scoping is to think that everything is in scope, unless it is specifically excluded in a sub-set.
Scenario 1 - Excluding networks The applicant wishes to only scope part of their organisation. This could be because some devices can not meet the requirements, or just because they only want to scope a small part of their organisation (For example a global company).
|
...
Excerpt | ||
---|---|---|
| ||
Scenario 4 - Student BYOD Exception Student BYOD is the one exception that is currently in place for Cyber Essentials and is in place to allow a pragmatic approach to the scheme that came into place to help Universities and Higher Education establishments achieve Cyber Essentials, due to the high volume of student BYOD that was in use and outside of their control. It was decided that students would be treated like customers.
All of the bullet points above are pretty much the same rules that apply to scenario one. The exception given for student BYOD is that when they are de-scoped, whole organisation can still be achieved. |