The below will appear on the Refined page at https://iasme.atlassian.net/wiki/spaces/CEKH/pages/2576842897/Secure+Configuration+-+FAQ#
QUESTION | ANSWER |
---|---|
What is the difference between a user and an admin account? | A user account is a standard account with limited control over a device or system. An admin (administrator) account is an account which has a high level of access and control (for example it can create, modify or delete accounts, change system settings, and install software). |
Why do I need to remove unused software or apps from my devices? | Apart from taking up space and resources on your device to no purpose, unused software is also less likely to be kept updated and may contain vulnerabilities that make your system less secure. |
What is a brute force attack? | A brute force attack can discover a password by trying every combination of characters until the correct one is found. |
What is throttling? | Throttling is a way of protecting against brute force attacks by increasing the time between each attempt at entering a password, slowing down the rate at which combinations can be tried. For Cyber Essentials, no more than 10 guesses in 5 minutes are allowed. |
What does device locking apply to? | Device locking applies when someone has physical access to a device which is used to access your organisation’s data or services and means that you must enter a password, PIN or biometric data to use the device. |
What is a default account and why does it matter? | A default account will often have an easily-discoverable default password (or empty password) meaning that anybody could use it to access a device. |
What is the minimum length of a PIN number or password for Cyber Essentials? | When unlocking a device, 6 characters. Where common passwords are blocked automatically, or MFA is in use, 8 characters. In all other cases, 12 characters. |
Does a customer count as a user? | If they are accessing organisational data and services, they will count as a user. |
How is secure configuration managed when assets are supplied and managed by a third party? | In this case the controls would need to be applied by the third party because they would have the access to carry out the administration of the devices. This is a fairly common scenario - but you would still be responsible for making sure that the controls have been applied to the devices. |
Does the requirement to disable or remove unused software also apply to contractors – how do we police that? Is it enough to ask them to do it? | There are many different ways you can ensure this, ranging from technical implementation to a written policy. For contractors a good suggestion might be to add it in as part of the SLA or contract. If you move onto a CE Plus a sample of these devices would be tested by an assessor. You could always follow this same approach and look at a sample as part of your management checks. |
Is having an MDM tool such as MS Intune a requirement for Cyber Essentials Plus certification? | There is no requirement for using MDM in Cyber Essentials. |