Theme-Logo
  • 5
    • Notifications
    • Generic placeholder image
      John Doe

      Lorem ipsum dolor sit amet, consectetuer elit.

      30 minutes ago
    • Generic placeholder image
      Joseph William

      Lorem ipsum dolor sit amet, consectetuer elit.

      30 minutes ago
    • Generic placeholder image
      Sara Soudein

      Lorem ipsum dolor sit amet, consectetuer elit.

      30 minutes ago
  • 3
  • User-Profile-Image
    • Logout
Generic placeholder image
Josephin Doe
Generic placeholder image
Lary Doe
Generic placeholder image
Alice
Generic placeholder image
Alia10 min ago
Generic placeholder image
Suzen15 min ago
Josephin Doe
Generic placeholder image

I'm just looking around. Will you tell me something about yourself?

8:20 a.m.

Ohh! very nice

8:22 a.m.

Generic placeholder image

can you come with me?

8:20 a.m.

  • Templates
    • Live Policies
    • Template Policies
    • Template Processes
    • Live Processes
  • Registers
    • Breach register
    • Record of Processing
    • Risk Register
    • Retention Schedule
    • Countries
  • Supplier Management
    • Supplier Register
    • Supplier Templates
    • Written Agreements
  • Data Subject Rights
    • DSARS
    • Rectification
    • Erasure / Deletion
    • Restriction of processing
    • Portability
    • Objections
    • Consent Management
  • Tasks
    • My Tasks
    • All Tasks
  • Tools
    • Gap Analysis
    • Checklists
  • Library
    • Training
    • Assessments
    • Letters
    • NDA
    • Notices
    • Posters
    • Reference
    • Document Repository
  • Support
    • Help
    • Regulations
    • Contact Support
Cyber Essentials
The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
No. of Questions:29
Boundary Firewalls and Internet Gateways






Information, applications and computers within the organisation’s internal networks should be protected against unauthorised access and disclosure from the internet, using boundary firewalls, internet gateways or equivalent network devices.


Boundary Firewalls and Internet Gateways







Boundary Firewalls and Internet Gateways





Boundary Firewalls and Internet Gateways





Boundary Firewalls and Internet Gateways



Boundary Firewalls and Internet Gateways





Boundary Firewalls and Internet Gateways





Secure Configuration


Secure Configuration





Secure Configuration





Secure Configuration





Secure Configuration



Secure Configuration


Secure Configuration


Secure Configuration


Access Control


Access Control


Access Control


Access Control


Access Control


Access Control


Access Control


Malware Protection





Malware Protection


Malware Protection


Malware Protection


Malware Protection


Malware Protection





Malware Protection


Checklist Overview

Completed 5 From 29 Questions

Have you installed Firewalls or similar devices at the boundaries of the networks in the Scope?
Have the default usernames/passwords on all boundary firewalls (or similar devices) been changed to a strong password
Have all open ports and services on each firewall (or similar device) been subject to justification and approval by an appropriately qualified and authorised business representative, and has this approval been properly documented?
Have all commonly attacked and vulnerable services (such as Server Message Block (SMB) NetBIOSm tftp, RPC, rlogin, rsh, rexec) been disabled or blocked by default at the boundary firewalls?
Confirm that there is a corporate policy requiring all firewall rules that are no longer required to be removed or disabled in a timely manner, and that this policy has been adhered to (meaning that there are currently no open ports or services that are not essential for the business)?
Confirm that any remote administrative interface has been disabled on all firewall (or similar) devices?
Confirm that where there is no requirement for a system to have Internet access, a Default Deny policy is in effect and that it has been applied correctly, preventing the system from making connections to the Internet
Have all unnecessary or default user accounts been deleted or disabled
Confirm that all accounts have passwords, and that any default passwords have been changed to strong passwords?
Has all unnecessary software, including OS utilities, services and applications, been removed or disabled
Has the Auto Run (or similar service) been disabled for all media types and network file shares?
Has a host based firewall been installed on all desktop PCs or laptops, and is this configured to block unapproved connections by default?
Is a standard build image used to configure new workstations, does this image include the policies and controls and software required to protect the workstation, and is the image kept up to date with corporate policies?
Do you have a backup policy in place, and are backups regularly taken to protect against threats such as ransomware?
Are security and event logs maintained on servers, workstations and laptops?
Are user account requests subject to proper justification, provisioning and an approvals process, and assigned to named individuals?
Are users required to authenticate with a unique username and strong password before being granted access to computers and applications?
Are accounts removed or disabled when no longer required?
Are elevated or special access privileges, such as system administrator accounts, restricted to a limited number of authorised individuals?
Are special access privileges documented and reviewed regularly (e.g. quarterly)?
Are all administrative accounts only permitted to perform administrator activity, with no Internet or external email permissions?
Does your password policy enforce changing administrator passwords at least every 60 days to a complex password?
Please confirm that malware protection software has been installed on at least all computers with an ability to connect outside of the network in Scope
Does corporate policy require all malware protection software to have all engine updates applied, and is this applied rigorously?
Have all malware signature files been kept up to date (through automatic updates or through centrally managed deployment)?
Has malware been configured for on-access scanning, and does this include downloading or opening files, opening folders on removable or remote storage, and web page scanning?
Has malware protection software been configured to run regular (at least daily) scans?
Are users prevented from running executable code or programs form any media to which they also have write access?
Are users prevented from accessing known malicious web sites by your malware protection software through a blacklisting function?