Cyber Essentials Certification Guide: What It Is, What It Costs, and How to Get It

Cyber Essentials Certification Guide: What It Is, What It Costs, and How to Get It
Cyber Essentials is a UK government-backed cybersecurity certification built around five basic technical controls that get tested against your actual infrastructure. It won't cover everything your business does (it's not trying to). What it actually targets are the controls that stop the most common internet-based attacks from getting through.
I've certified over 800 businesses through CE and CE Plus. So this guide is what the scheme involves in practice, what it costs, how long you're looking at, and where people trip up.
What Cyber Essentials tests
Five controls make up the entire scope of the assessment.
1. Firewalls
Every device connecting to the internet needs a firewall, whether that's routers, laptops, phones, or cloud services. The assessment looks at whether default firewall rules block inbound traffic unless you've gone in and explicitly allowed it. And it checks your administrative interfaces aren't sitting there exposed to the internet.
2. Secure configuration
Default settings on devices and software need changing. Get rid of default passwords, turn off services you're not using, and disable auto-run. The assessment checks you haven't just left everything in its out-of-the-box state.
3. Access control
User accounts need proper control, and everyone gets their own account. Admin privileges go only to people who genuinely need them, and only for admin tasks. MFA is required on all cloud services and any admin interface that faces the internet.
4. Malware protection
You need something in place against malware, whether that's traditional antivirus, application allowlisting, or sandboxing. Windows Defender counts (assuming it's configured properly and kept updated). The assessment checks it's active and current on every in-scope device.
5. Patch management
Software and firmware must be updated within 14 days of a patch being released, where the patch fixes a vulnerability rated high or critical. Unsupported software, meaning anything that's stopped receiving security updates, must be removed from scope or isolated behind a sub-scope boundary.
Two levels: Basic and Plus
CE Basic
Self-assessment questionnaire completed through the IASME portal. You answer questions about how your organisation handles the five controls, a qualified assessor reviews your answers, and if they're accurate and show compliance, you get certified.
The questionnaire runs through the IASME portal. It covers your network boundary, device inventory, cloud services, user accounts, patching processes, and malware protection. You declare the scope, which is the parts of your IT infrastructure you're including.
Cost: from GBP 320 + VAT for the IASME assessment fee Timeline: Most businesses complete the questionnaire in 2-5 days of preparation. Assessment review takes 1-5 working days.
CE Plus
Everything in Basic, plus verified technical testing. An assessor (that's my role) connects to your systems and runs tests against all five controls. We're checking whether what you declared on the questionnaire is actually true.
The Plus assessment includes five standard test cases:
- Patch verification - checking installed patch levels against known vulnerabilities
- Malware protection - testing that antivirus detects the EICAR test file
- Access control - verifying MFA is enforced and admin accounts are restricted
- External vulnerability scan - identifying internet-facing vulnerabilities rated CVSS 7.0 or above
- Configuration review - checking that devices match what was declared
If something fails, you get a 30-day remediation window to address it. Fix it, we re-test, and if it passes you're certified. Still failing after remediation means the assessment fails.
Cost: from GBP 1,200 to GBP 2,100 + VAT for most small to medium businesses Timeline: Testing takes 1-3 days depending on how many devices are in scope. You have a 3-month window from starting Basic to completing Plus.
Who needs it
Government suppliers: PPN 09/14 requires CE for contracts involving personal data or ICT services. This is based on contract type, not a monetary threshold.
NHS suppliers: NHS trusts and NHS Supply Chain typically require CE Plus for suppliers handling patient data.
Insurance requirements: Many cyber insurance providers ask for CE as a condition of cover or offer reduced premiums for certified businesses.
Supply chain requirements: Large organisations increasingly require CE from their suppliers as part of vendor due diligence.
Any UK business: Even without a contractual driver, the five controls represent a sensible baseline. They're the same controls that prevent the majority of commodity cyber attacks.
What it doesn't cover
CE tests five technical controls and nothing beyond them. It doesn't test:
- Governance - no security policy review, no risk assessment
- Detection - no monitoring, no alerting, no log review
- Incident response - no response plan, no recovery testing
- Staff training - no phishing awareness, no security culture assessment
- Physical security - no office access, no visitor management
- Backup and recovery - no backup verification, no disaster recovery
That's not me having a go at the scheme. CE is designed so any organisation can achieve it. And the five controls it does test work. A Lancaster University study tested 200 CVEs against CE controls and found 131 were fully mitigated and another 60 partially mitigated. But it's a baseline, not a complete security programme.
Common reasons businesses fail
After 800+ assessments, these are the failures I spot most often:
Unsupported software: Windows 10 reaches end of life in October 2025. Any device still running it after that date either needs upgrading or putting behind a sub-scope boundary.
Cloud MFA gaps: MFA is required on all cloud services and internet-facing admin portals. I regularly find businesses with MFA on Microsoft 365 but nothing on their accounting software, CRM, or backup platform. It's the gaps between the obvious ones that catch people.
Admin account misuse: People using admin accounts for daily work. CE requires admin accounts to be separate from standard accounts, used only for administrative tasks.
Patching delays: The 14-day window is strict. If a critical patch came out 15 days ago and you haven't installed it, that's a fail.
Scope declaration errors: Including things that shouldn't be there or excluding things that should. Most of the actual complexity in CE sits right here, in scoping.
How to prepare
- Define your scope - identify every device, cloud service, and user account that handles business data
- Run the self-assessment - answer the CE Basic questionnaire honestly. Where you can't answer "yes," those are your gaps
- Fix the gaps - patch everything, enforce MFA, remove admin rights from daily-use accounts, configure firewalls, update or remove unsupported software
- Document what you've done - the questionnaire asks for evidence. Have your device list, cloud service inventory, and patching records ready
- Book Plus testing - if you need Plus, schedule it within the 3-month window after starting Basic
Preparation is where all the real work happens. If the controls are genuinely in place when we turn up, the assessment itself is pretty straightforward. (consistent with the 2026 attestation evaluation criteria).
Certification validity
CE certificates last 12 months from the date of issue. Renewal means going through the full process again, fresh assessment and all. Your IT environment shifts over a year. New devices, new cloud services, people leaving, software updates. The annual reassessment catches what's drifted since the last certification.
Certificates are listed on the NCSC's public register. Anyone can verify yours is genuine and current by searching the IASME portal.
Getting started
If you want to check where your controls stand before committing, the readiness quiz covers CE's five controls in five minutes with no commitment and no sales call.
For the full assessment process, read how to prepare for CE Plus. For Danzell-specific changes affecting current assessments, read the Danzell update guide.
Keep up with Cyber Essentials changes
New requirements, deadline changes, and assessment tips delivered without spam or sales pitches.
Subscribe to the newsletter | Follow Daniel on LinkedIn
Related articles
- How to Prepare for Cyber Essentials Plus
- Danzell Changes 2026 Guide
- Failed Cyber Essentials? What to Do Next
- CE Plus vs Basic: What's the Difference?
Get cybersecurity insights delivered
Join our newsletter for practical security guidance, Cyber Essentials updates, and threat alerts. No spam, just actionable advice for UK businesses.
Related Guides
Cyber 365: Why Year-Round Vulnerability Scanning Is the New Cyber Essentials Baseline
The Danzell scheme platform that came in April 2026 made year-round vulnerability scanning and managed patching the new Cyber Essentials baseline, not the upgrade. What that operationally means, what it covers, and how the Cyber 365 programme delivers it.
Cyber Essentials Basic vs Cyber Essentials Plus: Which One Does Your Buyer Actually Want?
Cyber Essentials Basic is a self-assessment certificate. Cyber Essentials Plus adds an external assessor sampling the controls in your estate. Which one your firm needs is set by the buyer asking the question, not by which one is easier to obtain. The differences, the costs, the timelines, and how to read the procurement requirement correctly.
Cyber Essentials Plus vs PCI DSS Self-Assessment: Which Cyber Standard Does Your Card-Handling Firm Actually Need?
Cyber Essentials Plus is the UK government scheme for the IT estate. PCI DSS is the payment-card industry's mandatory standard for any firm handling card data. They cover different scopes and run alongside each other, not as alternatives. The differences, the overlap, and how UK retailers handle both.
Cyber Essentials vs Cyber Assessment Framework (CAF): Which UK Cyber Standard Does Your Sector Actually Need?
Cyber Essentials is the UK government scheme for general business. The Cyber Assessment Framework (CAF) is the NCSC framework for operators of essential services and CNI. Which one your firm needs is set by sector classification, not by which is harder. The differences, the overlap, and the procurement context.
Cyber Essentials vs NIST CSF: Which Cyber Framework Do UK Firms with US Exposure Actually Need?
Cyber Essentials is the UK government scheme. NIST CSF is the US federal cybersecurity framework. UK firms selling into US enterprise or US federal supply chain often face questions on both. The differences, the overlap, and how to read the requirement correctly.
Cyber Essentials Plus vs SOC 2: Which Cyber Standard Does Your Customer Base Actually Need?
Cyber Essentials Plus is the UK government scheme. SOC 2 is the global SaaS attestation standard. Both prove cyber controls. Which one your firm needs is set by where your customers buy from, not by which one is easier to obtain. The two standards side by side, the cost and timeline reality, and the cases where holding both is the right answer.
The Danzell Question Set Guide: What Changed in the April 2026 Cyber Essentials Update
The Danzell assessment platform replaced Marlin in April 2026, bringing year-round scanning and patching into explicit scope. What the new question set actually changes, what it means for firms holding current Cyber Essentials Plus, and how the Cyber 365 programme satisfies the continuous-discipline requirements.
IASME Cyber Assurance vs Cyber Essentials Plus: Which IASME Tier Does Your Procurement Actually Want?
IASME Cyber Assurance is IASME's audit-based cybersecurity standard. Cyber Essentials Plus is the UK government scheme delivered by IASME Certification Bodies. Both come from IASME. They prove different things. The differences, the procurement context, and the 2026 framework changes.
PPN 09/14 Compliance Guide: How UK Suppliers Meet the Cabinet Office Cyber Essentials Floor
Procurement Policy Note 09/14 set Cyber Essentials as the procurement floor for UK central government suppliers handling personal data or providing certain ICT services. What PPN 09/14 actually requires, where CE Plus fits in the framework, and how UK suppliers satisfy the cyber section of central government bid questionnaires.
Willow to Danzell Migration Guide: What UK Firms Need to Do Between Cyber Essentials Platform Versions
The Willow scheme version led into the Danzell platform from April 2026. What changed between Willow and Danzell, what the migration means for firms holding current Cyber Essentials, and how the Cyber 365 programme bridges the year-round-discipline expectation Danzell now makes explicit.
Ready to get certified?
Book your Cyber Essentials certification or check your readiness with a free quiz.