How Long Does a Cyber Essentials Plus Assessment Take?

How Long Does a Cyber Essentials Plus Assessment Take?
One to three days for the actual testing. That is the answer most people want to hear. But honestly, most people underestimate everything around those days, which is where timelines go wrong. There are fixed windows either side that nobody can compress, and forgetting them turns a two-week job into a two-month headache.
The sequence you can't skip
CE Plus follows a fixed chain, and here is the order it goes in.
Basic CE first. You need a current basic CE certificate before Plus becomes an option. We can get basic CE turned around in 48 hours, but preparation depends on where your controls sit. Some businesses already have everything sorted (proper firewall, patching done, MFA on) and just need the paperwork. Others need three weeks of fixes before the assessment can even start.
90-day window. Once you've got basic CE, Plus must be completed within 90 calendar days of your VSA date. Miss the window and your basic cert is still valid, but you'd need to recertify basic CE before trying Plus again. I've watched companies miss this by a week because somebody was on holiday. Extensions are only granted in exceptional circumstances through IASME's formal support process.
Pre-assessment coordination. Scope gets confirmed, device builds counted, sample size calculated, testing booked. Usually a few days of back and forth. Sometimes a week if the organisation takes ages getting their device list together (and they often do).
Testing. One to three days of active testing, which is the bit everyone asks about.
Remediation if needed. If the assessor finds problems, you get up to 30 calendar days to fix them (not business days). But that 30 days sits inside the 90-day overall window. If you used 70 days before the first test, your remediation window is effectively 20 days, not 30. Under the Danzell double sampling rule, if your first sample fails, the assessor tests a second random sample of different devices within the same remediation window. Let the clock run out and the whole assessment fails.
Certification. Assessor is satisfied, certificate gets issued.
What drives the testing duration
How many builds you run
CE Plus does not test every device. The IASME sampling methodology groups devices by OS build and pulls a representative sample from each group. Thirty Windows 11 workstations on the same build might yield three to five in the sample. But a company with 200 devices spread across eight configurations (Windows 11 Home, Windows 11 Pro, macOS Sonoma, couple of server editions, a Linux box somewhere) ends up with a much larger sample because every build needs its own set tested.
So more builds means more testing, and the maths is straightforward.
Servers
Every server gets tested individually, without exception. All of them, regardless of sampling rules for workstations. Fifteen servers means fifteen servers in scope. And they take longer per device than a workstation because configurations are more involved. And frankly there is more that can go wrong on a server than on a laptop someone uses for email.
Estate complexity
Single office, one internet connection, one firewall is quick to assess. Multi-site with VPNs, cloud infrastructure, multiple internet breakout points, maybe a colocation somewhere is not quick at all. And the assessor runs external vulnerability scans against every internet-facing IP, so when there are a lot of those, each one adds time. A company with 23 public IPs is not unusual, and that external scan alone takes most of a morning.
Remote or on-site
Most assessments run remotely now, which is quicker to set up because nobody is travelling. Can run slower if the remote access link has latency problems (and I've seen some truly painful ones), but generally it balances out. Some organisations prefer on-site because their setup doesn't lend itself to remote access. Read about how remote testing works if you want the detail.
Rough guide by organisation size
Under 50 devices, one or two builds. Single day. External vulnerability scan runs overnight or while the assessor is setting up. Internal scanning, malware checks, MFA verification, account separation, it all fits comfortably. But this is the size where people assume it takes an hour.
50 to 250 devices, three to five builds. Day and a half to two days. Bigger sample, more builds to verify, likely more servers. External scan may cover more IPs. This is the bracket where people get surprised because they picture "a quick audit" and it is not.
250 plus devices, six or more builds. Two to three days. Multi-site, lots of servers, complex infrastructure. Assessor may need extra time on the external scan if you've got many internet-facing services. That's too long in my view, but there is no way to compress it without cutting corners.
Those are testing durations only, not the full timeline. Pre-assessment coordination, remediation, and certification processing sit on top. Not many people factor that into their planning.
What the assessor actually tests
Five test cases in CE Plus:
-
External vulnerability scan: Unauthenticated scan of all internet-facing IPs. Open ports, vulnerable services, missing patches visible from outside.
-
Internal authenticated scan: Assessor logs into sampled devices, checks patch levels, configuration, and security settings from inside the device.
-
Malware protection: Antivirus or antimalware installed, running, configured. Tested with an EICAR test file to confirm real-time protection actually catches something. You'd be surprised how often it doesn't, usually because an exclusion policy is too broad.
-
MFA verification: Assessor checks every cloud service, attempts login, confirms the MFA prompt appears. Not just "MFA is enabled in the admin panel" but actually triggered during authentication. I've had organisations where MFA was turned on in the settings yet the login sailed straight through. So I dug into conditional access and found an exemption nobody remembered creating.
-
Account separation: Admin accounts separate from daily-use accounts. Users should not have unnecessary elevated privileges. The number of organisations where the director's daily account has Domain Admin is higher than it should be, and yours might be one of them.
Making it faster
Get your device list ready before pre-assessment. Full inventory, grouped by OS and build version. A third of the organisations I assess don't have this when I ask. That delay adds days before testing starts.
Fix what you already know about. Firewall firmware a version behind? Workstation still on Windows 10 21H2? Sort it before the assessor gets involved. Problems found during testing trigger the 30-day remediation window, turning a clean pass into a six-week process. (following the updated segmentation assessment protocol).
Test your remote access. If the assessment is remote, check the connection beforehand. A broken VPN on testing day wastes a full morning. I've lost count of how often this happens.
Make sure someone is available. The assessor needs credentials, access to devices, and someone who can answer questions. If your IT person is on annual leave during testing week, the whole thing stalls. Can you afford that?
Preparing for CE Plus and want to know where the basic controls stand first? The readiness quiz takes five minutes with no commitment required.
Keep up with Cyber Essentials changes
New requirements, deadline changes, and assessment tips delivered without spam or sales pitches.
Subscribe to the newsletter | Follow Daniel on LinkedIn
Related articles
- Cyber Essentials Plus Assessment Process Explained
- Cyber Essentials Plus Sample Sizes
- Cyber Essentials Plus Remote Testing
- How to Prepare for Cyber Essentials Plus
Get cybersecurity insights delivered
Join our newsletter for practical security guidance, Cyber Essentials updates, and threat alerts. No spam, just actionable advice for UK businesses.
Related Guides
Cyber 365: Why Year-Round Vulnerability Scanning Is the New Cyber Essentials Baseline
The Danzell scheme platform that came in April 2026 made year-round vulnerability scanning and managed patching the new Cyber Essentials baseline, not the upgrade. What that operationally means, what it covers, and how the Cyber 365 programme delivers it.
Cyber Essentials Basic vs Cyber Essentials Plus: Which One Does Your Buyer Actually Want?
Cyber Essentials Basic is a self-assessment certificate. Cyber Essentials Plus adds an external assessor sampling the controls in your estate. Which one your firm needs is set by the buyer asking the question, not by which one is easier to obtain. The differences, the costs, the timelines, and how to read the procurement requirement correctly.
Cyber Essentials Plus vs PCI DSS Self-Assessment: Which Cyber Standard Does Your Card-Handling Firm Actually Need?
Cyber Essentials Plus is the UK government scheme for the IT estate. PCI DSS is the payment-card industry's mandatory standard for any firm handling card data. They cover different scopes and run alongside each other, not as alternatives. The differences, the overlap, and how UK retailers handle both.
Cyber Essentials vs Cyber Assessment Framework (CAF): Which UK Cyber Standard Does Your Sector Actually Need?
Cyber Essentials is the UK government scheme for general business. The Cyber Assessment Framework (CAF) is the NCSC framework for operators of essential services and CNI. Which one your firm needs is set by sector classification, not by which is harder. The differences, the overlap, and the procurement context.
Cyber Essentials vs NIST CSF: Which Cyber Framework Do UK Firms with US Exposure Actually Need?
Cyber Essentials is the UK government scheme. NIST CSF is the US federal cybersecurity framework. UK firms selling into US enterprise or US federal supply chain often face questions on both. The differences, the overlap, and how to read the requirement correctly.
Cyber Essentials Plus vs SOC 2: Which Cyber Standard Does Your Customer Base Actually Need?
Cyber Essentials Plus is the UK government scheme. SOC 2 is the global SaaS attestation standard. Both prove cyber controls. Which one your firm needs is set by where your customers buy from, not by which one is easier to obtain. The two standards side by side, the cost and timeline reality, and the cases where holding both is the right answer.
The Danzell Question Set Guide: What Changed in the April 2026 Cyber Essentials Update
The Danzell assessment platform replaced Marlin in April 2026, bringing year-round scanning and patching into explicit scope. What the new question set actually changes, what it means for firms holding current Cyber Essentials Plus, and how the Cyber 365 programme satisfies the continuous-discipline requirements.
IASME Cyber Assurance vs Cyber Essentials Plus: Which IASME Tier Does Your Procurement Actually Want?
IASME Cyber Assurance is IASME's audit-based cybersecurity standard. Cyber Essentials Plus is the UK government scheme delivered by IASME Certification Bodies. Both come from IASME. They prove different things. The differences, the procurement context, and the 2026 framework changes.
PPN 09/14 Compliance Guide: How UK Suppliers Meet the Cabinet Office Cyber Essentials Floor
Procurement Policy Note 09/14 set Cyber Essentials as the procurement floor for UK central government suppliers handling personal data or providing certain ICT services. What PPN 09/14 actually requires, where CE Plus fits in the framework, and how UK suppliers satisfy the cyber section of central government bid questionnaires.
Willow to Danzell Migration Guide: What UK Firms Need to Do Between Cyber Essentials Platform Versions
The Willow scheme version led into the Danzell platform from April 2026. What changed between Willow and Danzell, what the migration means for firms holding current Cyber Essentials, and how the Cyber 365 programme bridges the year-round-discipline expectation Danzell now makes explicit.
Ready to get certified?
Book your Cyber Essentials certification or check your readiness with a free quiz.