Example: bankruptcy

Cyber Essentials: Requirements for IT infrastructure

Cyber Essentials: Requirements for IT infrastructure January 2022 Crown Copyright 2022 Cyber Essentials: Requirements for IT infrastructure Contents What s new .. 3 Definitions .. 3 Scope .. 4 Overview of the scope .. 4 Bring your own device (BYOD) .. 5 Home working .. 5 Wireless devices .. 6 Externally managed services cloud .. 6 Externally managed services other .. 7 Web applications .. 7 Requirements , by technical control theme .. 7 Firewalls .. 7 Objective .. 7 Introduction .. 7 Requirements under this technical control theme.

Cyber Essentials: Requirements for IT infrastructure v3.0 4 • A corporate VPN is a Virtual Private Network solution that connects back to the applicants office location or to a virtual/cloud firewall. This must be administered by the applicant

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Cyber Essentials: Requirements for IT infrastructure

1 Cyber Essentials: Requirements for IT infrastructure January 2022 Crown Copyright 2022 Cyber Essentials: Requirements for IT infrastructure Contents What s new .. 3 Definitions .. 3 Scope .. 4 Overview of the scope .. 4 Bring your own device (BYOD) .. 5 Home working .. 5 Wireless devices .. 6 Externally managed services cloud .. 6 Externally managed services other .. 7 Web applications .. 7 Requirements , by technical control theme .. 7 Firewalls .. 7 Objective .. 7 Introduction .. 7 Requirements under this technical control theme.

2 7 Secure configuration .. 8 Objective .. 8 Introduction .. 8 Requirements under this technical control theme .. 8 User access control .. 9 Objective .. 9 Introduction .. 9 Requirements under this technical control theme .. 10 Malware protection .. 11 Objective .. 11 Introduction .. 11 Requirements under this technical control theme .. 12 Security Update management .. 13 Objective .. 13 Introduction .. 13 Requirements under this technical control theme .. 13 Further Guidance .. 14 Back up your data.

3 14 Cyber Essentials: Requirements for IT infrastructure 3 We specify the Requirements under five technical control themes: firewalls secure configuration user access control malware protection security update managementAs a Cyber Essentials scheme Applicant, you must ensure that your organisation meets all the Requirements . You may also be required to supply various forms of evidence before your chosen Certification Body can award certification at the level you seek. Proceed as follows: the boundary of scope for your organisation, and determine what is in scopewithin this each of the five technical control themes and the controls they embody steps as necessary to ensure that your organisation meets every requirement,throughout the scope you have s new Added a Home Working requirement and information on how this is to be included in thescope of certifications.

4 All Cloud services are now in scope, added definitions and a shared responsibility table toassist with this. Extended the Multi-factor authentication requirement in relation to Cloud services. Updated the Password-based authentication requirement and added a new section onmulti-factor authentication. This requirement has also been moved to the User accesscontrol. Thin clients are now in scope and added to the Devices definition. Added a new Device Unlocking requirement to the Secure Configuration control.

5 Added a new statement clarifying the inclusion of end-user devices in the scope ofcertifications. Further information on un-supported applications added to the Security Updatemanagement control. Removed specific email, web, and application servers from control definitions andreplaced with servers . Updated the BYOD section. Updated the Wireless devices section. Added a new Servers definition. Added a new Sub-set definition and information on its impact on the scope. Added a new Licensed and supported Software includes operating systems, commercial off-the-shelf applications, plugins,interpreters, scripts, libraries, network software and firmware.

6 Devices includes all types of hosts, networking equipment, servers, networks, and end userdevices such as desktop computers, laptop computers, thin clients, tablets and mobilephones (smartphones) whether physical or virtual. Applicant means the organisation seeking certification, or sometimes the individual actingas the main point of contact, depending on Essentials: Requirements for IT infrastructure 4 A corporate VPN is a Virtual Private Network solution that connects back to the applicantsoffice location or to a virtual/cloud firewall.

7 This must be administered by the applicantorganisation so that the firewall controls can be applied. Organisational data includes any electronic data belonging to the applicant organisation. Forexample emails, office documents, database data, financial data. Organisational service includes any software applications, Cloud applications, Cloudservices, User Interactive desktops and Mobile Device management solutions owned orsubscribed to by the applicant organisation. For example: Web applications, Microsoft Office365, Google Workspace, Mobile Device Management Containers, Citrix Desktop, VirtualDesktop solutions, IP Telephony.

8 A sub-set is defined as a part of the organisation whose network is segregated from the restof the organisation by a firewall or VLAN. Servers are specific devices that provide organisational data or services to other devices aspart of the business of the applicant. Licensed and Supported Software is software that you have a legal right to use and that avendor has committed to support by providing regular updates or patches. The vendor mustprovide the future date when they will stop providing updates.

9 The vendor does not have tobe the original creator of the software, but they must have the ability to modify the originalsoftware to create Overview of the scope Assessment and certification should cover the whole of the IT infrastructure used to perform the business of the Applicant, or if necessary, a well-defined and separately managed sub-set. Either way, the boundary of the scope must be clearly defined in terms of the business unit managing it, the network boundary and physical location. The scope must be agreed between the Applicant and the Certification Body before assessment begins.

10 A sub-set can be used to define what is in scope or what is out of scope for Cyber Essentials. The Requirements apply to all the devices and software that are within the boundary of the scope and that meet the any of these conditions: can accept incoming network connections from untrusted Internet-connected hosts; or can establish user-initiated outbound connections to devices via the Internet; or control the flow of data between any of the above devices and the scope that does not include end-user devices is not acceptable.


Related search queries