![](https://assets.isu.pub/document-structure/230526095800-a44a2ab4dfa7010e9f5aa0aad6e3b593/v1/206a99374e22a390e9ed3a3c44d4d75e.jpeg?width=720&quality=85%2C50)
1 minute read
Cyber Essentials Process
Stage 1
The applicant company identifies the systems it believes are at risk from common Internet-based threats. This forms the scope of the Cyber Essentials certification.
Advertisement
![](https://assets.isu.pub/document-structure/230526095800-a44a2ab4dfa7010e9f5aa0aad6e3b593/v1/30cd4a8b029b15f273307b3c9c8dc610.jpeg?width=720&quality=85%2C50)
Stage 2
Using the available reference documentation and readiness tools, the applicant company can confirm that their scope is accurate and they are meeting the required controls.
Stage 3
Apply for Cyber Essentials self-assessment, and complete the online assessment questionnaire. The assessment is reviewed by a qualified assessor, feedback given if necessary, and certification is issued if all responses are compliant.
Stage 4
Cyber Essentials certification becomes an integral part of the business, and forms a strong foundation on which to mature Cyber Security within the organisation.
![](https://assets.isu.pub/document-structure/230526095800-a44a2ab4dfa7010e9f5aa0aad6e3b593/v1/6867a9426663b509f45a73c96a5f62c7.jpeg?width=720&quality=85%2C50)