1 minute read

Cyber Essentials Process

Next Article
CYBER ESSENTIALS

CYBER ESSENTIALS

Stage 1

The applicant company identifies the systems it believes are at risk from common Internet-based threats. This forms the scope of the Cyber Essentials certification.

Advertisement

Stage 2

Using the available reference documentation and readiness tools, the applicant company can confirm that their scope is accurate and they are meeting the required controls.

Stage 3

Apply for Cyber Essentials self-assessment, and complete the online assessment questionnaire. The assessment is reviewed by a qualified assessor, feedback given if necessary, and certification is issued if all responses are compliant.

Stage 4

Cyber Essentials certification becomes an integral part of the business, and forms a strong foundation on which to mature Cyber Security within the organisation.

This article is from: