Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable. It is mainly applicable where IT systems are primarily based on Common-Off-The-Shelf (COTS) products rather than large, heavily customised, complex solutions. The main objective of the Cyber Essentials assessment is to determine that your organisation has effectively implemented the controls required by the Scheme, in order to defend against the most common and unsophisticated forms of cyber-attack. The completed questionnaire attests that you meet the Requirements of the Cyber Essentials Scheme, which must be approved by a Board member or equivalent, and will then be verified by a competent assessor from Seric Systems (the Certifying Body). Such verification may take a number of forms, and could include, for example, a telephone conference. The verification process will be at the discretion of Seric Systems Scope of Cyber Essentials The Scope is defined in the scheme Assurance Framework document, available on the official scheme website www.cyberstreetwise.com/cyberessentials/files/assurance-framework.pdf You will be required to identify the actual scope of the system(s) to be evaluated as part of the questionnaire. How to avoid delays & additional charges You may incur additional charges if details are not sufficiently supplied, answer the questions as fully as possible giving supporting comments, paragraphs from policies and screen shots where possible. As a rule of thumb if it takes longer to assess the submission than you spent preparing it, you may be charged. Organisation Identification Please provide details as follows: Organisation Name (legal entity): Sector: Parent Organisation name (if any): Size of organisation micro, small, medium, large. (See definition below) No of employees Point of Contact name: Salutation (Mr, Mrs, Miss etc) Initial First Surname Job Title: Email address: Telephone Number: Main web address for company in scope: Building Name/Number Address 1 Address 2 Address 3 City County Postcode Certification Body: Do you wish to be excluded from the register of Cyber Essentials certified companies. Exclusion means customers will not be able to find your entry. If this is left blank you will be entered. From time to time government departments and other interested bodies may wish to use your company for marketing Cyber Essentials. If you do not wish to be promoted in this way please enter NO in the box. If this is left blank you imply your consent. QG Business Solutions 2015 © Issue 5 20/02/16 SME Definition Company category Balance Employees Turnover or sheet total Medium-sized < 250 ≤ € 50 m ≤ € 43 m Small < 50 ≤ € 10 m ≤ € 10 m Micro < 10 ≤€2m ≤€2m Business Scope Please identify the scope of the system(s) to be assessed under this questionnaire, including locations, network boundaries, management and ownership. Where possible, include IP addresses and/or ranges. A system name should be provided that uniquely identifies the systems to be assessed, and which will be used on any certificate awarded. (Note: it is not permissible to provide the company name, unless all systems within the organisation are to be assessed): A network diagram in here Show public IP addresses State if cloud apps are in or out and what they are State if you use Office 365/ Google Docs/ Dropbox etc. QG Business Solutions 2015 © Issue 5 20/02/16 Boundary Firewalls and Internet Gateways 1 Question Answer Comment Have you installed Firewalls or similar devices at the boundaries of the networks in the Scope? Always State the firewall make and type and provide a screenshot of the login Mostly Sometimes Rarely Never 2 Have the default usernames/passwords on all boundary firewalls (or similar devices) been changed to a strong password Always Mostly Sometimes Rarely Never 3 Have all open ports and services on each firewall (or similar device) been subject to justification and approval by an appropriately qualified and authorised business representative, and has this approval been properly documented? Always Mostly Sometimes Describe the process. Is it recorded in a spreadsheet or database? Provide a screenshot or provide documentation of the process to record a change. Rarely Never 4 Have all commonly attacked and vulnerable services (such as Server Message Block (SMB) NetBIOSm tftp, RPC, rlogin, rsh, rexec) been disabled or blocked by default at the boundary firewalls? Always Mostly Show a screen shot of the firewall rules. Attach findings from an external scanner to prove it Sometimes Rarely Never QG Business Solutions 2015 © Issue 5 20/02/16 5 Question Confirm that there is a corporate policy requiring all firewall rules that are no longer required to be removed or disabled in a timely manner, and that this policy has been adhered to (meaning that there are currently no open ports or services that are not essential for the business)? Answer Policy exists and has been implemented Policy exists but has not been implemented Comment Attach your policy (or an extract from the policy). Do you have a process to validate it? Do you have a formal review once a quarter? Once a year? Do you do an external scan to check? Policy does not exist 6 Confirm that any remote administrative interface has been disabled on all firewall (or similar) devices? Always Mostly Sometimes Rarely Ie so that you cant login to the router/firewall from a web page available externally. It is acceptable to VPN in to the network and then access a local login, should you have a requirement for a 3rd part to have access Never 7 Confirm that where there is no requirement for a system to have Internet access, a Default Deny policy is in effect and that it has been applied correctly, preventing the system from making connections to the Internet Always Mostly Show the firewall rules – show that by default there is a deny (inbound and outbound traffic) Sometimes Rarely Never Please provide any additional evidence to support your assertions above: QG Business Solutions 2015 © Issue 5 20/02/16 Secure Configuration 8 Question Answer Comment Have all unnecessary or default user accounts been deleted or disabled Yes Group policy or Microsoft Security Baseline analyser can be used to show this. Also you can take screen shots of the local users – make sure that guest account is not enabled Show the password policies. Remember to do for each kind of device eg servers, Macs, PCs, cloud apps may all have different settings. Microsoft Security Baseline Analyser can be used for PCs or Group Policy for domain PCs No 9 Confirm that all accounts have passwords, and that any default passwords have been changed to strong passwords? Always Mostly Sometimes Rarely 10 Has all unnecessary software, including OS utilities, services and applications, been removed or disabled Never Always Mostly Sometimes Rarely Never 11 Has the Auto Run (or similar service) been disabled for all media types and network file shares? Always Mostly Sometimes Rarely Never 12 Has a host based firewall been installed on all desktop PCs or laptops, and is this configured to block unapproved connections by default? Installed and configured Show that firewall is switched on on a mac. Show that firewall is switch on on Pcs and servers Installed, but not configured Not installed QG Business Solutions 2015 © Issue 5 20/02/16 13 Is a standard build image used to configure new workstations, does this image include the policies and controls and software required to protect the workstation, and is the image kept up to date with corporate policies? Yes 14 Do you have a backup policy in place, and are backups regularly taken to protect against threats such as ransomware? Yes 15 Are security and event logs maintained on servers, workstations and laptops? Yes Describe how you build new PCs/Macs/Servers No No No Describe how you backup your data. Show screen shots of the backup software and the policies. Describe how may days backups you maintain Most devices maintain logs (eg windows event viewer). If you specifically store yours somewhere else for longer (eg an SNMP server) mention it here Please provide any additional evidence to support your assertions above: QG Business Solutions 2015 © Issue 5 20/02/16 Access Control 16 17 18 Question Answer Comment Are user account requests subject to proper justification, provisioning and an approvals process, and assigned to named individuals? Yes Are users required to authenticate with a unique username and strong password before being granted access to computers and applications? Yes How is this done and recorded? Is the request recorded in a helpdesk? Is it in a spreadsheet? Is is such a small company that they boss knows everyone? Attach some screenshot proof Show your security settings that enforce it or show how you have a paper policy that dictates it. Are accounts removed or disabled when no longer required? Yes No No How do you handle leavers? No 19 20 Are elevated or special access privileges, such as system administrator accounts, restricted to a limited number of authorised individuals? Yes Are special access privileges documented and reviewed regularly (e.g. quarterly)? Yes No Show your policies or proof of a regular review No 21 22 Are all administrative accounts only permitted to perform administrator activity, with no Internet or external email permissions? Yes Does your password policy enforce changing administrator passwords at least every 60 days to a complex password? Yes No No Show your enforced security policy (might be windows Group Policy or might be a paper policy). What about password for cloud apps? Servers? etc Please provide any additional evidence to support your assertions above: QG Business Solutions 2015 © Issue 5 20/02/16 Malware Protection 23 Question Answer Comment Please confirm that malware protection software has been installed on at least all computers with an ability to connect outside of the network in Scope Always Provided the name and a screenshot of the anti malware software for each type of device (eg Macs will use the inbuilt anti malware, PCs might have Sophos, Linus servers might have ClamAV) Mostly Sometimes Rarely Never 24 Does corporate policy require all malware Yes protection software to have all engine updates applied, and is this applied No rigorously? Show an extract from your security policy 25 Have all anti malware signature files been kept up to date (through automatic updates or through centrally managed deployment)? Yes Show the update settings for your anti malware Has malware protection software been configured for on-access scanning, and does this include downloading or opening files, opening folders on removable or remote storage, and web page scanning? Yes Has malware protection software been configured to run regular (at least daily) scans? Yes Are users prevented from running executable code or programs form any media to which they also have write access? Other than anti-virus software, are access control measures in place to prevent virus code modifying commonly run executable files Always 26 27 28 No Show your scanning settings for your anti malware No Show your scanning settings for your anti malware No Tell us about any more advanced security functionality Mostly Sometimes Rarely Never 29 Are users prevented from accessing known malicious web sites by your malware protection software through a blacklisting function? QG Business Solutions 2015 © Yes No Issue 5 20/02/16 Please provide any additional evidence to support your assertions above: Patch Management 30 Question Answer Is all software installed on computers and network devices in the Scope licensed and supported? Always Comment Mostly Sometimes Rarely Never 31 Are all Operating System security patches applied within 14 days of release? Always Mostly Sometimes Rarely 32 Are all Application software security patches applied within 14 days of release? Never Always Mostly Sometimes Tell us your OS update settings for each type of OS, show screen shots of theme. For PCs this will be the Windows Update settings. If they aren’t explain why not Microsoft ones will be covered by Windows update. What about other ones? Chrome? Java etc. If they aren’t, explain why not Rarely 33 34 Is all legacy or unsupported software isolated, disabled or removed from devices within the Scope? Is a mobile working policy in force that requires mobile devices (including BYOD) to be kept up to date with vendor updates and app patches? Never Yes No Yes Is there any old machines like Windows NT or XP that are end of life? If so, how do you keep them separate from the rest of the network? Show your policy No Please provide any additional evidence to support your assertions above: QG Business Solutions 2015 © Issue 5 20/02/16 Approval It is a requirement of the Scheme that a Board level (or equivalent) of the organisation has approved the information given. Please provide evidence of such approval: X QG Business Solutions 2015 © Issue 5 20/02/16
© Copyright 2026 Paperzz