Cyber Essentials Assessment Guide

A comprehensive security readiness checklist based on the Cyber Essentials framework

📋 Client Information

0 of 24 questions completed

🛡️ 1. Firewalls

Boundary protection and network security controls

Q1 Incomplete
Do you have firewalls in place between your organization's internal networks and the internet?
Q2 Incomplete
Are software firewalls enabled on all computers, laptops, and servers?
Q3 Incomplete
Have you changed all default passwords on firewall and router devices?
Q4 Incomplete
Have you reviewed your firewall rules in the last 12 months and do you have a documented process for managing firewall configurations?

⚙️ 2. Secure Configuration

System hardening and configuration management

Q5 Incomplete
Have you removed or disabled unnecessary software and services on all devices and cloud services?
Q6 Incomplete
Do all devices and cloud services contain only necessary user accounts that are regularly used?
Q7 Incomplete
Have you changed all default passwords and implemented strong password requirements across all systems?
Q8 Incomplete
Are all devices that require physical presence protected by device locking mechanisms (biometric, password, or PIN)?

👥 3. User Access Control

Identity and access management

Q9 Incomplete
Do you have a formal process for creating and approving user accounts?
Q10 Incomplete
Are all user and administrative accounts accessed using unique credentials (no shared accounts)?
Q11 Incomplete
Do you have a process to disable/delete accounts for staff who leave the organization?
Q12 Incomplete
Are separate accounts used for administrative tasks, and are these accounts prevented from everyday activities like web browsing and email?

🔄 4. Security Update Management

Patch management and software maintenance

Q13 Incomplete
Are all operating systems on devices supported by vendors and receiving regular security updates?
Q14 Incomplete
Are all high-risk or critical security updates installed within 14 days of release?
Q15 Incomplete
Are automatic updates enabled where possible for operating systems and applications?
Q16 Incomplete
Have you removed all unsupported software, or moved it to isolated networks without internet access?

🦠 5. Malware Protection

Anti-malware solutions and application control

Q17 Incomplete
Is anti-malware software installed and active on all Windows and macOS devices?
Q18 Incomplete
Is anti-malware software configured to update automatically, prevent malware execution, and block malicious websites?
Q19 Incomplete
For mobile devices and tablets, are users restricted to installing only approved applications (via app stores or MDM)?
Q20 Incomplete
Is multi-factor authentication (MFA) implemented for all cloud services and administrative accounts?

💾 6. Data Backup and Recovery

Ensuring data is protected through backups

Q21 Incomplete
Do you have regular backups of all critical data and systems?
Q22 Incomplete
Are backups stored in a secure, offsite location or cloud service with appropriate access controls?
Q23 Incomplete
Do you test backup restoration processes at least annually to ensure recoverability?
Q24 Incomplete
Are backups encrypted and protected against unauthorized access?
0/24
Assessment Not Started

Complete all questions to see your security readiness score and recommendations for improvement.

📝 Assessment Notes

Use this space for general observations, recommendations, and action items