Cyber Essentials v3.2
UK NCSC Cyber Essentials certification - 5 technical controls to protect against common cyber attacks
This is a reference tool, not an authoritative source. For official documentation, visit www.ncsc.gov.uk.
Framework data extracted from the UK NCSC v3.2 Set Theory Relationship Mapping (STRM) files, licensed under Open Government Licence . Attribution required per license terms.
30 All
FW — Firewalls (7 requirements)
MP — Malware Protection (3 requirements)
SC — Secure Configuration (6 requirements)
SUM — Security Update Management (4 requirements)
UAC — User Access Control (10 requirements)
UAC-01User Account Creation Process
UAC-02Unique User Credentials
UAC-03Remove Inactive Accounts
UAC-04Implement MFA
UAC-05Separate Admin Accounts
UAC-06Remove Special Access When Not Required
UAC-07Password Brute-Force Protection
UAC-08Password Quality Requirements
UAC-09Password Management Support
UAC-10Compromised Password Process