Cyber Essentials Technical Controls
To minimize an organization's attack surface and reduce the threat of cyberattacks, Cyber Essentials specifies five technical controls, each focusing on an area of the IT environment and advising a security action to take to ensure cyber defence.
1. Boundary firewalls & internet gateways
A firewall must in place to protect all internet-connected devices.
2. Secure Configuration
Secure any default settings by implementing secure configurations to prevent criminals or hackers from gaining unauthorized access to your data.
3. Access Control
Reduce the likelihood of unauthorized access and control, which team members can see certain data.
4. Malware Protection
Protect your data from viruses, malware and other threats to your organization.
5. Patch Management
Regularly update your devices to identify and resolve any vulnerabilities.