Cyber Security Blog

Stay ahead of the curve with industry trends, cutting edge tech and inventive strategies.

Cyber Essentials Requirements Are Being Updated in April 2026

From 27 April 2026, organisations beginning a new Cyber Essentials or Cyber Essentials Plus assessment will be assessed against an updated version of the standard: Requirements for IT Infrastructure v3.3.

The changes are being introduced by IASME Consortium, the delivery partner of the National Cyber Security Centre. A new 2026 self-assessment question set, known as “Danzell”, will apply to all assessment accounts created on or after that date.

Assessments started before 27 April 2026 will continue under the current version.

Although described as refinements, the update meaningfully strengthens baseline expectations, particularly in identity security, cloud governance, vulnerability management and audit evidence.

You can download the full Cyber Essentials: Requirements for IT Infrastructure v3.3 document directly from the NCSC website here:

What Is Changing Under v3.3?

1: Multi-Factor Authentication Must Be Enabled Wherever Available

If a cloud service or system offers MFA, it must now be enabled using an approved method.

Organisations can no longer leave available MFA switched off. Failure to enable it will result in automatic assessment failure.

This change reflects the continued rise in credential-based attacks and reinforces identity protection as a foundational control.

2: All Cloud Services Are Explicitly in Scope

For the first time, the standard formally defines a cloud service. Any internet-accessible service that stores or processes organisational data must be included in scope.

This includes:

Even where services are managed by a third party, accountability remains with the organisation seeking certification.

If your organisation accesses it using company credentials, it should be considered in scope.

3: Clearer Device and Network Scoping Requirements

The previous “untrusted network” terminology has been removed.

Instead, any device capable of establishing or accepting an internet connection must be considered.

Organisations must now:

Without accurate asset inventories and defined network boundaries, assessments may face delays or clarification requests.

4: 14-Day Deadline for High and Critical Security Updates

Under v3.3, high-risk and critical patches must be applied within 14 days of release.

This applies to:

Failure to meet this timeframe will result in assessment failure.

Patch management must therefore be consistent, monitored and demonstrably effective across the full estate.

5: Backup and Recovery Elevated in Importance

While not one of the five core technical controls, backup guidance has been repositioned to emphasise resilience.

Organisations are expected to clearly document backup frequency, retention, separation and restoration testing procedures.

6: Application Development” Replaces “Web Applications

The updated terminology aligns with the UK Government’s Software Security Code of Practice and reinforces secure-by-design principles across the development lifecycle.

This is particularly relevant for organisations building internal or customer-facing applications.

7: Recognition of Passwordless Authentication

The new requirements formally recognise passwordless authentication methods, including:

Remediation must now be estate-wide, not limited to the originally sampled devices.

How This May Effect Your Organisation

The April 2026 update raises expectations across four key areas:

Identity Security – MFA must be universally enforced wherever available.
Cloud Governance – All cloud services are unquestionably in scope.
Patch Discipline – 14-day updates require structured and reliable processes.
Documentation & Evidence – Clear scoping and auditable processes are essential.

Organisations that prepare early are far more likely to experience a smooth certification process.

A headshot of Amait, Head of Cyber Essentials at Equilibrium

“The 2026 update is about clarity and consistency. Cyber Essentials has always focused on protecting organisations from the most common attacks, and these changes ensure the standard keeps pace with how businesses operate today. The important step now is preparation. Understanding what has changed and reviewing your environment early will make the transition straightforward.”

Our Role as an IASME Certification Body

As an accredited Cyber Essentials Certification Body, we work directly with organisations across a wide range of sectors to assess, guide and certify against the standard.

Our focus is not simply on assessment submission, but on ensuring organisations clearly understand:

The 2026 update represents a tightening of the baseline, but with structured preparation, certification remains entirely achievable.

How We Support Our Customers

We provide end-to-end support across both Cyber Essentials and Cyber Essentials Plus, including:

Our approach is practical, transparent and aligned directly to the official standard, ensuring there are no surprises during assessment.

Preparing for April 2026

If your renewal or first certification will fall after 27 April 2026, now is the right time to review your readiness under v3.3.

Early gap analysis will significantly reduce the risk of remediation delays and assessment failure.

If you would like a structured review of your environment against the updated requirements,  or a side-by-side comparison of how the Danzell question set differs from the current version, please get in touch with our expert team today.

Ready to achieve your security goals? We’re at your service.

Whether you are a CISO, an IT Director or a business owner, Equilibrium has the
expertise to help you shape and deliver your security strategy.

About the author

Jen is a marketing professional who supports the marketing strategy across the digital mix, with a strong focus on content creation and campaign delivery. She develops clear, customer-focused content that helps organisations understand cyber security risks and best practice. Jen enjoys keeping up with developments across the cyber security landscape to ensure marketing activity remains relevant and valuable.
Jen Goulbourne
Marketing Executive

Latest posts