https://store-images.s-microsoft.com/image/apps.43342.9fa57476-97c9-4f3d-96c0-466b93c582ef.11dc34ba-4ffb-46e2-bc35-705a572642ad.02430f10-ab08-4b48-936c-e590c44b0ae3

Cyber Essentials: 1 Day Assessment

ADM Computer Services Ltd

Cyber Essentials is a government-backed scheme to help organisations protect themselves against common online threats. ADM are well positioned to help businesses becomes CE and CE+ accredited.

ADM Computing take an audit & recommendation / remediation / certification three-phase approach to Cyber Essentials. This approach considers the requirements for completion of the official questionnaire (undertaken by ADM, assessed by the Certification Body). Our approach can be summarised as follows:

Cyber Essentials self-assessment questionnaire:

Phase one - Audit & Secure Score Evaluation

  • Pre-audit conference call
  • Onsite audit
  • Remote collation of audit data
  • Compilation of questionnaire and remediation report

Phase one - Recommendation - reports will be provided that include:

  • Summary of all actions that are needed to attain compliance
  • Supplementary reports covering IT estate, such as user accounts, registered devices, admin users, deployed software (and versions)
  • Separate report detailing Secure Score Evaluation and recommendations.

Phase two – Remediation

  • Advice on remediation requirements where needed
  • Remediation works undertaken by candidate organisation or other third party
  • ADM can give additional resource to assist with remediation if required (at additional cost dependent on requirements)

Phase three – CE Certification

  • ADM to review remediation actions and complete questionnaire with updated evidence
  • Sign-off of questionnaire by candidate organisation and submission to certification body by ADM

Annual renewal (CE only) An annual renewal is required, ADM can discuss the requirements for this once the initial certificate is awarded.

Additional notes

  • ADM will require full access to the servers and infrastructure of the candidate organisation.
  • The candidate organisation will need to supply copy of IT policies including user management and system change management (exact requirements will be discussed during the audit)
  • ADM will require access to your Microsoft 365 tenant for the purpose of producing the Microsoft Secure Score Evaluation.

At a glance

https://store-images.s-microsoft.com/image/apps.20435.9fa57476-97c9-4f3d-96c0-466b93c582ef.11dc34ba-4ffb-46e2-bc35-705a572642ad.6378ee16-1f5f-4151-a1bc-f5372497db54
/staticstorage/linux/20241223.2/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.44501.9fa57476-97c9-4f3d-96c0-466b93c582ef.d293fffb-0668-429e-97d7-a1b5e695c42f.2d4369cc-4207-4201-b500-097716f0a78b
https://store-images.s-microsoft.com/image/apps.2571.9fa57476-97c9-4f3d-96c0-466b93c582ef.d293fffb-0668-429e-97d7-a1b5e695c42f.465973b2-0158-4511-8747-a5f26d1c84a4
https://store-images.s-microsoft.com/image/apps.11469.9fa57476-97c9-4f3d-96c0-466b93c582ef.d293fffb-0668-429e-97d7-a1b5e695c42f.ec4084ae-d41c-4a8b-8216-8c88a3e90dd9
https://store-images.s-microsoft.com/image/apps.49667.9fa57476-97c9-4f3d-96c0-466b93c582ef.d293fffb-0668-429e-97d7-a1b5e695c42f.f2af85b3-aaaa-4ae2-8e3c-0f6405c5595e
https://store-images.s-microsoft.com/image/apps.25380.9fa57476-97c9-4f3d-96c0-466b93c582ef.d293fffb-0668-429e-97d7-a1b5e695c42f.3f51ece6-9101-4ce6-a88e-4c0c47e5d56d