In this the second of our three-part blog series, we will go into detail about the first three of the five Cyber Essential controls. We will also look at how to implement and maintain them to ensure compliance with Cyber Essentials.
We briefly mentioned the five controls in our last piece, but here they are again in a nutshell:
The five controls
1. Anti-Malware measures
2. Patch management
4. Applying Access Controls
5. Secure Configuration
The Cyber Essentials objective
Cyber Essentials was created with this aim in mind: ‘To prevent harmful code from causing damage or accessing sensitive data’. This is achieved by restricting the execution of known Malware and untrusted software.