Answers
Answers
Question Answer
Acceptance I accept
Notes:
Please provide the legal registered address for your Address Line 1: 124,
organisation, if different from the main operating Address Line 2: City Road
location. Town/City: London
County: United Kingdom
Postcode: EC1V 2NX
Country: United Kingdom
A2.4 End User Devices We have 24 laptops: 2 MacBook Pros running MacOS
Please list the quantities and operating systems for version Sonoma 14.2.1 23E214 and 1 Dell, 2 Microsoft
your laptops, desktops and virtual desktops within the Surfaces, 23 Lenovo Thinkbooks and 1 ASUS ZenBook
scope of this assessment. running OS Builds 22621.3007 and 22631.3007. We
Please Note: You must include make and operating also access a secure VNET network using AWS
system versions for all devices. Workspaces and Azure Virtual Machines 21H2 having
All user devices declared within the scope of the OS Version Windows version OS Build
certification only require the make and operating 20348.2322(Windows Server 2022 Datacenter).
system to be listed.We have removed the requirement
for the applicant to list the model of the device.
Devices
that are connecting to cloud services must be
included.A scope that does not include end user
devices is not acceptable.
A2.5 Server Devices Azure Virtual Server and AWS server: 3 x 21H2 having
Please list the quantity of servers, virtual servers and OS Version Windows version OS Build
virtual server hosts (hypervisor). You must include the 20348.2322(Windows Server 2022 Datacenter).
operating system.
A2.6 Mobile Devices All mobile devices that are used for accessing business
Please list the quantities of tablets and mobile devices data and have access to the internet are listed below:
within the scope of this assessment. 1. Samsung Galaxy S24 Android V14, 2. OnePlus Nord
N30 SE Android 13, 3. iPhone 14, iOS 17.4, 4.
Samsung S21 Android V13, 5. iPhone 12 Pro iOS
Please Note: You must include make and operating 17.3.1 As part of IT Security policy, we restrict the use
system versions for all devices. All user devices of mobile by disabling access to business-critical
declared within the scope of the certification only systems outside Virtual Machines.
require the make and operating system to be listed. We
have removed the requirement for the applicant to list
the model of the device.
Devices that are connecting to cloud services must be
included.A scope that does not include end user
devices is not acceptable.
All tablets and mobile devices that are used for
accessing organisational data or services and have
access to the internet must be included in the scope of
the assessment. This applies to both corporate and
user owned devices (BYOD).You are not required to list
any serial numbers, mac addresses or other technical
information.
A2.7 Networks All employees access the office network via Azure
Please provide a list of your networks that will be in the Virtual Network and AWS Virtual Network. Virtual
scope for this assessment. desktops are the only option to access business data.
Systems and technical setups are in place to restrict
You should include details of each network used in access to business sensitive customer data outside the
your organisation including its name, location and its AWS & Azure virtual networks. All SFR Medical data is
purpose (i.e. Main Network at Head Office for stored in secure Microsoft UK data centers (UK West or
administrative use, Development Network at Malvern the UK South Microsoft). Homeworker networks are
Office for testing software, home workers network - untrusted and we rely on software firewalls when
Answer Export
A2.8 Network Equipment All employees are working from home. Home user
Please provide a list of your network equipment that will networks have ISP provided devices which are out-of-
be in scope for this assessment (including firewalls and scope. All the employees login to the VNet virtual
routers). You must include make and model of each network configured on the Azure and AWS cloud
device listed. services. Azure Virtual Network (VNet) is the
fundamental building block for SFR Medical's private
You should include all equipment that controls the flow network in Azure. VNet enables many types of Azure
of data, this will be your routers and firewalls. resources, such as Azure Virtual Machines (VM), to
securely communicate with each other and with the
You do not need to include switches or wireless access internet. VNet is similar to a traditional network in that
points that do not contain a firewall or do not route you'd operate in a data center but brings with it
internet traffic. additional benefits of Azure's infrastructure such as
scale, availability, and isolation. Amazon Virtual Private
If you don't have an office and do not use network Cloud (Amazon VPC) is a service that lets SFR Medical
equipment, instead you are relying on software firewalls launch AWS resources in a logically isolated virtual
please describe in the notes field. network that is security complaint. Amazon VPC
provides advanced security features that allow us to
You are not required to list any IP addresses, MAC perform inbound and outbound filtering at the instance
addresses or serial numbers. and subnet level.
A2.9 Cloud Services AWS - IaaS Microsoft azure - App Service Microsoft
Please list all of your cloud services that are in use by Azure Virtual Machines - IaaS MicrosoftDynamics365 -
your organisation and provided by a third party. SaaS Microsoft Office365 -SaaS
Please note cloud services cannot be excluded from
the scope of CE.
A4.1.1 Off Network Firewalls We have Firewalls enabled, we also use encryption for
When your devices (including computers used by sensitive data, we have MFA enabled etc. Regular
homeworkers) are being used away from your cybersecurity awareness training is conducted for all
workplace (for example, when they are not connected employees, emphasising best practices for secure
to your internal network), how do you ensure they are remote working, recognizing phishing attempts, and
protected? reporting security incidents.
A4.2.1 Firewall Password Change Process Windows devices have the admin password reset by
Please describe the process for changing your firewall logging on as the admin and using control+alt+del to
password? select change password. Mac users will go to the users
Home routers not supplied by your organisation are not and groups section and choose to change the user
included in this requirement. password for the admin account. AWS and Azure
security is managed by admin accounts that have been
You need to understand how the password on your added within those systems.
firewall(s) is changed.
Please provide a brief description of how this is
achieved.
A4.6 Firewall Service Process We review which services are active and if the CTO
If you do have services enabled on your firewall, do you approves any change due to a service no longer being
have a process to ensure they are disabled in a timely required, we would remove that access and test to
manner when they are no longer required? A confirm it is no longer available.
description of the process is required.
boundary firewall in an office location. You can check settings for their computers every quarter. This is
this setting on Macs in the Security & Privacy section of validated by IT admins. IT admins also audit this
System Preferences. On Windows laptops you can information by remotely checking the laptops for these
check this by going to Settings and searching for settings on a Zoom call or by physically taking the
"Windows firewall". On Linux try "ufw status". laptops. Also, every time a laptop is assigned to a new
user, the admin checks all these settings and ensures
all security settings of the laptop are enabled and no
confidential data is stored on the laptop.
A5.1 Removed Unused Software SFR Medical virtual machines (VM) and laptops only
Where you are able to do so, have you removed or have limited applications which are required for
disabled all the software and services that you do not organizational duties by the employees. Since all the
use on your laptops, desktop computers, thin clients, users access all SFR Medical data from virtual
servers, tablets, mobile phones and cloud services? machines, only SFR Medical admin has access to
Describe how you achieved this. install/uninstall any software on the VM. The admin
ensures that only the necessary software is present on
You must remove or disable all applications, system VMs intended for different users. Admin team monthly
utilities and network services that are not needed in day- reviews all the software and uninstalls obsolete
to-day use. You need to check your cloud services and applications via c-panel (or Finder for MAC) for both
disable any services that are not required for day-to- VMs as well as for the laptops. Additionally, the admins
day use. team monitors applications that are not in use and
To view your installed applications: uninstall them as well.
A5.5 External Service Password Configuration A. Multi-factor authentication with a minimum password
If yes to question A5.4, which option of password- length of 8 characters and no maximum length,
based authentication do you use? C. A password minimum length of 12 characters and no
maximum length
A. Multi-factor authentication, with a minimum
password length of 8 characters and no maximum
length
B. Automatic blocking of common passwords, with a
minimum password length of 8 characters and no
maximum length
C. A minimum password length of 12 characters and no
maximum length
D. None of the above, please describe
A5.6 Compromised Password on External Service An auto password change prompt is scheduled after 3
Describe the process in place for changing passwords months. If we feel any passwords are compromised
on your external services when you believe they have then an admin promptly changes all the associated
been compromised. passwords OR requests the users to change them. We
get alerts on our Microsoft security center and Amazon
Passwords may be compromised if there has been a console about any such passwords being compromised
virus on your system or if the manufacturer notifies you
of a security weakness in their product. You should
know how to change the password if this occurs.
A5.7 External Service Brute Force B. Locking accounts after 10 unsuccessful attempts
When not using multi-factor authentication, which
option are you using to protect your external service Notes:
from brute force attacks? Applicant Notes: The system is set to lock the users
after five invalid attempts. Once the user is logged out
A. Throttling the rate of attempts then either system administrators can reset the
B. Locking accounts after 10 unsuccessful attempts password or the user need to validate via an otp sent to
C. None of the above, please describe a registered email ID to reset the password.
A5.10 Device Locking Method The user themselves sets a password for the local
Which method do you use to unlock the devices? device that has to meet complexity rules (i.e., a
minimum password length of 8, which is solely to
Please refer to Device Unlocking Credentials unlock the local device, and the use of special
paragraph found under Secure Configuration in the characters and different cases within the password).
Cyber Essentials Requirements for IT Infrastructure AWS and Azure VM also require MFA with a minimum
document for further information. of 12 characters using an authenticator app for users to
https://www.ncsc.gov.uk/files/Cyber-Essentials- login. Mobile devices require a minimum of a 6-digit
Requirements-for-Infrastructure-v3-1-January-2023.pdf PIN to unlock.
The use of a PIN with a length of at least six characters
can only be used where the credentials are just to
unlock a device and does not provide access to
organisational data and services without further
authentication.
A6.2.2 Malware Protection SFR Medical has implemented the following malware
Please list your Malware Protection software. protection systems: Azure Security Azure Cloud
The version is required. Security Sophos Antivirus (10.8.14.1 VE3.87.0)
Windows Defender.
Please list all malware protection and versions you use
so that the Assessor can understand your setup and
verify that they are in support.
A6.5.2 Manual Updates - Applications All applications on our devices are supported by a
Where auto updates are not being used, how do you supplier that produces regular fixes for any security
ensure all high-risk or critical security updates of all problems, and these are either manually or
applications are applied within 14 days of release? automatically applied. We use Azure and AWS remote
desktops to access applications. 1. We use Microsoft
It is not always possible to apply auto updates, this is PowerBI desktop (with fixes provided by Microsoft) via
often the case when you have critical systems or web access. 2. Microsoft Office 365 products,
applications and you need to be in control of the MSTeams (fixes provided by Microsoft) 3. Antivirus:
updating process. Sophos (for laptops) for VMs (fixes provided by QH) 4.
Please describe how any updates are applied when Adobe for PDF (fixes provided by Adobe) 5. Google
auto updates are not configured. Chrome 6. Microsoft Edge
If you only use auto updates, please confirm this in the
notes field for this question.
A7.1 User Account Creation Yes, users are provided user access only after their
Are your users only provided with user accounts after a formal onboarding is done, which involves the
process has been followed to approve their creation? CMO/CTO approving access for any employee after
Describe the process. careful analysis of the employee's duties. This is done
via JML forms (built on MS Forms) and the Teams
You must ensure that user accounts (such as logins to channel, and there are also regular audits to check
laptops and accounts on servers) are only provided their required licenses.
after they have been approved by a person with a
leadership role in the business.
A7.4 User Privileges Yes, at the time of onboarding, the roles and
Do you ensure that staff only have the privileges that responsibilities of the employees are defined, and a
they need to do their current job? How do you do this? decision regarding access privileges is made based on
access control (roles and responsibilities) and the SOD
Answer Export
When a staff member changes job role, you may also (segregation of duties) framework. These privileges can
need to change their permissions to only access the be revised, if needed, only with the approval of the
files, folders and applications that they need to do their CEO, CMO, or CTO.
day to day work.
A7.5 Administrator Approval Yes, we have a written process in our access control
Do you have a formal process for giving someone policy. Any access required for administrator access is
access to systems at an “administrator” level and can given by a defined process governed by the CTO and
you describe this process? co-founder. If any access is requested or needed, the
requester submits a grant admin-request form via
You must have a process that you follow when deciding Microsoft Forms, which is then sent for CTO approval.
to give someone access to systems at administrator Only then will a separate admin account be provided in
level. This process might include approval by a person addition to their standard account.
who is an owner/director/trustee/partner of the
organisation.
A7.6 Use of Administrator Accounts The administrator account is provided to the user as a
How does your organisation make sure that separate separate account from their day-to-day standard
accounts are used to carry out administrative tasks account. The admin account is unique to the user and
(such as installing software or making configuration is not shared in any system.
changes)?
A7.7 Managing Administrator Account Usage Admin accounts are not used for day-to-day activities.
How does your organisation prevent administrator Monthly teaching sessions on cybersecurity topics are
accounts from being used to carry out every day tasks conducted for all employees. We have an IT Security
like browsing the web or accessing email? Policy in place that states that admin access should
only be granted to those individuals who need it, and
This question relates to the activities carried out when they should not use their access to browse the internet
an administrator account is in use. or access personal emails for any purposes not
You must ensure that administrator accounts are not pertaining to their organization-related duties. We also
used to access websites or download email. Using conduct system log reviews to monitor system activities
such accounts in this way exposes the device to while system admin privileges are being used.
compromise by malware. Software and update
downloads should be performed as a standard user
and then installed as an administrator. You might not
need a technical solution to achieve this, it could be
based on good policy, procedure and regular training
for staff.
A7.10 Brute Force Attack Protection We employ several security measures to prevent brute-
Describe how you protect accounts from brute-force force attacks. Firstly, we use a multi-factor
password guessing in your organisation? authentication (MFA) or two-factor authentication (2FA)
system, so the user needs an extra piece of evidence
A brute-force attack is an attempt to discover a to login. We also use a set of rules to block a user from
password by systematically trying every possible allowing their password to be too simple (i.e., setting a
combination of letters, numbers, and symbols until you minimum length and requiring special characters).
discover the one correct combination that works. Lastly, after 10 attempts, the user account is locked.
Information on how to protect against brute-force
password guessing can be found in the Password-
based authentication section, under the User Access
Control section in the ‘Cyber Essentials Requirements
for IT
Infrastructure
https://www.ncsc.gov.uk/files/Cyber-Essentials-
Requirements-for-Infrastructure-v3-1-January-2023.pdf
A7.11 Password Quality We use a set of rules that are enforced on the system
Which technical controls are used to manage the when making a password, which are the following: 8
quality of your passwords within your organisation? characters for any local user account on a computer
and at least 12 characters with MFA for cloud systems.
Acceptable technical controls that you can use to
manage the quality of your passwords are outlined in
the new section about password-based authentication
in the ‘Cyber Essentials Requirements for IT
Infrastructure
https://www.ncsc.gov.uk/files/Cyber-Essentials-
Requirements-for-Infrastructure-v3-1-January-2023.pdf
A7.12 Password Creation Advice In our policies, there's a section about password
Please explain how you encourage people to use complexity that advises using three random words to
unique and strong passwords. create a strong, longer password that is easy to
remember.
You need to support those that have access to your
organisational data and services by informing them of
how they should pick a strong and unique password.
approved applications?