The NCSC and IASME have just announced significant updates to the Cyber Essentials scheme, set to take effect on April 27, 2026. These changes represent some of the most substantial modifications to the certification framework in recent years, driven by findings from breach investigations and audit insights.
While the five core controls remain unchanged, organisations seeking or maintaining Cyber Essentials certification need to understand these new requirements to ensure continued compliance.
Previously announced in November 2025, MFA implementation has moved from best practice to an absolute requirement. From April 27, 2026:
This change reflects the reality that compromised credentials remain one of the most common attack vectors. With MFA widely available across cloud platforms, there's no longer a justification for organisations to operate without this essential security layer.
Perhaps the most significant new change introduces strict timelines for security updates. Questions A6.4 and A6.5 are now auto-fail criteria, meaning organisations must:
This requirement acknowledges that delayed patching is consistently identified in breach investigations. Attackers routinely exploit known vulnerabilities, often within days of public disclosure. The 14-day window represents a balance between operational practicality and security necessity.
Organisations will face more rigorous requirements around defining their certification scope:
For organisations with multiple legal entities, individual certificates will be available for each entity within the larger scope, providing clearer accountability and transparency.
This increased transparency addresses a longstanding issue where scope ambiguity sometimes allowed organisations to gain certification while excluding significant portions of their IT infrastructure.
The CE+ assessment process is being strengthened to ensure update management isn't just performed on tested devices:
Start implementing these requirements now, even though they don't take effect until April 27, 2026:
Your current certificate remains valid until renewal, but:
These updates aren't arbitrary bureaucracy—they're responses to real-world security incidents. IASME explicitly states these changes are "based on findings from breach investigations, and evaluation of insights gained from audits."
The common factors in many breaches include:
The new requirements directly address these vulnerabilities, making Cyber Essentials a more robust assurance framework.
For organisations pursuing MOD contracts, these changes have particular significance. Cyber Essentials remains a baseline requirement for Defence Cyber Certification (DCC), and the stricter controls align with the threat landscape facing defence supply chains.
The 14-day patching requirement, in particular, reflects expectations already present in higher-level defence frameworks. Organisations working toward DCC compliance should view these changes as helpful alignment rather than additional burden.
With just over two months until these requirements take effect, organisations should:
Periculo specialises in helping organisations achieve and maintain Cyber Essentials certification, including navigating scheme changes like these. Whether you're seeking initial certification or need to ensure your existing certificate can be renewed under the new requirements, we can provide:
The April 2026 changes represent a significant strengthening of the Cyber Essentials scheme. While they increase the bar for compliance, they also increase the value of the certification as a meaningful security assurance framework.
Organisations that take these requirements seriously—implementing robust controls rather than seeking minimum compliance—will find themselves better protected against the evolving threat landscape, regardless of the certification requirements.
Need help preparing for the new Cyber Essentials requirements? Contact Us to discuss how we can support your compliance journey.