Clicky

Cyber Essentials is a UK Government-backed, industry-supported certification scheme introduced by the National Cyber Security Center (NCSC) to help organisations demonstrate operational security measures. 

Restorepoints solutions can help organisations ensure they comply with the requirements related to network device management, user access controls and password management:

Cyber Essentials Requirement:

How we can help:

Firewall scope: For firewalls (or equivalent network devices), the Applicant organisation must routinely:

Change default administrative password(s) to an alternative that is difficult to guess, or disable remote administrative access.

Restorepoint automatically detects the use of default vendor/manufacturer passwords. Passwords can be regularly updated in bulk using our device control feature. Additionally, password policies can be applied to devices to ensure they conform to the company’s prescribed password policy.

Block unauthenticated inbound connections by default.

With Restorepoint compliance policies, you can quickly assess if devices are configured to allow untrusted connections or protocols. Checks are performed at the point of your scheduled configuration backup, which is likely to be on a daily basis, and alerts sent if required.

Secure configuration for Network Devices: The Applicant must be active in its management of network devices. It must routinely:

Remove and disable unnecessary user accounts (such as guest accounts and administrative accounts that won’t be used)

Restorepoint helps admin in granting or revoking user access to systems in one action, instead of managing individual user accounts for each system, or having to change shared passwords when an employee or a contractor leaves the company.

Change any default or guessable account passwords to something non-obvious

Restorepoint automatically detects the use of default vendor/manufacturer passwords. Passwords can be modified and updated regularly updated in bulk using our Device Control feature. Furthermore, password policies can be applied to devices to ensure they conform to company policy regarding the use of strong passwords.

Remove or disable unnecessary software(s) including applications, system utilities, and network services.

With Restorepoint, companies can enable only services, protocols that are deemed necessary for the functioning of the system.

Disable any auto-run feature that allows file execution (such as when downloaded from the internet) without user authorisation.

Using Restorepoint you can perform required checks at the point of your scheduled configuration backup, and alerts, in this case, if any unauthorised application is running, sent if required.

Authenticate users before allowing internet access to commercially or personally sensitive data, and/or data that is critical to the running of the organisation.

Restorepoint enables admin to control access to systems on a per user basis. Also, the employer can determine the limitation to the access as per- business requirements such as by time of day or by need-based approvals.

User access control: The Applicant must be in control of its user accounts as well as access privileges granted to each user account. It must not only have an understanding of how user accounts authenticate but also know how to establish control/moderate the strength of such authentications, which means the Applicant must:

Remove or disable user accounts that are no longer required (such as when a user leaves the organisation, or after a defined period of account inactivity etc.)

Restorepoint helps admin in granting or revoking user access to systems in one action, instead of managing individual user accounts for each system, or having to change shared passwords when an employee or a contractor leaves the company.

Use administrative accounts to perform administrative activities only (no emailing, web browsing or other standard user activities, which may expose administrative privileges to avoidable risks).

With Restorepoint, one can define access policies to restrict the type of actions administrators can perform when connections are made to systems. Moreover, the system can generate alerts, disconnect, or ban user access based on violation policy.

Remove or disable special access privileges that are no longer required or are in use (such as when a member of staff changes role)

Restorepoint helps admin in granting or revoking user access to systems in one action, instead of managing individual user accounts for each system, or having to change shared passwords when an employee or a contractor leaves the company.

Authenticate users before granting access to applications or devices, using unique credentials (see Password-based authentication)

Restorepoint enables admin to control access to systems on a per-user basis. Also, the employer can determine the limitation to the access as per business requirements such as by time of day or by need-based approvals.Passwords can be regularly updated in bulk using our Device Control feature, saving administrators valuable time. Restorepoint manages bulk changes quickly, and provides visibility of the changes as they're performed.

Password-based authentication: Protect against brute-force password guessing, by using at least one of the following methods:

Set a minimum password length of at least 8 characters
Not set a maximum password length

Restorepoint Password policies can be applied to devices to ensure they conform to company policy regarding the use of strong passwords.

Promptly change passwords when the applicant knows or suspects the devices have been compromised.

Based on compliance policy designed as per the organization standards, Restorepoint can monitor devices and send alerts. Passwords can be regularly updated in bulk or only those of suspected user-accounts using our Device Control feature. It enables administrators to automate the change instead of separately connecting to each device to enforce the password change.

Learn more about managing compliance with Restorepoint
Learn more about Privileged Access Management