What the Cyber Essentials Requirements for IT Infrastructure v3.3 and the Danzell Standard Mean for Your Business

Cyber Essentials continues to evolve to reflect the realities of modern Cyber Security. From 27 April 2026, all new Cyber Essentials assessments are being assessed against Danzell (The new IASME standard based on Requirements for Infrastructure v3.3), introducing more rigorous expectations around cloud security, authentication and patching.

This update is more than a routine refresh. It reflects how organisations now operate, with cloud first services, remote working and increasingly sophisticated commodity threats firmly in scope. For businesses planning certification or renewal after May 2026, understanding these changes early is essential.

This guide breaks down what has changed and, more importantly, what practical steps organisations should take to remain compliant and resilient.


We’ve awarded over 1,500 Cyber Essentials and Cyber Essentials Plus accreditations

Get Started

Why is Multi Factor Authentication now an automatic failure requirement under Cyber Essentials Danzell?

One of the most significant changes in the Danzell standard is the automatic failure of Multi Factor Authentication when not enabled if available.

Where MFA is supported, whether it is free, bundled or paid for, it must be enabled for all users. Failure to do so will now result in an automatic fail.

What this means in practice

Organisations must:

  • Audit all user accounts across email, cloud platforms and administrative portals
  • Enable MFA consistently, including for privileged and administrative users (where separate accounts should be in place)
  • Remove legacy authentication methods that bypass MFA

This change improves accountability and dramatically reduces the risk of credential based attacks, which remain one of the most common causes of breaches.


How are Cloud Services treated under the updated Cyber Essentials requirements?

Under Danzell a new definition has been added ‘any cloud service that stores or processes organisational data is now in scope’. This removes previous ambiguity around excluding Software as a Service platforms.

Practical considerations for business

You should now:

  • Ensure a complete inventory of cloud services in use and maintained in accordance with the updated definition
  • Apply Cyber Essentials controls consistently against the updated inventory
  • Ensure access controls, MFA, firewalls, malware protection and patching responsibilities are clearly defined with suppliers.

This change reflects how critical cloud services have become to day to day operations and ensures security controls keep pace.


What do the new Cyber Essentials scoping rules mean for devices and services?

The previous concepts of “untrusted” or “user initiated” devices have been removed.

The new rule is straightforward: If a device or service owned by the organisation connects to the internet, or manages internet connected data, it is in scope.

Why this matters

This clarity reduces misinterpretation during assessments and ensures organisations take a more holistic view of their environment. Laptops, mobile devices, servers and cloud platforms should all be considered equally when applying controls. BYOD devices should also not be forgotten when accessing organisational data or services.

All legal entities applying must be listed on your Cyber Essentials application.

Can I exclude systems?

Excluded networks must be clearly detailed in new Danzell scoping statements for any partial scope assessments.


How have Application Development requirements changed in Cyber Essentials v3.3?

The scope formerly referred to as “Web Applications” has now evolved into Application Development.

This aligns Cyber Essentials with the UK Government’s Software Security Code of Practice, increasing focus on:

  • Secure coding principles
  • Timely patching of applications and frameworks
  • Managing vulnerabilities throughout the development lifecycle

Guidance for development teams

Organisations involved in application development should:

  • Document secure development practices
  • Keep third party libraries up to date
  • Demonstrate how vulnerabilities are identified and remediated
  • This change reinforces that security must be built in, not bolted on
Speak with an Expert

Why is Passwordless Authentication being encouraged by Cyber Essentials?

While not yet mandatory, the Danzell standard actively promotes passwordless authentication such as passkeys and FIDO2 authenticators.

Why organisations should take notice

Passwordless authentication:

  • Reduces reliance on weak or reused passwords
  • Improves user experience without sacrificing security
  • Aligns with the long‑term direction of secure identity management

Adopting passwordless methods now can simplify future compliance and strengthen overall security posture. For further information IASME guidance should be consulted.


What are the changes for Cyber Essentials Plus under Danzell?

No selective remediation:

Sample 1: If high or critical vulnerabilities are detected by the approved scanning tool in the first sample – a mandatory retest (scanning) with new sampled devices is required (Sample 2).

Sample 2: Random sample of devices which had detected vulnerabilities (high or critical) older than 14 days. If the same vulnerabilities are detected as those from Sample 1 a CE+ fail report is issued and CE certificate revoked by IASME.

  • If new or different high or critical vulnerabilities (older than 14 days) are detected this will result in an advisory being noted on the CE+ report and a CE+ Pass awarded.

Assessment rules:

Point in time assessment: All version and system information must be supported and meeting the criteria on the certificate issue date.

  • Systems must be supported on certificate issue date, not just submission date.
  • Version information should be within the 14-day window for patching if build numbers are provided.

Director declaration: now includes ongoing compliance responsibility.


What are the new Backup and Recovery expectations under Cyber Essentials v3.3?

Whilst not required, backup and recovery have received increased emphasis but are highly recommended by IASME.

Organisations should ensure that backups are:

  • Robust and documented
  • Protected from unauthorised access
  • Regularly tested to ensure recovery is achievable
  • If automatic backups are available, you should consider turning them on.

Practical steps to take:

Businesses should review:

  • Backup frequency and retention policies
  • Offline or immutable backup options
  • Evidence of routine restore testing

This ensures organisations are better prepared to recover from ransomware or other disruptive incidents.


When does the Cyber Essentials Danzell standard come into effect and what is the deadline?

There is a critical timing consideration for organisations planning certification.

  • Assessments set up before 27 April 2026 will follow the previous Willow standard
  • Assessments initiated on or after this date must comply with Danzell Standard

For some organisations, this presents a short‑term opportunity. For most, however, preparing for the new requirements is the more sustainable approach.

Get Support to Prepare

How can organisations prepare for Cyber Essentials certification after May 2026?

The Danzell update raises the bar, but it also brings clarity. Organisations that take a proactive approach will find that these changes not only support compliance but meaningfully improve resilience.

Key preparation steps include:

  • Reviewing MFA and account separation coverage across all systems
  • Bringing all cloud services into scope
  • Rigorous system wide patching in line with 14-day requirements, implementation of patching tools
  • Updating asset inventories and scoping assumptions
  • Strengthening backup and recovery processes
  • Aligning development practices with secure coding standards
  • Mobile device management for both organisation owned devices and BYODs is strongly advised.

How can CyberLab support your Cyber Essentials journey post-May 2026?

Navigating updated Cyber Essentials requirements can be complex, particularly for organisations with growing cloud environments.

CyberLab supports businesses through:

  • Cyber Essentials readiness assessments
  • Practical remediation guidance
  • Ongoing Cyber Security strategy aligned to evolving standards

If you are planning Cyber Essentials certification or renewal after May 2026, now is the right time to act.

Get Cyber Essentials Certified

Show your commitment to cyber security and reduce risk by gaining Cyber Essentials certification – the UK government-backed standard for defending against common threats.

As an IASME-approved assessor for Cyber Essentials and Cyber Essentials Plus, we make the process simple with tailored options to suit your technical capability and business needs.

Join over 120,000 organisations already certified and take the first step towards stronger security today.

Get Started