Skip to main content

Cyber Essentials is changing in April 2026 – What you need to do now

Key changes to Cyber Essentials April 2026

Written by Vincent Priestley
Updated over a week ago

1 - You need to be more precise in your scope

2 - You need a complete picture of your assets

3 - You must properly enforce MFA everywhere it’s required

I’ve been delivering Cyber Essentials since 2014. I’ve seen the scheme evolve from a relatively simple baseline control framework into a far more structured, mature certification that genuinely improves security posture when done properly.

In April 2026, IASME will release Version 16 of the questionnaire (codenamed Danzell), replacing the current Version 15 (Willow).

This isn’t a cosmetic update. It’s a tightening of definitions, a clarification of expectations, and in some areas, a raising of the bar.

If you’re already certified — or planning to be — here’s exactly what’s changing and what you need to do to remain compliant.

1. Scope: You must be precise (no more grey areas)

One of the biggest shifts in the 2026 update is around scope clarity.

Cyber Essentials has always required organisations to define whether certification covers:

  • The whole organisation

  • A specific business unit

  • Specific locations

  • Specific systems

However, the new questionnaire removes ambiguity. You’ll now need to be far more precise about:

  • What networks are in scope

  • What users are in scope

  • What physical and cloud environments are included

  • Whether segmentation between scoped and unscoped systems is properly enforced

What you must do

If you certify the whole organisation:

  • Make sure every user, device, and cloud service is covered

  • Confirm there are no “informal” exclusions

If you certify part of the organisation:

  • Demonstrate clear technical segregation

  • Make sure scoped systems are protected from unscoped systems

  • Be able to explain and evidence network separation

  • Make sure user access from outside scope can’t compromise in-scope systems

This will particularly affect:

  • Multi-site organisations

  • Group structures with shared IT

  • Businesses with partially outsourced IT

  • Organisations using shared cloud tenants

If your scope statement is vague, expect challenge from your assessor.

2. Asset visibility: You need a complete picture

The updated questionnaire strengthens requirements around declaring:

  • Network equipment

  • Operating systems (including quantities)

  • Cloud services in use

The direction is clear: IASME wants a complete and accurate inventory.

What you must do

  • Maintain an up-to-date asset register

  • Know exactly how many endpoints you have

  • Confirm all operating systems are supported by the vendor

  • Identify and remove any legacy or unsupported systems

  • List all cloud services used for business purposes — including SaaS platforms

  • Eliminate shadow IT

If you can’t clearly state what you have, you’re unlikely to pass confidently.

Unsupported operating systems remain an immediate fail.

3. MFA: You must properly enforce it everywhere it’s required

Multi-factor authentication has been mandatory for some time, but Version 16 sharpens expectations around its implementation — particularly in cloud environments.

The key shift is this:

MFA must be enforced.

What you must do

  • Enforce MFA on all cloud services handling organisational data.

  • Make sure MFA is enabled for all administrator accounts.

  • Review backup admin accounts.

  • Review service accounts.

  • Review legacy SaaS platforms.

  • Confirm there are no bypass routes.

Common failure points I still see:

  • Secondary admin accounts without MFA.

  • Shared accounts with weak authentication.

  • MFA applied to “most” users, but not all.

  • Conditional access misconfigurations.

From 2026 onward, partial MFA implementation is not defensible.

4. Changes to question wording

Many questions have been reworded.

While it might seem minor, in practice it reduces interpretation flexibility. Over the years, I’ve seen organisations answer based on how they thought the question was intended. The revised wording tightens this.

Areas with clearer phrasing include:

  • Supported operating systems

  • Firewall protections

  • Secure configuration requirements

  • User access controls

What you must do

  • Read every question carefully.

  • Don’t reuse last year’s answers without reviewing them.

  • Validate that your interpretation aligns with the updated wording.

  • Make sure whoever completes the questionnaire understands the technical controls.

Cyber Essentials is increasingly intolerant of “assumed compliance”.

5. Expansions to administrative and contractual information

The new questionnaire includes refined administrative questions covering:

  • Regulators

  • Contracting authorities

  • Grant authorities

  • Organisational registration details

This aligns Cyber Essentials more closely with public sector procurement frameworks.

What you must do

  • Make sure your organisation’s legal details are accurate.

  • Confirm any relevant regulatory oversight.

  • Check procurement-related declarations.

While not technical, errors here can delay certification.

What hasn’t changed

The five core control areas remain the same:

  1. Firewalls

  2. Secure configuration

  3. User access control

  4. Malware protection

  5. Security update management

Cyber Essentials is still a baseline technical standard. But the tolerance for incomplete implementation is reducing.

If you’re already certified: Your 2026 preparation checklist

Here’s exactly what I recommend doing before April 2026:

1. Review your scope

  • Confirm it is technically accurate

  • Confirm segmentation works

  • Update scope statements if necessary

2. Conduct a full asset audit

  • Endpoints

  • Servers

  • Network devices

  • Cloud services

  • Remote users

  • Mobile devices

3. Validate operating system support

  • Remove unsupported systems

  • Confirm patching processes are active and effective

4. Enforce MFA everywhere required

  • All cloud services

  • All administrators

  • All remote access

  • No exceptions

5. Review admin account hygiene

  • No shared admin accounts

  • Remove dormant accounts

  • Apply least privilege

6. Perform a gap analysis before renewal

Don’t wait until renewal week. Conduct a pre-assessment review at least 2–3 months in advance.

What to expect if you’re new to Cyber Essentials

If you’ve never been through Cyber Essentials before, here’s what you should understand:

  • It’s a self-assessment questionnaire verified by an external certification body

  • You must answer truthfully

  • Evidence may be requested

  • If applying for Cyber Essentials Plus, technical testing will validate your answers

You should expect to:

  • Document your IT environment properly

  • Implement baseline security controls

  • Patch systems promptly

  • Enforce MFA

  • Secure remote access

  • Remove unsupported systems

It’s not a paperwork exercise and if you treat it as one, you’ll struggle.

However, if implemented properly, Cyber Essentials provides:

  • A strong baseline security posture

  • Increased resilience against common attacks

  • Credibility in procurement

  • Protection against commodity threats

My professional view

Having delivered this scheme since 2014, I can say confidently:

The direction of travel is positive.

IASME is reducing ambiguity, strengthening cloud security expectations, and increasing the integrity of certification.

This update isn’t about making certification harder for the sake of it. It’s about ensuring that a Cyber Essentials badge genuinely means something.

If your organisation already takes security seriously, these changes will be manageable.

If you’ve been skating close to the edge, April 2026 will expose that.

If you’d like a readiness review, gap analysis, or support preparing for the new questionnaire, now is the time to start.

Cyber Essentials should be your foundation — not your finish line.

Did this answer your question?