Cyber Essentials Plus Illustrative Test Specification April 2020
Cyber Essentials Plus Illustrative Test Specification April 2020
v2.0
April 2020
Crown Copyright 2020
Cyber Essentials Plus: Illustrative Test Specification
Contents
What’s new ............................................................................................................................................. 3
Audience ................................................................................................................................................. 3
Purpose ................................................................................................................................................... 3
Before you begin ..................................................................................................................................... 4
Success criteria........................................................................................................................................ 4
Test results .......................................................................................................................................... 4
Advisory notes .................................................................................................................................... 4
External testing ....................................................................................................................................... 4
Test Case 1: Remote vulnerability assessment ................................................................................... 4
Internal testing ........................................................................................................................................ 7
General prerequisites for internal testing .......................................................................................... 7
Coverage of internal testing................................................................................................................ 7
Test Case 2: Check patching, by authenticated vulnerability scan of devices .................................... 7
Test Case 3: Check malware protection on EUDs ............................................................................... 8
Test Case 4: Check effectiveness of EUD defences against malware delivered by email................... 9
Test Case 5: Check EUD defences against malware delivered through a website ........................... 10
Conclude the assessment ..................................................................................................................... 11
Appendix A: Vulnerability scanning ...................................................................................................... 11
Appendix B: Types of test file ............................................................................................................... 12
Cyber Essentials Plus: Illustrative Test Specification
This illustrative test specification exists to help the Cyber Essentials Delivery Partner develop their
own test specifications for their Certification Bodies to carry out Cyber Essentials Plus
assessments.
The purpose of this illustration is to encourage a consistent approach, since Applicants should be
able to expect the same certification outcome, no matter which Certification Body they ultimately
use.
Throughout this illustration we address the Assessor directly, so that all task steps are as clear as
possible. We also include some contextual notes for the Delivery Partner.
What’s new
We've reworked this information so that it is easier to understand and use. If you're familiar with the
earlier PDF version (entitled 'Common Test Specification') you'll notice lots of changes in sense and
structure.
Many statements are now clearer, to reduce ambiguity and potential for misinterpretation.
Otherwise, there are few technical changes in this release. The main changes are:
Audience
This document is mostly aimed at personnel who actually conduct Cyber Essentials Plus assessments
on behalf of Certification Bodies (the 'Assessor', or 'you').
It may also be of interest to the organisation seeking Cyber Essentials Plus certification (the
'Applicant') — staff involved in the process may wish to understand the test criteria that make up
the assessment.
Purpose
The purpose of this test specification is to facilitate independent testing to check the Applicant's
compliance with the technical requirements of the Cyber Essentials scheme, and to:
• ensure this has indeed resulted in adequate defences against the threats in scope
• detail the required tests, and the criteria for 'pass' or 'fail' in assessment for certification
You must agree the boundary of scope with the Applicant, before testing begins. Refer to
Requirements for IT Infrastructure (Cyber Essentials scheme).
Cyber Essentials Plus: Illustrative Test Specification
Success criteria
Test results
You must mark the outcome of each test case and sub-test with one of the following results:
Pass:
• Before you mark a test case with a Pass result, you must ensure that every subtest in that
test case also resulted in Pass — unless a special exception is stated in this test specification.
• Similarly, before you mark the overall assessment with a Pass result (which would lead to
Cyber Essentials Plus certification), you must ensure that every test case resulted in Pass.
Fail:
• If any sub-test within this test specification results in Fail then you must also mark the
parent test case — and the overall assessment — Fail.
• To be clear: Any single Fail means a Fail for the assessment as a whole — unless a special
exception is stated in this test specification. In any case, you should remain diligent and
complete the assessment in full, to give the Applicant a complete appraisal.
Advisory notes
You may include an Advisory Note with any result. Use these to inform the Applicant about relevant
improvements they could easily make to improve cyber security, and to explain the rationale for
particular test decisions.
External testing
Test Case 1: Remote vulnerability assessment
Test purpose
To test whether an Internet-based opportunist attacker can hack into the Applicant's system with
typical low-skill methods.
Test description
Prerequisites
You will need:
• a vulnerability scanning tool that has been approved by the Delivery Partner — see Appendix
A: Vulnerability scanning
• to have identified the IP addresses to be scanned
Where dynamic IP addresses are in use for an Internet connection, the scope may be defined in
terms of appropriate DNS entries.
Cyber Essentials Plus: Illustrative Test Specification
Take care with such addresses to ensure services like carrier-grade NAT do not inadvertently send
assessment traffic to the wrong destination.
Sub-test 1.1
1. Identify all of the IP addresses currently in use by the Applicant.
2. Scan all identified IP addresses, on the recommended set of TCP and UDP ports (see
Appendix A: Vulnerability scanning).
3. For each Internet-accessible service you discover:
1. Determine whether any known vulnerabilities exist.
2. For each vulnerability you find, assess and score the level of risk using the CVSS v3
standard.
3. Use the flow diagram and notes below to determine whether to record a Pass or Fail
result for the service.
Cyber Essentials Plus: Illustrative Test Specification
Sub-test flow diagram for assessing services accessible through the firewall.
Start
1 6
Does this service Can
include authentication be
Fail Yes vulnerabilities bypassed with Yes Fail
that score 7.0 or low-skill
more (High risk)? methods?
No No
2 7
Does this service Have default
give access only passwords for this
Pass Yes to information service been No Fail
that is both public changed?
and read-only?
No Yes
3 8
Do network Does this service
controls restrict throttle login
Yes access to a attempts?
Pass Yes Pass
defined, limited
set of endpoints?
No No
4 9
Do users need to Does this service
authenticate to lock users out
Fail No access this after (at most) 10 No Fail
service? failed login
attempts?
Yes Yes
5 Pass
Is authentication
based on two or
Pass Yes more factors? 6: Low-skill methods for bypassing authentication mechanisms include,
for example:
Internal testing
These tests assess defence against attacks which originate externally but involve some form of
internal user action, or which are difficult to test directly from the internet.
• to be able to send arbitrary emails to an account operated by the Applicant — that is, you
need an external email system that performs no filtering and is not blacklisted
• test files, hosted on an external website owned by the Certification Body (see Appendix B:
Types of test file) — you may need to have the Applicant arrange access to this site, perhaps
adding it to their whitelist
• suitable credentials to perform the tests
• working email clients (and associated email addresses) and web browsers on a sample of the
end user devices in scope
• end user devices (EUDs) such as desktops, tablets, laptops, and smartphones which can
connect to internal resources
• servers on which standard (that is, non-administrator) users can obtain an interactive
desktop environment
On all but the smallest networks it will be impractical to test every device that is within the agreed
boundary of scope. Instead, test a representative sample — but take steps to ensure you can be
confident that your sample of devices (including servers and EUDs) is actually representative.
• Many organisations use standardised configurations for their servers and EUDs. In such
cases, much of the organisation's equipment can be covered by a small number of
representative samples.
• We recommend that you aim to satisfy yourself that, in total, your testing is representative
of at least 90% of all the devices in scope. The actual number of representative devices you
will need to test to achieve this level of confidence will depend on the amount of variation
that exists as a result of the Applicant's particular provisioning processes, and their
effectiveness.
Test description
Prerequisites
In addition to the general prerequisites for internal testing, you will need:
• a vulnerability scanning tool that has been approved by the Delivery Partner — see Appendix
A: Vulnerability scanning
Sub-test 2.1
For each device to be tested, scan with the approved vulnerability scanning tool.
Using the output of the scan, identify vulnerabilities that are high risk or security critical, as defined
by the following CVSS v3 parameters:
If there are any vulnerabilities which meet the above criteria, and for which the vendor provided
patch has been available for more than 14 days prior to testing, record a Fail result for the sub-test.
Otherwise, record a Pass result.
The idea here is to assess each vulnerability in context and try to determine if an internet-based
attacker really could exploit it and harm the Applicant.
You may determine that other mitigations for an unpatched vulnerability (such as virtual patching or
aggressive sandboxing) are less than ideal, but still adequate for a Pass result.
Test description
Prerequisites
Identify what type of malware protection each EUD in the sample set uses — antivirus software,
application whitelisting or application sandboxing.
• all antivirus definitions released within the 24 hours prior to testing have been installed
• all antivirus engine updates released within the 30 days prior to testing have been installed
If both of these are true, record a Pass result for this sub-test. Otherwise, record a Fail result.
• the list of trusted root certificates is the standard set as provided by the operating system
manufacturer, or a subset thereof
• additional trusted root certificates are added only with the Applicant's explicit agreement
• an unsigned executable, and an executable signed with a certificate that does not chain to a
trusted certificate, will not execute on the EUD
• operating system policy settings are appropriate to ensure code signing applies to all
executable file formats, as applicable to the EUD
If all of these are true, record a Pass result for this sub-test. Otherwise, record a Fail result.
If this is true, record a Pass result for this sub-test. Otherwise, record a Fail result.
Test Case 4: Check effectiveness of EUD defences against malware delivered by email
Test purpose
To test whether or not EUDs are protected against malware that is delivered via email attachments.
Test description
Prerequisites
See the general prerequisites for internal testing, and especially note Appendix B: Types of test
file.
Sub-test 4.1
For each EUD in the sample set:
Cyber Essentials Plus: Illustrative Test Specification
1. Establish a baseline by sending a simple email from your remote test account, with no
attachments. Using the EUD, verify that this email arrives successfully at the test destination.
2. Determine what types of file you should test for and ready your test emails. You'll need one
email for every type of file to be tested, given that you'll attach one test file to each email.
3. Attempt to send each test email from your remote test account to the test destination.
Using the EUD, attempt to open each attached test file. Note the result.
If any of the malware test files arrive successfully and the user is not blocked from accessing them
then record a Fail result for this sub-test.
If any of the executable test files arrive successfully and can be executed without a warning and
prompt for the user to decide whether or not to proceed then record a Fail result for this subtest.
Otherwise, record a Pass result for this sub-test.
Test Case 5: Check EUD defences against malware delivered through a website
Test purpose
To test whether or not EUDs have protection from malware delivered through a website.
Test description
Prerequisites
See the general prerequisites for internal testing, and especially note Appendix B: Types of test
file.
Also, have the Applicant configure the web content filter to provide an amount of filtering for the
approved external website that is representative of the filtering performed with most other allowed
sites (that is, those that are not specifically blacklisted).
The rationale for this approach is based on the assumption that there probably is a whitelisted site
from which files can be downloaded, somewhere. Testing for Cyber Essentials Plus simulates this by
using the approved external website.
Sub-test 5.1
For each EUD in the sample set:
If any of the malware test files are downloaded successfully and the user is not blocked from
accessing them then record a Fail result for this sub-test.
Cyber Essentials Plus: Illustrative Test Specification
If any of the executable test files are downloaded successfully and can be executed without a
warning and prompt for the user to decide whether or not to proceed then record a Fail result for
this sub-test. Otherwise, record a Pass result for this sub-test.
It may be that you cannot conclude on the appointed day, perhaps because of some particular
technical difficulties with testing. In this case, consult with the Delivery Partner — at their discretion,
you may defer tests and arrange to complete them at a later date.
Example
For some temporary reason you cannot obtain the test files you need for Test Case 3: Check
existence of malware protection on EUDs. Without these files you cannot complete the subtests
and confirm either a Pass or a Fail result. So, you should revisit when you can obtain the
files and complete the test. Then you can mark with a Pass or Fail result, as appropriate.
If you determine a Pass result for all test cases then the Applicant passes the overall assessment and
you may proceed to award a Cyber Essentials Plus certificate.
If you determine a Fail result for any test cases, but these failures result from only a small number of
minor issues then consult with the Delivery Partner. At their discretion, the Applicant may still pass
the overall assessment and then you may proceed to award a Cyber Essentials Plus certificate.
Otherwise, the Applicant fails the overall assessment and you will not award a certificate.
• Use the vulnerability scanning tool(s) that the Delivery Partner has approved for use in Cyber
Essentials Plus tests. For information on good practices with such tools see PCI Approved
Scanning Vendors Program Guide.
• Scan all IP addresses associated with the Applicant. Rather than scanning all ports associated
with all IP addresses, you may scan a more limited range specified by the Delivery Partner.
Your Certification Body is responsible for defining and hosting a sub-set for you to test with,
appropriate to the particular Applicant. Check with your Certification Body to ensure you will obtain
the correct files for each test.
For test result criteria, we distinguish between two broad groups of test files:
• malware test files — anti-malware should detect these and block the user from accessing
them
• executable test files — the user should at least see a warning and a prompt that allows them
to decide whether or not to proceed
You should also encourage the Certification Body to tailor the sub-set of test files that the Assessor
will actually use, to suit each Applicant. Each sub-set should reflect the applications and platforms
that the particular Applicant is using.
For example, if the Applicant uses only OS X devices then the sub-set need not cover Windows
specific file types. Or, if the Applicant uses a mixed environment then the sub-set should cover a
suitably wider set of file types.
The full set of representative test files you provide must include:
• container formats (such as .zip and .gz) which the Applicant's environment is able to process
• a range of file types that are executable by default on common platforms — both native
binaries and scripting languages
• files of types which users might regularly receive — such as documents and spreadsheets —
but which contain inert malware samples
• executable test files should launch obvious behaviour (such as launching a web browser to a
known page, or creating an onscreen dialog) so that the Assessor can detect execution
quickly and easily
• malware samples should be specific inert files that are known to be flagged by the majority
of common antivirus solutions