{"id":5409,"date":"2019-10-24T10:00:38","date_gmt":"2019-10-24T09:00:38","guid":{"rendered":"https:\/\/cybersmart.com\/?p=5409"},"modified":"2021-10-05T12:02:35","modified_gmt":"2021-10-05T12:02:35","slug":"cyber-essentials-your-it-infrastructure-requirements","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/cyber-essentials-your-it-infrastructure-requirements\/","title":{"rendered":"Cyber Essentials: Your IT infrastructure requirements"},"content":{"rendered":"

For<\/span> companies<\/span> aiming<\/span> to<\/span> apply<\/span> to<\/span> the<\/span> Government<\/span> Cyber<\/span> Essentials<\/span> scheme<\/span><\/a><\/span>,<\/span> it\u2019s<\/span> essential<\/span> to<\/span> be appropriately prepared and well-managed to reach all of the IT infrastructure requirements<\/span> listed.<\/span><\/p>\n

Businesses wishing to take that next step and get certified through IA<\/a><\/span>SME or any other scheme must<\/span> be<\/span> fully<\/span> compliant<\/span> with<\/span> these<\/span> requirements<\/span> to<\/span> reach<\/span> that<\/span> passing<\/span> grade.<\/span> With<\/span> our<\/span> guidance, you can be Cyber Essentials ready in next to no<\/span> time.<\/span><\/p>\n

The<\/span> specific<\/span> requirements<\/span> for<\/span> IT<\/span> infrastructure<\/span> under<\/span> the<\/span> Cyber<\/span> Essentials<\/span> scheme<\/span> are<\/span> split<\/span> into five distinct categories or control themes, listed<\/span> below:<\/span><\/p>\n

Firewalls<\/span><\/h4>\n

Every device running network services, particularly desktop computers, laptop computers, routers and servers, must include a boundary firewall. This firewall prevents or restricts the flow of network traffic both inbound and outbound to prevent against cyber attacks. Under Cyber Essentials, this firewall must:<\/span><\/p>\n