Lesson 1.4 — How the assessment works
This lesson explains the Cyber Essentials assessment process from start to finish — who is involved, what the questionnaire covers, how answers are reviewed, what happens after submission, and what the organisation needs to have in place before it begins.
What You'll Be Able to Do
By the end of this lesson, you will be able to:
- the learner should understand the end-to-end Cyber Essentials Basic assessment process — from selecting a certifying body to receiving the certificate — and be able to identify the key stages and responsibilities involved.
Why This Matters
It prepares learners to use the course as a preparation tool, not a last-minute revision exercise.
The Core Rule
Cyber Essentials Basic works like this: the organisation selects a certifying body, completes the questionnaire online, a responsible person attests that the answers are accurate, the assessor reviews the answers, and if everything passes, a certificate is issued.
Clarification requests are common and are not automatic failures. The certificate is valid for twelve months and is publicly listed.
Step 1 — Selecting a certifying body
Cyber Essentials assessments must be conducted through an organisation approved by IASME, the scheme owner.
These organisations are called certifying bodies. They are licensed to conduct Cyber Essentials assessments and to issue certificates on behalf of the scheme. The IASME website maintains a list of approved certifying bodies.
Step 2 — Completing the questionnaire
The assessment questionnaire is divided into sections corresponding to the key areas of the scheme:
- A1 — Organisation details: the legal entity, certificate identity, registration number, sector, staff numbers and addresses.
- A2 — Scope: what is included in the assessment — the whole organisation or a defined subset — and what is explicitly excluded.
- A3 — Firewalls: boundary firewalls, routers, software firewalls, rules, administration controls.
- A4 — Secure configuration: accounts, passwords, services, auto-run, authentication, device locking.
- A5 — User access control: account management, administrator accounts, MFA, password policy.
- A6 — Malware protection: protection method, configuration, coverage, update status.
- A7 — Security update management: OS and application updates, 14-day rule, unsupported software.
- A8 — Attestation: the responsible person formally confirms the answers are accurate and that the controls are in place.
Step 3 — The attestation
Before the completed questionnaire is submitted, a responsible person within the organisation must formally attest that:
- the answers are accurate;
- the controls described are genuinely in place;
- the organisation understands what it is declaring.
Copy This
Work through the workbook activity for this lesson. Each question maps directly to the CE questionnaire.
Quick Checklist
Before moving on, make sure you can say yes to these:
- [ ] Who provides the Cyber Essentials assessment platform and reviews the questionnaire answers?
- [ ] What does the attestation in the Cyber Essentials questionnaire require?
- [ ] What is a clarification request in the context of a Cyber Essentials assessment?
- [ ] Where is a Cyber Essentials certificate published once issued?
- [ ] Why should an organisation prepare a device and software inventory before completing the Cyber Essentials questionnaire?
Your Action
Do this now — it takes 10–20 minutes.
Register on the IASME assessment portal (iasme.co.uk) now so your account is ready when you are ready to submit.
Key Takeaway
This course prepares you to complete the questionnaire accurately — with evidence, with a clear scope, and without guessing.
Your Workbook Activity
Complete: Assessment process planner
Next Lesson
In the next lesson: Cyber Essentials vs Cyber Essentials Plus