Lesson 5.6 — Authentication before access: making sure users prove who they are before accessing organisational data or services

This lesson helps the learner understand the secure configuration requirement that users must be authenticated before they can access organisational data or services.

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • identify where organisational data or services could be accessed without authentication
  • confirm that users must sign in before access is granted
  • record evidence for devices
  • cloud services
  • servers
  • shared systems and applications

Why This Matters

It explains what authentication means in practical Cyber Essentials terms, where unauthenticated access can appear, how shared devices and cloud services should be handled, and how to record evidence without turning this lesson into the full user access control or MFA module.

The most common problems are:

  • assuming being on the office network is enough authentication;
  • confusing authentication with authorisation;
  • ignoring public file-sharing links;
  • ignoring internal systems with no login;

The Core Rule

Cyber Essentials expects users to be authenticated before they can access organisational data or services.

Authentication means proving who you are before access is granted.

What the CE Assessor Looks For

A strong position shows:

  • users must sign in before accessing devices, cloud services and applications;
  • organisational data is not accessible through anonymous links unless deliberately public;
  • shared devices require appropriate user authentication or are locked down to a specific function;
  • cloud services use named accounts;
  • remote access requires named authentication and MFA where required;
  • supplier access requires authentication and is reviewed;

Common Mistakes

  • assuming being on the office network is enough authentication;
  • confusing authentication with authorisation;
  • ignoring public file-sharing links;
  • ignoring internal systems with no login;
  • ignoring shared devices;
  • ignoring tablets and phones;

Copy This

Keep this rule visible:

People should not be able to access work data or work services anonymously or without proving who they are.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What does this secure configuration requirement expect?
  • [ ] What does authentication mean?
  • [ ] What is the difference between authentication and authorisation?
  • [ ] Give three examples of organisational data or services.
  • [ ] Why can public links be an authentication issue?

Your Action

Do this now — it takes 10–20 minutes.

Confirm that every in-scope device requires a password, PIN, or biometric before access. Note any exceptions. Record in Section SC.

Key Takeaway

People should not be able to access work data or work services anonymously or without proving who they are.

Your Workbook Activity

Complete: Authentication before access review record

Next Lesson

In the next lesson: Device unlocking: PINs, passwords, biometrics and lockout controls