Cybersecurity & Risk

The Big Changes in Cyber Essentials v3.3Don't Fail Your Next Certification

Cyber Essentials v3.3 has fundamentally changed what certification requires. Cloud services, SaaS applications, remote working environments, and identity governance are now firmly within scope. Organisations that prepared for earlier versions may find that their current controls no longer meet the standard - and many will not discover this until they fail an assessment.

This guide explains what has changed, why organisations are failing, and what operational disciplines are now required to achieve and maintain certification. The core message is straightforward: Cyber Essentials is no longer simply about installing the right products. It is increasingly about governance, operational visibility, identity management, SaaS control, and maintaining secure operational discipline across the organisation.

Key Numbers

14days

Maximum time to patch critical vulnerabilities

40-100apps

Average SaaS applications in an SME

3xmore

Governance failures vs. missing products as CE failure cause

100%required

MFA coverage for cloud and remote access accounts

Based on NCSC Cyber Essentials v3.3 requirements and Wavex client assessment data.

Key Changes at a Glance

What Has Changed in v3.3

The 2024 update to Cyber Essentials reflects the reality of how modern organisations operate. Seven areas have seen significant changes - each one representing a governance or operational discipline that many businesses have not yet formalised.

Cloud & SaaS in Scope

Cloud platforms, SaaS tools, and hosted services used by the organisation are now firmly within the Cyber Essentials boundary. Unmanaged SaaS adoption is no longer invisible to assessors.

MFA Now Critical

Multi-factor authentication is required for all accounts with access to organisational data, cloud services, and remote access. Password-only access is no longer acceptable.

Faster Patching Expectations

Critical and high-severity vulnerabilities must be remediated within 14 days. Patch governance - not just patch deployment - is now assessed.

Tighter Scoping Rules

Organisations can no longer easily exclude cloud services or remote devices from scope. The boundary must reflect the actual operational environment.

Remote & BYOD Expectations

Devices used to access organisational systems - including personal devices - must meet Cyber Essentials controls. Remote working is no longer a grey area.

Operational Visibility Required

Assessors now expect evidence of asset awareness, software visibility, and patch status tracking. Visibility is a control, not just a nice-to-have.

Governance Maturity Matters

Organisations must demonstrate operational ownership, defined processes, and consistent control application. Governance gaps are now a common cause of assessment failure.

Identity & Access Controls

Leaver/joiner processes, privilege management, and consistent identity lifecycle governance are now assessed as part of access control requirements.

Why Organisations Are Failing

The Certification Has Changed. Most Organisations Have Not.

For many years, Cyber Essentials was primarily a product checklist. Install antivirus, configure a firewall, enable patching, apply basic access controls. Organisations that had invested in standard IT infrastructure could pass with relatively modest preparation. The certification was a useful baseline, but it did not demand operational maturity.

Version 3.3 changes this significantly. The expansion of scope to include cloud services and SaaS applications means that the average organisation now has dozens of in-scope systems that were not previously assessed. The requirement for consistent MFA enforcement means that the informal exceptions that accumulated over years of reactive IT management are now compliance failures. The 14-day patching requirement means that organisations without structured vulnerability management will struggle to demonstrate compliance.

The organisations most at risk are those that have grown quickly, adopted SaaS tools across departments without central oversight or IT involvement. They may have passed previous Cyber Essentials assessments comfortably, but the environment they are operating in today looks very different from the one the earlier standard was designed to assess.

"Cyber Essentials is no longer simply about installing the right products. It is increasingly about governance, operational visibility, identity management, SaaS control, and maintaining secure operational discipline across the organisation."

The most common failure points we see in organisations preparing for Cyber Essentials v3.3 are not missing products. They are governance gaps: SaaS applications in scope that nobody knew about, leavers that where never raised with IT, and patch processes that worked in principle but could not be evidenced in practice. These are operational problems, not technology problems. And they require operational solutions.

For a broader perspective on how reactive IT creates hidden risk, our article on the hidden risks of reactive IT managed services explores the operational and commercial consequences of IT management that responds to problems rather than preventing them.

Concerned about your Cyber Essentials readiness? Speak to a Wavex specialist about a governance and compliance review.

Speak to Wavex
SaaS Discovery & Governance

The SaaS Problem Most Organisations Have Not Solved

The average SME now runs between 40 and 100 SaaS applications. Finance uses one platform for expense management, marketing another for campaign analytics, operations a third for project tracking. Each of these tools may be processing organisational data. Under Cyber Essentials v3.3, each one is potentially in scope.

The challenge is not simply the number of applications. It is that most organisations no longer have a complete picture of what SaaS platforms their staff use, where business data resides, who owns each system operationally, or whether SSO and MFA are enforced consistently across the estate. This is shadow IT at scale - and it is now a direct Cyber Essentials compliance risk.

SaaS Discovery Audits

A structured audit to identify all SaaS applications in use across the organisation, including those adopted without IT involvement.

Operational Governance Reviews

Assessment of current governance processes, identifying gaps in change management, supplier onboarding, and SaaS lifecycle management.

Identity & SSO Implementation

Extending Microsoft Entra ID SSO to the SaaS estate, ensuring MFA and access controls are applied consistently across all applications.

SaaS Rationalisation

Identifying duplicate tools, unused licences, and applications that can be consolidated or replaced with Microsoft 365 native capabilities.

The solution to SaaS sprawl is not restriction - it is governance. Organisations that implement a lightweight SaaS register and a simple approval process for new tools find that they can accommodate the pace of SaaS adoption without losing visibility or control. The goal is not to prevent staff from using the tools that make them productive. The goal is to ensure that when a new tool is adopted, IT knows about it, security has assessed it, and the organisation understands what data is being processed and where.

For organisations that have not yet addressed SaaS governance, our article on why SME technology projects fail provides a detailed framework for building operational governance without creating enterprise-scale bureaucracy.

Identity & Access Security

Identity Is Now the Security Perimeter

In the era of cloud computing and remote working, the traditional network perimeter has dissolved. Staff access organisational systems from home networks, personal devices, and public Wi-Fi. The only consistent control point that remains is identity - and Cyber Essentials v3.3 reflects this reality by placing identity management at the centre of its requirements.

The requirement for consistent MFA enforcement is the most visible change, but the underlying shift is broader. Assessors now expect organisations to demonstrate that identity is managed as an operational discipline - not just that MFA is enabled in a settings panel. This means leaver/joiner processes that are consistently followed, privilege reviews that happen on a defined schedule, service accounts that are documented and audited, and conditional access policies that enforce security standards at the identity layer.

Identity Security Checklist for Cyber Essentials v3.3

MFA enforced for all accounts accessing cloud services, email, and remote access

Conditional access policies configured to block non-compliant devices

Leaver process documented and consistently followed - accounts disabled within hours of departure

Joiner process ensures role-appropriate access from day one, not accumulated over time

Privileged accounts reviewed quarterly and access removed when no longer required

Service accounts documented, audited, and protected with strong credentials

SSO implemented to extend identity controls across the SaaS estate

Password policies enforced - minimum length, complexity, and no reuse

Admin accounts used only for administrative tasks, not day-to-day work

Microsoft Entra ID (formerly Azure Active Directory) provides the identity foundation that most organisations need to meet these requirements. When properly configured, it enforces MFA through conditional access policies, manages device compliance, extends SSO to hundreds of SaaS applications, and provides the audit trail that assessors expect. The technology is available to any Microsoft 365 customer - the challenge is implementing it correctly and maintaining it as the organisation evolves.

For organisations looking to understand the full scope of Microsoft 365 security capabilities, our Microsoft 365 and Azure services page explains how Wavex helps organisations get the most from their Microsoft investment while maintaining a strong security posture.

Wavex can assess your current identity governance posture and implement the controls needed for Cyber Essentials v3.3 compliance.

Speak to Wavex
Governance Maturity

Where Does Your Organisation Sit?

The five-level governance maturity model below reflects the operational reality of how organisations manage technology adoption, SaaS governance, and security controls. Click each level to understand the characteristics and the associated Cyber Essentials risk.

Most SMEs sit at Level 2 or Level 3. The majority of Cyber Essentials failures in v3.3 assessments stem from governance gaps - not missing products. An organisation at Level 2 may have all the right security tools deployed but still fail because it cannot demonstrate consistent control application, evidence patch compliance, or show that its SaaS estate is understood and managed.

1

Level 1: Uncontrolled Adoption

2

Level 2: Reactive Visibility

3

Level 3: Operational Governance

4

Level 4: Proactive Operational Maturity

5

Level 5: Strategic Governance & Continuous Improvement

Why Governance Gaps Cause Certification Failure

The shift from Level 2 to Level 3 governance is the most important transition for Cyber Essentials readiness. At Level 2, controls exist but their application is inconsistent and depends on individuals rather than process. When an assessor asks for evidence - patch compliance reports, MFA enforcement logs, leaver account closure records - Level 2 organisations often cannot provide it, even when the underlying controls are technically in place.

The goal is not to reach Level 5 governance before pursuing Cyber Essentials. The goal is to reach Level 3 - where controls are consistently applied and can be evidenced - and then build from there. Wavex works with organisations at every maturity level, providing the frameworks, tools, and operational support needed to achieve and maintain certification. Our IT strategy consulting service includes governance maturity assessments as a core component.

Operational Visibility

You Cannot Govern What You Cannot See

One of the most consistent findings in Cyber Essentials v3.3 assessments is that organisations lack the operational visibility needed to demonstrate compliance. They may have security controls in place, but they cannot produce evidence of consistent application. They may have a patch management process, but they cannot show which devices are compliant and which are not. They may have MFA enabled, but they cannot confirm that it is enforced for every account in scope.

Visibility is not simply a reporting capability. It is an operational discipline that enables organisations to identify gaps before assessors do, remediate issues before they become failures, and maintain compliance continuously rather than preparing for it reactively.

100% asset coverage

Asset Visibility

Complete inventory of all devices, servers, and endpoints within scope. No device should be unknown to the IT team.

14-day SLA monitoring

Patch Compliance Tracking

Real-time visibility of patch status across all in-scope devices, with outstanding vulnerabilities prioritised by severity.

Zero orphaned accounts

Identity & Access Reporting

Continuous monitoring of MFA enforcement, privileged access usage, and account lifecycle status across all systems.

Full SaaS inventory

SaaS Estate Visibility

Live register of all SaaS applications in use, their data classification, ownership, and security control status.

CIS benchmark aligned

Security Posture Scoring

CIS-aligned security scoring that provides a measurable, comparable view of the organisation's security posture over time.

Assessment-ready reports

Compliance Evidence

Automated generation of the evidence required for Cyber Essentials assessments - patch reports, MFA logs, configuration baselines.

Wavex provides clients with live operational dashboards that surface security posture, patch compliance, asset status, and identity governance in a single view. These dashboards are not simply reporting tools - they are operational management instruments that enable IT teams and business leaders to understand their current risk exposure and make evidence-based decisions. For organisations preparing for Cyber Essentials, they provide the audit trail that assessors require.

For a broader perspective on what operational visibility should look like in a well-managed IT environment, our article on what good IT looks like sets out the standards that mature IT management should meet.

Requirement by Requirement

Understanding Each v3.3 Requirement

Each section below covers a specific Cyber Essentials v3.3 requirement - explaining what it means in practice, the real-world operational challenge it presents, how mature organisations approach it, and how Wavex supports clients. Click any section to expand the detail.

Working with Wavex

Operational Problems We Help Clients Solve Every Day

Wavex works with SMEs and mid-market organisations across London and the UK to build the operational foundations that Cyber Essentials v3.3 requires. Our approach is not to prepare organisations for a single assessment - it is to help them build the governance, visibility, and operational disciplines that make certification a natural outcome of how they manage IT, rather than a project they undertake every two years.

The organisations we work with typically come to us at one of two points. Some are preparing for their first Cyber Essentials assessment and want to understand what is required. Others have previously held certification but are concerned that the v3.3 changes have created new gaps in their current controls. In both cases, the starting point is the same: a structured assessment of the current environment, identifying what is in scope, what controls are in place, and where the gaps are.

Cyber Essentials Readiness Review

A structured assessment of your current environment against Cyber Essentials v3.3 requirements, identifying gaps and providing a prioritised remediation plan.

Identity & MFA Implementation

Implementation of Microsoft Entra ID conditional access, MFA enforcement, and identity lifecycle management to meet v3.3 identity requirements.

SaaS Governance Programme

SaaS discovery audit, governance framework design, and SSO implementation to bring the SaaS estate under consistent operational control.

Ongoing Compliance Management

Continuous monitoring, patch management, and compliance reporting to maintain Cyber Essentials certification between assessment cycles.

Microsoft 365 Security Hardening

Security baseline implementation, Defender configuration, and compliance posture management across the Microsoft 365 environment.

Managed Security Services

24x7 security monitoring, threat detection, and incident response as part of a fully managed IT and security service.

For organisations that are also thinking about the broader AI governance implications of their technology environment, our article on why every business needs an AI risk policy explores how AI adoption intersects with Cyber Essentials and operational governance requirements.

Speak to a Wavex Sector Specialist Today about your Cyber Essentials v3.3 readiness and governance maturity.

Speak to Wavex
Frequently Asked Questions

Cyber Essentials v3.3 - Common Questions

What changed in Cyber Essentials v3.3?+
Version 3.3 significantly expanded the scope of Cyber Essentials to include cloud services, SaaS applications, and remote working environments. It introduced stricter MFA requirements, faster patching expectations (14 days for critical vulnerabilities), tighter scoping rules that make it harder to exclude cloud services, and a greater emphasis on operational governance and identity lifecycle management. The changes reflect the reality of how modern organisations operate, rather than the on-premise environments that earlier versions were designed around.
Is MFA mandatory for Cyber Essentials?+
Yes. Under Cyber Essentials v3.3, multi-factor authentication is required for all accounts that can access organisational data, cloud services, and administrative interfaces. This includes Microsoft 365, cloud platforms, remote access systems, and any other service where a compromise could affect the organisation. Password-only authentication is no longer acceptable for these accounts.
Are SaaS applications in scope for Cyber Essentials?+
Yes. Cloud platforms and SaaS applications used by the organisation to process, store, or transmit business data are now within the Cyber Essentials assessment boundary. This is one of the most significant changes in v3.3. Organisations must demonstrate that they have visibility of their SaaS estate and that appropriate controls - including MFA, access management, and secure configuration - are applied consistently across these platforms.
What is Cyber Essentials Plus?+
Cyber Essentials Plus is the independently verified version of Cyber Essentials. Where standard Cyber Essentials is a self-assessment questionnaire, Cyber Essentials Plus involves a technical audit conducted by an accredited assessor. The assessor tests the controls described in the self-assessment, including vulnerability scanning, configuration checks, and MFA verification. Cyber Essentials Plus provides a higher level of assurance and is increasingly required by government contracts and supply chain requirements.
How quickly must vulnerabilities be patched?+
Under Cyber Essentials v3.3, critical and high-severity vulnerabilities must be remediated within 14 days of a patch becoming available. This applies to all in-scope devices and software, including cloud services and SaaS applications. Organisations must also have a process for identifying vulnerabilities and tracking remediation progress - not just deploying patches reactively when they become aware of an issue.
Does Cyber Essentials cover Microsoft 365?+
Yes. Microsoft 365 is within the Cyber Essentials scope for any organisation that uses it to process, store, or transmit business data - which includes virtually all Microsoft 365 customers. Organisations must demonstrate that MFA is enforced for all Microsoft 365 accounts, that secure configuration has been applied, that access is managed appropriately, and that the environment is monitored for security issues.
Can unmanaged SaaS tools cause Cyber Essentials failure?+
Yes. If an unmanaged SaaS tool is used to process organisational data, it falls within the Cyber Essentials scope. If the organisation cannot demonstrate that appropriate controls are applied to that tool - including MFA, access management, and secure configuration - it represents a compliance gap. This is why SaaS discovery and governance are increasingly important for organisations preparing for Cyber Essentials assessment.
What is Cyber Essentials governance?+
Cyber Essentials governance refers to the operational processes and management disciplines that ensure Cyber Essentials controls are consistently applied and maintained across the organisation. This includes change management processes that assess security implications before new technology is adopted, identity lifecycle management that ensures access is granted and revoked appropriately, patch governance that tracks vulnerability remediation, and regular reviews that verify control effectiveness. Governance is what turns a one-time certification into a continuous security posture.
What is shadow IT?+
Shadow IT refers to technology - including SaaS applications, cloud services, and devices - used within an organisation without the knowledge or approval of IT and security teams. Under Cyber Essentials v3.3, shadow IT is a direct compliance risk because unmanaged applications may be processing organisational data without appropriate security controls. Managing shadow IT requires a combination of technical controls, governance processes, and cultural change.
What is SaaS sprawl?+
SaaS sprawl refers to the accumulation of software-as-a-service applications across an organisation, often purchased independently by different departments without central oversight. The average SME now runs between 40 and 100 SaaS applications. Under Cyber Essentials v3.3, this creates compliance risk because each application that processes organisational data falls within scope, and organisations must demonstrate consistent security controls across all of them.
Does Cyber Essentials require SSO?+
Cyber Essentials does not explicitly require single sign-on (SSO), but SSO is one of the most effective ways to meet the MFA and access management requirements consistently across a SaaS estate. By routing authentication through a central identity provider such as Microsoft Entra ID, organisations can enforce MFA, conditional access policies, and identity lifecycle controls across all connected applications without managing credentials separately in each system.
How does Cyber Essentials apply to remote workers?+
Remote workers are within the Cyber Essentials scope. Devices used to access organisational systems - including personal devices under BYOD policies - must meet Cyber Essentials controls. Remote access must be secured, and organisations must demonstrate that controls extend to the actual working environment of their staff. This includes ensuring that MFA is enforced for remote access, that devices meet minimum security standards, and that home networks are not creating security gaps.
What is operational governance in cybersecurity?+
Operational governance in cybersecurity refers to the management disciplines and processes that ensure security controls are consistently applied, monitored, and maintained as part of normal business operations. This includes change management processes that assess security implications before new technology is adopted, identity lifecycle management, patch governance, supplier security management, and regular reviews that verify control effectiveness. Operational governance is what distinguishes organisations that maintain genuine security from those that pass assessments but remain vulnerable.
How can SMEs improve Cyber Essentials readiness?+
The most effective approach for SMEs is to treat Cyber Essentials readiness as an operational discipline rather than a compliance project. This means building a SaaS register to understand the full application landscape, implementing MFA consistently across all accounts and services, establishing a patch governance process that tracks vulnerability remediation, conducting an identity audit to identify and remediate orphaned accounts and excessive privileges, and engaging an experienced managed IT provider who can assess the current environment and implement the necessary controls. Wavex offers Cyber Essentials readiness reviews as part of its managed service offering.

Take the Next Step

Ready to Assess Your Cyber Essentials Readiness?

Wavex works with SMEs and mid-market organisations to build the governance, visibility, and operational disciplines that Cyber Essentials v3.3 requires. Our readiness reviews identify gaps, prioritise remediation, and provide a clear path to certification - and to maintaining it continuously.