Cyber Essentials v3.3 has fundamentally changed what certification requires. Cloud services, SaaS applications, remote working environments, and identity governance are now firmly within scope. Organisations that prepared for earlier versions may find that their current controls no longer meet the standard - and many will not discover this until they fail an assessment.
This guide explains what has changed, why organisations are failing, and what operational disciplines are now required to achieve and maintain certification. The core message is straightforward: Cyber Essentials is no longer simply about installing the right products. It is increasingly about governance, operational visibility, identity management, SaaS control, and maintaining secure operational discipline across the organisation.
Key Numbers
Maximum time to patch critical vulnerabilities
Average SaaS applications in an SME
Governance failures vs. missing products as CE failure cause
MFA coverage for cloud and remote access accounts
Based on NCSC Cyber Essentials v3.3 requirements and Wavex client assessment data.
The 2024 update to Cyber Essentials reflects the reality of how modern organisations operate. Seven areas have seen significant changes - each one representing a governance or operational discipline that many businesses have not yet formalised.
Cloud platforms, SaaS tools, and hosted services used by the organisation are now firmly within the Cyber Essentials boundary. Unmanaged SaaS adoption is no longer invisible to assessors.
Multi-factor authentication is required for all accounts with access to organisational data, cloud services, and remote access. Password-only access is no longer acceptable.
Critical and high-severity vulnerabilities must be remediated within 14 days. Patch governance - not just patch deployment - is now assessed.
Organisations can no longer easily exclude cloud services or remote devices from scope. The boundary must reflect the actual operational environment.
Devices used to access organisational systems - including personal devices - must meet Cyber Essentials controls. Remote working is no longer a grey area.
Assessors now expect evidence of asset awareness, software visibility, and patch status tracking. Visibility is a control, not just a nice-to-have.
Organisations must demonstrate operational ownership, defined processes, and consistent control application. Governance gaps are now a common cause of assessment failure.
Leaver/joiner processes, privilege management, and consistent identity lifecycle governance are now assessed as part of access control requirements.
For many years, Cyber Essentials was primarily a product checklist. Install antivirus, configure a firewall, enable patching, apply basic access controls. Organisations that had invested in standard IT infrastructure could pass with relatively modest preparation. The certification was a useful baseline, but it did not demand operational maturity.
Version 3.3 changes this significantly. The expansion of scope to include cloud services and SaaS applications means that the average organisation now has dozens of in-scope systems that were not previously assessed. The requirement for consistent MFA enforcement means that the informal exceptions that accumulated over years of reactive IT management are now compliance failures. The 14-day patching requirement means that organisations without structured vulnerability management will struggle to demonstrate compliance.
The organisations most at risk are those that have grown quickly, adopted SaaS tools across departments without central oversight or IT involvement. They may have passed previous Cyber Essentials assessments comfortably, but the environment they are operating in today looks very different from the one the earlier standard was designed to assess.
"Cyber Essentials is no longer simply about installing the right products. It is increasingly about governance, operational visibility, identity management, SaaS control, and maintaining secure operational discipline across the organisation."
The most common failure points we see in organisations preparing for Cyber Essentials v3.3 are not missing products. They are governance gaps: SaaS applications in scope that nobody knew about, leavers that where never raised with IT, and patch processes that worked in principle but could not be evidenced in practice. These are operational problems, not technology problems. And they require operational solutions.
For a broader perspective on how reactive IT creates hidden risk, our article on the hidden risks of reactive IT managed services explores the operational and commercial consequences of IT management that responds to problems rather than preventing them.
Concerned about your Cyber Essentials readiness? Speak to a Wavex specialist about a governance and compliance review.
The average SME now runs between 40 and 100 SaaS applications. Finance uses one platform for expense management, marketing another for campaign analytics, operations a third for project tracking. Each of these tools may be processing organisational data. Under Cyber Essentials v3.3, each one is potentially in scope.
The challenge is not simply the number of applications. It is that most organisations no longer have a complete picture of what SaaS platforms their staff use, where business data resides, who owns each system operationally, or whether SSO and MFA are enforced consistently across the estate. This is shadow IT at scale - and it is now a direct Cyber Essentials compliance risk.
A structured audit to identify all SaaS applications in use across the organisation, including those adopted without IT involvement.
Assessment of current governance processes, identifying gaps in change management, supplier onboarding, and SaaS lifecycle management.
Extending Microsoft Entra ID SSO to the SaaS estate, ensuring MFA and access controls are applied consistently across all applications.
Identifying duplicate tools, unused licences, and applications that can be consolidated or replaced with Microsoft 365 native capabilities.
The solution to SaaS sprawl is not restriction - it is governance. Organisations that implement a lightweight SaaS register and a simple approval process for new tools find that they can accommodate the pace of SaaS adoption without losing visibility or control. The goal is not to prevent staff from using the tools that make them productive. The goal is to ensure that when a new tool is adopted, IT knows about it, security has assessed it, and the organisation understands what data is being processed and where.
For organisations that have not yet addressed SaaS governance, our article on why SME technology projects fail provides a detailed framework for building operational governance without creating enterprise-scale bureaucracy.
In the era of cloud computing and remote working, the traditional network perimeter has dissolved. Staff access organisational systems from home networks, personal devices, and public Wi-Fi. The only consistent control point that remains is identity - and Cyber Essentials v3.3 reflects this reality by placing identity management at the centre of its requirements.
The requirement for consistent MFA enforcement is the most visible change, but the underlying shift is broader. Assessors now expect organisations to demonstrate that identity is managed as an operational discipline - not just that MFA is enabled in a settings panel. This means leaver/joiner processes that are consistently followed, privilege reviews that happen on a defined schedule, service accounts that are documented and audited, and conditional access policies that enforce security standards at the identity layer.
MFA enforced for all accounts accessing cloud services, email, and remote access
Conditional access policies configured to block non-compliant devices
Leaver process documented and consistently followed - accounts disabled within hours of departure
Joiner process ensures role-appropriate access from day one, not accumulated over time
Privileged accounts reviewed quarterly and access removed when no longer required
Service accounts documented, audited, and protected with strong credentials
SSO implemented to extend identity controls across the SaaS estate
Password policies enforced - minimum length, complexity, and no reuse
Admin accounts used only for administrative tasks, not day-to-day work
Microsoft Entra ID (formerly Azure Active Directory) provides the identity foundation that most organisations need to meet these requirements. When properly configured, it enforces MFA through conditional access policies, manages device compliance, extends SSO to hundreds of SaaS applications, and provides the audit trail that assessors expect. The technology is available to any Microsoft 365 customer - the challenge is implementing it correctly and maintaining it as the organisation evolves.
For organisations looking to understand the full scope of Microsoft 365 security capabilities, our Microsoft 365 and Azure services page explains how Wavex helps organisations get the most from their Microsoft investment while maintaining a strong security posture.
Wavex can assess your current identity governance posture and implement the controls needed for Cyber Essentials v3.3 compliance.
The five-level governance maturity model below reflects the operational reality of how organisations manage technology adoption, SaaS governance, and security controls. Click each level to understand the characteristics and the associated Cyber Essentials risk.
Most SMEs sit at Level 2 or Level 3. The majority of Cyber Essentials failures in v3.3 assessments stem from governance gaps - not missing products. An organisation at Level 2 may have all the right security tools deployed but still fail because it cannot demonstrate consistent control application, evidence patch compliance, or show that its SaaS estate is understood and managed.
Level 1: Uncontrolled Adoption
Level 2: Reactive Visibility
Level 3: Operational Governance
Level 4: Proactive Operational Maturity
Level 5: Strategic Governance & Continuous Improvement
The shift from Level 2 to Level 3 governance is the most important transition for Cyber Essentials readiness. At Level 2, controls exist but their application is inconsistent and depends on individuals rather than process. When an assessor asks for evidence - patch compliance reports, MFA enforcement logs, leaver account closure records - Level 2 organisations often cannot provide it, even when the underlying controls are technically in place.
The goal is not to reach Level 5 governance before pursuing Cyber Essentials. The goal is to reach Level 3 - where controls are consistently applied and can be evidenced - and then build from there. Wavex works with organisations at every maturity level, providing the frameworks, tools, and operational support needed to achieve and maintain certification. Our IT strategy consulting service includes governance maturity assessments as a core component.
One of the most consistent findings in Cyber Essentials v3.3 assessments is that organisations lack the operational visibility needed to demonstrate compliance. They may have security controls in place, but they cannot produce evidence of consistent application. They may have a patch management process, but they cannot show which devices are compliant and which are not. They may have MFA enabled, but they cannot confirm that it is enforced for every account in scope.
Visibility is not simply a reporting capability. It is an operational discipline that enables organisations to identify gaps before assessors do, remediate issues before they become failures, and maintain compliance continuously rather than preparing for it reactively.
Complete inventory of all devices, servers, and endpoints within scope. No device should be unknown to the IT team.
Real-time visibility of patch status across all in-scope devices, with outstanding vulnerabilities prioritised by severity.
Continuous monitoring of MFA enforcement, privileged access usage, and account lifecycle status across all systems.
Live register of all SaaS applications in use, their data classification, ownership, and security control status.
CIS-aligned security scoring that provides a measurable, comparable view of the organisation's security posture over time.
Automated generation of the evidence required for Cyber Essentials assessments - patch reports, MFA logs, configuration baselines.
Wavex provides clients with live operational dashboards that surface security posture, patch compliance, asset status, and identity governance in a single view. These dashboards are not simply reporting tools - they are operational management instruments that enable IT teams and business leaders to understand their current risk exposure and make evidence-based decisions. For organisations preparing for Cyber Essentials, they provide the audit trail that assessors require.
For a broader perspective on what operational visibility should look like in a well-managed IT environment, our article on what good IT looks like sets out the standards that mature IT management should meet.
Each section below covers a specific Cyber Essentials v3.3 requirement - explaining what it means in practice, the real-world operational challenge it presents, how mature organisations approach it, and how Wavex supports clients. Click any section to expand the detail.
Wavex works with SMEs and mid-market organisations across London and the UK to build the operational foundations that Cyber Essentials v3.3 requires. Our approach is not to prepare organisations for a single assessment - it is to help them build the governance, visibility, and operational disciplines that make certification a natural outcome of how they manage IT, rather than a project they undertake every two years.
The organisations we work with typically come to us at one of two points. Some are preparing for their first Cyber Essentials assessment and want to understand what is required. Others have previously held certification but are concerned that the v3.3 changes have created new gaps in their current controls. In both cases, the starting point is the same: a structured assessment of the current environment, identifying what is in scope, what controls are in place, and where the gaps are.
A structured assessment of your current environment against Cyber Essentials v3.3 requirements, identifying gaps and providing a prioritised remediation plan.
Implementation of Microsoft Entra ID conditional access, MFA enforcement, and identity lifecycle management to meet v3.3 identity requirements.
SaaS discovery audit, governance framework design, and SSO implementation to bring the SaaS estate under consistent operational control.
Continuous monitoring, patch management, and compliance reporting to maintain Cyber Essentials certification between assessment cycles.
Security baseline implementation, Defender configuration, and compliance posture management across the Microsoft 365 environment.
24x7 security monitoring, threat detection, and incident response as part of a fully managed IT and security service.
For organisations that are also thinking about the broader AI governance implications of their technology environment, our article on why every business needs an AI risk policy explores how AI adoption intersects with Cyber Essentials and operational governance requirements.
Speak to a Wavex Sector Specialist Today about your Cyber Essentials v3.3 readiness and governance maturity.
Take the Next Step
Wavex works with SMEs and mid-market organisations to build the governance, visibility, and operational disciplines that Cyber Essentials v3.3 requires. Our readiness reviews identify gaps, prioritise remediation, and provide a clear path to certification - and to maintaining it continuously.
Most technology project failures are governance failures. This guide explains the root causes and how to build a lightweight governance framework that prevents them.
Despite record investment in security products, UK businesses continue to suffer breaches. The problem is not a lack of tools - it is a lack of risk visibility.
AI adoption is accelerating faster than governance. This guide explains the risks and how to build a proportionate AI risk policy for your organisation.