Ensure that the controls you are implementing are aligned to the requirements of the Cyber Essentials Scheme with this toolkit.
*Note: You are purchasing templates which are compatible with Office 2016, 2013, 2010 & 2007. If you use one of these Office versions on a MAC, or are using an older version of Office, please contact us.
Built on expert knowledge gained from numerous cybersecurity implementation projects in a range of industries and companies, this toolkit includes all the necessary work procedures and processes for ensuring that the controls you are implementing, according to the requirements of the Scheme, are effective in delivering what they intend to do.
Download the full contents list here.
These processes will help your organization move to the next level of cybersecurity and ensure that the required controls are implemented effectively.
The most important aspect of your CES documentation is that it has to be your own.
It has to reflect your organizational culture, your processes, and your technologies.
The biggest danger in using any set of model documents is that they can deprive your organization of the opportunity to really understand what it is doing. The result can be that the CES implementation fails, either immediately or in the long term.
This documentation toolkit is designed to reflect all the requirements of the Cyber Essentials Scheme, but it does not incorporate the actual actions that must be implemented to be certified to the scheme. That is, the documents describe what your organization should be doing to meet the scheme’s requirements, but you will need to ensure that your organization follows through.
For more information read our FAQ here