Copyright © 2000
Restorepoint Ltd, all rights reserved
Cyber Essentials is a UK Government-backed, industry-supported certification scheme introduced by the National Cyber Security Center (NCSC) to help organisations demonstrate operational security measures.
Restorepoints can help organisations ensure they comply with the requirements related to network device management, user access controls and password management:
Firewall scope: For firewalls (or equivalent network devices), the Applicant organisation must routinely:
Restorepoint automatically detects the use of default vendor/manufacturer passwords. Passwords can be regularly updated in bulk using our device control feature. Additionally, password policies can be applied to devices to ensure they conform to the company’s prescribed password policy and meet UK Cyber Essentials password policy requirements.
With Restorepoint compliance policies, you can quickly assess if devices are configured to allow untrusted connections or protocols. Checks are performed at the point of your scheduled configuration backup, which is likely to be on a daily basis, and alerts sent if required.
Secure configuration for Network Devices: The Applicant must be active in its management of network devices. It must routinely:
Restorepoint automatically detects the use of default vendor/manufacturer passwords. Passwords can be modified and updated regularly updated in bulk using our Device Control feature. Furthermore, password policies can be applied to devices to ensure they conform to company, and UK Cyber Security Essentials password policies, regarding the use of strong passwords.
To adhere to UK Cyber Security Essentials regulations, using Restorepoint you can perform required checks at the point of your scheduled configuration backup. Alerts, in this case, if any unauthorised application is running, can be sent if required.
Restorepoint enables admin to control access to systems on a per user basis. Also, the employer can determine the limitation to the access as per- business requirements such as by time of day or by need-based approvals.
User access control: The Applicant must be in control of its user accounts as well as access privileges granted to each user account. It must not only have an understanding of how user accounts authenticate but also know how to establish control/moderate the strength of such authentications, which means the Applicant must:
Restorepoint helps admin in granting or revoking user access to systems in one action, instead of managing individual user accounts for each system, or having to change shared passwords when an employee or a contractor leaves the company.
With Restorepoint, one can define access policies to restrict the type of actions administrators can perform when connections are made to systems. Moreover, the system can generate alerts, disconnect, or ban user access based on violation policy.
Restorepoint helps admin in granting or revoking user access to systems in one action, instead of managing individual user accounts for each system, or having to change shared passwords when an employee or a contractor leaves the company.
Restorepoint enables admin to control access to systems on a per-user basis. Also, the employer can determine the limitation to the access as per business requirements such as by time of day or by need-based approvals.Passwords can be regularly updated in bulk using our Device Control feature, saving administrators valuable time. Restorepoint manages bulk changes quickly, and provides visibility of the changes as they're performed.
Password-based authentication: Protect against brute-force password guessing, by using at least one of the following methods:
Restorepoint Password policies can be applied to devices to ensure they conform to company UK Cyber Essentials policies regarding the use of strong passwords.
Based on compliance policy designed as per the organization standards, Restorepoint can monitor devices and send alerts. Passwords can be regularly updated in bulk or only those of suspected user-accounts using our Device Control feature. It enables administrators to automate the change instead of separately connecting to each device to enforce the password change.