Your AI roadmap starts here
AI Pathfinder
layer 1 layer 2 layer 3 layer 4 layer 5 abstract shapes

2026 Cyber Essentials Changes Explained

Understanding the Danzell update, mandatory MFA, tighter patching rules, the transition timeline and how to prepare.

22 Mar 2026

10 min read

Cyber Essentials remains one of the strongest indicators of effective cyber security for UK organisations. It provides a clear, government‑backed baseline for protecting systems and data against the most common cyber attacks.

The scheme is built around five core technical controls and is underpinned by guidance from the National Cyber Security Centre (NCSC), with delivery and assessment operated through IASME. As technology and threats evolve, Cyber Essentials is reviewed regularly to ensure it remains relevant and effective.

From 27 April 2026, Cyber Essentials will undergo one of its most significant operational updates in recent years. While the core controls haven’t changed, the way they are assessed has. The Danzell update expands scope, tightens enforcement and removes ambiguity, meaning organisations often need more time to identify and remediate gaps before renewal.

In this article we explain everything you need to know about the updates  – what’s changing? What’s Danzell? And how it will affect organisations across the UK.

Cyber Security That Adapts

Cyber Essentials certification is valid for 12 months, requiring organisations to renew annually. Each review cycle can introduce refinements that strengthen clarity, consistency and real‑world effectiveness.

The 2026 update is delivered through:

  • An updated Requirements for IT Infrastructure document (v3.3) published by the NCSC
  • A new self‑assessment question set, known as Danzell, which replaces the previous “Willow” question set

When are the changes effective from?

These changes apply to all assessment accounts created on or after 26 April 2026. Organisations with an active assessment account created before that date will have six months to complete certification using the previous requirements.

Expert View

Importantly, businesses need to prepare sooner because the Danzell update expands scope, mandates real technical controls, and applies stricter verification. This means gaps take longer to fix and late preparation risks delays or failure at renewal.

BCN's Cyber Security Lead

Get prepared for Cyber Essentials

Speak to our cyber security experts

Contact us down down down

Why Are the Changes Being Made to Cyber Essentials in April 2026?

The intent behind the April 2026 changes is not to add new controls, but to:

  • Remove ambiguity from previous assessments
  • Strengthen enforcement of critical security practices
  • Ensure certification outcomes more accurately reflect real‑world security posture

In particular, the updates respond to common issues identified through breach investigations and scheme audits, such as inconsistent scoping, delayed patching, and partial implementation of multi‑factor authentication (MFA).

Cyber Essentials continues to represent the minimum cyber security standard that UK organisations should aim to meet and maintain.

The Five Technical Controls (Unchanged)

Cyber Essentials is still built on the same five technical control areas:

  1. Firewalls and Internet Gateways
  2. Secure Configuration
  3. User Access Control
  4. Malware Protection
  5. Security Update Management

What has changed is how clearly and strictly these controls are assessed under the new Danzell question set.

Understanding the April 2026 Changes

Clearer Definitions and Less Ambiguity

The updated Danzell question set introduces:

  • More precise wording
  • Stronger marking criteria
  • Reduced reliance on interpretation

Organisations should not rely on answers from previous assessments, as responses that previously passed may no longer meet the updated criteria.

For Example: An organisation that previously reused last year’s answers may now be challenged to provide clearer explanations of scope, user access controls or update processes – even though the underlying controls haven’t changed.

Cloud Services Are Fully in Scope

For the first time, Cyber Essentials formally defines cloud services and makes it explicit that they cannot be excluded from scope.
Any cloud service that stores or processes organisational data must now be included in the assessment. This includes, but is not limited to:

  • Microsoft 365
  • Azure
  • AWS
  • Google Workspace
  • Cloud‑hosted CRM, finance, HR and collaboration platforms

While cloud providers may implement some security controls, responsibility for correct configuration, access control and user security remains with the organisation under Cyber Essentials’ shared responsibility model. This ensures assessments reflect real‑world operating models and reduce the risk of insecure cloud configurations being overlooked.

For example: A small accountancy practice might rely almost entirely on Microsoft 365 and a cloud bookkeeping platform. Previously, their assessment could have focused mainly on laptops. Under the new rules, the cloud services holding sensitive financial data are also assessed — providing reassurance that client data is protected at the source, not just on the endpoint.

Multi‑Factor Authentication Is Mandatory for Cloud Services

Multi‑factor authentication (MFA) is now a strict requirement for all cloud services where it is available.
If a cloud service supports MFA and it has not been enabled, the assessment will result in an automatic failure. This applies regardless of whether MFA is free, bundled or available as a paid feature. In practice, this applies most critically to cloud services, which are now explicitly in scope and where MFA is almost always available.

For example: A legal firm may have strong password policies in place, but if a solicitor reuses a password elsewhere and that external site is breached, attackers could gain access to case files. MFA significantly reduces this risk by ensuring a stolen password alone is not enough to access sensitive systems.

Understanding all cloud services in use — including those outside of central IT oversight — is therefore essential ahead of assessment or renewal.

Security Update Management: A Zero‑Tolerance Area

Security update management is one of the most tightly enforced areas in the April 2026 update.
Two assessment questions are now classed as automatic fail if not met:

  • All high‑risk or critical security updates for operating systems, router and firewall firmware must be installed within 14 days of release
  • All high‑risk or critical security updates for applications (including extensions and associated files) must also be installed within 14 days

Failure to meet either requirement results in an automatic assessment failure, regardless of performance elsewhere.

For Example: A growing consultancy might patch laptops regularly but overlook a critical update for a firewall or a widely used browser extension. Under the new rules, that single gap could cause a failed assessment, encouraging organisations to adopt more structured and automated patching processes.

Defining Scope More Precisely

The updated scheme places greater emphasis on transparency and clarity of scope.
Organisations must now:

  • Clearly define what is in scope
  • Fully justify any exclusions
  • Explain how excluded systems are technically segregated from in‑scope systems
  • Identify all legal entities included within the scope

This reduces ambiguity for both assessors and organisations, improves the credibility of certification outcomes and avoids disputes late in the assessment process.

For Example: A multi‑site organisation that excludes a warehouse network will need to demonstrate how that network is technically separated from core systems — not simply state that it’s “out of scope”.

Expert view

Cyber Essentials sets the minimum cyber security standard organisations should meet - not as a one‑off exercise, but as an ongoing commitment to protecting systems, data and reputation.

BCN's Cyber Security Lead

What’s Changing for Cyber Essentials Plus?

The April 2026 update also strengthens the Cyber Essentials Plus (CE+) assessment methodology to prevent “selective compliance”.

Key changes include:

  • If patching failures are identified during CE+ testing, remediation must be applied across the wider environment — not just the initial sample
  • During re‑testing, assessors will check both the original device sample and a new random sample to verify consistent compliance
  • Organisations can no longer amend their self‑assessment responses once CE+ testing has begun

For Example: A professional services firm that manually patches a handful of devices may find CE+ increasingly difficult to pass without automated update management. The changes encourage consistency and reduce reliance on best‑effort approaches.

These changes don’t introduce new technical requirements, but they do close previous loopholes and ensure CE+ provides a stronger level of technical assurance. As a result, organisations are expected to demonstrate that controls are not just defined, but consistently applied across their real operating environment.

Managing the Transition Timeline

The April 2026 changes do not invalidate existing Cyber Essentials certificates overnight. Instead, they apply based on when you create your next assessment account, not when your current certificate expires. Which rules apply depends on when you start your next assessment — not when your current certificate expires.

In simple terms, there are two scenarios:

  • If you create a Cyber Essentials assessment account before 26 April 2026
    You can complete certification using the previous question set, with a six‑month window to finish the assessment.
  • If you create a Cyber Essentials assessment account on or after 26 April 2026
    Your assessment must use the new Danzell question set and updated marking criteria.

Because Cyber Essentials is a point‑in‑time certification, organisations should plan ahead. Waiting until the last minute — especially without checking MFA, patching and cloud scope — increases the risk of delays or failed assessments.

A Necessary Evolution for Cyber Security in the UK

The April 2026 Cyber Essentials update strengthens the scheme without changing its fundamental purpose. By tightening definitions, enforcing critical controls and improving consistency, Cyber Essentials becomes a more reliable indicator of real cyber resilience.
As certification continues to be widely required for tenders, partnerships and supplier assurance, maintaining compliance is increasingly important for UK organisations of all sizes.

Next Steps: How to Get Ready

If your organisation is due to renew Cyber Essentials or Cyber Essentials Plus in 2026, now is the time to prepare. The April 2026 changes don’t introduce new controls — but they do remove ambiguity and increase enforcement. Good preparation is simple and practical. Before starting your next assessment:

  • Start with an early readiness assessment to identify gaps against the new Danzell requirements
  • Review what is in scope, including all cloud services used to store or process organisational data
  • Ensure multi‑factor authentication is enabled wherever it’s available
  • Confirm high‑risk and critical security updates are being applied within 14 days
  • Allow time to resolve RED items, particularly around MFA, patching and cloud scope
  • Fix issues in phases, rather than rushing last‑minute changes that increase risk and disruption
  • Prepare evidence in advance so your assessment reflects how your environment actually operates today

A little preparation now can prevent delays, rework or failed assessments later — and helps ensure Cyber Essentials continues to reflect real cyber resilience, not just compliance.

Trust BCN With Your Cyber Essentials Journey

At BCN, we help organisations prepare for, achieve and maintain Cyber Essentials and Cyber Essentials Plus certification — including readiness assessments aligned to the new Danzell requirements.

Our BCN Cyber security Pledge reflects our commitment to raising every customer to an appropriate, defensible level of cyber security maturity as standard.
If you’d like support navigating the April 2026 changes or preparing for certification, our team is always ready to help.

Find out how BCN can support your organisation

Book your free consultation today

Contact us down down down