Cyber Essentials for Government Contracts and MOD Supply Chain
Since October 2014, all suppliers bidding for UK government contracts involving sensitive information must hold a valid Cyber Essentials certificate. MOD supply chain contracts have additional requirements. This guide explains what is needed and how to achieve it.
Overview
Cyber Essentials is mandatory for UK government contracts involving sensitive data, required since October 2014. MOD supply chain contracts require Cyber Essentials Plus. Certification is annual and covers five technical controls. 48% of certified organisations report their own suppliers are increasingly required to hold certification.
Learn about Cyber EssentialsWhy Government Contracts Require Cyber Essentials
For UK businesses that supply goods or services to government, cybersecurity certification is not optional — it is a contractual prerequisite. Since October 2014, all central government contracts involving the handling of sensitive information or personal data have required suppliers to hold a valid Cyber Essentials certificate. This requirement was introduced following NCSC guidance (then CESG) that a defined set of baseline technical controls, if implemented correctly, would protect against the vast majority of common cyber attacks.
The mandate applies across all central government departments — HMRC, DVLA, NHS, Ministry of Defence, Home Office, Department for Education, and every other government body. Local government and NHS trust contracts often carry the same requirement, though this varies by authority and contract type. The tender documents for any specific procurement will state whether Cyber Essentials certification is required and which tier — standard or Plus — is specified.
The DSIT Cyber Security Breaches Survey 2025 found that 43% of UK businesses experienced a cybersecurity breach or attack in the past 12 months, with 74% of large businesses reporting breaches (DSIT 2025). The government's supply chain security requirements exist precisely because a breach at a supplier can compromise the security of government systems and the personal data of citizens.
Cyber Essentials: The Mandatory Baseline
Cyber Essentials is the UK government's baseline cybersecurity certification scheme, managed by IASME under licence from the NCSC. It covers five technical controls that together address the attack vectors used in the majority of common cyber attacks: boundary firewalls and internet gateways, secure configuration, access control, malware protection, and patch management.
Standard Cyber Essentials is a self-assessed questionnaire completed online through an IASME-accredited certification body. You answer detailed questions about your technical controls covering all five areas, and your responses are reviewed by a qualified assessor. If your answers demonstrate that the five controls are genuinely in place, you receive the certification. For businesses that are already prepared, the assessment process typically takes one to three days. The certificate is valid for 12 months and must be renewed annually.
With 55,995 Cyber Essentials certifications issued in 2025 (NCSC), the scheme has become the de facto standard for demonstrating baseline cybersecurity to government and private sector clients alike.
Cyber Essentials Plus: The MOD and Defence Requirement
Cyber Essentials Plus covers the same five controls but requires independent technical verification by an accredited assessor. Rather than relying on self-assessment, the assessor tests your actual systems — running vulnerability scans, checking patch compliance, attempting to install unauthorised software, verifying MFA enforcement, and testing firewall configuration. This hands-on testing provides a higher level of assurance that controls are genuinely implemented, not just described on a questionnaire.
Ministry of Defence supply chain contracts under DEFCON 658 specifically require Cyber Essentials Plus. This applies to all suppliers in the defence supply chain, not just direct MOD contractors — the requirement cascades through the supply chain to sub-contractors who handle relevant information. Many other high-value or sensitive government contracts are beginning to specify CE+ rather than standard CE as the minimum requirement, reflecting the growing recognition that independent verification provides meaningfully greater assurance.
The average cost of a data breach for UK organisations was £3.4 million (IBM 2024). For defence and government supply chain contexts, where breaches can have national security implications, the additional assurance provided by CE+ is considered proportionate and necessary.
Defence Standard (Def Stan) Requirements
For suppliers working on classified or sensitive MOD contracts, requirements extend beyond Cyber Essentials Plus. Defence Standard 05-138 (Cyber Security for Defence Suppliers) sets out additional security controls for the handling of MOD information. These requirements cover areas including secure communications, data handling procedures, personnel security, and incident reporting specific to defence contexts.
Suppliers handling information classified at OFFICIAL-SENSITIVE or above must meet additional requirements that go significantly beyond the Cyber Essentials framework. AMVIA's readiness assessment identifies where your current controls stand relative to both Cyber Essentials Plus and any additional Def Stan requirements specified in your contract.
Supply Chain Cascade: Requirements Flowing Downstream
Government cybersecurity requirements do not stop at the primary contractor. Supply chain security is a growing focus across UK government procurement, with requirements cascading to sub-contractors and suppliers throughout the chain. If you supply a business that holds a government contract, you may be required to hold Cyber Essentials certification even if you do not contract with government directly.
According to DSIT, 85% of breaches involved phishing (DSIT 2025), and supply chain compromise is an increasingly common attack vector. The 2023 attack on IT provider CTS simultaneously disrupted multiple law firms, demonstrating how a single supplier compromise can cascade across an entire sector. Government procurement requirements are designed to prevent exactly this type of cascading failure.
Only 14% of UK businesses have a formal incident response plan (DSIT 2025). For government suppliers, the expectation is considerably higher — incident reporting procedures, breach notification timescales, and evidence of ongoing security management are frequently specified in contract terms.
Common Reasons for Failing Certification
The most common reasons UK businesses fail Cyber Essentials assessment include unpatched software (particularly third-party applications like web browsers, Java, and PDF readers that are not covered by Windows Update); unsupported operating systems still in use (Windows 7, Server 2012, or other end-of-life software); weak admin account controls (shared admin accounts, or administrators using their privileged account for day-to-day tasks); firewall rules that allow unnecessary inbound access; MFA not enforced on all internet-facing accounts; and overly permissive user permissions that grant access beyond what is required for each role.
For Cyber Essentials Plus specifically, the most common failure points are patch compliance (devices that have missed critical updates), legacy authentication protocols still enabled in Microsoft 365, and mobile devices accessing business data without adequate management policies.
Preparing for Certification: Timeline and Planning
AMVIA recommends starting the Cyber Essentials process at least six weeks before any contract deadline. For businesses starting from scratch, the timeline typically breaks down as follows: two to three weeks for the pre-assessment gap analysis and remediation planning; two to four weeks for implementing any required changes (patching, MFA deployment, firewall reconfiguration, policy updates); and one week for the formal assessment itself. Cyber Essentials Plus requires an additional one to two weeks for the technical verification stage.
For businesses already on AMVIA's managed cybersecurity service, the annual renewal is significantly more straightforward because the required controls are maintained continuously throughout the year. AMVIA tracks certification expiry dates and initiates renewal proactively.
Key Considerations for Government Suppliers
- Check tender documents carefully — the specific CE variant required (standard or Plus) will be stated in the procurement documentation
- Certification scope must cover all devices and systems relevant to the contract — cloud services including Microsoft 365 are in scope
- Annual renewal is mandatory — an expired certificate disqualifies you from bidding and may breach existing contract terms
- Sub-contractors may need their own certification — check whether supply chain requirements cascade to your suppliers
- MOD contracts under DEFCON 658 require CE+ specifically — standard CE is not sufficient
- Allow sufficient lead time — rushing certification increases the risk of failure and the cost of remediation
How AMVIA Supports Government Suppliers
AMVIA prepares and supports UK businesses through both Cyber Essentials and Cyber Essentials Plus certification. The process begins with a comprehensive readiness assessment that identifies every gap against the required standard, followed by structured remediation and the formal assessment. For businesses in the MOD supply chain or tendering for high-value government contracts, AMVIA's managed cybersecurity service maintains CE+ compliance on an ongoing basis, making annual renewal straightforward and ensuring your certification never lapses.
Key Points
What suppliers need to know about Cyber Essentials for government contracts.
Mandatory Since 2014
All central government contracts involving personal information or sensitive data require Cyber Essentials certification as a condition of bidding.
MOD Requires CE Plus
Ministry of Defence supply chain contracts under DEFCON 658 require Cyber Essentials Plus — the independently verified version.
Annual Renewal Required
Cyber Essentials certificates are valid for 12 months. Allowing certification to lapse can result in disqualification from contract renewals.
Supply Chain Pressure Growing
48% of Cyber Essentials-certified organisations report suppliers are increasingly required to hold certification — creating a cascade through supply chains.
Cyber Essentials Contract Readiness Checklist
Confirm whether contract requires CE or CE Plus — check tender documents
All software and operating systems patched within 14 days of release
Admin accounts separate from day-to-day user accounts
MFA enforced on all cloud accounts including Microsoft 365
Endpoint protection active and up to date on all in-scope devices
Annual renewal date tracked — lapsed certification disqualifies from contract bids
Frequently Asked Questions
All central government contracts involving the handling of personal information or sensitive and personal data require Cyber Essentials certification. This has applied since October 2014. The requirement is growing across local government and NHS procurement. The tender documents for any specific contract will state whether CE (standard) or CE Plus is required — check these carefully before bidding.
For a business that has the controls broadly in place, the standard CE assessment can be completed within a week. For businesses starting from scratch, AMVIA recommends allowing four to six weeks to implement controls, conduct a pre-assessment audit, remediate any gaps, and complete the formal assessment. CE Plus requires additional time for the technical verification stage — typically an additional one to two weeks depending on environment complexity.
An expired certificate means the business is no longer certified. For active government contracts, this may trigger a contractual obligation to renew within a specified period. For future contract bids, an expired certificate disqualifies you from bidding if CE is a requirement. AMVIA monitors certification renewal dates for clients on its managed service and initiates the renewal process in advance of expiry.
Get Cyber Essentials Certified
AMVIA manages the full Cyber Essentials certification process — from gap assessment through to certification. Talk to our team about your contract requirements and timeline.
Related Resources
Cyber Essentials Guide
A complete guide to Cyber Essentials — what it covers, what it costs, and how to achieve it.
Cyber Essentials Plus
The independently verified version required for MOD and sensitive government contracts.
Cyber Essentials vs Cyber Essentials Plus
Understanding the difference between standard CE and CE Plus for government contract purposes.
Protect your business → Get Cybersecurity Assessment