How does Cyber Essentials differ from ISO 27001?

ISO 27001 adopts a more holistic approach and is focused on the development, implementation and continual improvement of an information security management system (ISMS).

Adopting a risk-based approach, ISO 27001 considers threats to all of its information assets in whatever form, i.e. paper, information systems or digital media.

When certifying to ISO 27001, you need to provide the assessor with evidence that you are meeting all the mandatory elements of the management system e.g. understanding the organisation, demonstrating leadership commitment, conducting risk assessments and treatment, evaluating performance and continually improving.

The controls you implement are dictated by your risk assessment. Cyber Essentials on the other hand is a ‘snapshot in time’ assessment, where the focus is on protecting data and programs on networks, computers, servers and other elements of IT infrastructure, from cyber threats.

There is no risk assessment involved and all the security measures set out by the NCSC must be in place at the time of the certification assessment. The same applies to Cyber Essentials Plus.

One of the great things about Cyber Essentials is that it is a targetable standard, so you always know exactly where you are.
Charity
Apply for Cyber Essentials certificationApply for Cyber Essentials Plus

Cyber Security Case Study: The Human and Organisational Cost of a Breach

Published on
21 Nov
2025

URM’s blog shares a Managing Director’s account of navigating & recovering from a major cyber attack, with a focus on the human impact of the breach.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
7/11/2025
Cyber Essentials Requirements Update

URM’s blog breaks down the latest changes to the Cyber Essentials requirements and outlines why these updates matter for organisations seeking certification.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
6/11/2025
Building Cyber Security Resilience Against Phishing

URM’s blog explores the different forms of phishing attacks, the strategies used to exploit human vulnerabilities, & how to protect against these attacks.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
31/10/2025
Deconstructing the EU Cyber Resilience Act

URM’s blog breaks down the new EU Cyber Resilience Act, what products/entities are in scope, the security requirements it imposes on organisations, and more.

Read more
"
Our assessor was brilliant! He was incredibly supportive and knowledgeable and really helped us get through CE+. It was a pleasure working with him.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.