The Cyber Essentials scheme is undergoing important updates and new CE Standard (Danzell) will take effect from 27 April 2026. While the five core technical controls remain unchanged, the new CE assessment version (Danzell) introduces stricter verification, tighter technical enforcement, and expanded organizational accountability.
For organisations planning Cyber Essentials certification or renewal in 2026, these changes directly affect pass and fail outcomes.
As a trusted UK Cyber Essentials Certification Body, Armoryze is advising organisations to begin preparation now to avoid audit delays, remediation costs, or certification failure.
When Do the Changes Take Effect
All Cyber Essentials assessments created on or after 26 April 2026 will be assessed against the updated requirements.
Organisations that create their assessment before this date will have a six-month window to complete certification under the current version.
This creates a limited transition period for organisations seeking a smoother certification route.
Key Cyber Essentials Changes for April 2026
Mandatory Multi Factor Authentication Enforcement
Multi factor authentication is now a strict certification requirement.
If MFA is available for any cloud service and not implemented, certification will automatically fail. This includes but not limited to:
- Microsoft 365
- Google Workspace
- Cloud admin portals
- Remote access platforms
- Social media accounts
Organisations must demonstrate enforced MFA coverage, not partial deployment.
Security Update Compliance Becomes Auto Fail
Two new automatic failure conditions have been introduced:
- Critical operating system and network device patches (for vulnerabilities with CVSSv3.0 score 7.0 or higher) must be applied within 14 days.
- Application and extension patches (for vulnerabilities with CVSSv3.0 score 7.0 higher) must also be applied within 14 days.
Patch latency is now treated as a structural security failure rather than an operational delay.
Stronger Cyber Essentials Plus Technical Testing
Cyber Essentials Plus audits will now include enhanced device testing.
If sampled devices fail patch compliance:
- Remediation is required within 30 days.
- A retest is performed
- If the first sample is failed, a new second random sample is also audited.
- If further failures are found, certification may be revoked.
This prevents selective hardening of audit devices.
Locked Self-Assessment Declarations
Once Cyber Essentials Plus testing begins, organisations will not be able to change their self-assessment answers.
This means all technical declarations must be accurate and evidence backed before audit commencement.
Expanded Certification Scope Transparency
The updated scheme introduces more detailed reporting, including:
- Unlimited scope descriptions
- Disclosure of out-of-scope environments
- Listing of legal entities
- Entity specific certification
This improves supply chain transparency and procurement assurance.
Cloud Services Must Be Included
Any cloud platform storing or processing organizational data must be included in certification scope.
Cloud environments can no longer be excluded from assessment boundaries.
Governance Level Accountability
Board level sign off will now include a formal commitment to maintain Cyber Essentials controls throughout the certification period.
Certification is no longer a point in time exercise. It becomes an ongoing security obligation.
Additional Scheme Enhancements
Other CE standard refinements include:
- Alignment with the UK Software Security Code of Practice
- Clearer cloud service definitions
- Simplified internet exposure criteria
- Greater focus on backup resilience
- Recognition of passwordless authentication methods
What These Changes Mean for Your Organization
The April 2026 update represents a maturity shift in Cyber Essentials assurance. Your organization will need to demonstrate:
- Operational security control effectiveness
- Continuous patch governance
- Full cloud visibility
- Accurate scope declarations
- Enforced identity protection
- CE Checklist compliance alone will not be sufficient.
How Armoryze Supports Your Certification Readiness
As an accredited Cyber Essentials Certification Body, Armoryze supports 200+ organisations through the full certification lifecycle, including:
• Gap assessments and readiness reviews
• MFA and patch compliance validation
• CE scope definition and boundary design
• CE Plus technical audit preparation
• Remediation guidance and retesting
Our goal is to ensure your organization achieves CE and CE Plus certification efficiently, without operational disruption.
Recommended Next Steps Before April 2026
We advise organisations to act early and complete the following:
- Enforce MFA across all users and administrators
- Validate 14-day patch deployment SLAs
- Review certification scope including subsidiaries and cloud
- Conduct CE and CE Plus readiness testing
- Finalize evidence before assessment submission
- Early CE preparation reduces audit risk and avoids retesting delays.
Start Your Cyber Essentials Certification Journey
If your organization is planning Cyber Essentials or Cyber Essentials Plus certification in 2026, early engagement is critical. Armoryze team can help you assess compliance readiness, remediate gaps, and achieve certification swiftly under the updated framework. Contact our certification team to begin your CE readiness review today at [email protected].