{"id":3748,"date":"2020-06-09T22:21:00","date_gmt":"2020-06-09T22:21:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3748"},"modified":"2026-04-14T23:20:22","modified_gmt":"2026-04-14T23:20:22","slug":"pack-the-essentials-the-minimum-cyber-security-requirements","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements","title":{"rendered":"The Minimum Cyber Security Requirements"},"content":{"rendered":"\n<p>There hasn\u2019t been a whole lot of travel going on due to the restrictions and lockdowns in place amidst the Covid-19 pandemic, but while you won\u2019t be getting to pack the usual critical items into your suitcase (toothbrush, socks, razor \u2013 you know the drill), you can still pack the essentials into your business network.<\/p>\n\n\n\n<p>In fact, several governments across the globe have now said you&nbsp;<em>must<\/em>&nbsp;pack your network with these essentials, outlining mandatory security measures that organisations need to have in place to ensure \u2013 for want of a better phrase \u2013 a smooth trip.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pre-Flight Checklist \u2013 For the Network<\/h2>\n\n\n\n<p>Denmark, the United Kingdom and Australia have all set out minimum cyber security requirements that government and other agencies should meet in order to ensure a common, high level of security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Denmark \u2013&nbsp;<strong><a href=\"https:\/\/sikkerdigital.dk\/myndighed\/tekniske-tiltag\/tekniske-minimumskrav\/\" target=\"_blank\" rel=\"noreferrer noopener\">Minimum Technical Requirements<\/a><\/strong><\/li>\n\n\n\n<li>UK&nbsp;\u2013&nbsp;<strong><a href=\"https:\/\/www.ncsc.gov.uk\/cyberessentials\/overview\" target=\"_blank\" rel=\"noopener\" title=\"\">Cyber Essentials<\/a><\/strong><\/li>\n\n\n\n<li>UK \u2013&nbsp;<strong><a href=\"https:\/\/www.gov.uk\/government\/publications\/the-minimum-cyber-security-standard\" target=\"_blank\" rel=\"noreferrer noopener\">MCSS: Minimum Cyber Security Standard<\/a><\/strong><\/li>\n\n\n\n<li>Australia \u2013\u00a0<strong><a href=\"https:\/\/www.asd.gov.au\/about\/what-we-do\/cyber-security\" target=\"_blank\" rel=\"noopener\" title=\"\">Strategies to Mitigate Cyber Security Incidents<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p>All are broken up into similar categories relating to clients, malware protection, access management, and responding to threats, among&nbsp;others, and within each of these categories are various security measures to ensure adequate cyber security.<\/p>\n\n\n\n<p>Some of these standards are mandatory: The Danish&nbsp;<strong>Minimum Technical Requirements<\/strong>. Many requirements within this scheme became compulsory as of January 1st this year, while the deadline for several others is fast approaching on July 1st, 2020.<\/p>\n\n\n\n<p>Others are simply recommended by the government as the standards that should be met \u2013 or ideally, exceeded \u2013 in order to establish and maintain a safe IT system.<\/p>\n\n\n\n<p>In the UK, the government-backed&nbsp;<strong>Cyber Essentials<\/strong>&nbsp;scheme enables organisations to gain one of two badges which identify them as having a high-level of security and protection from cyber threats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"251\" height=\"168\" src=\"\/wp-content\/uploads\/2022\/10\/image-2.png\" alt=\"\" class=\"wp-image-3749\"\/><\/figure>\n\n\n\n<p>The UK\u2019s&nbsp;<strong>MCSS<\/strong>&nbsp;along with the Australian&nbsp;<strong>Strategies to Mitigate Cyber Security Incidents<\/strong>&nbsp;are in place to help government departments and other organisations prepare for, respond to, and recover from cyber attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Landing on Common Ground<\/h2>\n\n\n\n<p>Just as every travel suitcase contains the same essential items: deodorant, a good book and a cosy pair of pyjamas (okay, so the book and PJs aren\u2019t 100% essential, but they&nbsp;<em>will<\/em>&nbsp;make your life a whole lot better), all of the schemes described above identify more or less the same minimum requirements and agree that these standards set the benchmark for cyber security.<\/p>\n\n\n\n<p>Several of these technical requirements take more of the spotlight than others, being heavily mentioned across all four standards.<\/p>\n\n\n\n<p>Such is the case for the following three:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Managing Administrator Privileges<\/strong><\/li>\n\n\n\n<li><strong>Malware Protection<\/strong><\/li>\n\n\n\n<li><strong>Logging Activity<\/strong><\/li>\n<\/ul>\n\n\n\n<p>These practices are frequently emphasised as being an essential and integral part of a safe IT system.<\/p>\n\n\n\n<p>See the table below for excerpts from each government scheme that refer to these three common essentials:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a><strong>&nbsp;<\/strong><\/a><\/td><td><strong>Denmark<\/strong><strong>Minimum Cyber Security Requirements<\/strong><\/td><td><strong>United Kingdom<\/strong><strong>Cyber Essentials<\/strong><\/td><td><strong>United Kingdom<\/strong><strong>Minimum Cyber Security Standard (MCSS)<\/strong><\/td><td><strong>Australia<\/strong><strong>Strategies to Mitigate Cyber Security Incidents<\/strong><\/td><\/tr><tr><td><strong>Admin Rights<\/strong><\/td><td><strong>Administrative rights for users are granted only for a limited time and with well-documented needs.<\/strong>&nbsp;The majority of malware requires administrative rights on the PC to be installed. Therefore, to prevent the risk of malware spreading, users should not have administrative rights unless there is a proven business need.&nbsp;<em>Must be implemented on: July 1, 2020<\/em><\/td><td>To minimise the potential damage that could be done if an account is misused or stolen, staff accounts should have just enough access to software, settings, online services and device connectivity functions for them to perform their role. Extra permissions should only be given to those who need them.<strong>&nbsp;<\/strong><strong>Administrative accounts<\/strong>&nbsp;Check what privileges your accounts have &#8211; accounts with administrative privileges should only be used to perform administrative tasks.Standard accounts should be used for general work.&nbsp;By ensuring that your staff don\u2019t browse the web or check emails from an account with administrative privileges you cut down on the chance that an admin account will be compromised.&nbsp;This is important because an attacker with unauthorised access to an administrative account can be far more damaging than one accessing a standard user account.&nbsp;<strong>Cyber Essentials Certification requires:<\/strong>That you control access to your data through user accounts, that administration privileges are only given to those that need them, and that what an administrator can do with those accounts is controlled.&nbsp;<\/td><td><strong>Identify:<\/strong><strong>&nbsp;<\/strong><strong>The need for users to access sensitive information or key operational services shall be understood and continually managed.<\/strong>&nbsp;Users shall be given the minimum access to sensitive information or key operational services necessary for their role.&nbsp;<strong>Protect:<\/strong><strong>&nbsp;<\/strong><strong>Access to sensitive information and key operational services shall only be provided to identified, authenticated and authorised users of systems.<\/strong>&nbsp;Users and systems shall always be identified and authenticated prior to being provided access to information or services. Depending on the sensitivity of the information or criticality of the service, you may also need to authenticate and authorise the device being used for access.<\/td><td><strong>Restrict administrative privileges<\/strong>&nbsp;to operating systems and applications based on user duties.&nbsp;Regularly revalidate the need for privileges.&nbsp;Disable local administrator accounts \u2026 to prevent propagation using shared local administrator credentials.<\/td><\/tr><tr><td><strong>Malware Protection<\/strong><\/td><td><strong>Endpoint protection must be implemented against viruses, malware, etc. with automatic updating on all clients.<\/strong>&nbsp;The use of continuously updated endpoint protection ensures known viruses, malware, etc. cannot be run on the workstation.&nbsp;Most endpoint protection programs also check for abnormal application behaviour.<\/td><td><strong>How to defend against malware<\/strong>&nbsp;<strong>Anti-malware measures<\/strong>&nbsp;\u2026 should be used on all computers and laptops.&nbsp;<strong>Whitelisting<\/strong>&nbsp;can also be used to prevent users installing and running applications that may contain malware.&nbsp;<strong>Sandboxing<\/strong>. Where possible, use versions of the applications that support sandboxing.&nbsp;<strong>Cyber Essentials Certification requires:<\/strong>That you implement at least one of the approaches listed above to defend against malware.<\/td><td><strong>Detect:<\/strong><strong>&nbsp;<\/strong><strong>Departments shall take steps to detect common cyberattacks.<\/strong>&nbsp;Any monitoring solution should evolve with the Department\u2019s business and technology changes, as well as changes in threat.&nbsp;Attackers attempting to use common cyber-attack techniques should not be able to gain access to data or any control of technology services without being detected.<\/td><td><strong>Non-persistent virtualised sandboxed environment<\/strong>, denying access to important (sensitive\/high-availability) data, for risky activities (e.g. web browsing, and viewing untrusted Microsoft Office and PDF files).&nbsp;<strong>Antivirus software using heuristics and reputation ratings to check a file\u2019s prevalence and digital signature prior to execution.<\/strong>Use antivirus software from different vendors for gateways versus computers.\u00ad\u00ad\u00ad&nbsp;<strong>Antivirus software with up-to-date signatures to identify malware, from a vendor that rapidly adds signatures for new malware.<\/strong>Use antivirus software from different vendors for gateways versus computers.<\/td><\/tr><tr><td><strong>Activity Logging<\/strong><\/td><td><strong>Logging requirements.<\/strong>&nbsp;Log on all systems and services on network servers.&nbsp;Provides a prerequisite for the discovery and investigation of various security incidents.<\/td><td>&nbsp;<\/td><td><strong>Detect:<\/strong><strong>&nbsp;<\/strong><strong>Departments shall take steps to detect common cyberattacks.<\/strong>&nbsp;Any monitoring solution should evolve with the Department\u2019s business and technology changes, as well as changes in threat.&nbsp;Attackers attempting to use common cyber-attack techniques should not be able to gain access to data or any control of technology services without being detected.&nbsp;Digital services that are attractive to cyber criminals for the purposes of fraud should implement transactional monitoring techniques from the outset.<\/td><td><strong>Continuous incident detection<\/strong>&nbsp;and response with automated immediate analysis of centralised time-synchronised logs of allowed and denied computer events, authentication, file access and network activity.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>A summary of the points made in the table is as follows:<\/p>\n\n\n\n<p><strong>Managing Administrator Privileges<\/strong><\/p>\n\n\n\n<p>&#8211; Organisations should implement&nbsp;<strong>POLP<\/strong>&nbsp;\u2013 The&nbsp;<strong>Principle of Least Privilege<\/strong>: users should only be granted the bare minimum privileges necessary to perform their function.<\/p>\n\n\n\n<p>&#8211; Organisations should implement&nbsp;<strong>JIT<\/strong>&nbsp;\u2013&nbsp;<strong>Just-in-Time<\/strong>&nbsp;elevation of privileges: users should only be granted administrator privileges when and where they need it, rather than having long-term access.<\/p>\n\n\n\n<p>&#8211; Users should have to prove their need to use administrator rights before they are authorised to do so.<\/p>\n\n\n\n<p>&#8211; Users that do need administrator privileges should be controlled and managed.<\/p>\n\n\n\n<p><strong>Malware Protection<\/strong><\/p>\n\n\n\n<p>&#8211; More than one anti-malware solution should be implemented on all clients.<\/p>\n\n\n\n<p>&#8211; Sandboxing environments should be used wherever possible.<\/p>\n\n\n\n<p>&#8211; Whitelisting solutions should be used wherever possible.<\/p>\n\n\n\n<p>&#8211; Anti-malware solutions should use a variety of prevention and detection techniques and should be updated regularly.<\/p>\n\n\n\n<p><strong>Logging Activity<\/strong><\/p>\n\n\n\n<p>&#8211; Logging should be used on all systems within the network.<\/p>\n\n\n\n<p>&#8211; Logging should be able to detect any attack attempting to gain unauthorised access or control.<\/p>\n\n\n\n<p>&#8211; Logging should capture activity such as approved or denied events, file access and network activity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Pack Efficiently and Effectively<\/h2>\n\n\n\n<p>Admin By Request is a Privileged Access Management (PAM) solution that packs all three of these essentials into one clean, compact, easy-to-carry (or deploy, in this case) bag.<\/p>\n\n\n\n<p>Here\u2019s a checklist of everything you get with Admin By Request to enable you to more easily meet the minimum cyber security requirements:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>&nbsp;<\/strong><\/td><td><strong>Admin By Request<\/strong><\/td><td><strong>&nbsp;<\/strong><\/td><\/tr><tr><td><strong>Admin Rights<\/strong><\/td><td><strong>POLP \u2013 The Principle of Least Privilege<\/strong><\/td><td>Admin By Request allows you to revokes admin rights and choose who gets what access, based on the needs of different users and groups of users. Access can range from very strict to lenient, depending on your settings and sub-settings with the software\u2019s user portal.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/f8299c8d-a79b-4314-ae38-3c7a62c7bc58\" alt=\"\"><\/td><\/tr><tr><td><strong>JIT \u2013 Just-in-Time Elevation<\/strong><\/td><td>Admin By Request implements&nbsp;<strong>Just-in-Time<\/strong>&nbsp;access, with the options to:<em>Run as Administrator<\/em>&nbsp;\u2013 The user does not have privileged credentials, but they are able to request and run an application with administrative permissions, andRequest a<em>&nbsp;Full Session elevation<\/em>, which gives a user administrative privileges on their device for a set amount of time. When the time is up, so is the user\u2019s ability to run processes as administrator.<\/td><td>&nbsp;&nbsp;<img decoding=\"async\" src=\"blob:\/4b4937ed-4538-414b-8ae9-8de5ae71952c\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Proof of Need<\/strong><\/td><td>Admin By Request requires the user to provide a reason when they want to either&nbsp;<em>Run as Administrator<\/em>, have a<em>&nbsp;Full Session elevation<\/em>&nbsp;or gain admin access via Admin By Request\u2019s&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">fourth elevation method<\/a>: a&nbsp;<em>one-time-use PIN<\/em>&nbsp;provided directly by an IT admin.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/1927dc5f-aa8a-431b-b9f9-f0410ea03f5f\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Control and Management<\/strong><\/td><td>Once deployed, Admin By Request allows for the management of thousands of end users with a friendly online user interface within the software\u2019s user portal, which contains easily-to-manipulate global and sub-settings and other management tools (described further on). As well as requiring&nbsp;<strong>Proof of Need<\/strong>, you can also configure settings to require explicit approval before the user can gain administrator access.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/cfb7917e-1008-40d3-af96-561c07844d26\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Malware Protection<\/strong><\/td><td><strong>Multiple<\/strong><strong>Anti-malware Solutions<\/strong><\/td><td>Admin By Request has integrated&nbsp;<a href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\" rel=\"noreferrer noopener\">Opswat\u2019s MetaDefender Cloud<\/a>&nbsp;which uses over 30 anti-malware engines to prevent and detect cyber security threats. The malware detection rate of th\u00ade MetaDefender Cloud is&nbsp;<a href=\"https:\/\/www.opswat.com\/docs\/mdcloud\/knowledge-base\/why-metadefender-cloud-and-not-other-vendors-\" title=\"\">99.4%<\/a>.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/82a18741-d0f2-4e0e-b2ca-586d3a4d53e2\" alt=\"\"><\/td><\/tr><tr><td><strong>Sandboxing Environment<\/strong><\/td><td>Admin By Request guarantees secure software installs by supporting a sandbox environment. When users try to install software, Admin By Request intercepts the process and installs the software under a full audit trial, ensuring it is safe before any damage can be done or changes can be made to the machine.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/430e3c54-bf35-41c5-98c8-a5164c359315\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Whitelisting<\/strong><\/td><td><em>Pre-approval<\/em>, Admin By Request\u2019s whitelist solution, allows you to enable users to run commonly-used applications that you know are safe without needing to gain full local administrator rights to their system. This ensures productivity isn\u2019t hampered and your users stay happy.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/976271dd-24d6-479c-bd08-49b8950ca189\" alt=\"\"><\/td><\/tr><tr><td><strong>Up-to-Date Anti-malware That Uses a Range of Techniques<\/strong><\/td><td>Opswat keeps its partners informed with the latest updates, meaning you\u2019ll stay safe with up-to-date anti-malware software. The MetaDefender Cloud uses a variety of techniques to detect and prevent malware, including signature-matching, heuristics and machine learning technology.<\/td><td>&nbsp;&nbsp;<img decoding=\"async\" src=\"blob:\/ab474157-d6a3-424b-964f-a630c32f735d\" alt=\"\"><\/td><\/tr><tr><td><strong>Activity Logging<\/strong><\/td><td><strong>Learning Mode<\/strong><\/td><td>Admin By Request allows you to enable&nbsp;<em>Learning Mode<\/em>&nbsp;when you first deploy the software on your system. Users still operate the same way they always have, but everything they run as administrator is logged in the&nbsp;<em>Learning Mode Collection<\/em>. This enables you to monitor activity and easily whitelist the necessary applications so that productivity isn\u2019t hampered when it comes time to revoke admin privileges.&nbsp;<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/170d2a4c-5ea6-48cd-9e0f-03724b7fbc4e\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Auditlog<\/strong><\/td><td>Every time a user requests administrator rights using one of the&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">elevation methods<\/a>, the activity that takes place during these processes and sessions is logged in the auditlog of the user portal. This allows you to monitor activity and detect any potential foul play, such as an attempt at privilege escalation.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/9fd1fec2-457b-4594-ad34-048b34bab4c1\" alt=\"\"><\/td><\/tr><tr><td><strong>Real-time Requests<\/strong><\/td><td>User requests for admin access are sent in real-time to the Admin By Request user portal to be viewed and either approved or denied (if you have&nbsp;<em>Require Approval<\/em>&nbsp;set to on).<\/td><td><img decoding=\"async\" src=\"blob:\/44c9fad2-bdfb-4f26-819a-f5345f5abd06\" alt=\"\">&nbsp;<\/td><\/tr><tr><td><strong>Mobile Application<\/strong><\/td><td>As well as a web interface, Admin By Request provides a mobile app which allows you to view the auditlog and view \/ approve \/ deny requests for admin access from any location.<\/td><td>&nbsp;<img decoding=\"async\" src=\"blob:\/2f4d7af0-8e72-40b8-87c2-064c961cc454\" alt=\"\"><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>There is a long list of critical items that are necessary for the smooth sailing of your business, but <a href=\"\/en\/freeplandownload\">Admin By Request<\/a> can help you gear up by packing a huge chunk of these essential requirements into one compact bag.<\/p>\n\n\n\n<p>And to boot: any time you can show customers that you have these essential security measures in place within your organisation, they will be reassured and much more keen to embark on the journey with you &#8211; even if it is a virtual journey.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.<\/p>\n","protected":false},"author":2,"featured_media":2812,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39,235,148,38,20,67,68,236,115],"ppma_author":[9],"class_list":["post-3748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-compliance","tag-cyber-essentials","tag-cybersecurity","tag-data","tag-least-privilege","tag-pam","tag-privileged-access-management","tag-regulations","tag-security","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"compliance,cyber essentials,cybersecurity,data,least privilege,pam,privileged access management,regulations,security\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"The Minimum Cyber Security Requirements \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-06-09T22:21:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-04-14T23:20:22+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"The Minimum Cyber Security Requirements \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#blogposting\",\"name\":\"The Minimum Cyber Security Requirements \\u00bb Admin By Request\",\"headline\":\"The Minimum Cyber Security Requirements\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Background-Blue-1.png\",\"width\":1920,\"height\":1200,\"caption\":\"Navy digital network artwork.\"},\"datePublished\":\"2020-06-09T22:21:00+00:00\",\"dateModified\":\"2026-04-14T23:20:22+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage\"},\"articleSection\":\"Blogs, Compliance, Cyber Essentials, Cybersecurity, Data, least privilege, PAM, Privileged Access Management, Regulations, Security, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#listItem\",\"name\":\"The Minimum Cyber Security Requirements\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#listItem\",\"position\":3,\"name\":\"The Minimum Cyber Security Requirements\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements\",\"name\":\"The Minimum Cyber Security Requirements \\u00bb Admin By Request\",\"description\":\"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Background-Blue-1.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements\\\/#mainImage\",\"width\":1920,\"height\":1200,\"caption\":\"Navy digital network artwork.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pack-the-essentials-the-minimum-cyber-security-requirements#mainImage\"},\"datePublished\":\"2020-06-09T22:21:00+00:00\",\"dateModified\":\"2026-04-14T23:20:22+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>The Minimum Cyber Security Requirements \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"The Minimum Cyber Security Requirements \u00bb Admin By Request","description":"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"compliance,cyber essentials,cybersecurity,data,least privilege,pam,privileged access management,regulations,security","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#blogposting","name":"The Minimum Cyber Security Requirements \u00bb Admin By Request","headline":"The Minimum Cyber Security Requirements","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/Background-Blue-1.png","width":1920,"height":1200,"caption":"Navy digital network artwork."},"datePublished":"2020-06-09T22:21:00+00:00","dateModified":"2026-04-14T23:20:22+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage"},"articleSection":"Blogs, Compliance, Cyber Essentials, Cybersecurity, Data, least privilege, PAM, Privileged Access Management, Regulations, Security, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#listItem","name":"The Minimum Cyber Security Requirements"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#listItem","position":3,"name":"The Minimum Cyber Security Requirements","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements","name":"The Minimum Cyber Security Requirements \u00bb Admin By Request","description":"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/Background-Blue-1.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\/#mainImage","width":1920,"height":1200,"caption":"Navy digital network artwork."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements#mainImage"},"datePublished":"2020-06-09T22:21:00+00:00","dateModified":"2026-04-14T23:20:22+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"The Minimum Cyber Security Requirements \u00bb Admin By Request","og:description":"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-06-09T22:21:00+00:00","article:modified_time":"2026-04-14T23:20:22+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"The Minimum Cyber Security Requirements \u00bb Admin By Request","twitter:description":"Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3748","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-04-15 00:03:22","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2023-05-22 21:56:16","updated":"2026-04-15 00:17:15"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tThe Minimum Cyber Security Requirements\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"The Minimum Cyber Security Requirements","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3748"}],"version-history":[{"count":5,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3748\/revisions"}],"predecessor-version":[{"id":32489,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3748\/revisions\/32489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/2812"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3748"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}