Cyber Essentials is updating, and if you are planning to certify or renew in 2026, now is the time to pay attention.
From 27th April 2026, a set of updates approved by the National Cyber Security Centre and DSIT, delivered through the scheme operated by IASME, will come into effect. These changes are based on real breach investigations and audit insights and are designed to strengthen the consistency, clarity, and credibility of Cyber Essentials.
As part of this update, the Cyber Essentials self-assessment question set is changing. The existing question set, known as Willow, will be replaced by a newly named and updated version called Danzell.
At CybaVerse, we work closely with businesses completing Cyber Essentials every day. These updates do not change the purpose of the scheme, but they do raise the bar on preparation and accuracy. This guide breaks down what is changing, what is staying the same, and how to get ready without stress.
The foundations of Cyber Essentials remain exactly the same.
The scheme is still built around the five core technical controls:
Cyber Essentials continues to focus on defending against common cyber attacks using clear, achievable controls. If your organisation already takes security seriously, these changes should feel like a tightening of clarity rather than a shift in direction.
While the controls remain the same, how they are assessed and verified is becoming more explicit.
From April 2026, Cyber Essentials will move from the Willow self-assessment question set to a newly named version called Danzell.
The Danzell question set:
The key takeaway is simple. Do not rely on answers from previous assessments completed under Willow. Organisations should always complete the current question set in use at the time of assessment, as responses that previously passed may no longer meet the updated criteria under Danzell.
Some requirements are now classed as automatic failures if they are not met.
Multi-Factor Authentication (MFA)
MFA is now mandatory for all cloud services where it is available.
If MFA is not enabled, the assessment will automatically fail.
This applies to services such as email platforms, cloud productivity tools, and cloud administration portals.
Security updates and patching
High-risk and critical security updates must now be installed within 14 days of release.
This includes:
Failure to meet this requirement will result in an automatic fail. This change reflects how frequently attackers exploit known vulnerabilities shortly after release.
Scope definition is becoming clearer and more visible.
Organisations will now be required to:
What this means in practice:
This improves trust and makes it easier for customers, partners, and stakeholders to understand what a Cyber Essentials certificate actually covers.
Cyber Essentials Plus is also being strengthened to improve assurance.
Wider update verification
Assessors will now:
This ensures updates are not applied just to a small test group.
Locked self-assessment responses
Once CE+ testing begins:
This reinforces the importance of being fully prepared before testing starts.
From our experience supporting organisations through incidents and certification alike, these updates reflect real-world risk.
Breach investigations consistently show that:
The updated Cyber Essentials framework addresses these issues while keeping the scheme practical and accessible.
If you are certifying or renewing after April 2026, early preparation makes all the difference.
Focus on four areas:
Good preparation avoids delays, rework, and failed assessments.
Cyber Essentials is not becoming harder for the sake of it. It is becoming clearer, more consistent, and more aligned with how modern attacks actually happen.
For organisations that already follow good security practice, these changes should feel like a natural progression. That’s because true cyber resilience isn’t a one-off snapshot, it’s a continuous process.
At CybaVerse, we don’t see security as a point-in-time test that’s ‘passed’ and then forgotten. Threats evolve constantly, new vulnerabilities emerge between quarterly scans, and systems change daily. That’s why our CybaOps platform is built with continuous visibility, scanning, and risk prioritisation at its core.
With CybaOps you get:
This means security controls stay effective long after initial certification and patch windows stay short, not just around assessment dates. Ultimately, CybaOps helps organisations shift from reactive, point-in-time testing to continuous assurance and control, making compliance easier and security far more resilient.
If you’re unsure how the Danzell updates affect your approach to ongoing cyber risk, our team would be glad to walk you through how CybaOps keeps your environment secure and continuously aligned to good practice.