- Cyber
- 24th Apr 2026
- 1 min read
Cyber Essentials Plus v3.2 (Willow): What Changed - SureCloud
- Written by
In Short..
TLDR: 4 Key Takeaways
-
MFA requirements have expanded significantly — now mandatory for all internet-facing services, with passwordless methods formally accepted.
-
Vulnerability fixes now go beyond patching — configuration and registry changes trigger the same 14-day remediation window.
-
Cloud scope is no longer flexible — any service handling business data must be included in scope with no exclusions.
-
CE+ assessments are more rigorous and standardised — mandatory scope validation and defined sampling remove assessor discretion.
Cyber Essentials Plus v3.2 shifts the focus from declared controls to provable, continuously maintained security across your real environment.
Introduction
Cyber Essentials v3.2 — known by its question set name Willow — came into force on 28 April 2025, replacing the Montpellier question set. Three substantive changes cover authentication requirements, the definition of vulnerability fixes, and cloud scoping rules. The CE+ test specification was updated alongside.
Version note: This article covers Cyber Essentials v3.2 (Willow), which became mandatory on 28 April 2025. Cyber Essentials v3.3 is a separate update expected in April 2026 and is not covered here.
What Is Cyber Essentials Plus v3.2?
Cyber Essentials Plus v3.2 is the independently assessed tier of the UK government's Cyber Essentials scheme, operated by the IASME Consortium on behalf of the National Cyber Security Centre (NCSC). It sets the minimum security baseline for UK organisations, and is a mandatory requirement for suppliers handling certain UK government contracts.
Cyber Essentials has two tiers. The standard Cyber Essentials certification is a self-assessment: organisations complete the Willow question set and a certifying body verifies the responses. Cyber Essentials Plus (CE+) requires independent technical testing by an accredited assessor, who verifies the same controls against the CE+ Test Specification v3.2. Both tiers are governed by the IASME Requirements for IT Infrastructure document, which reached version 3.2 in April 2025.
Note: IASME manages the Cyber Essentials scheme on behalf of NCSC. NCSC sets scheme policy; IASME administers certification and accredits the certifying bodies that carry out assessments.
What Is the Willow Question Set?
Willow is the self-assessment question set introduced with Cyber Essentials v3.2, replacing Montpellier on 28 April 2025. The version number (v3.2) refers to the Requirements for IT Infrastructure document; 'Willow' is the name for the question set derived from it. Both terms refer to the same update. Any assessment account created from 28 April 2025 uses Willow.
What Changed in Authentication and MFA Requirements?
Under v3.2, MFA is now mandatory for every internet-facing service — not only cloud platforms and admin accounts as under v3.1 (Montpellier). Willow also formally recognises passwordless authentication methods for the first time.
- Passwordless authentication accepted: Methods that eliminate the password entirely — including FIDO2 passkeys, biometric authentication tied to device credentials, and certificate-based authentication — now satisfy the authentication requirements.
- MFA mandatory for all internet-facing services: MFA is required for any service accessible from the public internet. Where passwordless is not implemented, MFA must be in place.
- Brute-force protection tightened: Specific thresholds for account lockout and rate limiting are now defined in the Willow question set. Under Montpellier, account lockout was required but thresholds were not formally specified.
Default passwords: Devices must have default passwords changed before being placed in scope. This requirement was restated with greater clarity in v3.2.
What Changed in Vulnerability Fix Requirements?
Cyber Essentials v3.2 expands the definition of a 'vulnerability fix' beyond software patches. Under Montpellier, remediation was understood as applying patches. Willow states explicitly that a vulnerability fix may also include configuration changes, registry changes, or software removal.
The core remediation window is unchanged: High and Critical vulnerabilities — defined as those with a CVSS score of 7.0 or above, or where the vendor has not published a severity rating — must be addressed within 14 days of a fix becoming available. Software that has reached end-of-life (EOL) must be removed or network-isolated.
The substantive shift is in what triggers that 14-day window. If a vendor publishes a security advisory recommending a configuration change or registry edit to close a known vulnerability, that advisory constitutes an available fix. The 14-day clock starts from the date it is published. Organisations can no longer defer remediation on the grounds that no patch exists where a configuration workaround has been documented.
Quotable paragraph: Under Cyber Essentials v3.2, a vulnerability fix is any remediation that addresses a known security vulnerability, including software patches, configuration changes, registry changes, and software removal. If a vendor publishes a security advisory recommending a configuration or registry change, the 14-day remediation window for High and Critical vulnerabilities (CVSS 7.0 or above) starts from the date that advisory is published — not from the date a patch is released.
What Changed in Cloud and Scope Definitions?
Cyber Essentials v3.2 removes the flexibility organisations previously had to exclude cloud services from their assessment scope.
Any cloud service that stores, processes, or provides access to the organisation's data is now in scope. This applies to:
- SaaS platforms such as Microsoft 365 and Google Workspace — organisations are responsible for MFA configuration, admin account protection, and licensed software management within their boundary
- IaaS environments such as Microsoft Azure and AWS — scope extends to operating system, firewall configuration, and patch management within the organisation's control boundary
- PaaS components where the organisation is responsible for configuration
Under previous versions, organisations had some flexibility to exclude certain SaaS or IaaS platforms from their assessment. Willow closes that gap entirely. If the service stores or touches your data, it is in scope.
What Changed in the CE+ Test Specification?
The CE+ Test Specification was updated alongside Willow, making CE+ assessments more rigorous and consistent.
- 'Illustrative' removed from the title: The previous version was the 'Illustrative Cyber Essentials Plus Test Specification', implying the methodology was advisory. The v3.2 document removes 'Illustrative' — the methodology is now the defined standard, not a reference point.
- Scope verification now mandatory: Before technical testing begins, the assessor must confirm that the scope declared in the CE self-assessment matches the systems included in the CE+ assessment. This prevents scope narrowing between the two stages.
- Defined sampling methodology introduced: Assessors must follow the sampling rules in the v3.2 specification when selecting devices, accounts, and services for testing. Sampling is no longer at assessor discretion.
Quotable paragraph: The Cyber Essentials Plus Test Specification v3.2 introduces three procedural changes: it removes the word 'Illustrative' from the document title (making the methodology a defined standard rather than guidance), mandates scope verification before technical testing begins, and introduces a fixed sampling methodology. CE+ assessors no longer have discretion over which devices, accounts, or services they select for testing.
What Else Changed in v3.2?
In addition to the three primary areas, Cyber Essentials v3.2 includes the following changes:
- Home and remote working terminology updated to reflect hybrid working as a standard operating model rather than an exception.
- Software definition expanded to explicitly include firmware, operating system components, and browser extensions within scope.
- Least privilege formalised as an explicit control requirement: users must be granted only the access needed to perform their role.
Licensed software check added: organisations must demonstrate that in-scope software is properly licensed and supported. Unlicensed or unsupported software is now a documented control point.
Who Is Affected and When Does v3.2 Apply?
Cyber Essentials v3.2 applies to all UK organisations seeking Cyber Essentials or CE+ certification, including private sector businesses, public sector bodies, and supply chain organisations required to hold certification as a condition of contracting.
All assessment accounts created from 28 April 2025 use Willow. Existing Montpellier certificates remain valid until expiry. Renewals from 28 October 2025 must use Willow.
How Should Organisations Prepare for CE+ Under v3.2?
1. Conduct a cloud inventory
List every cloud service in use across the organisation — SaaS, IaaS, and PaaS — and confirm whether it stores, processes, or provides access to business data. Each such service must be included in scope for both the CE self-assessment and the CE+ assessment.
2. Audit MFA across all internet-facing services
Map every service accessible from the public internet, not only cloud platforms, and confirm that MFA or a compliant passwordless method is in place. Pay particular attention to VPN gateways, remote desktop services, and web-based management interfaces.
3. Review your vulnerability fix process
Update your vulnerability management process to capture configuration-based and registry-based remediations, not only patches. Vendor advisories recommending configuration changes as mitigations must be tracked and actioned within the 14-day window where the CVSS score is 7.0 or above.
4. Align scope between CE self-assessment and CE+ testing
Confirm that the scope declared in the CE self-assessment accurately reflects all in-scope systems, services, and cloud environments. Assessors must verify scope alignment before technical testing begins. Discrepancies will require resolution before the assessment can proceed.
5. Prepare evidence in advance
Gather evidence for each control area: MFA configuration records, vulnerability scan reports, patch and remediation records (including configuration changes), cloud service settings, and access control policies. Evidence must be audit-ready — not assembled in the weeks before an assessment.
6. Check for EOL software
Review all in-scope devices and systems for software that has reached end-of-life and is no longer receiving security updates. EOL software must be removed or network-isolated before the assessment.
How Can a GRC Platform Support Cyber Essentials Compliance?
Cyber Essentials certification is annual. The evidence, controls, and remediation records that CE+ assessors review must be maintained continuously — not assembled in the weeks before an assessment.
The v3.2 changes make continuous maintenance more important, not less. Expanded vulnerability fix scope means remediation records must capture configuration changes and vendor advisory responses alongside patch logs. The new scope verification requirement means cloud inventories and system registers must be kept current between cycles — not reconstructed at renewal time.
A GRC platform supports this by mapping controls to the Cyber Essentials requirements, tracking remediation activities against the 14-day vulnerability fix window, and maintaining a centralised evidence library. SureCloud's GRC platform is built to support Cyber Essentials compliance as a continuous programme — so the evidence is there when you need it, not gathered under pressure when the assessment window opens.
v3.1 (Montpellier) vs v3.2 (Willow): Changes by Control Area
|
Control area |
v3.1 (Montpellier) |
v3.2 (Willow) |
|
Authentication |
MFA required for cloud services and admin accounts. Passwordless methods not addressed. |
MFA mandatory for all internet-facing services. Passwordless authentication (FIDO2, passkeys, certificate-based) explicitly accepted as compliant. |
|
Brute-force protection |
Account lockout required; thresholds not formally defined. |
Brute-force protection tightened with clearer thresholds for lockout and rate limiting. |
|
Vulnerability fixes |
Remediation understood as applying software patches. 14-day window for High/Critical (CVSS 7.0+). |
Definition expanded: fixes now include configuration changes, registry changes, and software removal. 14-day window unchanged. |
|
Cloud scope |
Some flexibility to exclude SaaS/IaaS services from scope. |
All cloud services storing, processing, or providing access to business data are in scope. No exclusions permitted. |
|
Software definition |
Software covered; firmware and browser extensions not explicitly named. |
Definition expanded to include firmware, OS components, and browser extensions. |
|
Least privilege |
Implied good practice; not stated as an explicit requirement. |
Least privilege formalised as an explicit control requirement. |
|
Licensed software |
No formal requirement to evidence licensing status. |
Organisations must demonstrate that in-scope software is properly licensed and supported. |
|
Home/remote working |
Addressed but treated as an exception to standard operating model. |
Terminology updated to reflect hybrid working as a standard model. |
|
CE+ test specification |
Titled 'Illustrative'; sampling at assessor discretion; no mandatory scope verification. |
'Illustrative' removed; scope verification now mandatory before testing; defined sampling methodology introduced. |
Key Takeaways
- Cyber Essentials v3.2 (Willow) came into force on 28 April 2025, replacing Montpellier. All new assessments from that date use Willow.
- The three substantive changes are: MFA mandatory for all internet-facing services (passwordless now accepted); 'vulnerability fix' expanded to include configuration and registry changes; cloud services storing or processing business data cannot be excluded from scope.
- The CE+ test specification was updated: scope verification is now mandatory before testing, 'Illustrative' has been removed from the title, and a defined sampling methodology applies.
- The 14-day remediation window for High and Critical vulnerabilities (CVSS 7.0+) is unchanged but now applies to configuration-based fixes, not only patches.
- Existing Montpellier certificates remain valid until expiry. Renewals from 28 October 2025 must use Willow.
- Cyber Essentials v3.3 is a separate update expected in April 2026 and is outside the scope of this article.
External References
- NCSC Cyber Essentials overview
- IASME Cyber Essentials
- IASME Requirements for IT Infrastructure v3.2 (available via the IASME website)
- IASME Cyber Essentials Plus Test Specification v3.2 (available via the IASME website)
- CVSS scoring system — FIRST.org
Stay Audit-Ready for Cyber Essentials Plus v3.2
FAQ’s
What is the difference between Cyber Essentials and Cyber Essentials Plus under v3.2?
Cyber Essentials is a self-assessment certification: organisations complete the Willow question set and a certifying body verifies their responses. Cyber Essentials Plus (CE+) requires independent technical testing by an accredited assessor, who verifies the same controls hands-on against the CE+ Test Specification v3.2. Under v3.2, scope must be aligned between the two stages before CE+ testing can begin. CE+ provides a higher level of assurance because controls are independently verified rather than self-declared.
What is the Willow question set?
Willow is the name given to the self-assessment question set introduced with Cyber Essentials v3.2. It replaced the Montpellier question set on 28 April 2025. IASME assigns place names to successive versions of the question set. Any assessment account created from 28 April 2025 uses Willow. The underlying requirements are set out in the IASME Requirements for IT Infrastructure v3.2 document.
What counts as a 'vulnerability fix' under Cyber Essentials v3.2?
Under v3.2, a vulnerability fix is any remediation action that addresses a known security vulnerability — including software patches, configuration changes, registry changes, and software removal. If a vendor publishes guidance recommending a configuration or registry change to mitigate a known vulnerability, that constitutes an available fix. Organisations have 14 days to apply the fix for vulnerabilities with a CVSS score of 7.0 or above, or where the vendor has not published a severity rating. The 14-day window runs from the date the fix becomes available, not the date a patch is released.
Are cloud services like Microsoft 365 and Google Workspace in scope for Cyber Essentials v3.2?
Yes. Under v3.2, any cloud service that stores, processes, or provides access to the organisation's data is in scope. This includes SaaS platforms such as Microsoft 365 and Google Workspace, IaaS environments such as Azure and AWS, and PaaS components where the organisation controls configuration. Organisations are responsible for the controls within their boundary — typically including MFA configuration, admin account protection, and licensed software management for SaaS platforms.
My existing Cyber Essentials certificate was issued before April 2025. Is it still valid?
Yes. Certificates issued under Montpellier or earlier versions remain valid until their expiry date. Cyber Essentials certification is annual. When the certificate comes up for renewal, the assessment will use the current requirements — Willow (v3.2). If your renewal falls after 28 October 2025, you must complete a Willow assessment. Certificates do not need to be reissued mid-cycle as a result of the v3.2 update.
How is Cyber Essentials Plus different from Cyber Essentials in terms of what gets tested?
Under v3.2, CE+ assessments begin with mandatory scope verification: the assessor must confirm that the scope declared in the CE self-assessment matches the systems included in the CE+ assessment before testing starts. The assessor then tests controls — including vulnerability scanning, MFA configuration checks, and firewall rule verification — following a defined sampling methodology introduced in v3.2. Sampling rules are no longer at assessor discretion.
What is the 14-day patching window, and how does it apply to configuration changes?
The 14-day window requires organisations to apply a fix within 14 days of it becoming available for any vulnerability rated High or Critical (CVSS 7.0 or above), or where no vendor severity rating has been published. Under v3.2, 'a fix becoming available' includes the publication of configuration-based or registry-based remediations, not only software patches. If a vendor publishes a security advisory recommending a configuration change to address a known vulnerability, the 14-day clock starts from the date that advisory is published.
Related resources
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
“In SureCloud, we’re delighted to have a partner that shares in our values and vision.”
Read more on how Mollie achieved a data-driven approach to risk and compliance with SureCloud.
Platform +
Frameworks +
Products +
Industries +
Resources +
Company +
London Office
1 Sherwood Street, London, W1F 7BL, United Kingdom
US Headquarters
6010 W. Spring Creek Pkwy., Plano, TX 75024, United States of America
© SureCloud 2026. All rights reserved.