Skip to content

Cyber Essentials Password Policy & MFA Requirements UK 2026

Cyber Essentials password policy explained: the three accepted approaches, MFA requirements, passwordless / passkey rollout & common failures. UK 2026 guide.

Quick answer: Cyber Essentials password policy explained: the three accepted approaches, MFA requirements, passwordless / passkey rollout & common failures. UK 2026 guide.

Last updated: April 2026  |  Reviewed by: Connection Technologies team

Cyber Essentials password policy and MFA requirements — UK desk with smartphone showing authentication code, hardware security key and passwords notebook

Cyber Essentials Password Policy & MFA Requirements UK 2026

The Cyber Essentials password policy is one of the most-misunderstood parts of the scheme. The current IASME spec (v3.2, current through 2026) accepts any one of three approaches — and forces forced 90-day rotations are discouraged, not required. Multi-factor authentication is required on every cloud service that holds organisational data and on every administrative account, with passwordless authentication explicitly accepted as a valid form of MFA.

This guide covers the password and MFA requirements in detail: what’s accepted, what’s recommended, where assessors push back, and the practical configuration that satisfies the questionnaire. For wider context see our requirements guide and the M365 / Azure configuration guide.

Cyber Essentials password policy — the three accepted approaches

You only need one of these three:

ApproachMin password lengthOther requirementBest for
1. MFA8 charactersSecond factor requiredAll cloud services (default)
2. Throttling8 charactersAuto-lockout after ≤ 10 incorrect attempts in 5 minInternal systems where MFA is impractical
3. Strong password length12 charactersDeny-list of common/breached passwordsLegacy systems, kiosks

You can mix approaches across systems — MFA for M365, throttling for an internal HR tool, 12-character passwords on a legacy line-of-business app — provided every in-scope system uses one of the three.

What’s NOT required (despite popular belief)

  • Forced password rotations — explicitly discouraged in the current spec. Don’t force 90-day changes. Rotate only when there’s evidence of compromise.
  • Specific complexity rules — e.g. “1 uppercase, 1 number, 1 special character” — not required. Length is what matters.
  • Password history of 24 — not required.
  • Custom security questions — not required and generally insecure.
  • Hardware tokens for MFA — accepted but not required. Authenticator app, SMS codes (least preferred), push notification, biometric, hardware key — all accepted.

This was a genuine 2022-2023 update from the older NCSC password guidance. If you’re working from older internal documents, time to revise them.

IT support that actually supports you

Proactive managed IT from a UK team. 24/7 monitoring, cybersecurity and cloud services. Get a free quote.

✓ No obligation✓ 24/7 monitoring✓ UK-based team

MFA requirements in detail

Multi-factor authentication is required on:

  • Every cloud service that holds organisational data — M365, Google Workspace, Salesforce, Xero, Slack, your CRM, your project tool. List them all.
  • Every administrative account — global admins, domain admins, root accounts on cloud platforms, admin accounts on your firewall, admin on your MDM, etc.
  • Every internet-accessible service that authenticates users — VPN portals, remote access, web admin consoles for any in-scope system.

MFA is recommended but not strictly required for end-user access to internal-only systems that aren’t internet-facing. Most modern guidance treats it as required anyway.

Accepted forms of MFA

In rough order of strength (and assessor preference):

  1. Hardware security keys (YubiKey, Titan) — strongest, phishing-resistant
  2. Passwordless / passkeys — FIDO2 / WebAuthn, increasingly the default for M365 and Google
  3. Platform biometric (Windows Hello, Touch ID, Face ID) — strong, phishing-resistant when bound to device
  4. Authenticator app push notification (Microsoft Authenticator, Google Authenticator, Duo Push) — strong
  5. Authenticator app TOTP code — strong
  6. Hardware token TOTP — strong
  7. Email-based codes — accepted but the inbox itself must be MFA-protected
  8. SMS codes — accepted but discouraged (SIM swap risk). Use only as fallback.

The 2025 update to v3.2 explicitly added passwordless / passkeys as fully acceptable. You don’t need to keep a password if you’re using a stronger primary factor — passkey-only authentication is now CE-compliant.

Password storage requirements

Where your business operates services that store user passwords (your website’s customer login, an internal tool you’ve built):

  • Passwords must be hashed using a modern algorithm — bcrypt, Argon2, scrypt
  • Salt must be unique per password
  • Plaintext storage is a hard fail
  • Reversible encryption is a hard fail
  • MD5 / SHA-1 are not acceptable

This rarely affects most SMEs (you’re using Auth0, Cognito, M365, Google) but does apply if you’ve built a custom auth system.

Brute-force protection (the throttling option)

If you’re using approach 2 (throttling instead of MFA), the system must:

  • Lock out after no more than 10 incorrect attempts in 5 minutes (the standard rule)
  • Log the failed attempts
  • Either auto-unlock after a defined period (typically 15-30 mins) or require admin reset

Most modern systems do this by default. The questionnaire wants a screenshot of the policy or a config snippet showing the lockout settings.

Common Cyber Essentials password & MFA failures

  1. “MFA is on for users but admin accounts are exempt.” Hard fail — admins must have MFA, no exclusion.
  2. “We allow break-glass admin without MFA.” Acceptable only if the break-glass account credentials are stored in a vault accessible only by named individuals, with logged access. Document the procedure.
  3. “We use SMS for everyone.” Accepted but assessors prefer authenticator app. Doesn’t fail you, but expect a query.
  4. “We force password rotation every 60 days.” Doesn’t fail you (rotation is allowed, just not required) but you’ll get a polite query asking why.
  5. “We have MFA on M365 but not on Salesforce.” Hard fail — every cloud service holding org data needs MFA.
  6. “Service accounts don’t have MFA.” True for most service accounts (they’re not interactive), but they must be governed: long random password, stored in a vault, no shared usage, rotated on suspicion.

Password manager — recommended (and IASME-friendly)

Although not required, a password manager (1Password, Bitwarden, Dashlane, Keeper, LastPass) is the simplest way to evidence the password requirements:

  • Every account gets a unique strong password (no reuse)
  • Centrally enforces length and complexity
  • Stores TOTP codes in the same vault
  • Provides reporting (compromised passwords, weak passwords, reused passwords)
  • Audit trail of access

The reporting alone is useful evidence in the questionnaire — a screenshot of “0 reused passwords across the organisation” is a clean, single-page evidence pack.

Passwordless / passkey rollout for Cyber Essentials

If you want to move to passwordless on M365 (the simplest passwordless rollout for most SMEs):

  1. Enable passkey authentication in Entra ID > Authentication methods
  2. Have users register a passkey (typically Windows Hello or platform biometric, plus a backup security key)
  3. Add Conditional Access policy “phishing-resistant MFA required for admins”
  4. Eventually disable password sign-in entirely (months 3-6 of the rollout, after every user has registered passkeys)

This satisfies the strongest MFA position and the assessor will be enthusiastic. Plus it eliminates phishing as a credential-theft vector.

The Connection Technologies managed approach

Our managed Cyber Essentials service deploys the password and MFA controls automatically — Conditional Access policies for MFA, Intune compliance for device-bound credentials, optional passkey rollout, and reporting that the assessor can read directly. No spreadsheets, no policy documents to draft from scratch.

Get Cyber Essentials & Cyber Essentials Plus — fully managed

Connection Technologies runs Cyber Essentials and Cyber Essentials Plus for UK businesses end-to-end. Our compliance agent automates the five technical controls across every Windows, macOS, iOS and Android device — we submit, audit and renew so you stay certified without the paperwork. RRP from £103/month with free £25,000 cyber-liability insurance for eligible UK businesses.

Skip the Cyber Essentials paperwork

We handle the five controls, the questionnaire, the audit and the renewal — RRP from £103/month.

See Cyber Essentials & CE+ pricing →

Frequently asked questions

You can use any one of three approaches: (1) MFA + 8-char password, (2) 8-char password with auto-lockout after 10 failed attempts in 5 min, or (3) 12-char password with a deny-list of common/breached passwords. Forced rotations are discouraged.

Yes — on every cloud service that holds organisational data, on every administrative account, and on every internet-accessible service that authenticates users. Passwordless / passkeys are accepted as MFA in the current v3.2 spec.

Hardware security keys (strongest), passkeys / FIDO2, platform biometric (Windows Hello, Touch ID, Face ID), authenticator app push, authenticator app TOTP, hardware tokens, email codes (where the inbox is MFA-protected) and SMS (accepted but discouraged).

No — and forced 90-day rotations are explicitly discouraged in the current spec. Rotate only when there’s evidence of compromise. Length and uniqueness matter more than rotation frequency.

8 characters if combined with MFA or throttling. 12 characters if used alone (must be paired with a deny-list of common/breached passwords).

Yes — the v3.2 spec (current through 2026) explicitly accepts passwordless authentication including passkeys, FIDO2 / WebAuthn and platform biometrics. You don’t need to keep a password if you’re using a stronger primary factor.

Sitemap
Get an IT Quote 0333 015 2615

Need managed IT support?

Proactive UK-based IT support, cybersecurity and cloud services. Free, no-obligation quote.

Get an IT Quote →

Or call 0333 015 2615