Upcoming Changes to Cyber Essentials

Cyber Essentials changes 2026: what the move from Willow to Danzell means for you

By Glen Patrick, Head of Cyber Audit at CyberSmart

From 28 April 2026, significant changes to Cyber Essentials and Cyber Essentials Plus will come into effect, as IASME introduces the new Danzell question set to replace Willow.

These updates represent one of the most important shifts in the Cyber Essentials scheme in recent years - tightening requirements, reducing flexibility, and placing greater emphasis on real-world security.

In this guide, we explain:

  • What’s changing in Cyber Essentials 2026
  • How Cyber Essentials Plus audits are evolving
  • What the move from Willow to Danzell means
  • How to prepare for the new requirements


Why Cyber Essentials is changing in 2026

IASME updates Cyber Essentials annually to ensure the framework continues to reflect current cyber threats and best practices.

The April 2026 Cyber Essentials changes are designed to:

  • Strengthen cyber resilience across UK organisations
  • Improve consistency and reduce interpretation in assessments
  • Prevent “last-minute fixes” or selective compliance
  • Reinforce Cyber Essentials as a trusted supply chain standard

As discussed in our recent Ask the Auditors session, these changes aim to ensure organisations are genuinely secure - not just compliant on paper.

What is the difference between Willow and Danzell?

The transition from Willow to Danzell introduces stricter controls and removes much of the tolerance that previously existed in Cyber Essentials assessments.

1. Mandatory MFA across all cloud services

Under Danzell:

  • Multi-factor authentication (MFA) must be enabled on all cloud services where available
  • This includes SaaS platforms, business tools, and systems using single sign-on (SSO)
  • Failure to implement MFA will result in an automatic fail

Previously, some MFA gaps could be tolerated. That is no longer the case.


2. Stricter Cyber Essentials scoping requirements

Cyber Essentials scope must now be:

  • Clearly defined and justified
  • Based on network boundaries (not departments or roles)
  • Supported by detailed explanations for any exclusions

All internet-connected organisational devices must be included in scope unless explicitly justified.

3. Evidence must be explicit and verifiable

The new Danzell question set requires:

  • Clear, documentable evidence
  • Less reliance on assumed or theoretical controls

This reinforces Cyber Essentials as a verifiable security standard, not just a self-assessment exercise.

How Cyber Essentials Plus is changing in 2026

The most impactful changes affecting Cyber Essentials Plus:

New vulnerability sampling process

Under the updated model:

  1. A random sample of devices is tested
  2. If vulnerabilities are found:
    • Organisations must remediate them
    • A second random sample is tested
  3. If vulnerabilities are found again:
    • The Cyber Essentials Plus audit may fail
    • The underlying Cyber Essentials certification may be invalidated

This replaces the previous model, where passing a single sample could still lead to certification.

What this means in practice:

  • Organisations must be fully compliant before audit
  • Vulnerabilities cannot be deferred
  • Audit preparation must happen earlier
  • The risk of failure increases if organisations are not ready


Cyber Essentials is now a “point-in-time” certification

Another key change in 2026 is the move to point-in-time compliance.

This means:

  • Certification reflects your organisation’s security posture at that exact moment
  • You must be compliant before and during certification
  • There is minimal opportunity to fix issues after audit activity begins


How to prepare for Cyber Essentials 2026 changes

To succeed under the new requirements, organisations should:

1. Implement MFA everywhere

Ensure MFA is enabled across all cloud services where available.

2. Prioritise vulnerability management

Address high and critical vulnerabilities quickly, especially within required timelines.

3. Review your Cyber Essentials scope

Ensure all relevant systems are included and exclusions are clearly justified.

4. Start audit preparation earlier

Do not wait until just before your Cyber Essentials Plus audit to begin remediation.


How CyberSmart supports Cyber Essentials and Cyber Essentials Plus

At CyberSmart, we’re already adapting our platform and processes to help organisations and partners succeed under the new Cyber Essentials framework.

A new, guided Cyber Essentials Plus experience

We’re developing a more structured journey that:

  • Encourages earlier preparation
  • Reduces uncertainty during audit
  • Guides organisations step-by-step through the process

Improved audit readiness dashboards

We’re introducing enhanced visibility within the platform, including:

  • Real-time vulnerability status
  • Clear audit readiness indicators
  • Actionable steps before booking an audit

Helping you achieve Cyber Essentials with confidence

Our focus is on helping organisations:

  • Avoid last-minute surprises
  • Reduce audit risk
  • Achieve certification efficiently and confidently


Final thoughts: Cyber Essentials is evolving

The Cyber Essentials 2026 changes mark a significant step forward for the scheme.

While the requirements are stricter, they also increase the value and credibility of certification - particularly as Cyber Essentials continues to play a key role in supply chain security.

For organisations and partners, success will depend on one thing:

Being ready before the audit begins.

Learn more about the Cyber Essentials changes

For a deeper dive into the Willow to Danzell transition and what it means for you, revisit our Ask the Auditors webinar in the CyberSmart Community.

We’ll continue to share guidance, updates, and best practices to help you prepare for April 2026 and beyond.

Download the guide