Cyber Essentials v3.3 MFA Requirement: What You Need to Know
The Cyber Essentials Requirements were updated to version 3.3 in April 2026, and the single biggest change is the mandatory multi-factor authentication (MFA) requirement. This applies to all user accounts accessing organisational data or services – no exceptions.
This article explains what changed, who is affected, and how to ensure your organisation complies.
What Changed in v3.3?
Prior to v3.3, MFA was recommended but only mandatory for certain account types, primarily administrator accounts and cloud service accounts. The v3.3 update removes this distinction entirely.
Under v3.3, MFA is mandatory for every user account in scope. This includes:
There are no exemptions. If an account can be used to access organisational data or services, it must have MFA enabled.
Why Did This Change?
Credential theft remains one of the most common attack vectors. The NCSC has consistently found that compromised passwords account for a significant proportion of successful cyber attacks against UK organisations. MFA dramatically reduces the risk of account compromise – even if a password is stolen, the attacker cannot access the account without the second factor.
The move to mandatory MFA reflects a broader industry trend. Microsoft, Google, and other major platforms have already implemented mandatory MFA for administrator accounts. The NCSC is extending this requirement to all accounts under the Cyber Essentials scheme.
What Counts as MFA?
Acceptable MFA methods under v3.3 include:
Not acceptable as MFA:
Common Compliance Challenges
Legacy systems without MFA support – Some older applications and systems do not support MFA natively. For these, you have two options: upgrade or decommission the system, or place it behind an MFA-protected gateway (such as a VPN or identity provider that enforces MFA before granting access).
BYOD devices – If employees use personal devices to access organisational data, those accounts must have MFA enabled. This is a scope issue that catches many organisations – if the device accesses work email or cloud storage, it is in scope.
Shared accounts – v3.3 does not permit shared accounts as a way to avoid MFA. Each user must have an individual account with MFA enabled. If you currently use shared accounts, you will need to transition to individual accounts before certification.
Service accounts – Automated service accounts that do not have interactive login capability are not required to have MFA. However, service accounts that can be used for interactive login must have MFA enabled or be converted to non-interactive accounts.
How to Prepare
1. Audit all accounts in scope – Identify every account that accesses organisational data or services. Include cloud platforms, email, VPN, and any SaaS applications.
2. Enable MFA on all accounts – Work through your account inventory and enable MFA for each one. Microsoft 365 and Google Workspace both support organisation-wide MFA enforcement through admin policies.
3. Choose the right MFA method – Authenticator apps and hardware keys are the most secure options. SMS is acceptable but carries higher risk. Choose based on your organisation's risk appetite and user capability.
4. Test before certifying – After enabling MFA, verify that all users can successfully log in with their second factor. MFA rollouts sometimes cause access issues that need resolving before assessment.
5. Use the readiness checker – Fig's Cyber Essentials readiness checker includes specific questions about MFA deployment to help you identify gaps.
Impact on Certification Timeline
If your organisation already has MFA deployed across all accounts, the v3.3 update should not delay your certification. If you need to roll out MFA, allow 1–2 weeks for deployment and user training before attempting certification.
For organisations ready to certify, Fig offers same-day Cyber Essentials certification for orders placed before midday.
Want to see how Fig handles this?
Explore how Fig automates compliance mapping, evidence collection, and framework alignment across 65+ compliance standards.
Request a demoRelated solutions
More in Compliance
The Fastest Cyber Essentials Certification Body in the UK: Why Fig Stands Alone
Most Cyber Essentials certification bodies take 24 to 72 hours to issue a certificate. Fig does it in under 6 hours. No other certification body in the UK can match this. Here is why.
Why Does Cyber Essentials Certification Take So Long? It Does Not Have To.
Waiting 24 to 72 hours for Cyber Essentials certification is the norm at most certification bodies. But it is not a requirement – it is a limitation. Fig is the only certification body that has eliminated the wait entirely.
Cyber Essentials Certification Bodies Compared: Speed, Service, and Why Fig Leads
With dozens of Cyber Essentials certification bodies in the UK, how do you choose? We compare the key differences in speed, service, and process – and explain why Fig is the only body that certifies in under 6 hours.