Skip to contentAbout Fig Group
Guides

Does Cyber Essentials require a VPN?

Not directly. Cyber Essentials does not mandate a VPN, but under v3.3 any remote access to internal systems must use multi-factor authentication and strong encryption. A VPN is one common way to meet that requirement; it is not the only way.

Author

Jay Hopkins

Editor

Edited by Jack Wickham

Published

Last reviewed

Read time

5 min read

Share

Does Cyber Essentials require a VPN?

No - Cyber Essentials does not require a VPN. Under v3.3, the scheme requires any remote access to internal systems to use multi-factor authentication and strong encryption. A VPN is one common way to meet that requirement; it is not the only way.

What v3.3 actually requires for remote access

  • MFA on all remote access paths to corporate systems and cloud services in scope.
  • No direct exposure of internal services (RDP, management interfaces, file servers) to the public internet.
  • Strong encryption (TLS 1.2+, or equivalent).
  • Phishing-resistant MFA for admin accounts when accessing admin functions remotely.

See the User Access Control pillar guide for the full detail.

Where a VPN is a good solution

  • Accessing on-premises servers or file shares from outside the office.
  • Presenting a consistent egress IP for allow-listing.
  • Protecting traffic on untrusted networks.
  • Legacy applications that assume a trusted LAN.

A well-configured VPN with MFA satisfies the remote-access control cleanly.

Where a VPN is not needed

Cloud-first organisations that access all corporate services through Microsoft 365, Google Workspace, or SaaS tools - with identity-provider MFA enforced via Conditional Access - meet the v3.3 remote-access bar without a VPN at all. The identity provider becomes the enforcement point rather than the network boundary.

This is increasingly common for:

  • SaaS SMEs with no internal infrastructure
  • Fully remote-first businesses using Zero Trust / conditional-access patterns
  • Organisations that have already retired legacy LAN-dependent applications

Where Zero Trust / Conditional Access replaces the VPN

Microsoft Entra ID Conditional Access, Okta, and Google Workspace Context-Aware Access can enforce:

  • MFA per sign-in
  • Device-compliance requirement (MDM-enrolled, encrypted, patched)
  • Risk-based blocks for unusual locations or impossible travel
  • Phishing-resistant MFA for admin roles

Configured properly, this provides stronger authentication and authorisation than a traditional VPN with a shared password plus one-time code. IASME assessors accept it as a full substitute for the remote-access control.

VPN rules that still apply to remote workers

Regardless of whether a VPN is in place:

  • Home-office routers are in scope under v3.3 (default passwords changed, firmware current).
  • MFA on email and cloud services is required for everyone.
  • Admin accounts require phishing-resistant MFA.

See Cyber Essentials for remote and hybrid workforces for the complete remote-work scope.

Bottom line

Cyber Essentials does not require a VPN. It requires MFA and strong encryption on any remote-access path, and no direct internet exposure of internal services. A VPN is one way to meet that; identity-provider-enforced Conditional Access is another. Both pass the v3.3 assessment cleanly.

Start Cyber Essentials from £299.99 + VAT | MFA for Cyber Essentials v3.3 | Free readiness check

About the author

Jay Hopkins

Jay Hopkins

Managing Director, Fig Group

IASME-licensed Cyber Essentials AssessorIASME Cyber Assurance Assessor

Jay Hopkins is the Managing Director of Fig Group and an IASME-licensed Cyber Essentials assessor. He was previously Head of Technology for a global regulated firm. He works with UK organisations across regulated sectors on baseline compliance, supply-chain assurance, and AI-augmented security tooling.

Next step

Want to see how Fig handles this?

Discover how Fig helps organisations prepare for security assessments and maintain ongoing compliance.

Request a demo

Related solutions

Continue exploring Fig