Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Cyber Essentials

Exceed UK Baseline Certification with Physical Isolation Evidence

Cyber Essentials establishes baseline security requirements for UK organisations. Firevault Control provides physical measures that demonstrably exceed baseline requirements, providing stronger evidence for Cyber Essentials Plus certification and supply chain assurance.

Back to Control
Control

Cyber Essentials

Cyber Essentials certification demonstrates baseline security hygiene. Physical enforcement demonstrates that those baselines are continuously maintained and cannot be accidentally undermined.

5/5

Technical controls with physical enforcement

100%

Boundary firewall requirements exceeded

CE+

Cyber Essentials Plus evidence strengthened

Full

Continuous certification evidence

The Certification Gap

Baseline certification is necessary but not sufficient.

Baseline vs Reality

Cyber Essentials certifies baseline controls at a point in time. Between assessments, control effectiveness can degrade through configuration drift and human error.

Boundary Device Limitations

Cyber Essentials requires boundary firewalls, but firewalls can be misconfigured, bypassed, or compromised, undermining the boundary they are meant to protect.

Supply Chain Requirements

Government and enterprise contracts increasingly require Cyber Essentials Plus. Stronger evidence differentiates organisations competing for these contracts.

The Scenario

Scenario: Supply Chain Tender with Physical Evidence

A government department evaluates three suppliers for a sensitive contract. All three hold Cyber Essentials Plus certification. However, the department's security assessment reveals that two suppliers rely entirely on software-based boundary controls that have experienced configuration incidents in the past year. The third supplier presents physical boundary enforcement evidence from Firevault Control, showing continuous, unbroken boundary protection with tamper-proof logs. The department selects the supplier with physical enforcement, noting that physical boundaries provide a higher assurance level for the sensitivity of the contract.

"All our competitors had Cyber Essentials Plus. What differentiated us was the ability to show physical boundary enforcement with continuous evidence. For the government buyer, physical controls meant genuine assurance, not just a certificate."

Framework Mapping

Physical measures that exceed baseline certification.

Organisations exceed Cyber Essentials requirements through physical enforcement of all five technical controls. Boundary protection is physical. Access control is multi-party governed. Recovery from malware is guaranteed through air-gapped archives. Continuous evidence strengthens certification renewals and differentiates in supply chain competitions.

  • Physical boundary protection exceeding firewall requirements
  • Governed access control with multi-party authorisation
  • Continuous compliance evidence between assessments
  • Competitive differentiation in supply chain tenders
  • Air-gapped recovery for guaranteed malware protection
  • Stronger CE Plus evidence for technical verification
Fracture

Fracture — Boundary Firewall Enforcement

Module 1 of 4

Provides physical boundary enforcement that exceeds Cyber Essentials firewall requirements. Physical boundaries cannot be bypassed through misconfiguration, providing a higher assurance standard.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Physical Boundary Protection

Physical network boundaries exceed Cyber Essentials boundary firewall requirements, providing demonstrable protection that cannot be misconfigured.

Governed Access Control

Multi-party authorisation provides access control evidence that exceeds baseline requirements and demonstrates active governance.

Continuous Evidence

Automated logging generates continuous compliance evidence, strengthening your position for Cyber Essentials Plus assessment and renewals.

Secure Configuration Support

Physical zone separation ensures secure configuration requirements are maintained regardless of individual system configuration states.

Assessment-Ready Logs

Tamper-proof logs provide complete audit trails ready for Cyber Essentials Plus technical verification.

Clean Recovery Capability

Air-gapped backups ensure clean system restoration, supporting malware protection requirements with guaranteed uncompromised recovery.

Demo to Live

Adoption Guide

Step 1

Baseline Assessment

Review your current Cyber Essentials controls and identify where physical enforcement provides the greatest assurance improvement.

Step 2

Physical Boundary Design

Design physical boundary enforcement for your network perimeter and internal zone boundaries aligned to your Cyber Essentials scope.

Step 3

Pre-Assessment Deployment

Deploy Control before your next Cyber Essentials Plus assessment to generate continuous evidence and validate physical boundary effectiveness.

Step 4

Full Boundary Enforcement

Organisation-wide physical boundary enforcement with continuous evidence generation and air-gapped recovery capability.

Step 1

Baseline Assessment

Review your current Cyber Essentials controls and identify where physical enforcement provides the greatest assurance improvement.

Step 2

Physical Boundary Design

Design physical boundary enforcement for your network perimeter and internal zone boundaries aligned to your Cyber Essentials scope.

Step 3

Pre-Assessment Deployment

Deploy Control before your next Cyber Essentials Plus assessment to generate continuous evidence and validate physical boundary effectiveness.

Step 4

Full Boundary Enforcement

Organisation-wide physical boundary enforcement with continuous evidence generation and air-gapped recovery capability.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy