Get patching current, enable MFA everywhere, lock down firewall rules, document your scope, and test before the assessor does. A gap analysis before booking the assessment saves time and money.
Quick answer: Get patching current, enable MFA everywhere, lock down firewall rules, document your scope, and test before the assessor does. A gap analysis before booking the assessment saves time and money.
The Preparation Checklist
1. Define your scope clearly
Know exactly what's included:
- Every device that accesses company data
- Every user account
- Every external service (email, cloud apps, website)
- Every network boundary
- Forgetting mobile devices with company email
- Missing that old PC in the warehouse
- Ignoring personal devices used for work
- Overlooking test/dev systems
2. Patching - get current
The standard requires critical and high-severity patches within 14 days.
Check everything:
- Windows/Mac updates
- Third-party applications
- Browser versions
- Firmware on firewalls and network kit
- Mobile device OS versions
- That server no one touches
- Software that doesn't auto-update
- Legacy applications
- Devices that haven't been online recently
3. MFA - everywhere that matters
Multi-factor authentication on:
- All cloud services (Microsoft 365, Google, etc.)
- VPN access
- Remote desktop access
- Firewall and network equipment admin
- Any admin portals
4. Firewall configuration
- Default deny on inbound traffic
- Only necessary ports open
- Admin interface not exposed to internet
- Documented rules you can explain
5. User access control
- No shared accounts
- Admin rights only where necessary
- Leavers removed promptly
- Documented process for access changes
6. Malware protection
- Antivirus/EDR on all devices in scope
- Signatures current
- Scanning enabled
- Not disabled by users
7. Secure configuration
- Default passwords changed
- Unnecessary services disabled
- Auto-run disabled
- Screen locks enabled
Before You Book the Assessment
Run your own checks:
- Vulnerability scan your external systems
- Check MFA is actually enforced (not just enabled)
- Verify patches are installed, not just downloaded
- Test a sample of devices against the requirements
On Assessment Day
For the technical testing:
- Assessor needs access to a sample of devices
- They'll run vulnerability scans
- They'll check configurations
- They may test phishing email handling
What We Do
Our pre-assessment service mirrors the real assessment. We check:
- External vulnerability scan
- Device configuration samples
- MFA verification
- Patch status
- Firewall review
---
- find problems before the assessor does.
---
