CE-style baseline checklist

Cyber Essentials-style clarity for Microsoft 365-centric SMEs

A fast checklist across the five Cyber Essentials control areas - focused on scope, owners, and evidence (not process theatre).

CE-style baseline checklist

Cyber Essentials-style clarity for Microsoft 365-centric SMEs

A fast checklist across the five Cyber Essentials control areas - focused on scope, owners, and evidence (not process theatre).

CE-style baseline checklist

Cyber Essentials-style clarity for Microsoft 365-centric SMEs

A fast checklist across the five Cyber Essentials control areas - focused on scope, owners, and evidence (not process theatre).

UK-based • Microsoft 365–centric • Governance-led approach

What is it?

A practical, checklist-first PDF that helps you spot baseline gaps across five CE control themes.

What is it?

A practical, checklist-first PDF that helps you spot baseline gaps across five CE control themes.

What is it?

A practical, checklist-first PDF that helps you spot baseline gaps across five CE control themes.

It focuses on what must be true, what you should be able to show, and who owns it.

Who it's for

Who it's for

Who it's for

This checklist is for you if your business is:

A 10-25 person, owner-managed SMEs in Sussex & Kent (or the South East)

Already using Microsoft 365 day-to-day

Limited (or no) in-house IT capacity

Want baseline clarity before making IT/security decisions or to help meet supplier expectations

What you'll be able to answer

What you'll be able to answer

What you'll be able to answer

Do we have clear scope, owners and evidence across the Cyber Essentials+ baseline controls?

Where are we relying on assumptions or “one-off fixes”?

Which controls are in place today—and which aren’t consistently maintained?

What decisions do we need to make to reduce scope ambiguity and decision latency?

Do we have clear scope, owners and evidence across the Cyber Essentials+ baseline controls?

Where are we relying on assumptions or “one-off fixes”?

Which controls are in place today—and which aren’t consistently maintained?

What decisions do we need to make to reduce scope ambiguity and decision latency?

What's inside

What's inside

What's inside

5 sections mapped to CE control themes (Firewalls, Secure configuration, User access control, Malware protection, Security update management)

Evidence prompts (what you should be able to show)

Owner prompts (internal / supplier / shared)

A short misconceptions box

A clear “what next” path (Triage → Baseline Review)

How to use it

How to use it

How to use it

  1. Download the Baseline.

  1. For each question, tick Yes/No/Unsure.

  1. If you have any No/Unsure, book a free Security Triage Call to clarify scope, answers and evidence requirements.

  1. Download the PDF.

  1. For each question, tick Yes/No/Unsure.

  1. If you have any No/Unsure, book a free Security Triage Call to clarify scope, answers and evidence requirements.

Get the checklist

Enter your details below to unlock your download!

Get the checklist

Enter your details below to unlock your download!

Get the checklist

Enter your details below to unlock your download!

*Required fields

*Required fields

We will email you the CE-style Microsoft 365 Baseline Checklist and a short follow-up email series related to it. If you provide a phone number, we may call once to check it reached you.

We will email you the CE-style Microsoft 365 Baseline Checklist and a short follow-up email series related to it. If you provide a phone number, we may call once to check it reached you.

Opt out any time.

Opt out any time.