Cyber Essentials

Cyber Essentials Control 1: Firewalls — Your First Line of Defence

> series: cyber_essentials_demystified —— part: 03/10 —— control: firewalls —— function: boundary_defence<span class="cursor-blink">_</span>_

Hedgehog Security 19 February 2026 12 min read

The gatekeeper between your network and the internet.

The firewall control is the first line of defence in the Cyber Essentials framework. Its purpose is straightforward: ensure that every device that connects to the internet is protected by a correctly configured firewall that controls what traffic is allowed in and out. What sounds simple in principle, however, is where a significant proportion of CE Plus assessment failures occur — not because organisations lack firewalls, but because the firewalls they have are misconfigured, overly permissive, or have accumulated years of exception rules that undermine their effectiveness.

This article covers what the Danzell v3.3 requirements specifically demand for the firewall control, the different types of firewall that apply (boundary, personal, cloud, and home router), the configuration mistakes we most commonly encounter during assessments, and practical guidance for ensuring your firewalls meet the standard.


Recommended

Getting certified doesn't have to be painful.

We handle the Cyber Essentials process end to end — from gap analysis to certification.

Start Your Certification

The specific firewall requirements.

Under the Danzell question set, the firewall requirements are clearly defined. Every device in scope must be protected by at least one firewall — and the firewall must be configured to deny inbound connections by default, allowing only those that have been explicitly approved as necessary for business operations. Outbound connections should be restricted where practical, though the scheme acknowledges that most organisations allow outbound traffic by default.

Requirement Detail Common Failure
Default deny inbound All inbound connections must be blocked by default. Only explicitly required services should be allowed through — and each allowed service must have a documented business justification. Firewall has accumulated 'temporary' allow rules over years that were never removed. Rules reference decommissioned services or former staff IP addresses.
Administrative interfaces Firewall and router management interfaces must not be accessible from the internet. If remote administration is required, it must be protected by additional measures such as VPN access or IP whitelisting combined with MFA. Router management interface accessible on a public IP with default credentials. We see this more often than any IT team would care to admit.
Personal firewalls All laptops, desktops, and tablets must have a software firewall enabled. The firewall must be configured to block inbound connections by default and must not be user-configurable — end users should not be able to disable it. Software firewall disabled by a user who found it 'interfered with their application'. Group Policy not enforcing firewall state across the domain.
Home routers (remote workers) If staff work from home, their home router's firewall must be configured appropriately — or the device they use must be protected by its own software firewall. The default configuration of most consumer routers satisfies the inbound blocking requirement, but the default admin password must be changed. Home router running default admin credentials (admin/admin). Staff member's home network not considered in scope.

The boundary has moved to the cloud.

For organisations using cloud infrastructure — AWS, Azure, Google Cloud — the traditional concept of a network boundary firewall extends to cloud security groups, network access control lists, and cloud-native firewall services. Under Danzell, cloud services are formally in scope, which means your cloud security group configurations must meet the same default-deny-inbound requirements as a physical firewall appliance.

The most common cloud firewall failure we encounter is overly permissive security groups — typically set to allow all inbound traffic on all ports during development and never locked down for production. A security group that allows inbound SSH (port 22) or RDP (port 3389) from 0.0.0.0/0 is a critical misconfiguration that will fail a CE Plus assessment and, more importantly, exposes your cloud infrastructure to brute-force attacks from the entire internet.


Common firewall failures during assessments.

Accumulated Allow Rules
The firewall was configured correctly when it was deployed — but over months and years, temporary rules were added to resolve specific issues and never removed. Each rule is a hole in the boundary. We routinely find firewalls with dozens of rules that reference services, IP addresses, and staff members that no longer exist.
Default Credentials on Network Devices
Routers, switches, and firewalls deployed with manufacturer-default passwords. This is both a firewall control failure and a secure configuration failure. During CE Plus assessments, we check for default credentials on all in-scope network devices — and find them more often than you might expect.
Management Interfaces on Public IPs
Router or firewall admin panels accessible from the internet without VPN or IP restriction. This gives any attacker on the internet a login prompt to your network infrastructure — and if combined with default credentials, it provides direct access to reconfigure your boundary defences.
Disabled Personal Firewalls
End-user devices with software firewalls turned off — either by the user, by a misconfigured Group Policy, or by a third-party application installer. Without an enforced personal firewall, a laptop connected to a coffee shop Wi-Fi has no boundary protection at all.

How to get your firewalls assessment-ready.

Preparing your firewalls for a Cyber Essentials assessment — whether CE or CE Plus — requires a systematic review rather than a last-minute scramble. The following steps will identify and close the most common gaps.

Firewall Assessment Preparation Checklist
── Boundary Firewall ───────────────────────────────────────
[ ] Review all inbound allow rules — remove any without current justification
[ ] Verify default-deny inbound policy is active
[ ] Confirm management interface is not accessible from the internet
[ ] Change default admin credentials if not already done
[ ] Document all allowed inbound services with business justification

── Personal Firewalls ──────────────────────────────────────
[ ] Verify software firewall is enabled on all laptops and desktops
[ ] Enforce firewall state via Group Policy (Windows) or MDM (Mac/mobile)
[ ] Confirm users cannot disable the firewall

── Cloud Security Groups ───────────────────────────────────
[ ] Audit all security groups for overly permissive inbound rules
[ ] Remove 0.0.0.0/0 inbound rules on management ports (22, 3389)
[ ] Implement least-privilege inbound rules for all cloud services

── Home Workers ────────────────────────────────────────────
[ ] Verify home router default passwords have been changed
[ ] Confirm device-level firewalls are active on all remote devices

Firewalls are not set and forget.

A firewall that is correctly configured today can drift out of compliance within weeks as new rules are added, exceptions are granted, and configurations are modified. For organisations that want continuous visibility into their firewall posture — and their broader security state — SOC in a Box provides 24/7 monitoring that detects configuration drift, identifies unauthorised changes, and alerts your team before a misconfiguration becomes an exposure.

For organisations that want their firewall configurations tested under realistic attack conditions, our infrastructure penetration testing service probes your boundary from the outside using the same tools and techniques an attacker would use — providing evidence of what gets through and what does not.


Part 4 preview.

Next week, we deep-dive into Control 2 — Secure Configuration. We cover what Danzell requires for default passwords, unnecessary accounts, device hardening, and the configuration baselines that every in-scope device must meet.


We can help — as your assessor or your advisor.

As an IASME-approved certification body, we assess your firewall configuration as part of every CE Plus engagement. If you want to fix issues before the assessment, our <a href="/cyber-essentials/concierge">Concierge service</a> identifies and remediates gaps so you pass first time.

Next Step

Getting certified doesn't have to be painful.

We handle the Cyber Essentials process end to end — from gap analysis to certification.

Start Your Certification

Related Articles