IT support insights
Strategy2 April 2026 · 7 min read

Cyber Essentials Plus is no longer optional for sub-contractors

Tier-one contractors are quietly making Cyber Essentials Plus a contractual prerequisite. If you're not ready, you'll find out at the worst possible moment.

Five years ago Cyber Essentials was a nice-to-have for construction sub-contractors. Three years ago it became standard on government and large public-sector contracts. Now it's written into pre-qualification questionnaires across most of the tier-one market, and Cyber Essentials Plus is increasingly the bar for any contract above a certain value.

The tier-ones have decided their supply chain is their attack surface. That's a fair conclusion. The 2020s have produced enough attacks via small suppliers that the larger firms now treat supplier security as part of their own.

What Cyber Essentials actually requires

Cyber Essentials covers five technical control areas: firewalls, secure configuration, user access control, malware protection, and security update management. It's deliberately practical and avoids exotic requirements. Most modern Microsoft 365 setups can meet it with a few weeks of focused work.

Cyber Essentials Plus adds a hands-on technical audit by an external assessor. They scan your endpoints, test your patching, verify your MFA, and check that what you said in the self-assessment is actually true. It's harder, but it's also the version tier-ones increasingly want to see.

What gets people stuck

Unmanaged personal devices. The site engineer's laptop they bought themselves. The director's iPad that's been used for board papers without enrolment. Cyber Essentials Plus will catch these, and the conversation isn't fun.

Unsupported operating systems. The odd Windows 10 machine that wasn't upgraded, the Mac running an old macOS, the Android device still on a major version that stopped getting updates two years ago. All of these will trigger findings.

Local admin rights. Standard users running with administrator privileges, often because someone configured it three years ago and nobody changed it. Removing local admin is achievable but takes a couple of weeks of pain.

Patching cadence. Cyber Essentials requires high and critical patches to be applied within fourteen days. A manual patching process tends to fail this. Intune, Windows Update for Business or a managed service usually passes it.

Why you don't want to do this in a panic

The worst time to start a Cyber Essentials Plus programme is the week you find out a tier-one bid requires it within thirty days. The remediation work usually takes longer than that, the assessment itself needs scheduling, and the auditors are busy.

Construction firms that lose bids over this tend to be the ones who treated it as a tick-box too late. The ones who treat it as a calendar item, with annual renewals scheduled and gap remediation done quietly through the year, never have the conversation.

Treating it as business development

It helps to reframe Cyber Essentials Plus as a sales enabler rather than a compliance cost. The contracts you become eligible for as a CE+ certified sub-contractor are worth materially more than the cost of getting and keeping the certification.

A typical CE+ assessment costs a few thousand pounds. The remediation work, if you start from a reasonable baseline, is a few thousand more in consultancy time. A single tier-one contract win pays for many years of certification.

The 90-day approach that works

Days one to thirty: gap assessment. A construction-aware IT partner runs through the CE+ control set against your current Microsoft 365 and endpoint estate. The output is a remediation plan ranked by effort and impact.

Days thirty to seventy-five: remediation. MFA enforced, local admin removed, patching tightened, unsupported devices retired or fenced off, conditional access policies tidied up. Most of this work is invisible to users if it's done well.

Days seventy-five to ninety: pre-assessment and audit. A friendly internal scan first to catch anything the partner missed, then the formal CE+ audit. Allow time for one round of follow-ups; it's normal to have a couple of small findings on the first pass.

What good looks like a year in

A construction firm that's run CE+ for a couple of cycles tends to look quietly different. Patching is automated and reported. Joiner-leaver is tidy. Devices are all managed. The PQQ responses are written once and reused, with the certificate attached.

When the next tier-one asks the question, the answer is in a folder. That's what 'ready' actually means, and it pays for itself the first time it matters.

Renewal, not certification

Once you have Cyber Essentials Plus, the work shifts from getting it to keeping it. Each annual renewal asks the same questions, and the firms that struggle are usually the ones who let things drift between assessments.

Treat it as a calendar item. Monthly patching reports, quarterly account reviews, an annual policy refresh, and a friendly pre-assessment scan a month before the formal audit. The cost stays modest. The certificate stays current. The next tier-one PQQ is straightforward.

One more practical point. CE+ is increasingly being asked for at the supply chain level too, not just the tier-one level. Sub-contractors are being asked to confirm their own sub-contractors hold it. The cascade is real and likely to continue.

Getting ahead of it is a competitive advantage. Being the sub-contractor whose paperwork is already in order, while your peers are scrambling, is worth real money on framework appointments.

Need the right partner for this?

We'll connect you with a UK specialist.

Tell us where you are and we'll introduce a Microsoft-focused managed support specialist who fits.

Connect me with a specialist