This guide explains which devices are covered by Cyber Essentials and Cyber Essentials Plus, and which ones can be excluded from scope under specific conditions.

Cyber Essentials device scope concept image.

Does Cyber Essentials cover all devices?

Almost all devices that access organisational data or services are in scope. In practical terms, any device that can connect to the internet, initiate outbound connections, accept inbound connections, or control the flow of data to/from the internet will be considered in scope. Organisation-owned devices are always in scope.

Examples of devices that ARE in scope

• Laptops and desktops (Windows, macOS, Linux)
• Tablets and smartphones (company-owned and BYOD when used for work email/apps)
• Company-managed remote-working devices and anything connecting via corporate VPN
• IP desk phones that connect to cloud services (e.g., Microsoft Teams phones)
• Devices used to access cloud services such as Microsoft 365, Azure, Google Workspace

What devices are NOT in scope?

Some devices can be out of scope, but only under strict conditions:

• Personal devices used only for calls or SMS (no work data access)
• Smart cars or similar devices that only mirror a paired phone and do not independently connect to the internet
• Home broadband routers supplied by an ISP (note: devices behind them remain in scope)
• Specialist legacy equipment (e.g., manufacturing machinery, lab/research kit) that cannot be updated may be excluded only if strictly isolated via VLANs or firewalls
• Devices used only by third‑party engineers, students or customers (not organisational devices)

Can we de-scope unsupported or risky devices?

Yes. Devices that cannot meet Cyber Essentials requirements can be excluded if they are segregated from production systems using robust technical controls (e.g., VLANs, firewalls) and clearly documented in the assessment scope. Priority IT will help identify such devices and implement safe isolation where appropriate.

Summary table

DEVICE TYPE IN SCOPE? NOTES
Company laptops/desktops Yes Always in scope
Smartphones/tablets accessing email/365 Yes BYOD in scope if used for work
Home ISP routers No Devices behind them are in scope
Smart cars No If only mirroring a phone and not independently internet-connected
Specialist legacy machinery Possibly No Only if strictly isolated via VLANs/firewalls
IP desk phones with cloud services Yes Declare OS/version if required
BYOD used only for calls or texts No No organisational data access
Devices used by third‑party engineers No Not staff devices

How Priority IT help

We will review your all of your devices, confirm scope, identify any out-of-date or unsupported devices, and recommend remediation or safe isolation before you commit to Cyber Essentials or Cyber Essentials Plus.

For more details, view the Cyber Essentials page of our website, or call us on 01225 636000 or email [email protected]