Achieve Cyber Essentials with Agentless PAM
UK Cyber Essentials and Cyber Essentials Plus require five technical controls to protect against common cyber threats. 12Port enforces access control, secure configuration, and user account management with zero agents and deployment in under 5 minutes.
How 12Port Maps to UK Cyber Essentials Controls
12Port addresses the controls most relevant to privileged access management, giving your audit team verifiable evidence for every requirement.
Access Control
Enforce least privilege for all user accounts with RBAC, policy-driven approval workflows, and automatic de-provisioning of unused accounts.
Secure Configuration
AccessWall enforces secure configuration by restricting all privileged access to PAM-brokered sessions, blocking direct logins and bypass paths.
User Access Mgmt
Manage the complete lifecycle of privileged accounts: onboarding, periodic reviews, role changes, and offboarding with full audit trails.
Authentication
Enforce MFA for all privileged access: TOTP, Duo, YubiKey, Entra ID. Eliminate password-only access to critical systems.
Monitoring & Logging
Session recording captures all privileged activity. AI Session Intelligence detects anomalous behavior in real time.
Patch Management
Secure access to patch management systems through PAM-brokered sessions with approval workflows and change tracking.
Continuous Audit Evidence, Always Ready
Stop scrambling before audits. 12Port continuously generates the evidence your assessors need, stored in tamper-proof archives and exportable in audit-ready formats.
-
Access Control Evidence
RBAC policies, approval chains, and de-provisioning logs for Cyber Essentials access control requirements.
-
Secure Config Proof
AccessWall enforcement evidence showing PAM-only access paths to critical systems.
-
MFA Enforcement Logs
Comprehensive logs proving MFA enforcement for all privileged sessions.
-
Session Recordings
Tamper-proof recordings for audit and monitoring requirements.
Every Compliance Capability in One Platform
Every 12Port capability maps directly to compliance controls. No add-ons, no modules to buy, no agents to install.
Credential Vault
FIPS 140-3 validated encryption. Auto-rotation after every use. Secrets never exposed to users.
MFA Everywhere
Enforced at every gate: RDP, SSH, VNC, Web. Supports TOTP, Duo, YubiKey, Entra ID, and RADIUS.
Session Intelligence
AI-powered analytics detect anomalies, flag policy violations, and surface risk in real time.
AccessWall
Enforce that all privileged access goes through PAM. Block direct logins and eliminate bypass paths at the host level.
One Platform, Every Framework
Compliance rarely exists in isolation. Most organizations must satisfy multiple overlapping frameworks. 12Port covers them all from a single platform.
ISO 27001
The comprehensive ISMS standard that builds on Cyber Essentials foundations.
NIS2
EU cybersecurity directive with similar access control requirements.
NIST CSF 2.0
Map to six core cybersecurity functions with PAM evidence.
SOC 2 Type II
Meet Trust Service Criteria for logical access and monitoring.
Essential Eight
Australia's cybersecurity baseline with similar maturity model.
PCI DSS v4.0
Payment card security with overlapping access control requirements.
Cyber Insurance
Cyber Essentials certification supports insurance qualification.
All Frameworks →
Browse all 15+ security and compliance frameworks supported by 12Port PAM.
Ready to Achieve Cyber Essentials?
See how 12Port maps to your specific requirements. Deploy in under 5 minutes with no agents.