UK Cyber Essentials Compliance | 12Port Privileged Access Management
UK Cybersecurity Standard

Achieve Cyber Essentials with Agentless PAM

UK Cyber Essentials and Cyber Essentials Plus require five technical controls to protect against common cyber threats. 12Port enforces access control, secure configuration, and user account management with zero agents and deployment in under 5 minutes.

Cyber Essentials

How 12Port Maps to UK Cyber Essentials Controls

12Port addresses the controls most relevant to privileged access management, giving your audit team verifiable evidence for every requirement.

AC

Access Control

Enforce least privilege for all user accounts with RBAC, policy-driven approval workflows, and automatic de-provisioning of unused accounts.

SC

Secure Configuration

AccessWall enforces secure configuration by restricting all privileged access to PAM-brokered sessions, blocking direct logins and bypass paths.

UAM

User Access Mgmt

Manage the complete lifecycle of privileged accounts: onboarding, periodic reviews, role changes, and offboarding with full audit trails.

MFA

Authentication

Enforce MFA for all privileged access: TOTP, Duo, YubiKey, Entra ID. Eliminate password-only access to critical systems.

Audit

Monitoring & Logging

Session recording captures all privileged activity. AI Session Intelligence detects anomalous behavior in real time.

Patch

Patch Management

Secure access to patch management systems through PAM-brokered sessions with approval workflows and change tracking.

Continuous Audit Evidence, Always Ready

Stop scrambling before audits. 12Port continuously generates the evidence your assessors need, stored in tamper-proof archives and exportable in audit-ready formats.

  • Access Control Evidence

    RBAC policies, approval chains, and de-provisioning logs for Cyber Essentials access control requirements.

  • Secure Config Proof

    AccessWall enforcement evidence showing PAM-only access paths to critical systems.

  • MFA Enforcement Logs

    Comprehensive logs proving MFA enforcement for all privileged sessions.

  • Session Recordings

    Tamper-proof recordings for audit and monitoring requirements.

Every Compliance Capability in One Platform

Every 12Port capability maps directly to compliance controls. No add-ons, no modules to buy, no agents to install.

Credential Vault

FIPS 140-3 validated encryption. Auto-rotation after every use. Secrets never exposed to users.

MFA Everywhere

Enforced at every gate: RDP, SSH, VNC, Web. Supports TOTP, Duo, YubiKey, Entra ID, and RADIUS.

Session Intelligence

AI-powered analytics detect anomalies, flag policy violations, and surface risk in real time.

AccessWall

Enforce that all privileged access goes through PAM. Block direct logins and eliminate bypass paths at the host level.

Ready to Achieve Cyber Essentials?

See how 12Port maps to your specific requirements. Deploy in under 5 minutes with no agents.

Cyber Essentials Cyber Essentials Plus ISO 27001 NIS2 SOC 2 Type II