What Cyber Essentials Plus asks. Every device that connects to the internet — directly or via a shared network — must sit behind a properly configured firewall (or an equivalent network device). Default-deny inbound is the baseline; every approved inbound rule has a documented business need and a named owner. Administrative access to firewalls is restricted to named accounts with MFA, logged centrally.
What counts as compliant. A documented firewall inventory; default-deny inbound enforced with a reviewable exception list; MFA on every firewall admin account; default vendor admin accounts disabled or rotated.
What Secruna ships for Family 1. Three rules covering boundary firewalls, default-deny inbound and firewall administrative access. The cyber posture artefact surfaces the firewall state per device class. Evidence pack cites the connector signal that drove each verdict.
See this in your dashboard at: /inventory?framework=cyber_essentials_plus&family=FW with the boundary-firewall state surfaced per tenant.