Resource Detail
Deep dive into our research and tools.
The Evidence Vault Blueprint: What to Collect and Why It Matters
A practical blueprint for building an evidence vault that transforms Cyber Essentials certification from stressful reconstruction to procedural submission. Explains the first principle (evidence must remove doubt by answering: does the control exist, is it enforced, is it current), how to design vault structure aligned to the five control areas, and exactly what to collect for each area. Covers strong vs weak evidence patterns (current/estate-wide/clearly labelled vs partial/old/device-specific), the labelling standard most businesses skip (naming convention with control area, system, what it shows, and date), monthly collection calendar (15-20 minute tasks), quarterly reviews (45-60 minutes), and annual maintenance. Includes guidance on teaching your organisation to generate evidence passively, thinking like an auditor without becoming one, and recognising when evidence gaps signal deeper control problems.
Overview & Key Insights
The Evidence Vault Blueprint: What to Collect and Why It Matters
Overview
Most Cyber Essentials friction is not caused by weak security—it is caused by weak evidence.
Organisations often implement the right controls but fail to demonstrate them clearly. When assessment begins, they scramble through shared drives, email attachments, and half-forgotten screenshots trying to reconstruct proof after the fact. This is avoidable.
An effective evidence vault transforms certification from a stressful reconstruction exercise into a procedural submission. The goal is simple: If asked to prove a control tomorrow, you can do so in under two minutes.
This guide explains exactly what to collect, how to structure it, what auditors are really looking for, and how to maintain an evidence rhythm that prevents last-minute panic. You are not becoming an auditor—you are learning to anticipate one.
First Principle: Evidence Must Remove Doubt
Auditors are not searching for perfection. They are searching for confidence.
Good evidence answers three questions immediately: - Does the control exist? - Is it enforced? - Is it current?
Anything that leaves interpretation introduces delay. The fastest certifications occur when evidence is unambiguous.
What an Evidence Vault Actually Is
Strip away the grand language. An evidence vault is simply a central, structured repository containing proof that your baseline security controls are operating.
It should be: - Centralised - Access-controlled - Clearly labelled - Easy to navigate - Regularly updated
What it must never be is scattered. Fragmented evidence signals fragmented control.
Design the Vault Before You Fill It
Create structure aligned directly to the five Cyber Essentials control areas:
Evidence Vault
├── Firewalls & Internet Gateways
├── Secure Configuration
├── User Access Control
├── Malware Protection
└── Security Update Management
Inside each folder, separate by evidence type: Screenshots, Policies, Reports, Configuration exports.
Predictability is your ally. When auditors ask for something, you should know instinctively where it lives.
Control Area 1: Firewalls & Internet Gateways
What Auditors Want to See
They are confirming that uncontrolled inbound traffic is not permitted. Collect: - Firewall configuration screenshots - Rule summaries - Confirmation that default passwords are changed - Remote admin restrictions - VPN configuration overview (if applicable)
If using a managed firewall, obtain a configuration summary from your provider. Ownership still rests with you.
Strong Evidence
Screenshot showing deny-by-default inbound rules, named device with visible timestamp, admin interface clearly identifiable.
Why it works: It demonstrates intent and enforcement simultaneously.
Weak Evidence
- A marketing datasheet for the firewall
- An invoice
- A vague statement such as "router configured securely"
Auditors assess controls, not purchases. Buying security tools is not the same as using them correctly.
Common Gap
Consumer routers in business environments. If present, ensure admin credentials are unique, firmware is current, and remote administration is disabled. Document this explicitly. Assumptions fail audits.
Control Area 2: Secure Configuration
This is about reducing attack surface. Auditors want proof that devices are hardened beyond factory defaults.
Collect:
- Device encryption status
- Screen lock enforcement
- Disabled unnecessary services
- Standard build documentation
- Mobile device controls (if applicable)
A single baseline build document is disproportionately valuable. It shows deliberate configuration rather than improvisation.
Strong Evidence
- Screenshot confirming full-disk encryption enabled
- Endpoint management console showing policy enforcement
- Build checklist used during deployment
These demonstrate repeatability. Repeatability signals maturity.
Inadequate Evidence
- A verbal assurance that "all laptops are encrypted"
- One screenshot from one device
Auditors extrapolate risk from sampling. Do not force them to guess.
Common Gap
Legacy machines quietly escaping the baseline. Perform a device inventory twice yearly at minimum. Unknown devices undermine otherwise solid posture.
Control Area 3: User Access Control
Identity is now the primary attack vector. Auditors examine it closely.
Collect:
- MFA enforcement screenshots
- Admin account list
- Joiner–mover–leaver process
- Password policy
- Privilege allocation approach
Clarity matters more than length. A one-page access philosophy often outperforms a ten-page policy nobody follows.
Strong Evidence
- Admin console showing MFA required for all users
- Screenshot listing privileged accounts
- Document describing least-privilege approach
This combination demonstrates governance.
Weak Evidence
- Policy without proof of enforcement
- MFA enabled for "most" users
"Most" is not a defensible security position. Consistency is the standard.
Common Gap
Dormant accounts belonging to former staff. Run quarterly access reviews. Remove hesitation from this process. Disable first, investigate second if necessary.
Control Area 4: Malware Protection
Auditors are not testing brand preference. They want assurance that malicious code is unlikely to execute undetected.
Collect:
- Endpoint protection dashboard screenshot
- Real-time protection status
- Signature update confirmation
- Device coverage report
Central visibility is critical. If protection is installed but unmanaged, risk remains opaque.
Strong Evidence
- Console view showing all devices protected
- Alerts panel visible
- Update status current
This communicates operational awareness.
Weak Evidence
- Screenshot from a single laptop
- Proof of purchase
Again, ownership of the control matters more than acquisition.
Common Gap
Bring-your-own-device environments without defined protection expectations. If personal devices access company data, your policy must state required safeguards. Ambiguity invites audit friction.
Control Area 5: Security Update Management
Attackers disproportionately exploit known vulnerabilities. Patch discipline is therefore heavily scrutinised.
Collect:
- Patch management dashboard
- Update policy
- Exception handling process
- Evidence of supported operating systems
A written patch cadence is surprisingly persuasive. It signals operational rhythm.
Strong Evidence
- Screenshot showing devices fully updated
- Automated patch policy
- OS version visibility
These eliminate interpretive burden.
Weak Evidence
- Statement that "updates are automatic"
- One device shown as current
Auditors care about estate-wide posture.
Common Gap
Unsupported operating systems lingering in corners. These frequently derail certification. Retire them or isolate them decisively. There is no elegant workaround.
Good vs. Inadequate Evidence — The Underlying Pattern
Strong evidence is: - Current - Estate-wide - Clearly labelled - Hard to misinterpret
Weak evidence is: - Partial - Old - Device-specific - Ambiguous
When in doubt, ask: Would a cautious stranger feel confident relying on this? If not, improve it.
The Evidence Labelling Standard Most Businesses Skip
Adopt a simple naming convention:
[ControlArea]_[System]_[WhatItShows]_[YYYY-MM-DD]
Example:
AccessControl_M365_MFAEnforced_2026-02-08
This prevents forensic file hunting later. Small operational habits produce large renewal advantages.
Detailed Insights
Building and Maintaining Your Evidence Vault
The Monthly Collection Calendar
Evidence gathering should be ambient, not frantic.
Monthly (15–20 minutes)
- Capture patch dashboard
- Confirm endpoint protection coverage
- Export MFA status
- Note any new infrastructure
Minimal effort. Maximum future relief.
Quarterly (45–60 minutes)
- Review admin accounts
- Validate firewall posture
- Confirm encryption coverage
- Update device inventory
Think of this as posture verification rather than compliance work.
Annually
- Refresh policies
- Archive superseded evidence
- Remove obsolete devices from records
- Validate that your vault structure still fits your environment
Do not allow the repository to decay into clutter. Order supports confidence.
Evidence Mistakes That Cause Certification Delays
Over-Collection - Hundreds of files with no hierarchy create noise. Auditors prefer precision.
Under-Collection - Sparse evidence invites questions. Questions slow certification.
Outdated Screenshots - Timestamp visibility matters more than many realise.
Personal Storage - Evidence on individual machines introduces fragility. Centralise always.
Teach Your Organisation to Generate Evidence Passively
The strongest environments produce proof as a byproduct of operation. For example: - Endpoint dashboards naturally show coverage - Access platforms log MFA - Patch tools generate reports
When selecting tools, consider their evidentiary clarity. Visibility is not administrative vanity. It is operational leverage.
Think Like an Auditor (Without Becoming One)
Adopt three mental checks:
Visibility - Could an outsider understand this quickly?
Consistency - Does evidence align across devices?
Recency - Is it obviously current?
If all three are satisfied, certification friction drops sharply.
When Evidence Signals Deeper Problems
Occasionally, difficulty producing proof reveals genuine control weakness. Treat this as valuable intelligence rather than inconvenience.
Evidence gaps often expose: - Informal device deployment - Privilege sprawl - Patch inconsistency - Tool fragmentation
Correction strengthens both security and audit readiness.
The Strategic Value Most SMEs Miss
An organised evidence vault does more than support certification. It: - Accelerates procurement responses - Reassures insurers - Strengthens client trust - Enables faster incident investigation - Supports operational continuity
In short, it professionalises your security posture.
Build Once. Benefit Repeatedly.
The first vault requires intention. After that, maintenance is trivial compared to reconstruction.
Future renewals should feel administrative precisely because your environment is observable. Security that cannot be demonstrated is security that will be doubted.
Final Guidance
Do not treat evidence as paperwork created for auditors. Treat it as a reflection of operational control.
Build a vault that is: - Structured - Current - Unambiguous - Centralised
Then maintain it quietly throughout the year. When certification arrives, you should not prepare—you should simply submit.