IASME Cyber Assurance Auditing
back to our services...
IASME Cyber Assurance assessment and audit services for organisations that need broader organisational cyber assurance through Level One verified assessment or Level Two audited certification.
IASME Cyber Assurance is a broader organisational certification than Cyber Essentials, covering cyber security and data protection controls across the business. Punk Security provides both the Level One verified assessment route and the Level Two audited route for organisations that need a wider assurance statement.
What IASME Cyber Assurance is
IASME describes Cyber Assurance as a comprehensive, flexible, and affordable way to demonstrate that an organisation has important cyber security and data protection controls in place.
The certification is available in two levels:
- Level One: Verified Assessment
- Level Two: Audited
You must pass Level One before applying for Level Two.
This page is for the assessment and audit routes
This service is for organisations that want to book IASME Cyber Assurance assessment activity itself.
The focus is on:
- confirming eligibility and scope
- assessing the organisation against the relevant level
- reviewing the submitted evidence and responses
- auditing the required controls for Level Two
- completing certification where the standard is met
Cyber Essentials comes first
IASME states that an organisation must hold a valid Cyber Essentials certificate, with at least one month remaining before expiry, before it can complete IASME Cyber Assurance.
IASME also states that the scope of Cyber Essentials and IASME Cyber Assurance must cover the whole organisation.
Who this is for
- You need broader organisational assurance than Cyber Essentials alone provides.
- A customer, framework, or supply-chain requirement expects a wider control set covering cyber resilience and data protection.
- You want a certification route that is broader than Cyber Essentials without defaulting immediately to ISO 27001.
- You need either Level One verified assessment or Level Two audited assurance.
- You want the assessment or audit itself, not a page centred on preparation support.
Level One and Level Two
Level One
Level One is a verified assessment reviewed by an independent Assessor. It is the entry point into IASME Cyber Assurance and must be passed before Level Two.
Level Two
Level Two is the audited route. IASME describes it as an audit of the processes, procedures, and controls required by the IASME Cyber Assurance standard.
What Punk Security does
- Confirm the certification route and organisation size.
- Check the Cyber Essentials prerequisite and scope position.
- Assess the submitted Level One answers and supporting material.
- Perform the Level Two audit where that route is required.
- Record findings, complete the review, and issue certification where the requirements are met.
What the assessment is looking at
IASME Cyber Assurance goes beyond the five Cyber Essentials controls and looks more broadly at how the organisation manages cyber security and data protection.
That commonly includes themes such as:
- governance and policy
- asset and device management
- access control
- backup and resilience
- incident response
- supplier and third-party oversight
- privacy and data protection controls
What you need before booking
- A valid Cyber Essentials certificate with enough time left before expiry.
- Whole-organisation scope clarity.
- A named internal owner who can answer organisational and control questions.
- Access to the policies, procedures, registers, and evidence needed for the selected level.
What commonly affects the assessment
- Cyber Essentials does not actually cover the whole organisation.
- The organisation has operational controls in place, but weak evidence ownership.
- Governance exists informally but is not well recorded.
- Supplier, backup, incident, or privacy controls are inconsistently applied.
- The business is choosing between Level One and Level Two without first understanding the assurance requirement.
Typical route
- Confirm that Cyber Essentials is valid and in scope for the whole organisation.
- Choose the appropriate IASME Cyber Assurance level.
- Complete Level One verified assessment.
- Progress to Level Two if audited assurance is required.
- Complete certification once the relevant level has been successfully assessed.
Why Punk Security
- We provide both assessment and audit capability across assurance schemes.
- We communicate clearly about what is being assessed and what the organisation needs to provide.
- We understand the relationship between Cyber Essentials, IASME Cyber Assurance, DCC, and wider governance-led certifications.
- We already hold IASME Cyber Assurance Level 2 ourselves, which gives us a practical feel for the standard as well as the assessment route.
Common questions
Is IASME Cyber Assurance a replacement for Cyber Essentials?
No. Cyber Essentials is a prerequisite to IASME Cyber Assurance, not an alternative to it.
Does IASME Cyber Assurance apply to the whole organisation?
Yes. IASME states that the scope of both Cyber Essentials and IASME Cyber Assurance must cover the whole organisation.
Is Level Two mandatory?
No. Some organisations only need Level One. Others specifically need the additional confidence of the audited Level Two route.
What if we need help getting ready first?
That sits outside the assessment itself. This page is written for organisations that want to book the IASME Cyber Assurance assessment or audit route.
Useful references

Want to learn more?
WHAT OUR CLIENTS SAY
Our internal IT team were in need of expert consultancy to help us strengthen our cybersecurity measures and protect our sensitive data.
We engaged the services of Punk Security and were thoroughly impressed with the level of professionalism and knowledge they brought to the table.
The team was able to provide valuable insights and recommendations, and their guidance helped us implement effective security protocols that have greatly enhanced our overall security posture.
We originally sought Punk’s services to support us with a potential cyber-attack. The team responded immediately, out of hours, and calmly and professionally walked us through the necessary steps to determine that our environment hadn’t been compromised.
Since then, we have engaged Punk to carry out a third party audit of our cloud environment and a gap analysis against the Cyber Essentials and ISO270001 criteria. The team provided a thorough report with recommendations and are now working with us to improve our processes and systems.
I feel assured that we are walking towards best practice security operations.
Having attended a live hack demo held at C4DI we approached Punk Security to help sure-up our cyber security and DevOps processes. Punk not only completed this audit but passed on valuable gained knowledge to our team to broaden their skills and insight in this area.
We have since continued to work in partnership with Punk to implement a WAF and frequently consult their expertise in DevOps in relation to our application so we can all learn and grow in a collaborative way.
Punk are approachable, knowledgeable and also adept at explaining in layman’s terms for the less technical! We look forward to continuing our fruitful working relationship.
Our team at Illumio recently participated in a custom CTF event hosted by Punk Security, and it was a great experience! The CTF was not only challenging but also immensely educational, especially in the realm of cloud security principles.
The challenges presented during the CTF were designed to cover a broad spectrum of cloud security topics. This approach allowed our team to dive deep into practical scenarios that tested our skills and pushed us to explore new strategies and technologies. The balance between difficulty and learning outcomes was perfectly struck, ensuring that each team member, regardless of their prior level of expertise, found the event to be rewarding.
Punk Security were happy to perform external scans pro bono due to our status as an NGO.
The team also spent meeting time on two separate occasions to discuss our requirements and provide advice without any commitment or expectation. I’ll certainly be coming to Punk Security again in future should we need further security services
Punk Security provided exceptional DevSecOps training for our engineers here at Sage and delivered an outstanding talk at our Securing Sage Summit.
Their expertise and knowledge were evident throughout the sessions.
Not only were they efficient and great to work with, but their presentation was also the highest rated session of the entire event. We highly recommend Punk Security for any security-related needs.
We initially reached out to Punk Security to help us out with our hosting architecture and were impressed with their breadth of knowledge.
With their expertise we were able to implement additional controls into AWS and successfully scale our systems. When we needed to gain more performance insights, their engineers configured our datadog platform end to end.
We’ve found that they really take the time to understand our problem and then put forward a great solution.