By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Ukraine approves second sanctions package targeting Russian nuclear industry
    23 February 2023
    SEC Climate Disclosure Rules Finally Come Out; Scope 3 Emissions Reporting Not Required
    11 March 2024
    Bank of America’s Corporate Culture Crisis: A Study in Failure
    19 September 2024
    Latest News
    Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025
    7 November 2025
    UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility
    1 November 2025
    US National Security Compliance Risk & Readiness Report
    26 October 2025
    What Would a Farage Government Mean for Compliance?
    20 October 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    How to Detect New Threats via Suspicious Activities
    21 February 2023
    3 Steps to Automate Your Third-Party Risk Management Program
    22 February 2023
    Clipper Malware Found in 450+ PyPI Packages!
    24 February 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    The Myth of the Psychopathic Personality Refuses to Die
    21 February 2023
    Spotify’s New ‘AI DJ’ Mimics the Worst Parts of Listening to the Radio
    22 February 2023
    ‘Cocaine Bear’ review: A wild true story becomes a bonkers comedy, and yet…
    23 February 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Sunak secures backing of key Brexiters for N Ireland trade deal
    21 February 2023
    David Bowie’s vast archive donated to V&A Museum
    23 February 2023
    Russia’s war in Ukraine drags into second year with no end in sight By Reuters
    24 February 2023
    Latest News
    Microvast Holdings earnings beat by $0.02, revenue topped estimates
    11 November 2025
    Client Challenge
    10 November 2025
    Peter Thiel warns if you ‘proletarianize the young people,’ don’t be surprised they end up communist
    9 November 2025
    US Supreme Court lets Trump withhold $4 billion in food aid funding for now
    8 November 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Stream episode Cybercrime Wire For Feb. 25-26, 2023. Weekend Update. WCYB Digital Radio. by Cybercrime Magazine podcast
    25 February 2023
    Cyberwarfare Report, Week Of Mar. 3, 2023. Theresa Payton Reporting.
    5 March 2023
    Global CISO Report. The Human Side Of Security. Mary Rose Martinez, Marathon Petroleum Corporation.
    14 March 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: What testers need to know about the changes to the CHECK scheme
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Pentesting > What testers need to know about the changes to the CHECK scheme
Pentesting

What testers need to know about the changes to the CHECK scheme

webmaster
Last updated: 2025/11/04 at 6:57 PM
webmaster
Share
8 Min Read
SHARE

TL;DR

  • CTLs must hold a minimum UK Cyber Security Council title of Principle.
  • CTMs must hold a Practitioner title by March 2026.
  • CHECK companies require Cyber Essentials Plus.
  • Expect frequent, detailed NCSC report reviews.
  • Only CTLs can write reports, keep language neutral.
  • Stay current with CPD, Training and NCSC masterclasses.

Chartership and professional titles

UKCSC has announced that the CHECK Team Leaders and CHECK Team Members will be required to have a professional title in order to continue delivering work under the CHECK scheme.

What does Chartership mean for the CHECK Scheme?

UKCSC runs the professional titles system. It sets out the standards for the cyber industry, much like other professions. Accountants, Engineers etc.

Under CHECK, this means:

  • Practitioner = CHECK Team Member (CTM). Shows you can test and are working on your development.
  • Principal = CHECK Team Leader (CTL). Shows leadership, experience, and responsibility for engagements.
  • Chartered = CHECK Team Leader (CTL), top level. A wealth of experience and contribution in cyber.

This means testers are now assessed not only on technical skill, but also on their professionalism, ethical conduct, and commitment to ongoing learning.

Testing practices under CHECK

One of the biggest shifts in the updated Scheme Standard is around the testing itself. CHECK has always been about more than running a vulnerability scan, but NCSC are now being clearer on what that means in practice.

A few things stand out:

Scoping first

The scope must be clearly defined and agreed upon with the client before testing begins. It should state what is in and out of scope, confirm the schedule, and explain how risks will be managed. NCSC requires a written scope covering both external and internal systems, with representative vulnerability scanning of endpoints, servers, network devices and key applications, using credentialed scans where possible. For large estates, sampling is allowed but must cover at least ten per cent of the environment, with higher coverage giving more accurate results.

Methodology  

CHECK testing must follow the NCSC method: reconnaissance, analysis, exploitation, and post-exploitation. The difference now is the push to show how weaknesses can be used and combined into realistic attack paths, not just listed one by one.

Risk aware

Exploitation should be safe and controlled. The point is to prove a risk, not cause downtime. NCSC have made it clearer that testers must think about business impact, not just technical gain.

Evidence based  

Reports need proper evidence and plain explanations, so the client understands both the technical flaw and the business risk. This isn’t new, but it’s being reinforced after NCSC QA showed too many reports were still “tool output dumps”.

Clean up

Any accounts, scripts, or files created during a test must be removed at the end. Again, not new, but flagged more strongly now as clients raised concerns about leftovers.

Team accountability  

A Primary CTL must always be responsible and available during testing. They also own the final report. NCSC have underlined this point to stop confusion over who is accountable.

The bottom line

CHECK is not vulnerability scanning, and NCSC is tightening up how that’s enforced. Automated scanners can throw out hundreds of findings, many of them false positives. Under CHECK, testers are expected to validate results, show realistic exploitation, and explain the actual business impact. The focus is now firmly on risk and remediation, not just raw data.

Reporting in the CHECK Scheme

Reporting under the CHECK scheme has become far more rigorous. NCSC has increased both the number and frequency of report reviews. Each report must now meet clear criteria to pass quality assurance. This means using neutral, professional language throughout, including an executive summary written for non-technical readers, and structuring findings so that clients can clearly prioritise fixes. Reports should also assign clear severity ratings and provide tailored, actionable recommendations to guide remediation efforts.

Reporting standards: https://www.ncsc.gov.uk/files/CHECK-Scheme-Standard.pdf

It is important to understand that if reports do not meet the CHECK criteria, it is possible that the primary CTL on the job could risk losing their CHECK status.

Staying current

To maintain CHECK status, testers must stay active and engaged within the scheme. This means carrying out CHECK assessments regularly to keep skills current, attending at least two NCSC events or masterclasses each year, and maintaining accurate records of all training and continuing professional development (CPD) activities in case they are reviewed. Technical Leads are ultimately responsible for the quality of reports issued under their supervision and for ensuring that every member of their team continues to develop professionally.

Apply for your UKCSC title now, don’t wait. Applications are made through one of the UK Cyber Security Council’s licensed professional bodies, such as CIISec or BCS. Choose the level that matches your role and submit evidence of your experience, ethics, and professional development.

Renewal requirements

The rules for staying in the CHECK scheme have shifted. You no longer need to submit a CTM or CTL pass certificate from Crest or the Cyber Scheme. Instead, the key to renewal is holding the right Chartership title for your level.

Here’s where it gets a little tricky. UKCSC still expects proof of technical competence when you submit. The good news? If you had a valid pass certificate when you applied for your Chartership, you’re covered for the next three years, even if that exam technically expires in the meantime.

We know there’s still some grey area here, and both UKCSC and CHECK are expected to release more detail on how renewals will work going forward. As soon as they do, we’ll break it down for you so you can stay ahead of the curve.

Conclusion

The overhaul of the CHECK scheme is big. The threshold has been raised with the implementation of Chartership, report reviewing and detailed testing requirements. Technical ability is no longer the only requirement. Testers must show that they are both responsible and professional when conducting these engagements.

The key is to write reports that go beyond tool output, keep your title up to date, and make sure your work explains real risks and business impact with clear fixes.

You Might Also Like

From Prompt Injection To Account Takeover · Embrace The Red

From Prompt Injection To Account Takeover · Embrace The Red

From Prompt Injection To Account Takeover · Embrace The Red

From Prompt Injection To Account Takeover · Embrace The Red

From Prompt Injection To Account Takeover · Embrace The Red

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Snyk Studio: Now for All Customers, Powering Secure AI Development at Scale
Next Article Kickoffs and Rip-offs—Watch Out for Online Betting Scams This Football Season
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

8 Black Friday Candle Sales Worth Sniffing Around in 2025
ARCHITECTURE 11 November 2025
SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
VERACODE 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
Microvast Holdings earnings beat by $0.02, revenue topped estimates
Businness 11 November 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?