Scoping Your Organisation for DCC Level 0: The Decisions That Make or Break Your Assessment
By Jay Hopkins · Published 24 February 2026 · Updated 21 April 2026 · 10 min read
More DCC Level 0 engagements go sideways because of scope than because of control failures. Get scope right at the start and the rest of the assessment follows a predictable path. Get scope wrong and you generate clarification cycles, assessor findings, and - in the worst cases - a requirement to re-scope and re-submit.
This guide is the practical scoping playbook for L0. It covers what "scope" actually means in DCC terms, how it is documented, how it has to align with your Cyber Essentials scope, the five errors that come up repeatedly, and how to run a defensible scoping conversation with your Certification Body.
If you are earlier in the process, read the DCC L0 process walkthrough first - scoping sits at Step 2 of 8.
What "scope" means in DCC
Scope is the boundary inside which your cybersecurity controls will be assessed. Everything inside the scope must meet the DCC L0 requirements. Everything outside the scope is excluded from the assessment - which means it is also excluded from the certificate's coverage.
A DCC L0 scope statement answers five questions:
Which legal entities are in scope? Usually one company. Sometimes a defined group with shared infrastructure. Rarely a business unit.
Which sites are in scope? Every physical office, warehouse, or production site where in-scope staff work. Home offices count as sites for remote workers.
Which users are in scope? All users within the in-scope entities who access MOD-related information systems, plus typically all users whose devices are on the same network as in-scope systems.
Which systems are in scope? All IT systems (including cloud services) processing MOD information or providing services to in-scope users.
Which third parties are in scope? Subcontractors, managed service providers, and supply chain partners who access in-scope systems or process MOD information on your behalf.
The assessor documents the agreed scope in the IASME portal, and the resulting certificate is issued against that scope. Expanding scope later requires re-assessment.
The Cyber Essentials alignment requirement
Every DCC L0 supplier must hold a current Cyber Essentials certificate. The DCC L0 scope must be equal to or contained within the Cyber Essentials scope. In practice, this means one of three patterns:
Identical scope. The CE and DCC scopes cover the same boundary. Cleanest, easiest to assess.
DCC within CE. Your CE covers the whole business; DCC covers only the part handling MOD work. Acceptable, but the boundary between in-DCC and out-of-DCC systems must be meaningful and defensible (not just "this office").
Scope divergence. CE covers A; DCC covers A plus B. Not acceptable. You need to expand CE to match.
Assessors check this alignment explicitly. Misalignment is the single most common reason L0 submissions get bounced back for scope re-work.
Five scoping errors to avoid
1. Excluding remote workers "because their laptops are personal"
If remote workers access MOD information, they are in scope. BYOD on personal laptops is permissible under DCC with the correct controls (endpoint management, disk encryption, MFA), but it has to be declared and the devices have to be assessed. Excluding remote workers is a near-automatic finding.
2. Excluding cloud services "because they are SaaS"
Cloud services that process MOD data are in scope. Microsoft 365, Google Workspace, Salesforce, project-management SaaS, any cloud storage, any cloud-based collaboration tool - all in scope if MOD information flows through them. The assessor will ask you to name them.
3. Scoping "the office" without thinking about the users
Users move. The MOD-facing project team this quarter may include staff working from home, staff in a client office, and staff on a shared WeWork desk. Site-based scoping ("we cover the Bristol office") only works if you can demonstrate MOD information never leaves that office. Almost never true.
4. Excluding subcontractors "because they are not employees"
If a subcontractor has access to your in-scope systems or processes MOD information on your behalf, their access is in scope. That does not mean the subcontractor has to be DCC-certified (though the MOD is increasingly pushing that for tier-one subcontractors) - but their access controls, vetting, and offboarding become part of your submission.
5. Over-scoping to look thorough
Some suppliers include the whole business in scope under the mistaken belief that it makes them look more serious. This costs time, generates more findings, and does not improve the commercial value of the certificate. Scope exactly what your MOD work requires - no more.
Scoping for complex organisations
Three patterns come up repeatedly at L0:
Group companies. Where a parent and subsidiary share infrastructure, the scope is usually the entity holding the MOD contract, with a defined boundary against the wider group. If infrastructure is genuinely shared (single AD, single M365 tenant, single corporate network), scoping only the subsidiary is usually not defensible; expand to the shared infrastructure.
Managed service providers. If an external MSP manages your IT, their access is in scope. You need their Cyber Essentials certificate (or equivalent) and a data-processing agreement. Assessors will ask.
Construction and engineering suppliers. Project teams often form and dissolve as contracts come and go. The scope should cover the standing capability - the personnel, systems, and processes that support MOD work generally - rather than a specific project. Project-specific scoping rarely holds up at re-certification.
How to document scope properly
A good scope statement is:
Written. Not verbally agreed on a call.
Specific. Names the legal entity, sites, user groups (or count), cloud services, and third parties explicitly.
Signed off. By someone with authority to commit the organisation (director-level).
Versioned. If the scope changes during the engagement, the change is logged.
At Fig we produce a one-page scope document as part of the engagement opening. It becomes the reference document for every subsequent assessor conversation, which eliminates almost all scope-related clarification cycles.
How scope connects to pricing
DCC L0 pricing is tier-based by employee count - scope does not directly affect price at L0. At L1, scope does affect price because a larger, more complex scope takes more assessor time. For L0, scope correctness matters for timeline and assessment quality, not cost.
How Fig Group approaches scoping
The Fig scoping process:
30-minute scoping call with the consultant. Walks through the five scope questions and the five common errors.
Draft scope document produced within 24 hours, aligned to your existing CE scope.
Client review and sign-off - usually 48 to 72 hours.
Scope locked in the IASME portal. From this point on, scope changes require an explicit change request.
This upfront investment (two or three working days) removes the risk of scope-related findings during the assessor phase. It is the single most important mechanism for keeping the engagement on the 14-to-21-day track.
Key questions from MOD suppliers researching this topic.
What should be included in DCC Level 0 scope?
Include the legal entities, sites, users, systems, and third parties that support the relevant MOD contract. That covers employees accessing MOD-related systems, cloud services processing MOD information, and subcontractors with access to in-scope systems.
Can we exclude remote workers from scope?
Usually not. If remote workers access MOD-related systems or process MOD information, they are in scope regardless of where they physically work. Excluding active delivery users is a common scoping error that can invalidate assurance confidence.
Does DCC scope need to align with Cyber Essentials scope?
Yes. DCC scope must be equal to or contained within your CE scope. Scope mismatches between CE and DCC are the most common reason submissions get bounced back for re-scoping.
What is the risk of over-scoping?
Over-scoping increases effort, evidence volume, and remediation burden without improving assurance value for the specific contract. Scope exactly what your MOD work requires - no more, no less.
When should scope be reviewed during the project?
Review scope at the start (during scoping), after initial discovery, and before submission so changes in users, assets, or service boundaries do not create late-stage clarification cycles or re-submission requirements.
Related DCC articles
Keep reading.
Technical Guides
The Five Technical Controls of DCC Level 0: A Practical Guide to Meeting Each One
DCC Level 0 inherits the five Cyber Essentials technical controls and layers defence-specific governance on top. This guide breaks down each control, the specific evidence an IASME-licensed assessor expects, common configuration mistakes, and how the controls map to the CSM v4 requirements behind L0.
How Long Does Defence Cyber Certification Take? A Realistic Timeline for L0 and L1 Assessment
The honest answer to "how long does DCC take" depends more on the supplier's starting posture than on the Certification Body's turnaround. L0 can complete in under three weeks for a prepared organisation. L1 is a six to twelve week engagement. This guide walks through both, with the specific factors that lengthen or shorten each phase.
Preparing Evidence for DCC Level 0: What Assessors Actually Look For
DCC Level 0 is passed or failed on the quality of the evidence you submit. This guide is a control-by-control breakdown of the specific evidence types an IASME-licensed assessor looks for, how to assemble an evidence pack that avoids clarification cycles, the reality of evidence retention, and the difference between operational evidence and evidence fabricated for audit.