• Post category:StudyBullet-14
  • Reading time:5 mins read


the Essential Eight outlines a minimum set of preventative measures, organisations need to implement additional measures

What you will learn

Assessments against the Essential Eight are conducted using the Essential Eight Maturity Model because it provides a structured framework from ACSC

Essential Eight Maturity Model.

cyber security Assessments

Application control

Description

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight.

The Essential Eight Maturity Model, first published in June 2017 and updated regularly, supports the implementation of the Essential Eight. It is based on the ACSC’s experience in producing cyber threat intelligence, responding to cyber security incidents, conducting penetration testing and assisting organisations to implement the Essential Eight.


Get Instant Notification of New Courses on our Telegram channel.


As the Essential Eight outlines a minimum set of preventative measures, organisations need to implement additional measures where it is warranted by their environment. Further, while the Essential Eight can help to mitigate the majority of cyber threats, it will not mitigate all cyber threats. As such, additional mitigation strategies and security controls need to be considered, including those from the Strategies to Mitigate Cyber Security Incidents and the Information Security Manual (ISM).

Organisations should also consider implementing a cyber security maturity model to help them identify areas of strength and weakness in their existing security posture. This will allow organisations to track progress over time and make informed decisions about where further investment is needed. Additionally, it is important for organisations to have processes in place for responding quickly and effectively when a cyber incident does

English
language

Content

Introduction

Welcome to E8 Essential Eight Assessment Guide
Introduction
Overview
Evidence quality
Determining effective implementation of mitigation strategies
Stages of an assessment
Stage 1: Assessment planning and preparation
Stage 2: Determination of assessment scope and approach
Stage 3: Assessment of controls

Essential Eight Maturity Model : Maturity Level One

Maturity Level One
Application control
Configure Microsoft Office macro settings
User application hardening
Restrict administrative privileges
Patch operating systems
Multi-factor authentication
Regular backups

Maturity Level Two

Maturity Level Two
Application control
Patch applications
Configure Microsoft Office macro settings
User application hardening
Restrict administrative privileges
Patch operating systems
Multi-factor authentication
Regular backups

Maturity Level Three

Maturity Level Three
Application control
Patch applications
Configure Microsoft Office macro settings
User application hardening
Restrict administrative privileges
Patch operating systems
Multi-factor authentication
Regular backups