Skip to content
Securing Australia Logo
  • Who we are
  • Services
    Compliance Frameworks
    • The Essential 8
    • ISO9001
    • ISO14001
    • ISO22301
    • ISO27001
    • ISO28001
    • ISO45001
    Risk Register
    Your Heading
    • GDPR
    • SOC2
    • NIST 800-53
    • CMMC
    • NIST Privacy
    • SOX
    • SOCI
    Vendor Management

    Industry Sectors

    • Defence
    • Software Developments
    • Manufacturers
    • Distributors
    • Service providers
    • Government
  • Contact Us

    Contact Us

    Address

    54 Hyde Street, Adelaide 5000

    Mail

    [email protected]

    Phone

    (08) 8304 8899

    Facebook Youtube Linkedin

      Get Direction Here...

    What is Essential 8

    What is the Essential Eight Maturity Model?

    The Essential Eight Maturity Model is designed to assist organisations in its implementation in a graduated manner based upon different levels of adversary tradecraft and targeting. The different maturity levels can also be used to provide a high-level indication of an organisation’s cyber security maturity.

    Why should I implement the Essential Eight?

    Implementing the Essential Eight proactively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber security incident.

    Why update the Essential Eight Maturity Model?

    The ACSC is committed to providing cyber security advice that is contemporary, contestable and actionable. This includes regular updates to the Essential Eight Maturity Model.

    The Essential 8

    These are eight essential mitigation strategies from the Australian Cyber Security Center to mitigate cyber security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.

    The mitigation strategies that constitute the Essential Eight are:

    Application control

    The execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets is prevented on workstations from within standard user profiles and temporary folders used by the operating system, web browsers and email clients.

    Patch applications

    Patches, updates or vendor mitigations for security vulnerabilities in internet-facing services are applied within two weeks of release, or within 48 hours if an exploit exists.

    Configure Microsoft Office macro settings

    Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.

    Restrict administrative privileges

    Requests for privileged access to systems and applications are validated when first requested.

    User application hardening

    Web browsers do not process Java from the internet. Web browsers do not process web advertisements from the internet.

    Patch operating systems

    Patches, updates or vendor mitigations for security vulnerabilities in operating systems of workstations, servers and network devices are applied within one month of release.

    Multi-factor authentication

    Multi-factor authentication is used by an organisation's users if they authenticate to their organisation’s internet-facing services.

    Regular backups

    Backups of important data, software and configuration settings are performed and retained in a coordinated and resilient manner in accordance with business continuity requirements.

    Securing Australia Logo
    Request A Demo

    Email Us

    • [email protected]

    Follow Us

    Facebook Youtube Linkedin

    Call Us

    • (08) 8304 8899

    Find Us

    • 54 Hyde Street, Adelaide 5000