ASD Essential 8 

The Australian Government, Australian Signals Directorate (ASD) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight.

33%

Do not have a cyber incident response plan

44%

Have limited or no capability to protect confidential information adequately

20%

Have not adopted a cyber security standard

ASD Essential 8

While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.

Multi-factor Authentication

Multi-Factor Authentication often referred to as two-factor authentication (2FA) or multifactor authentication (MFA), is a security measure that requires two or more proofs of identity to grant access your digital systems. Multi-factor authentication typically requires a combination of something the user knows (PIN, secret question), something you have (card, token) or something you are (fingerprint or other biometric).

User Application Hardening

User application hardening aims to reduce the attack surface of software applications. This involves implementing security configurations and best practices to strengthen user defences. Configuring settings within web browsers and other applications to disable unnecessary features that could be leveraged by attackers. Techniques include disabling unneeded plugins, scripting functionalities, and using security-focused browser settings.

Patch Operating Systems

Keeping your Operating Systems secure.
A structured approach to updating and securing operating systems by addressing identified vulnerabilities and ensuring optimal security. By implementing a proactive patch management strategy that covers your operating system, we help safeguard your systems from potential exploits.

Regular Backups

Safeguard your critical information.
Implementing a secure backup solution is paramount for an organisation to recover and maintain its operations in the event of a cyber incident, for example, a ransomware attack or unforeseen event. Backups must be carefully scoped to ensure that they cover all information an organisation requires to recover from a cyber incident and may include on-premises storage, servers, as well as services such as Microsoft 365.

Microsoft Office Macros

Protecting your business against Macro-based attacks. Given their potential for misuse, Microsoft Office Macros can be exploited by cybercriminals to deliver malicious payloads. The mitigation strategy here, involves restricting macro usage to essential and trusted instances only, thus minimising the risk of macro-enabled malware. Implementing strict policy controls and user education on the safe use of macros are key with this strategy.

Application Control

Application control is a critical security measure that involves the regulation of executable software within an organisation’s network. This strategy ensures that only authorised and verified applications are allowed to operate within your organisation's environment, effectively mitigating the risk of malicious malware infections and other security breaches. With application whitelisting, you establish a strong defensive barrier that safeguards your systems from unknown and potentially harmful software. 

Restrict Administrative Privileges

Restricting administrative privileges is one of the most effective mitigation strategies in ensuring the security of systems. Malicious actors often use malicious code (also known as malware) to exploit vulnerabilities in workstations and servers. Restricting administrative privileges makes it more difficult for malicious actors to elevate privileges, spread to other hosts, hide their existence, persist after reboot, obtain sensitive data or resist removal efforts. This process involves robust access control management and regular review of user privileges to ensure as fewer users can make significant changes to their operating environment, either intentionally or unintentionally.

Patch Applications

Strengthen your application security.
The process of regularly updating and patching applications is essential for maintaining a strong cyber security posture. This involves regularly reviewing, identifying and patching software vulnerabilities that could be exploited by cyber attackers and emerging threats. Effective patch management includes timely deployment of vendor-released patches and continuous monitoring for potential software vulnerabilities.

Our Essential 8 Process

In conjunction with our Managed Services Plans, this process can be used to assist with aligning your business with the (ASD) Australian Cyber Security Centers Essential Eight. During an Essential 8 audit, we will review your organisations compliance and posture against each of the Essential 8 strategies to mitigate Cyber Security incidents.

 1

Plan & Prepare

Site meeting to review and focus on identifying the target Maturity Level. Identify components of the clients systems, digital assets and infrastructure. 

2

Benchmark & Assessment

Review and benchmark your IT Systems, processes and security measures against the Essential 8 Maturity levels and specific ISM Controls.

3

Analyse & Report

Review and provide recommendations and proposals to meet the Essential 8 ISM Security controls. 

Mobirise
Address

Suite 1D, 539 Greenhill Road
Hazelwood Park SA 5066

Contacts

support@nextsolutions.com.au    
Phone: (08) 8333 3600                  
Fax: (Really) who uses fax

Set up a free site with Mobirise