The ‘Essential Eight’ is no longer relevant….
Photo by Pok Rie from Pexels

The ‘Essential Eight’ is no longer relevant….


...or is it even more relevant today?

The expression ‘May you live in interesting times’ is claimed to be an English translation of a traditional Chinese curse. At face value this appears to be a blessing, however such ‘interesting times’ are usually times of turmoil.

The past year has certainly been ‘interesting’, from global ravages of the pandemic, political upheaval and natural disasters such as the one in New South Wales Australia at the moment.

Even though the turmoil is highly unsettling, this is no time to ‘take your eye off the ball’- to use another saying.

‘The Essential Eight’ was developed by the Australian Cyber Security Centre (ACSC) to help organisations mitigate occurrences caused by cyber threats, and form a solid foundation for all organisations.

This valuable, free resource defines eight of the most effective strategies along with three maturity levels for each.

Application control prevents the execution of unapproved/malicious programs.

Patch applications with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications where possible.

Configure MS Office macro settings to block macros from the Internet. Allow only vetted macros either in ‘trusted locations’ with restricted write access, or digitally signed with a trusted certificate.

User application hardening, configure web browsers to block or uninstall Flash and Java on the Internet. Disable unneeded features in Web browsers, MS Office and PDF viewers.

Restrict admin privileges to operating systems and apps based on user duties. Reevaluate the need for privileges regularly.

Patch operating systems with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version where possible.

Use multi-factor authentication for users performing a privileged action or access a sensitive/high-availability data repository.

Create daily backups of important new or changed data, software and configuration settings. Store these in a disconnected, ‘off network’ location, and retain them for at least three months. Test restores at the start of your backup regime, annually and as infrastructure changes.

The maturity levels are defined as:

Level One: Partly aligned with the intent of the mitigation strategy.

Level Two: Mostly aligned with the intent of the mitigation strategy.

Level Three: Fully aligned with the intent of the mitigation strategy.

Where does your organisation lie?

https://www.cyber.gov.au/acsc/view-all-content/publications/essential-eight-maturity-model

Ferd Hagethorn, Ing.

Chief hacker at Planit, IoT wrangler and beer drinker at night

3 年

You can't build a house without having the foundation in place

要查看或添加评论,请登录

Lawrence Ostle的更多文章

  • The Security Operations Center – measuring the business benefits.

    The Security Operations Center – measuring the business benefits.

    A Security Operation Center (SOC) is a central function within an organisation utilising people, processes, and…

  • What motivates people?

    What motivates people?

    What motivates people? Is it money? Status? Bonuses? Ownership? Here is my top 5 in order of importance! Money is…

  • it's 10 o'clock do you know where your PII is?

    it's 10 o'clock do you know where your PII is?

    In May 2018, GDPR (General Data Protection Regulation) came into effect. Even though this is euro-centric, it caused…

  • The Security Hype Cycle – What’s Your Take?

    The Security Hype Cycle – What’s Your Take?

    Gartner’s ‘Hype Cycle’ presentation has been criticised by some for its lack of science, the subjective nature of the…

    5 条评论
  • What's going to keep us awake in 2017?

    What's going to keep us awake in 2017?

    More of the same I think, with some subtle changes..

  • Is legacy endpoint dead or does it just smell funny?

    Is legacy endpoint dead or does it just smell funny?

    I attended a presentation from a business partner regarding ‘next generation endpoint protection’ recently. The pitch…

    5 条评论
  • A bridge too far?

    A bridge too far?

    THE ICT THREAT LANDSCAPE Most agree that the ICT security threat landscape is more dynamic now than ever before. The…

  • What makes the difference?

    What makes the difference?

    I’ve read that there are a number of ‘moments of truth’ during a company’s relationship with customers, usually when…

  • The Time Is Right For DLP

    The Time Is Right For DLP

    DLP Globally Much has been written in the overseas press (particularly in the US) about Data Loss Prevention (DLP). The…

    1 条评论
  • DLP

    DLP

    A while back, in another world I was involved in doing a DLP scan of a customer's network. This revealed a number of…

    2 条评论

社区洞察

其他会员也浏览了