To help organisations protect themselves against various cyber threats, the Australian Cyber Security Centre (ACSC) developed 'Strategies to Mitigate Cyber Security Incidents'. Within these guidelines, there are eight mitigation strategies they perceive as the most effective in protecting Microsoft Windows-based, internet-connected networks. These are known as the Essential Eight.
The ACSC states the Essential Eight Maturity Model is based on their “experience in producing cyber threat intelligence, responding to cyber security incidents, conducting penetration testing and assisting organisations to implement the Essential Eight” which was first published in June 2017 and is updated regularly.
It is important to note that whilst the eight mitigation strategies could be applied to securing cloud services, enterprise mobility and other operating systems, alternative mitigation strategies may be more appropriate.
In this eBook, we explain each of the Essential Eight Mitigation strategies, the requirements of each maturity level and how they can help secure your business.