Skip to main content
Category
Guidance Document
Type
Standard
Version
2023
Access
Open
Status
Active
Created
February 2017
Updated
November 2023
The document provides a brief introduction to the implementation of a priority set of strategies to mitigate cyber security incidents, developed by the Australian Signals Directorate (ASD). The Essential Eight strategies are designed to protect organisations' internet-connected information technology networks. The strategies are:

- patch applications

- patch operating systems

- multi-factor authentication

- restrict administrative privileges

- application control

- restrict Microsoft Office macros

- user application hardening

- regular backups.

Main sections:

- Introduction

- The Essential Eight (list)

- Implementing the Essential Eight

- Assessing implementations of the Essential Eight

- Further information

- Contact details
Access Essential Eight Explained v2023

By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.