Category
Guidance Document
Type
Standard
Version
2023
Access
Open
Status
Active
Created
February 2017
Updated
November 2023
The document provides a brief introduction to the implementation of a priority set of strategies to mitigate cyber security incidents, developed by the Australian Signals Directorate (ASD). The Essential Eight strategies are designed to protect organisations' internet-connected information technology networks. The strategies are:
- patch applications
- patch operating systems
- multi-factor authentication
- restrict administrative privileges
- application control
- restrict Microsoft Office macros
- user application hardening
- regular backups.
Main sections:
- Introduction
- The Essential Eight (list)
- Implementing the Essential Eight
- Assessing implementations of the Essential Eight
- Further information
- Contact details
- patch applications
- patch operating systems
- multi-factor authentication
- restrict administrative privileges
- application control
- restrict Microsoft Office macros
- user application hardening
- regular backups.
Main sections:
- Introduction
- The Essential Eight (list)
- Implementing the Essential Eight
- Assessing implementations of the Essential Eight
- Further information
- Contact details
Access Essential Eight Explained v2023
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.