Skip to main content
Category
Guidance Document
Standard
Essential Eight Explained
Version
v2023
Access
Open
Status
Active
Created
February 2017
Updated
November 2023
The document provides a brief introduction to the implementation of a priority set of strategies to mitigate cyber security incidents, developed by the Australian Signals Directorate (ASD). The Essential Eight strategies are designed to protect organisations’ internet-connected information technology networks. The strategies are:

• patch applications

• patch operating systems

• multi-factor authentication

• restrict administrative privileges

• application control

• restrict Microsoft Office macros

• user application hardening

• regular backups.

Main sections:

• Introduction

• The Essential Eight (list)

• Implementing the Essential Eight

• Assessing implementations of the Essential Eight

• Further information

• Contact details
Access Essential Eight Explained v2023

By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.