Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Created
July 2021
Updated
April 2024
This is the current version.
Essential Eight is designed to protect organisations' internet-connected IT networks against cyber threats.
This information was developed to answer frequently asked questions on the Essential Eight Maturity Model.
Main sections:
- General questions
- Essential Eight Maturity Model update (November 2023)
- Implementation questions - general
- Implementation questions - patch applications and patch operating systems
- Implementation questions - multi-factor authentication
- Implementation questions - restrict administrative privileges
- Implementation questions - application control
- Implementation questions - restrict Microsoft Office macros
- Implementation questions - user application hardening
- Implementation questions - regular backups
This information was developed to answer frequently asked questions on the Essential Eight Maturity Model.
Main sections:
- General questions
- Essential Eight Maturity Model update (November 2023)
- Implementation questions - general
- Implementation questions - patch applications and patch operating systems
- Implementation questions - multi-factor authentication
- Implementation questions - restrict administrative privileges
- Implementation questions - application control
- Implementation questions - restrict Microsoft Office macros
- Implementation questions - user application hardening
- Implementation questions - regular backups
Access Essential Eight Maturity Model FAQs
By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.