Category
Guidance Document
Type
Standard
Access
Open
Status
Active
Created
November 2023
Essential Eight is designed to protect organisations' internet-connected IT networks against cyber threats.
This document describes mitigation strategies, test IDs, control descriptions and test methodologies for assessment against Essential Eight Maturity Level One.
Main sections:
- Patch applications
- Patch operating systems
- Multi-factor authentication
- Restrict administrative privileges
- Application control
- Restrict Microsoft Office macros
- User application hardening
- Regular backups
This document describes mitigation strategies, test IDs, control descriptions and test methodologies for assessment against Essential Eight Maturity Level One.
Main sections:
- Patch applications
- Patch operating systems
- Multi-factor authentication
- Restrict administrative privileges
- Application control
- Restrict Microsoft Office macros
- User application hardening
- Regular backups