Quick Reference Guide

Summary of theACSC Essential Eight

The Australian Cyber Security Centre's (ACSC) Essential Eight is a set of mitigation strategies designed to enhance the cybersecurity posture of organisations.

What is the Essential Eight?

TheĀ Australian Cyber Security Centre (ACSC) Essential Eight is a set of cybersecurity strategies and recommendations developed by the Australian government to help organisations protect their systems and data against cyber threats. These strategies are designed to mitigate a wide range of cyber threats and are considered essential for improving an organisation’s cybersecurity posture. The ACSC Essential Eight is based on sound cybersecurity principles and is intended to be adaptable for organisations of all sizes and types.

So what are the Essential Eight?

ACSC’s Essential eight provides eight specific recommendations which address a specific aspect of cybersecurity.

      1. Application Whitelisting
      2. Patching Applications
      3. Configuring Microsoft Office Macro Settings
      4. User Application Hardening
      5. Restricting Administrative Privileges
      6. Patching Operating Systems
      7. Multi-Factor Authentication
      8. Daily Backup

Essential Eight Activities

We have summarised the ACSC Essential Eight and the core activities needed to address each recommendation:

1. Application Whitelisting

Application whitelisting allows only approved applications to run on systems. It prevents unauthorised and potentially malicious software from executing.

Application Whitelisting Activities

    • Identify and categorise authorised applications.
    • Create and maintain an application whitelist.
    • Regularly update and review the whitelist.
    • Implement effective change management processes.

2. Patch Applications

Regularly applying security patches to applications helps fix known vulnerabilities and reduces the risk of exploitation.

Patching Activities

    • Establish a process to identify and prioritise patches.
    • Test patches in a controlled environment.
    • Deploy patches promptly across all systems.
    • Monitor and verify patching effectiveness.

3. Configure Microsoft Office Macros

Macros in Microsoft Office applications can be exploited. Configuring macros mitigates this risk.

Macro Security Activities

    • Disable macros in documents from the internet.
    • Prompt users to enable macros for trusted sources.
    • Educate users about the risks associated with macros.

4. User Application Hardening

Configuring web browsers and email clients to limit the execution of scripts and other active content reduces the attack surface.

Application Hardening Activities

    • Disable unnecessary browser plugins.
    • Configure browsers to block or prompt for active content.
    • Educate users about safe browsing practices.

5. Restrict Administrative Privileges

Limiting the number of users with administrative privileges reduces the potential impact of security breaches.

Activities to Restrict Administrator Privileges

    • Identify users requiring administrative privileges.
    • Implement strong authentication mechanisms for admin access.
    • Use separate accounts for administrative tasks.
    • Regularly review and revoke unnecessary admin rights.

6. Patch Operating Systems

Regularly updating and patching operating systems helps fix known vulnerabilities and prevents exploitation.

Operating System Patching Activities

    • Establish a patch management process for OS updates.
    • Test patches before deployment.
    • Deploy patches promptly while considering system uptime.

7. Multi-Factor Authentication (MFA)

Implementing MFA adds an extra layer of security by requiring users to provide multiple forms of verification.

Implementing MFA Activities

    • Identify critical systems and applications for MFA.
    • Choose appropriate MFA methods (e.g., tokens, SMS, biometrics).
    • Train users on MFA usage.
    • Implement MFA tools.

8. Daily Backups

Regularly backing up critical data ensures that data can be restored in case of data loss or ransomware attacks.

Activities for daily backups

    • Identify critical data and systems requiring backups.
    • Implement automated backup processes.
    • Store backups securely and off-network.
    • Regularly test the restoration process.

Summary of the Essential Eight

Implementing these activities in alignment with the ACSC Essential Eight can significantly enhance your organisation’s cybersecurity posture, reducing the risk of cyber threats and providing a more secure digital environment.

For additional Quick Reference Guides see our other Framework overviews within our blog.

Looking for specific advice or guidance? Our cybersecurity specialists are just a message away.

Send us your questions and our team will connect with you to support your needs.