The Australian Signals Directorate Essential 8

Implementing a foundational cybersecurity framework to protect Australian organisations from modern Cyber Threats

Overview

What is the ASD Essential 8?

The Essential 8 is a prioritised list of mitigation strategies released by the Australian Signals Directorate to assist organisations in protecting their systems against a range of adversaries

Take the Essential 8 Assessment

Welcome to your Essential 8 Quiz

Are Daily Backups configured?

Are Offsite data replications enabled?

Are Backup restore tests conducted?

Are Servers Patched automatically?

Are Workstations Patched automatically?

Are all Servers currently up to date with Critical Patches?

Are all Workstations currently up to date with Critical Patches?

Are there Operating Systems other than Windows in the environment that are patched?

Are baseline applications such as Flash, Java patched automatically?

Are there unsupported applications running in the environment?

Do users have Admin rights to their PCs?

Do all admins have Full Admin / Domain Admin / Global Admin rights?

Are Delegated Admin rights enabled for admin users?

Is there a Least Privilege Policy in place for the environment?

Do Network and peripheral devices have default password set?

Are Office Macros enabled?

Are web browsers configured to block or disable support for Flash content?

Are web browsers configured to block web advertisements?

Are Default SNMP communities in place?

Are default usernames in place for network devices?

Are non-essential ports restricted to servers and applications?

Is Multi-factor authentication is used to authenticate all users of remote access solutions?

Is Multi-factor authentication is used to authenticate all privileged users and admins?

Are web applications enforcing Multi-factor authentication?

Is single sign on enabled for any applications?

Are Application whitelists in use?

Are Application blacklists in use?

Are Application greylists in use?

Is there any application control in place?

How secure is your cyber security framework?

Don’t guess.
Let’s complete a penetration test to find out.

Enquire Today