Essential Eight for Enhanced Cyber Security Protection
The “Essentials 8” process refers to a set of eight essential strategies recommended by the Australian Cyber Security Centre (ACSC) for mitigating cybersecurity incidents. These strategies are part of the broader “Strategies to Mitigate Cyber Security Incidents” framework and are designed to protect systems and data from various cyber threats. Implementing these eight strategies effectively can significantly reduce the risk of cybersecurity breaches.
- Ensure only approved applications can execute, preventing malicious software from running on systems.
- This reduces the risk of unauthorized software, including malware, from being executed.
- Regularly update and patch applications to fix security vulnerabilities.
- Focus on high-risk applications, such as web browsers, Microsoft Office, Java, and PDF viewers.
Configure Microsoft Office Macro Settings
- Restrict the use of macros in Microsoft Office applications.
- Only allow macros from trusted locations and disable macros in documents received from the internet unless required.
User Application Hardening
- Apply hardening techniques to user applications to reduce the attack surface.
- For example, block ads and disable Flash, Java, and other unneeded features in browsers.
Restrict Administrative Privileges
- Limit administrative privileges to only those who need them.
- Regularly review and restrict the use of these privileges to minimize the potential damage from compromised accounts.
- Keep operating systems up to date by applying security patches.
- Prioritize patching vulnerabilities that can be exploited remotely and ensure all devices have supported and secure operating systems.
Multi-Factor Authentication (MFA)
- Implement multi-factor authentication for access to sensitive systems and information.
- This adds an extra layer of security by requiring multiple forms of verification.
- Ensure that regular backups of important data are performed and securely stored.
- Regularly test backups to ensure they can be restored, and store backups offline or in a way that prevents them from being corrupted by ransomware.