Skip to content

The ASD Essential 8 Maturity Model: A Practical Guide for Enhanced Business Security

Louis Strauss |

November 1, 2019
The ASD Essential 8 Maturity Model: A Practical Guide for Enhanced Business Security

Contents

 

The digital age is revolutionizing business operations at every level, presenting both opportunities and challenges. Australian businesses can leverage technologies like the cloud, machine learning, and mobile devices to enhance efficiency and reduce costs. However, these very technologies also expose businesses to increasingly sophisticated cyberattacks.

To effectively manage cybersecurity incidents, it's crucial to adopt best-practice strategies as a starting point. The Australian Signals Directorate (ASD) and Australian Cybersecurity Centre (ACSC) have developed the Essential 8 Model, a government-led cybersecurity initiative. By following these strategies as general guidelines, businesses can quickly improve their cybersecurity posture without extensive investments or research.

To help you understand the benefits of the ASD Essential 8 maturity model for your enterprise or startup, we've organized this article into four sections:

  1. Introducing the ASD Essential Eight
  2. Preparing to Use the Essential Eight
  3. Implementing the Essential Eight
  4. Easily Assessing against the Essential Eight

Introducing the Essential 8 Maturity Model

The Essential Eight provides practical guidelines to mitigate cybersecurity incidents, including preventing malware delivery and execution, limiting the extent of cybersecurity incidents, and ensuring data recovery and system availability. According to cyber.gov.au, implementing the Essential Eight makes it significantly harder for adversaries to compromise systems. Proactive implementation of the Essential Eight can be more cost-effective in terms of time, money, and effort compared to responding to a large-scale cyber security incident. While businesses operating in high-risk environments may require additional guidance, assessing against the Essential Eight serves as a basic and affordable guide to prevent cyberattacks and related risks.

Preparing to Use the Essential 8 Maturity Model

Before implementing the mitigation strategies outlined in the next section, it is crucial to consider the following:

  1. Identify which systems require protection: Determine which systems store, process, or communicate sensitive or easily accessible information.

  2. Identify likely adversaries: Identify the adversaries most likely to target your systems, such as nation-states, cybercriminals, or malicious insiders.

  3. Determine required protection level: Select mitigation strategies based on the risks posed by specific adversaries to business activities.

Implementing the Essential 8 Maturity Model

The Essential Eight encompasses strategies categorized into three key areas. Here's an overview of each strategy:

Strategies to Prevent Malware Delivery and Execution:

  1. Whitelist applications: Control the programs allowed to run on your company's network to reduce exposure to malware attacks. Gradually implement whitelisting starting with high-level and high-risk users.

  2. Patch software: Keep applications up to date by patching or mitigating computers with software flaws that can enable ransomware spread within 48 hours.

  3. Block untrusted Microsoft Office macros: Configure Microsoft Office macro settings to block macros from the internet, allowing only vetted macros from trusted sources.

  4. Fortify user applications: Configure web browsers to block Flash, ads, and Java on the internet. Disable unnecessary features in Microsoft Office, web browsers, and PDF viewers.

Experts-guide-asd-essential-8

Strategies to Limit the Extent of Cybersecurity Incidents:

  1. Restrict access privileges: Limit administrative privileges based on user duties, and provide extra confirmation steps for those with administrative access. Regularly review and manage access privileges using a centralized system.

  2. Enable multi-factor authentication: Implement stronger user authentication using at least two methods, such as passwords, security keys, physical tokens, biometrics, and smartcards.

  3. Update operating systems: Apply patches for security vulnerabilities in operating systems like Windows 10 and macOS as soon as they're released. Avoid using unsupported versions.

Strategies to Ensure Data Recovery and System Availability:

  1. Back up your systems daily: Regularly back up systems to ensure information can be recovered following a cybersecurity incident. Store multiple copies locally, on USB drives, and in the cloud. Test restoration periodically and after any IT infrastructure changes.
 

Easily Assessing against the Essential Eight

For an easier, digital implementation of the ASD Essential 8 for cybersecurity, consider using the 6clicks platform. Preventative maintenance plays a fundamental role in effective cybersecurity management, and the Essential Eight provides a comprehensive starting point for Australian businesses. Implementing these strategies correctly can help businesses avoid the devastating costs associated with major cyber breaches. Sign up or visit www.6clicks.com to learn more about assessing and improving your cybersecurity posture using 6clicks' tools.

ASD Essential 8 maturity model assessment

 

Related useful resources





Louis Strauss

Written by Louis Strauss

Louis began his career in Berlin where he also founded Dobbel Berlin – Berlin’s curated search engine. Returning to Melbourne to join KPMG, Louis lead the development of software designed to distribute IP and create a platform for us by advisors and clients. While at KPMG, Louis also co-authored Chasing Digital: A Playbook for the New Economy. Louis is accomplished in stakeholder management, requirements gathering, product testing, refinement and project implementation. Louis also holds a Bachelor of Engineering and a Masters of Information Systems from the University of Melbourne.