<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[emdeh’s Substack: Essential Eight Series]]></title><description><![CDATA[Essential Eight Series]]></description><link>https://www.emdeh.com/s/essential-eight-series</link><image><url>https://substackcdn.com/image/fetch/$s_!ZFh2!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e3ab64a-692c-4b46-903b-f8cbe66d9aba_144x144.png</url><title>emdeh’s Substack: Essential Eight Series</title><link>https://www.emdeh.com/s/essential-eight-series</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 10:26:04 GMT</lastBuildDate><atom:link href="https://www.emdeh.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[emdeh]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[emdeh@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[emdeh@substack.com]]></itunes:email><itunes:name><![CDATA[emdeh]]></itunes:name></itunes:owner><itunes:author><![CDATA[emdeh]]></itunes:author><googleplay:owner><![CDATA[emdeh@substack.com]]></googleplay:owner><googleplay:email><![CDATA[emdeh@substack.com]]></googleplay:email><googleplay:author><![CDATA[emdeh]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Application Control]]></title><description><![CDATA[Assessing Application Control.]]></description><link>https://www.emdeh.com/p/application-control</link><guid isPermaLink="false">https://www.emdeh.com/p/application-control</guid><dc:creator><![CDATA[emdeh]]></dc:creator><pubDate>Wed, 24 Jan 2024 21:06:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!x1rx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x1rx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x1rx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x1rx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x1rx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!x1rx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63814c9e-de25-4f6b-8225-2ea569f96a86_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Introduction</h1><h2>Control objective</h2><p>The objective of the <strong>Application Control</strong> strategy is to ensure applications are only accessible from appropriate locations and to the appropriate users.</p><h2>Expectation</h2><p>Organisations are expected to have a comprehensive approach to managing and controlling the execution of software applications.</p><p>The approach must include the full lifecycle of approving, deploying, and removing software applications. At higher maturity levels, log retention and monitoring are required.</p><p>The scope of application control is also extended from just workstations to internet-facing servers at Maturity Level 2 and all workstations and servers at Maturity Level 3.</p><h2>Implementing application control</h2><ul><li><p>Identify business-critical applications and formally approve their use.</p></li><li><p>Develop application control rules to ensure that only approved applications can be executed.</p></li><li><p>Maintain the application control rules using a change management program.</p></li><li><p>Validate application control rules on an annual or more frequent basis.</p></li></ul><h2>Contents</h2><ul><li><p><a href="https://emdeh.substack.com/i/145144237/assessment-scope">Assessment scope</a></p></li><li><p><a href="https://emdeh.substack.com/i/145144237/assessing-application-control">Assessing application control</a></p></li><li><p>Guidance</p><ul><li><p><a href="https://emdeh.substack.com/i/145144237/maturity-level-guidance">Maturity Level 1</a></p></li><li><p><a href="https://emdeh.substack.com/i/145144237/maturity-level-guidance">Maturity Level 2</a></p></li><li><p><a href="https://emdeh.substack.com/i/145144237/maturity-level-guidance">Maturity Level 3</a></p></li></ul></li><li><p><a href="https://emdeh.substack.com/i/145144237/other-considerations">Other considerations</a></p><ul><li><p><a href="https://emdeh.substack.com/i/145144237/considering-kernel">Kernel</a></p></li><li><p><a href="https://emdeh.substack.com/i/145144237/identifying-adversary-attempts-to-execute-malicious-code">Identifying malicious code execution</a></p></li><li><p><a href="https://emdeh.substack.com/i/145144237/applocker-and-wdac">Applocker and WDAC</a></p></li></ul></li><li><p><a href="https://emdeh.substack.com/i/145144237/useful-resources">Useful resources</a></p></li></ul><div><hr></div><h1>Assessment scope</h1><p>When carrying out application control assessments, it&#8217;s important to consider paths related to standard user-profiles and temporary directories that are utilised by operating systems, web browsers, and email clients. These can include:</p><ul><li><p><code>%userprofile%*</code></p></li><li><p><code>%temp%*</code></p></li><li><p><code>%tmp%*</code></p></li><li><p><code>%windir%\Temp*</code></p></li></ul><p>Based on the system&#8217;s setup, some overlap may be present; for example, <code>%temp%</code> and <code>%tmp%</code> are usually found within <code>%userprofile%</code>.</p><blockquote><p><em>It is important to note that the last major update to the maturity model introduced compiled Hypertext Markup Language (HTML) (</em><code>.chm</code> files), HTML applications (<code>.hta</code> files) and control panel applets (<code>.cpl</code> files) to the list of file types that need to be controlled. Some application control solutions may not support these file types.</p></blockquote><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/6jUMq/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66b12e2f-e4b5-434b-aae7-ac32bf18c952_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:947,&quot;title&quot;:&quot;Maturity Level requirements&quot;,&quot;description&quot;:&quot;Create interactive, responsive &amp; beautiful charts &#8212; no code required.&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/6jUMq/1/" width="730" height="947" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><div><hr></div><h1>Assessing Application Control</h1><p>To assess the effectiveness of application control strategies:</p><ul><li><p>Identify authorised programs.</p></li><li><p>Identify the application control approach that is being used (if in place).</p></li><li><p>Assess the controls using assessment methods and tools.</p></li><li><p>Determine the associated maturity level.</p></li></ul><h1>Assessment methods</h1><p>Application control assessments are possible without tools, but the efficacy of the tests will be significantly reduced, and edge cases that malicious actors might exploit could be missed. For instance, threat actors might deploy bespoke tools to enumerate weak paths in a system.</p><p>The ACSC provides guidelines and recommendations on the methods and tools that can be used to assess the control.</p><p>The only true way to test is to attempt execution against all file types in all locations.</p><p><code>SysInternals AccessChk</code> application can be used to generate output of folder permissions, but this is only relevant, potentially, for Level 1.</p><h2>E8MVT</h2><p>The Essential Eight Maturity Verification Tool (E8MVT) tests application control policies by attempting to write and execute certain file types in specific locations.</p><p>The tool also checks that Microsoft&#8217;s recommended block rules and drive block rules are implemented.</p><h2>ACVT</h2><p>The Application Control Verification Tool (ACVT) tests application control policies by enumerating all sub-directories and attempting to write and execute each relevant file type from each location.</p><blockquote><p><em>Both the E8MVT and ACVT are part of ASD&#8217;s toolkit, available through their <a href="https://www.cyber.gov.au/become-asd-partner#no-back">partner program</a>.</em></p></blockquote><h2>Scripts</h2><h3>Get AppLocker Policies</h3><pre><code><code>Get-AppLockerPolicy -Effective -Xml | Set-Content ('c:\windows\temp\curr.xml')`</code></code></pre><pre><code><code>Get-AppLockerPolicy -Local | Test-AppLockerPolicy -Path C:\Windows\System32\*.exe -User Everyone</code></code></pre><p>Test in calc.exe or notepad.exe:</p><pre><code><code>Test-AppLockerPolicy -XMLPolicy C:\windows\temp\curr.xml -Path C:\windows\system32\calc.exe, C:\windows\system32\notepad.exe -User Everyone</code></code></pre><h3>Sysinternals accesschk</h3><p>If only trusted Microsoft tools are permitted on the system, <strong>SysInternals AccessChk</strong> can be used for outputting folder permissions, noting this is only suitable for a path-based approach to implementing the control.</p><pre><code><code>accesschk -dsuvw [path] &gt; report.txt</code></code></pre><p>Running <code>whoami /groups</code> would also need to be executed to determine which user groups a typical standard user belonged to in order to determine the effective permissions for each path.</p><p>This approach is, however, likely to be tedious in assessing effectively.</p><div><hr></div><h1>Maturity Level 1 guidance</h1><p>The intent of application control at Maturity Level 1 can be met without a dedicated application control solution. This is achieved through file system permissions to prevent unnecessary access to user profile directories and temporary folders.</p><blockquote><p><em>The execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets is prevented on workstations from within standard user profiles and temporary folders used by the operating system, web browsers and email clients.</em></p></blockquote><p>Given how complex file system permissions can become, it&#8217;s essential to attempt to write and execute from all user-accessible directories to effectively check application control.</p><p>ACSC&#8217;s Essential Eight Maturity Verification (E8MVT) and Application Control Verification (ACVT) tools (available to ACSC partners) can assist in achieving this. A number of other tools on the market can also enumerate a file system to perform this test.</p><p>Where applicable, PowerShell cmdlets can be used to test and review AppLocker policies and <code>Sysinternals accesschk</code> can be used if only Microsoft-based tools are available to use.</p><p>For a system on which tools cannot be run, and assuming a path-based approach is used, screenshots of the &#8216;effective access&#8217; permissions for specified folders can be requested. This, however, has limitations because unless screenshots of access permissions are requested for every folder and sub-folder (for which there are usually many), it will not be possible to comprehensively assess whether read, write and execute permissions exist for a given user. Consequently, this will likely impact the quality of evidence cited in the final report.</p><p>At a minimum, screenshots for key paths (such as temporary folders used by the operating system, web browsers and email clients) should be requested and examined to determine whether inheritance is set, noting that at any point in a path, application control inheritance previously set by an operating system may be disabled by an application installer</p><h1>Maturity Level 2 guidance</h1><p>Whereas Maturity Level 1 is focused on End-User Compute (EUC) endpoints, Level 2 extends application control to internet-facing servers and includes additional log-retention requirements.</p><h1>Maturity Level 3 guidance</h1><p>Maturity Level 3 builds on Level 2 in that it requires log monitoring, application control on all servers, and the implementation of Microsoft&#8217;s block rules. Application control rulesets also need to be validated at least annually.</p><div><hr></div><h1>Other considerations</h1><h2>Considering Kernel</h2><p>Virtual memory is split into kernel and user space. The scope to which an application control solution protects a system&#8217;s kernel should also be considered.</p><h2>Identifying adversary attempts to execute malicious code</h2><p>Application control can help identify attempts to execute malicious code.</p><p>This can be achieved by configuring application control to generate event logs for allowed and blocked executions.</p><p>Event logs should include relevant information such as:</p><ul><li><p>name of the file</p></li><li><p>date/time stamp</p></li><li><p>username of the executing user</p></li></ul><p>Application control logs can also be ingested into an SIEM/SOAR system to allow for and contribute to a broader context of the threat landscape.</p><h2>AppLocker and WDAC</h2><p>AppLocker and Windows Defender Application Control (WDAC) are both security features in Windows, designed to control application usage and restrict unauthorised software. However, they have distinct differences:</p><ol><li><p><strong>Design and Purpose</strong>:</p><ul><li><p><strong>AppLocker</strong>: Primarily aimed at providing administrators with the ability to specify which users or groups can run particular applications, based on unique identities of files. It&#8217;s more about managing application access than outright security.</p></li><li><p><strong>WDAC</strong>: Focuses more on security. It is designed to prevent malware and untrusted applications from running by enforcing code integrity policies.</p></li></ul></li><li><p><strong>Scope and Control</strong>:</p><ul><li><p><strong>AppLocker</strong>: Works at a more granular level, allowing control over scripts, executable files, Windows Installer files, DLLs, and packaged app installers.</p></li><li><p><strong>WDAC</strong>: Controls the entire spectrum of executable code on the system, including kernel-mode drivers and user-mode applications.</p></li></ul></li><li><p><strong>Implementation and Management</strong>:</p><ul><li><p><strong>AppLocker</strong>: Managed through Group Policy, making it easier to implement in an environment already using Group Policy for configurations.</p></li><li><p><strong>WDAC</strong>: Managed through PowerShell and uses a different policy format, which can be more complex to set up but offers higher security. -</p></li></ul></li><li><p><strong>Flexibility and Usability</strong>:</p><ul><li><p><strong>AppLocker</strong>: Offers more flexibility and is simpler to configure, especially for smaller organizations or those with less complex needs.</p></li><li><p><strong>WDAC</strong>: While it provides a stronger security posture, implementing and managing it can be more challenging, particularly in environments with diverse applications.</p></li></ul></li><li><p><strong>System Requirements</strong>:</p><ul><li><p><strong>AppLocker</strong>: Available on Windows 7 and newer versions but only for Enterprise and Ultimate editions.</p></li><li><p><strong>WDAC</strong>: This feature is available on Windows 10 and Windows Server 2016 and later, offering broader support across different Windows editions.</p></li></ul></li><li><p><strong>Security Level</strong>:</p><ul><li><p><strong>AppLocker</strong>: Considered less robust in terms of security compared to WDAC, as it lacks the more comprehensive system-wide controls.</p></li><li><p><strong>WDAC</strong>: Provides a more secure environment by ensuring that only trusted software runs on the system.</p></li></ul></li></ol><p>In summary, while AppLocker is more user-friendly and easier to manage, particularly for application access control, WDAC offers a more comprehensive and secure approach, focusing on system integrity and malware prevention. The choice between the two would depend on the organisation's specific needs and capabilities, particularly in terms of desired security level and ease of management.</p><div><hr></div><h1>Useful resources</h1><ul><li><p><a href="https://learn.microsoft.com/en-us/compliance/essential-eight/e8-app-control">Essential Eight application control - Essential Eight | Microsoft Learn</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules">Microsoft recommended driver block rules - Windows Security | Microsoft Learn</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac">Applications that can bypass WDAC and how to block them - Windows Security | Microsoft Learn</a></p></li><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/small-business-cyber-security/small-business-cloud-security-guide/technical-example-application-control">Technical example: Application control | Cyber.gov.au</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Assessment planning and scoping]]></title><description><![CDATA[The four stages of assessment]]></description><link>https://www.emdeh.com/p/assessment-planning-and-scoping</link><guid isPermaLink="false">https://www.emdeh.com/p/assessment-planning-and-scoping</guid><dc:creator><![CDATA[emdeh]]></dc:creator><pubDate>Fri, 24 Nov 2023 08:17:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!poLr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!poLr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!poLr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!poLr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!poLr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!poLr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!poLr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;2023-essentialeight.png (1792&#215;1024)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="2023-essentialeight.png (1792&#215;1024)" title="2023-essentialeight.png (1792&#215;1024)" srcset="https://substackcdn.com/image/fetch/$s_!poLr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!poLr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!poLr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!poLr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F690687dc-03f0-4e1d-92ec-fcc7f5a1ec10_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Introduction</h1><p>An assessment's planning and scoping stages are essential for structuring the process and ensuring that the security insights gained accurately represent the environment being assessed. During this stage, it&#8217;s vital to take into account the context in which an organisation operates, including the threat landscape. In this context, the threat landscape can mean the primary threat the organisation is facing&#8212;for example, insider threats or external threats&#8212;including the level of threat sophistication.</p><p>Assessors should examine the organisation&#8217;s policies and procedures, conduct comprehensive tests of technical controls pertinent to each strategy, and assess their effectiveness. Determining the organisation's desired maturity level is key to guiding the assessment and establishing the appropriate scope and methods.</p><p>The type and quality of evidence collected will influence the assessment outcomes, so it&#8217;s critical to ensure that the evidence gathered is of high quality and reliability. This will underpin the report&#8217;s conclusions and recommendations.</p><p>When there are mandatory requirements for implementing the Essential Eight, an assessment is needed to attest to the level of maturity of the organisation&#8217;s cyber security controls. The assessment process, however, is intended to provide an organisation with actionable insights. For this reason, organisations that do not have a mandated requirement will still find regular assessment helpful as a way to identify improvements.</p><blockquote><p><em>Non-corporate entities within the Australian Government are typically required to obtain a Maturity Level Two within the broader context of the mandatory Protective Security Policy Framework (PSPF).</em></p></blockquote><p>The following sections describe the four assessment stages.</p><h2>Contents</h2><ul><li><p><a href="https://emdeh.substack.com/i/145121109/stage-assessment-planning-and-preparation">Assessment planning and preparation</a></p></li><li><p><a href="https://emdeh.substack.com/i/145121109/stage-assessment-scoping">Assessment scoping</a></p></li><li><p><a href="https://emdeh.substack.com/i/145121109/stage-assessment-of-controls">Assessment of controls</a></p></li><li><p><a href="https://emdeh.substack.com/i/145121109/stage-development-of-the-assessment-report">Development of the assessment report</a></p></li><li><p><a href="https://emdeh.substack.com/i/145121109/useful-resources">Useful resources</a></p></li></ul><div><hr></div><h1>Stage 1 - Assessment planning and preparation</h1><p>During this stage, pre-planning is undertaken to build a contextual overview of the organisation and the threat landscape in which it operates. The assessor will aim to gain an understanding of the infrastructure, the teams the assessor will need to interact with, and the skills required to complete the assessment.</p><p>As part of planning, the assessor should discuss the following with the asset owner:</p><ul><li><p>Determine asset classification and assessment scope.</p></li><li><p>Requirements around access to low and high-privileged user accounts, devices, documentation, personnel, and facilities.</p></li><li><p>Any approvals required to run scripts and tools within the environment.</p></li><li><p>Evidence collection and protection requirements, including following the conclusion of the assessment.</p></li><li><p>Finalising approval to use tools and scripts on sample systems/servers/networks.</p></li><li><p>Requirements for where the assessment report will be developed (e.g. on the organisation&#8217;s system or externally).</p></li><li><p>How stakeholder engagement and consultation should be approached, including confirming key contact points.</p></li><li><p>Whether any managed service providers support or manage any aspects of the system(s) under assessment, including appropriate points of contact if so.</p></li><li><p>Obtaining copies of any previously completed assessment reports for the system.</p></li><li><p>Agreement on appropriate use, retention and marketing of the assessment report by both parties.</p></li></ul><p>At the end of this stage, the assessor should have developed the assessment test plan.</p><div><hr></div><h1>Stage 2 - Assessment scoping</h1><p>Different maturity levels will impact aspects or components of the assessment. During this stage the assessor should become familiar with the requirements for the target maturity level, so the assessment approach and test plan can be adjusted accordingly.</p><blockquote><p><em>The Essential Eight should be implemented and assessed as a package. If a system has not previously been assessed and demonstrated to meet Maturity Level One, that system should not be assessed for Maturity Level Two. Likewise, a system should be assessed and demonstrated to meet Maturity Level Two before being assessed for Maturity Level Three<strong>.</strong></em></p></blockquote><p>As part of determining the appropriate assessment approach, the assessor should conduct the following activities:</p><ul><li><p>Make use of asset registers that describe the environment to determine the applicability of the Essential Eight.</p></li><li><p>Conduct workshops with the system owners to identify and agree on the precise assessment scope, including out-of-scope items.</p></li><li><p>Agree with system owners on the assessment duration and milestones.</p></li><li><p>Obtain an approximate breakdown of the operating systems used within the environment.</p></li><li><p>Determine the necessary sample size to represent all in-scope assets and types of assets accurately.</p></li><li><p>Document any assessment limitations, including sample sizes and constraints in the assessment report.</p></li></ul><h2>Evidence quality</h2><p>Assessments should strive to gather and use the highest-caliber evidence to effectively support conclusions on the effectiveness of controls. Evidence quality requirements should be considered and discussed at this stage.</p><p>It&#8217;s important to use a mix of qualitative and quantitative techniques, as these will often complement each other and allow for cross-referencing. Qualitative techniques may include reviewing documentation and interviewing system administrators. Quantitative techniques could include reviewing system configurations or utilising tools and scripts.</p><p>When conducting assessments, the quality of evidence can typically be categorised as follows:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/KLS8o/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab092538-a86c-4a55-844a-2aae40029e57_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:387,&quot;title&quot;:&quot;[ Insert title here ]&quot;,&quot;description&quot;:&quot;Create interactive, responsive &amp; beautiful charts &#8212; no code required.&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/KLS8o/1/" width="730" height="387" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><div><hr></div><h1>Stage 3 - Assessment of controls</h1><p>At this stage, the effectiveness of the controls within the Essential Eight are tested against the target Maturity Level.</p><p>ACSC has developed standardised assessment outcomes which must be used.</p><p>Each control can be assessed as follows:</p><ul><li><p><strong>Effective</strong>: The organisation effectively meets the control&#8217;s objective.</p></li><li><p><strong>Ineffective</strong>: The organisation is not adequately meeting the control&#8217;s objective.</p></li><li><p><strong>Alternate control:</strong> The organisation effectively meets the control&#8217;s objective through an alternate control.</p></li><li><p><strong>Not assessed:</strong> The control has not yet been assessed.</p></li><li><p><strong>Not applicable:</strong> The control does not apply to the system or environment.</p></li><li><p><strong>No visibility:</strong> The assessor was unable to obtain adequate visibility of a control&#8217;s implementation.</p></li></ul><p>Importantly, the Essential Eight Maturity Model does not allow for risk acceptance without compensating controls. If a system owner has accepted a risk with no compensating controls, the mitigation strategy must not be considered or implemented.</p><p>Moreover, when evaluating the efficacy of compensating controls, it&#8217;s important to verify that the level of protection the compensating control(s) offer is commensurate to that prescribed by the Essential Eight to protect against the level of adversarial tradecraft for the target Maturity Level.</p><blockquote><p><em>There is no scope in the Essential Eight model that allows for risks to be accepted without commensurate compensating controls.</em></p></blockquote><div><hr></div><h1>Stage 4 - Development of the assessment report</h1><p>In the final stage, the assessor will develop the security assessment report.</p><h2>Understanding maturity levels.</h2><p>The report will contextualise the assessment against the Maturity Model. The Maturity Model contains four levels that provide a way for an organisation to measure its progress in implementing the Essential Eight while also identifying areas for improvement.</p><p>There are three target levels, based on increasingly sophisticated adversarial tradecraft levels. Level 0 designates instances where the requirements of the first maturity level are not met.</p><p>At <strong>Maturity Level 0,</strong> weaknesses exist in the overall cyber security posture. This is also the default starting position if no assessment has been done previously.</p><p>At <strong>Maturity Level One</strong> the focus is on protection against malicious actors who are content to simply leverage widely available tradecraft. This level of maturity does not offer protection against APT tradecraft or other persistent threats, including insider threats.</p><p>At <strong>Maturity Level Two</strong>, a level of protection is reached that is sufficient to mitigate threats from malicious actors willing to invest more time in a target and in the effectiveness of their tools.</p><p>At <strong>Maturity Level Three</strong>, the focus is on threats that are more adaptive and much less reliant on public tools and techniques, such as state-sponsored actors, military operations, and other APTs.</p><h2>Report validity</h2><p>The assessment report has no expiry date. Theoretically, an assessment could be indefinite, but assessors should be cautious of relying on older previous reports and should consider doing a gap analysis to determine any deviations from succeeding changes to the Essential Eight and changes within the environment itself.</p><h2>Treatment and exceptions</h2><p>The use of exceptions for a system needs to be documented and approved by an appropriate authority through a formal process. The appropriate authority may be defined in the broader PSPF for government entities.</p><p>Documentation for exceptions should include the scope and justification for the exception, as well as the following details of the compensating controls:</p><ul><li><p>Reason, scope, and justification for compensating controls.</p></li><li><p>Anticipated implementation lifetime of the compensating control(s).</p></li><li><p>The review schedule of the compensating control.</p></li><li><p>The system risk rating before and after the compensating control was implemented.</p></li><li><p>Any caveats around the use of the system because of the exception.</p></li><li><p>The formal acceptance from the appropriate authority of any residual risk for the system.</p></li><li><p>When will the need for the exception next be considered by the appropriate authority? Note that exceptions should not be approved beyond one year.</p></li></ul><div><hr></div><h2>Useful resources</h2><ul><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide">Essential Eight Assessment Process Guide | Cyber.gov.au</a></p></li><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model">Essential Eight Maturity Model | Cyber.gov.au</a></p></li><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-faq">Essential Eight Maturity Model FAQ | Cyber.gov.au</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Overview of Essential Eight]]></title><description><![CDATA[Where did the Essential Eight come from, and who's it for?]]></description><link>https://www.emdeh.com/p/overview-of-essential-eight</link><guid isPermaLink="false">https://www.emdeh.com/p/overview-of-essential-eight</guid><dc:creator><![CDATA[emdeh]]></dc:creator><pubDate>Sun, 19 Nov 2023 22:28:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cBJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cBJP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cBJP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cBJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cBJP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cBJP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5293a7d-f5c3-43e5-9e53-edb4f0d53856_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Introduction</h1><p>Sometimes, it&#8217;s helpful to contextualise what something <em>isn&#8217;t.</em> That is certainly the case with the Australian Signals Directorate&#8217;s <strong>Essential Eight</strong> <em>Strategies to Mitigate Cyber Security Incidents</em>.</p><p>The Essential Eight and its Maturity Model are often conflated with the Australian Government&#8217;s broader <em>Protective Security Policy Framework (PSPF),</em> which has its own Maturity Model.</p><p>So, to begin, let&#8217;s set the scene.</p><h2>Contents</h2><ul><li><p><a href="https://emdeh.substack.com/i/145111595/where-did-the-essential-eight-come-from">W</a><a href="https://emdeh.substack.com/i/145111595/where-did-the-essential-eight-come-fromhttps://emdeh.substack.com/i/145111595/whos-it-for">here did the Essential Eight come from?</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/where-did-the-essential-eight-come-fromhttps://emdeh.substack.com/i/145111595/whos-it-for">Who&#8217;s it for?</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/categorising-the-strategies">Categorising the strategies</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/where-to-start">Where to start</a></p><ul><li><p><a href="https://emdeh.substack.com/i/145111595/targeted-cyber-intrusions-and-other-external-malicious-actors-who-steal-data">Targeted cyber intrusions and other external malicious actors who steal data</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/ransomware-and-external-malicious-actors-who-destroy-data">Ransomware and external malicious actors who destroy data</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/malicious-insiders-who-steal-data">Malicious insiders who steal data</a></p></li><li><p><a href="https://emdeh.substack.com/i/145111595/malicious-insiders-who-destroy-data-and-prevent-systems-functioning">Malicious insiders who destroy data and prevent systems functioning</a></p></li></ul></li><li><p><a href="https://emdeh.substack.com/i/145111595/useful-resources">Useful resources</a></p></li></ul><h1>Where did the Essential Eight come from?</h1><p>In February 2010, the <em>Strategies to Mitigate Cyber Security Incidents</em> was published to summarise the <em>Information Security Manual.</em> Seven years later, a revision added a degree of relative security effectiveness to these 37 strategies. Eight of these were marked <em>Essential</em>, thus giving rise to the Essential Eight.</p><p>Notably, the Essential Eight are not the <em>Easy Eight</em>. Nor is it the minimum needed for an effective cyber security posture. Instead, see it as a prioritisation. If you&#8217;re unsure where to start on a cyber security program of work, start with the Essential Eight.</p><p>Indeed, the PSPF is quite explicit about this. Policy 10: Safeguarding data from cyber threats states that entities must mitigate common cyber threats by implementing the Essential Eight and considering which of the remaining 29 strategies need to be implemented to achieve an acceptable level of residual risk.</p><blockquote><p><em><strong>The Essential Eight is not all that you need to do. Policy 10 creates a requirement for entities to consider what remaining mitigation strategies they need to achieve an acceptable level of residual risk.</strong></em></p></blockquote><h1>Who&#8217;s it for?</h1><p>The Essential Eight is not designed for all environments. It focuses on Microsoft Windows environments and may not be as relevant for other settings, such as IoT or Operational Technology.</p><p>Increasingly, government directives and legislative instruments are mandating the application of the Essential Eight as a risk management program.</p><ul><li><p>The PSPF mandates it for most government entities at the Federal level</p></li><li><p>Some state governments have mandated it, including Victoria, Queensland, and New South Wales.</p></li><li><p>Entities designated as Critical Infrastructure (Security of Critical Infrastructure Act 2018)</p></li></ul><h1>Categorising the 37 strategies</h1><p>The strategies are categorised into five types:</p><ol><li><p>Preventing Malware delivery and execution.</p></li><li><p>Limiting the extent of Cyber Security Incidents.</p></li><li><p>Detecting Cyber Security Incidents and Responding.</p></li><li><p>Recovering data and system availability after a Cyber Security incident.</p></li><li><p>Preventing malicious insiders.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-OUA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-OUA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 424w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 848w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 1272w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-OUA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png" width="1456" height="919" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:919,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:&quot;Strategies to Mitigate Cyber Secyurity Incidents&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="Strategies to Mitigate Cyber Secyurity Incidents" srcset="https://substackcdn.com/image/fetch/$s_!-OUA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 424w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 848w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 1272w, https://substackcdn.com/image/fetch/$s_!-OUA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff1f0a53-685f-498d-8deb-f3b0ab6894a9_1913x1208.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Source: <a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/strategies-mitigate-cyber-security-incidents">cyber.gov.au</a></p><p>The strategies are also tagged against three further dimensions:</p><ol><li><p>Potential User Resistance</p></li><li><p>Upfront cost</p></li><li><p>Ongoing maintenance cost</p></li></ol><p>How these dimensions were baselined isn&#8217;t clear; presumably, it&#8217;s relative.</p><p>For the Essential Eight, there are:</p><ul><li><p>Four <em>prevention</em> strategies.</p></li><li><p>Three <em>limiting</em> strategies.</p></li><li><p>One <em>recovering</em> strategy.</p></li></ul><h1>Where to start?</h1><p>Logically, the advice is to follow a risk-based approach and start with strategies that mitigate the threats of most concern. This will look different for different organisations. The <em>Strategies to Mitigate Cyber Security Incidents</em> decompose this into four categories.</p><p>When implementing a strategy, first implement it for high-risk users and computers, such as those with access to important data and/or are exposed to untrustworthy internet content. Then, implement it for all other users and computers.</p><h2>Targeted cyber intrusions and other external malicious actors who steal data.</h2><h3>Step 1</h3><p>In this category, the first step is to implement the essential mitigation strategies that: a. prevent malware payload delivery and execution, b. limit the extent of cyber security incidents, and c. recover data and system availability.</p><p><strong>Step 1 implementation order:</strong></p><ol><li><p>Application Control</p></li><li><p>Patch Applications</p></li><li><p>Configure Microsoft Office macro settings</p></li><li><p>User application hardening</p></li><li><p>Restrict administrative privileges</p></li><li><p>Patch operating systems</p></li><li><p>Multi-factor authentication</p></li><li><p>Regular backups</p></li></ol><h3>Step 2</h3><p>Next, repeat the first step for the strategies with an effectiveness rating of &#8216;excellent&#8217; in the detect, preventative, and limiting categories.</p><p><strong>Step 2 implementation order:</strong></p><ol><li><p>Continuous incident detection and response</p></li><li><p>Automated dynamic analysis of email and web content run in a sandbox.</p></li><li><p>Email content filtering</p></li><li><p>Web content filtering</p></li><li><p>Deny corporate computers direct internet connectivity</p></li><li><p>Operating system generic exploit mitigation</p></li><li><p>Disable local administrator accounts</p></li><li><p>Network segmentation</p></li><li><p>Protect authentication credentials</p></li></ol><h3>Step 3</h3><p>Lastly, consider what remaining strategies are required to achieve an acceptable level of residual risk<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>.</p><h2>Ransomware and external malicious actors who destroy data</h2><h3>Step 1</h3><p>For this category, the first step is to implement the Essential Eight that:</p><ul><li><p>recover data and system availability,</p></li><li><p>prevent malware payload delivery and execution, an</p></li><li><p>limit the extent of cyber security incidents.</p></li></ul><p><strong>Step 1 implementation order:</strong></p><ol><li><p>Regular backups</p></li><li><p>Application Control</p></li><li><p>Patch Applications</p></li><li><p>Configure Microsoft Office macro settings</p></li><li><p>User application hardening</p></li><li><p>Restrict administrative privileges</p></li><li><p>Patch operating systems</p></li><li><p>Multi-factor authentication</p></li></ol><h3>Step 2</h3><p>Next, repeat the first step for the strategies with an effectiveness rating of &#8216;excellent&#8217; in the detecting, preventative, and limiting categories.</p><p><strong>Step 2 implementation order:</strong></p><ol><li><p>Continuous incident detection and response</p></li><li><p>Automated dynamic analysis of email and web content run in a sandbox.</p></li><li><p>Email content filtering</p></li><li><p>Web content filtering</p></li><li><p>Deny corporate computers direct internet connectivity</p></li><li><p>Operating system generic exploit mitigation</p></li><li><p>Disable local administrator accounts</p></li><li><p>Network segmentation</p></li><li><p>Protect authentication credentials</p></li></ol><h3>Step 3</h3><p>Lastly, consider what remaining strategies are required to achieve an acceptable level of residual risk.</p><h2>Malicious insiders who steal data.</h2><h3>Steps 1 and 2</h3><p>For this category, the first step is to implement data exfiltration by implementing the strategy <em>&#8216;Control removable storage media and connected devices&#8217;</em>. The second is to implement the limiting strategy: <em>outbound web and email data loss prevention.</em></p><p><strong>Step 1 and 2 implementation order:</strong></p><ol><li><p>Control removable storage media and connected devices.</p></li><li><p>Outbound web and email data loss prevention.</p></li></ol><h3>Step 3</h3><p>Next is to implement the Essential Eight <em>limiting</em> strategies and those that allow <em>detection and response</em>.</p><p><strong>Step 3 implementation order:</strong></p><ol><li><p>Restrict administrative privileges</p></li><li><p>Patch operating systems</p></li><li><p>Multi-factor authentication</p></li><li><p>Continuous incident detection and response</p></li></ol><h3>Step 4</h3><p>Then, repeat the third step for strategies with an effective rating of excellent in the limiting category and implement the preventative strategy of Personnel Management.</p><p><strong>Step 4 implementation order:</strong></p><ol><li><p>Disable local administrator accounts</p></li><li><p>Network segmentation</p></li><li><p>Protect authentication credentials</p></li><li><p>Personnel management</p></li></ol><h3>Step 5</h3><p>Lastly, if employees are likely to have the technical cyber security capabilities, implement the remaining Essential Eight strategies to prevent malware delivery, then repeat step 3 with less effective mitigation strategies to achieve an acceptable level of residual risk.</p><p><strong>Step 5 implementation order:</strong></p><ol><li><p>Application Control</p></li><li><p>Patch Applications</p></li><li><p>Configure Microsoft Office macro settings</p></li><li><p>User application hardening</p></li></ol><h2>Malicious insiders who destroy data and prevent systems functioning.</h2><h3>Step 1</h3><p>For this category, the first step is to implement the Essential Eight that:</p><ul><li><p>recover data and system availability, and</p></li><li><p>limit the extent of cyber security incidents.</p></li></ul><p><strong>Step 1 implementation order:</strong></p><ol><li><p>Regular backups</p></li><li><p>Restrict administrative privileges</p></li><li><p>Patch operating systems</p></li><li><p>Multi-factor authentication</p></li></ol><h3>Step 2</h3><p>Next, repeat the first step for the strategies with an effectiveness rating of &#8216;excellent&#8217; in the detecting and limiting categories.</p><p><strong>Step 2 implementation order:</strong></p><ol><li><p>Continuous incident detection and response</p></li><li><p>Disable local administrator accounts</p></li><li><p>Network segmentation</p></li><li><p>Protect authentication credentials</p></li></ol><h3>Step 3</h3><p>Next, implement the preventative strategy of Personnel Management. Again, if employees are likely to have the technical cyber security capabilities, implement the remaining Essential Eight strategies to prevent malware delivery. Then, repeat step 3 with less effective mitigation strategies to achieve an acceptable level of residual risk.</p><p><strong>Step 3 implementation order:</strong></p><ol><li><p>Personnel Management</p></li><li><p>Application Control</p></li><li><p>Patch Applications</p></li><li><p>Configure Microsoft Office macro settings</p></li><li><p>User application hardening</p></li></ol><h3>Useful resources</h3><ul><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight">Essential Eight | Cyber.gov.au</a></p></li><li><p><a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/strategies-mitigate-cyber-security-incidents">Strategies to Mitigate Cyber Security Incidents | Cyber.gov.au</a></p></li><li><p><a href="https://www.protectivesecurity.gov.au/policies">Policies | Protective Security Policy Framework</a></p></li><li><p><a href="https://www.protectivesecurity.gov.au/publications-library/policy-10-safeguarding-data-cyber-threats">Policy 10: Safeguarding data from cyber threats | Protective Security Policy Framework</a></p></li></ul><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>This is a requirement for entities covered by the Protective Security Policy Framework (see <a href="https://www.protectivesecurity.gov.au/system/files/2024-02/policy-10-safeguarding-data-from-cyber-threats.pdf">Policy 10: Safeguarding data from cyber threats</a>, Requirement B.1.b)</p></div></div>]]></content:encoded></item><item><title><![CDATA[Essential Eight Explainers]]></title><description><![CDATA[An overview of the ASD's Essential Eight strategies to mitigate cyber security incidents.]]></description><link>https://www.emdeh.com/p/essential-eight-explainers</link><guid isPermaLink="false">https://www.emdeh.com/p/essential-eight-explainers</guid><dc:creator><![CDATA[emdeh]]></dc:creator><pubDate>Sun, 29 Oct 2023 22:07:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ktrk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ktrk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ktrk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ktrk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ktrk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ktrk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5c943a5-5561-4b6e-ab6a-310ecc0a0f90_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>What are the Essential Eight</h1><p>The Australian Signals Directorate&#8217;s <a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-explained">Essential Eight Strategies to Mitigate Cyber Security Incidents</a> was developed as a prioritised baseline to assist organisations in protecting their systems against a range of cyber threats.</p><p>Notably, the Essential Eight is just a starting point and is not exhaustive. Organisations should conduct regular risk assessments and adopt additional strategies based on their specific threat environment.</p><p>For government entities covered by the Protective Security Policy Framework (PSPF), <a href="https://www.protectivesecurity.gov.au/publications-library/policy-10-safeguarding-data-cyber-threats">Policy 10: Safeguarding data from cyber threats</a> specifies that in addition to implementing the Essential Eight, entities should:</p><blockquote><p><em>&#8220;[consider] which of the remaining mitigation strategies from the <a href="https://www.cyber.gov.au/acsc/view-all-content/strategies-to-mitigate-cyber-security-incidents">Strategies to Mitigate Cyber Security Incidents</a> need to be implemented to achieve an acceptable level of residual risk for their entity.&#8221;</em></p></blockquote><p>Over the coming months, I&#8217;ll endeavour to produce more detailed explainers demonstrating why each of the Essential Eight is important, and focusing on how the controls are assessed.</p><p>The table below lists the Essential Eight, the typical exploits each strategy helps protect against and a brief example.</p><h1>Essential Eight Strategies</h1><ol><li><p>Application Control</p></li><li><p>Patch Applications</p></li><li><p>Configure Microsoft Office macro settings</p></li><li><p>User Application Hardening</p></li><li><p>Restrict Administrative Privileges</p></li><li><p>Patch Operating Systems</p></li><li><p>Multi-Factor Authentication</p></li><li><p>Daily Backups</p></li></ol><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/Inr2y/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ffce09a5-81f7-42cd-bc20-d52e93772e55_1260x660.png&quot;,&quot;thumbnail_url_full&quot;:&quot;&quot;,&quot;height&quot;:1035,&quot;title&quot;:&quot;Examples of exploits the strategies protect against&amp;nbsp;&quot;,&quot;description&quot;:&quot;Create interactive, responsive &amp; beautiful charts &#8212; no code required.&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/Inr2y/1/" width="730" height="1035" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div>]]></content:encoded></item></channel></rss>