Essential 8 Security Controls

The following provides those controls required by an organisation to comply with the ACSC “Essential 8”.

Guidelines for Cyber Security Incidents

Managing cyber security incidents

Reporting cyber security incidents

Reporting cyber security incidents to the ACSC

Responding to cyber security incidents

Enacting incident response plans

Guidelines for System Monitoring

Event logging and monitoring

Event log details

Centralised event logging facility

Event log monitoring

Guidelines for Personnel Security

Access to systems and their resources

Privileged access to systems

Suspension of access to systems

Guidelines for System Hardening

Operating system hardening

Operating system releases and versions

Hardening operating system configurations

Application control

PowerShell

Hardening user application configurations

Microsoft Office macros

Server application hardening

Multi-factor authentication

Setting credentials for break glass accounts, local administrator accounts and service accounts

Protecting credentials

Separate privileged operating environments

Administrative infrastructure

Scanning for missing patches or updates

When to patch security vulnerabilities

When to patch security vulnerabilities

Cessation of support

Data backup and restoration

Performing and retaining backups

Backup access

Backup modification and deletion

Testing restoration of backups

Centralised event logging facility

Event log monitoring