Essential 8 Security Controls
The following provides those controls required by an organisation to comply with the ACSC “Essential 8”.
Guidelines for Cyber Security Incidents
Managing cyber security incidents
Reporting cyber security incidents
Reporting cyber security incidents to the ACSC
Responding to cyber security incidents
Enacting incident response plans
Guidelines for System Monitoring
Event logging and monitoring
Event log details
Centralised event logging facility
Event log monitoring
Guidelines for Personnel Security
Access to systems and their resources
Privileged access to systems
Suspension of access to systems
Guidelines for System Hardening
Operating system hardening
Operating system releases and versions
Hardening operating system configurations
Application control
PowerShell
Hardening user application configurations
- ism-1667
- ism-1668
- ism-1669
- ism-1542
- ism-1859
- ism-1823
- ism-1486
- ism-1485
- ism-1666
- ism-1412
- ism-1585
- ism-1670
- ism-1860
- ism-1824