0% found this document useful (0 votes)
95 views2 pages

PROTECT - Essential Eight Maturity Model (June 2020)

This document describes the Essential Eight maturity model developed by the Australian Cyber Security Centre (ACSC) to help organizations assess their implementation of the Essential Eight cybersecurity mitigation strategies. It defines three maturity levels for each strategy: level one indicates partial alignment, level two indicates mostly aligned, and level three indicates fully aligned. The document recommends organizations aim for level three for each strategy and provides contact details for additional assistance from ACSC.

Uploaded by

Revive Revival
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views2 pages

PROTECT - Essential Eight Maturity Model (June 2020)

This document describes the Essential Eight maturity model developed by the Australian Cyber Security Centre (ACSC) to help organizations assess their implementation of the Essential Eight cybersecurity mitigation strategies. It defines three maturity levels for each strategy: level one indicates partial alignment, level two indicates mostly aligned, and level three indicates fully aligned. The document recommends organizations aim for level three for each strategy and provides contact details for additional assistance from ACSC.

Uploaded by

Revive Revival
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Essential Eight

Maturity Model
JUNE 2020

Introduction
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the
Strategies to Mitigate Cyber Security Incidents, to help organisations mitigate cyber security incidents caused by
various cyber threats. The most effective of these are known as the Essential Eight.

Maturity levels
To assist organisations in determining the maturity of their implementation of the Essential Eight, three maturity levels
have been defined for each mitigation strategy. The maturity levels are defined as:
 Maturity Level One: Partly aligned with the intent of the mitigation strategy.
 Maturity Level Two: Mostly aligned with the intent of the mitigation strategy.
 Maturity Level Three: Fully aligned with the intent of the mitigation strategy.

What maturity level to aim for


As a baseline organisations should aim to reach Maturity Level Three for each mitigation strategy. Where the ACSC
believes an organisation requires a maturity level above that of Maturity Level Three, the ACSC will provide tailored
advice to meet the specific needs of the organisation.

Further information
The Australian Government Information Security Manual (ISM) assists in the protection of information that is
processed, stored or communicated by organisations’ systems. It can be found at https://www.cyber.gov.au/acsc/view-
all-content/ism.
The Strategies to Mitigate Cyber Security Incidents complements the advice in the ISM. The complete list of
strategies can be found at https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-
security-incidents.

Contact details
If you have any questions regarding this guidance you can contact us via 1300 CYBER1 (1300 292 371) or
https://www.cyber.gov.au/acsc/contact.
Essential Eight Maturity Model
Mitigation Strategy Maturity Level One Maturity Level Two Maturity Level Three

Application control Application control is implemented on all workstations to restrict the execution of executables to an Application control is implemented on all workstations to restrict the execution of executables, Application control is implemented on all workstations to restrict the execution of executables,
approved set. software libraries, scripts and installers to an approved set. software libraries, scripts and installers to an approved set.
Application control is implemented on all servers to restrict the execution of executables to an Application control is implemented on all servers to restrict the execution of executables, software Application control is implemented on all servers to restrict the execution of executables, software
approved set. libraries, scripts and installers to an approved set. libraries, scripts and installers to an approved set.
Microsoft’s latest recommended block rules are implemented to prevent application control
bypasses.

Patch applications Security vulnerabilities in applications and drivers assessed as extreme risk are patched, updated or Security vulnerabilities in applications and drivers assessed as extreme risk are patched, updated or Security vulnerabilities in applications and drivers assessed as extreme risk are patched, updated or
mitigated within one month of the security vulnerabilities being identified by vendors, independent mitigated within two weeks of the security vulnerabilities being identified by vendors, independent mitigated within 48 hours of the security vulnerabilities being identified by vendors, independent
third parties, system managers or users. third parties, system managers or users. third parties, system managers or users.
Applications that are no longer supported by vendors with patches or updates for security Applications that are no longer supported by vendors with patches or updates for security An automated mechanism is used to confirm and record that deployed application and driver
vulnerabilities are updated or replaced with vendor-supported versions. vulnerabilities are updated or replaced with vendor-supported versions. patches or updates have been installed, applied successfully and remain in place.
Applications that are no longer supported by vendors with patches or updates for security
vulnerabilities are updated or replaced with vendor-supported versions.

Configure Microsoft Microsoft Office macros are allowed to execute, but only after prompting users for approval. Only signed Microsoft Office macros are allowed to execute. Microsoft Office macros are only allowed to execute in documents from Trusted Locations where
Office macro settings Microsoft Office macro security settings cannot be changed by users. Microsoft Office macros in documents originating from the internet are blocked. write access is limited to personnel whose role is to vet and approve macros.
Microsoft Office macro security settings cannot be changed by users. Microsoft Office macros in documents originating from the internet are blocked.
Microsoft Office macro security settings cannot be changed by users.

User application Web browsers are configured to block or disable support for Flash content. Web browsers are configured to block or disable support for Flash content. Web browsers are configured to block or disable support for Flash content.
hardening Web browsers are configured to block web advertisements. Web browsers are configured to block web advertisements.
Web browsers are configured to block Java from the internet. Web browsers are configured to block Java from the internet.
Microsoft Office is configured to disable support for Flash content.
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.

Restrict Privileged access to systems, applications and information is validated when first requested. Privileged access to systems, applications and data repositories is validated when first requested and Privileged access to systems, applications and data repositories is validated when first requested and
administrative Policy security controls are used to prevent privileged users from reading emails, browsing the web revalidated on an annual or more frequent basis. revalidated on an annual or more frequent basis.
privileges and obtaining files via online services. Policy security controls are used to prevent privileged users from reading emails, browsing the web Privileged access to systems, applications and data repositories is limited to that required for
and obtaining files via online services. personnel to undertake their duties.
Technical security controls are used to prevent privileged users from reading emails, browsing the
web and obtaining files via online services.

Patch operating Security vulnerabilities in operating systems and firmware assessed as extreme risk are patched, Security vulnerabilities in operating systems and firmware assessed as extreme risk are patched, Security vulnerabilities in operating systems and firmware assessed as extreme risk are patched,
systems updated or mitigated within one month of the security vulnerabilities being identified by vendors, updated or mitigated within two weeks of the security vulnerabilities being identified by vendors, updated or mitigated within 48 hours of the security vulnerabilities being identified by vendors,
independent third parties, system managers or users. independent third parties, system managers or users. independent third parties, system managers or users.
Operating systems for workstations, servers and ICT equipment that are no longer supported by Operating systems for workstations, servers and ICT equipment that are no longer supported by An automated mechanism is used to confirm and record that deployed operating system and
vendors with patches or updates for security vulnerabilities are updated or replaced with vendor- vendors with patches or updates for security vulnerabilities are updated or replaced with vendor- firmware patches or updates have been installed, applied successfully and remain in place.
supported versions. supported versions. Operating systems for workstations, servers and ICT equipment that are no longer supported by
vendors with patches or updates for security vulnerabilities are updated or replaced with vendor-
supported versions.

Multi-factor Multi-factor authentication is used to authenticate all users of remote access solutions. Multi-factor authentication is used to authenticate all users of remote access solutions. Multi-factor authentication is used to authenticate all users of remote access solutions.
authentication Multi-factor authentication uses at least two of the following authentication factors: passwords, Multi-factor authentication is used to authenticate all privileged users and any other positions of Multi-factor authentication is used to authenticate all privileged users and any other positions of
Universal 2nd Factor security keys, physical one-time password tokens, biometrics, smartcards, trust. trust.
mobile app one-time password tokens, SMS messages, emails, voice calls or software certificates. Multi-factor authentication uses at least two of the following authentication factors: passwords, Multi-factor authentication is used to authenticate all users when accessing important data
Universal 2nd Factor security keys, physical one-time password tokens, biometrics, smartcards or repositories.
mobile app one-time password tokens. Multi-factor authentication uses at least two of the following authentication factors: passwords,
Universal 2nd Factor security keys, physical one-time password tokens, biometrics or smartcards.

Daily backups Backups of important information, software and configuration settings are performed monthly. Backups of important information, software and configuration settings are performed weekly. Backups of important information, software and configuration settings are performed at least daily.
Backups are stored for between one to three months. Backups are stored offline, or online but in a non-rewritable and non-erasable manner. Backups are stored offline, or online but in a non-rewritable and non-erasable manner.
Partial restoration of backups is tested on an annual or more frequent basis. Backups are stored for between one to three months. Backups are stored for three months or greater.
Full restoration of backups is tested at least once. Full restoration of backups is tested at least once when initially implemented and each time
Partial restoration of backups is tested on a bi-annual or more frequent basis. fundamental information technology infrastructure changes occur.
Partial restoration of backups is tested on a quarterly or more frequent basis.

You might also like