Essential 8 and The Maturity Model

As cyber threat mitigation strategies evolve so do the cyber threats. To this end the ACSC has developed a set of strategies to mitigate cyber security incidents called Essential 8.

With this implementation an organisation establishes a baseline which covers the following areas: application control, patch applications, configure Microsoft Office macro settings, user application hardening, restrict administrative privileges, patch operating systems, multi-factor authentication and regular backups.

Then the organisation moves through the Essential 8 Maturity model which assists in a regular cycle of improvement.

It is always more cost effective to take a proactive approach rather than a reactive one.