Guest mode
Help
Getting Started
Support Center
Contact Support
Sign in
Reports
Essential Eight Compliance Guide
EN
Editor
Term map
Competitors
Integrations
Created
Jul 6, 2023
by Edward Kost
Last edited
Jul 7, 2023
Term used
Importance
Unused
Heading
acsc
the essential eight
mitigation strategies
the australian cyber security centre
cyber security incidents
essential 8
multi-factor authentication
backups
maturity level
baseline
vulnerabilities
cyber threats
application control
ransomware
endpoint
acsc essential
administrative privileges
security controls
patch applications
apps
patch operating systems
australia
essential eight maturity model
cyberattacks
automate
asd
user application hardening
australian government
remediation
mfa
malware
access management
webinar
privileged accounts
cyber risk
whitelisting
regular backups
use cases
microsoft office macro settings
australian signals directorate
cybersecurity posture
functionality
remote access
privileged access
government agencies
sensitive data
providers
vectors
strategies to mitigate cyber security incidents
daily backups
threat landscape
templates
patch management
incident response
web browsers
Your working draft
learn.microsoft.com/en-us/compliance/essential-eight/e8-overview
#1 desktop
www.upguard.com/blog/essential-eight
#2 desktop
www.qualys.com/forms/whitepapers/essential-eight-cyber-security-guidelines/
#3 desktop
huntsmansecurity.com/resource/compliance-guides/essential-8-compliance-guide/
#4 desktop
info.zscaler.com/resources-ebooks-essential-8-compliance-through-zero-trust
#5 desktop
www.microsoft.com/en-au/business/topic/security/essential-eight/
#6 desktop
www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-compliance-guide-asd-essential-8.pdf
#6 mobile
www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight
#7 mobile
www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide
#8 mobile
www.beyondtrust.com/solutions/compliance/essential-8
#9 desktop
www.ivanti.com/en-au/lp/security/guide-to-acsc-essential-8-compliance
#9 mobile
www.puppet.com/resources/acsc-essential-8
#11 desktop
blog.6clicks.com/asd-essential-eight-cybersecurity-guide
#12 desktop
blog.6clicks.com/asd-essential-eight-cybersecurity-guide?hs_amp=true
#12 mobile
www.threatintelligence.com/blog/essential-8
#13 desktop
www.manageengine.com/essential-eight/
#13 mobile
www.cyberark.com/resources/meet-audit-and-compliance/addressing-the-australian-signals-directorate-asd-essential-eight
#14 desktop
www.manageengine.com/products/self-service-password/essential-eight.html
#14 mobile
www.data3.com/solutions/security/acsc-essential-eight/
#15 desktop
www.linkedin.com/posts/therealandrewlawrence_essential-eight-assessment-process-guide-activity-7004582636677459968-_wAB
#15 mobile
eosit.com.au/guides/what-is-essential-eight/
#17 mobile
www.atlassian.com/trust/compliance/resources/essential8
#18 desktop
docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-acsc_essential_8.html
#18 mobile
delinea.com/resources/acsc-essential-eight-whitepaper
#19 mobile
duo.com/resources/ebooks/duo-for-essential-8
#20 mobile
media.zones.com/images/pdf/jamf-mitigate-cyber-security-incidents-whitepaper.pdf
#22 mobile
scytale.ai/resources/essential-8-maturity-model-achieving-cyber-security-excellence/
#24 desktop
www.avepoint.com/blog/avepoint-blog/asd-essential-8-explained
#25 desktop
tesserent.com/solutions/essential-8-services
#26 desktop
www.tenable.com/whitepapers/the-asd-essential-eight
#27 desktop
www.compliancemanagergrc.com/blog/essential-8-maturity-model/
#28 desktop
land.fortmesa.com/australia-acsc-essential-8
#29 desktop
power-net.com.au/managed-it-services/it-security/essential-8/
#30 desktop
acsc
H
Typical: 2-4 (2)
acsc
Importance:
9
/10
Heading presence:
Moderate
Typical uses:
2-4
Current uses:
2
Examples
the essential eight
H
Typical: 3-9 (21)
the essential eight
Importance:
8
/10
Heading presence:
Moderate
Typical uses:
3-9
Current uses:
21
Examples
mitigation strategies
Typical: 1-3 (3)
mitigation strategies
mitigation strategy
Importance:
8
/10
Typical uses:
1-3
Current uses:
3
Examples
the australian cyber security centre
Typical: 1-2 (1)
the australian cyber security centre
Importance:
7
/10
Typical uses:
1-2
Current uses:
1
Examples
cyber security incidents
Typical: 1-3 (1)
cyber security incidents
cyber security incident, cybersecurity incidents, cybersecurity incident
Importance:
7
/10
Typical uses:
1-3
Current uses:
1
Examples
essential 8
H
Typical: 3-7 (2)
essential 8
essential-8, essential8
Importance:
6
/10
Heading presence:
High
Typical uses:
3-7
Current uses:
2
Examples
multi-factor authentication
Typical: 1-3 (5)
multi-factor authentication
multifactor authentication, multi-factor_authentication
Importance:
6
/10
Typical uses:
1-3
Current uses:
5
Examples
backups
H
Typical: 2-4 (12)
backups
backup
Importance:
6
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
12
Examples
maturity level
H
Typical: 4-10 (7)
maturity level
maturity levels
Importance:
6
/10
Heading presence:
Low
Typical uses:
4-10
Current uses:
7
Examples
baseline
Typical: 1-3 (3)
baseline
baselines
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
vulnerabilities
Typical: 1-3 (36)
vulnerabilities
vulnerability
Importance:
6
/10
Typical uses:
1-3
Current uses:
36
Examples
cyber threats
Typical: 1-3 (5)
cyber threats
cyber threat, cyberthreats, cyber-threats
Importance:
5
/10
Typical uses:
1-3
Current uses:
5
Examples
application control
Typical: 1-3 (5)
application control
application controls, application_control
Importance:
5
/10
Typical uses:
1-3
Current uses:
5
Examples
ransomware
Typical: 1-2 (1)
ransomware
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
endpoint
Typical: 2-4 (2)
endpoint
endpoints, end points, end point
Importance:
4
/10
Typical uses:
2-4
Current uses:
2
Examples
acsc essential
H
Typical: 1-3 (1)
acsc essential
acsc’s essential, acsc's essential
Importance:
4
/10
Heading presence:
Moderate
Typical uses:
1-3
Current uses:
1
Examples
administrative privileges
Typical: 1-3 (4)
administrative privileges
administrative privilege, administrative_privileges, administrator privileges
Importance:
4
/10
Typical uses:
1-3
Current uses:
4
Examples
security controls
Typical: 2-4 (7)
security controls
security control
Importance:
4
/10
Typical uses:
2-4
Current uses:
7
Examples
patch applications
Typical: 1-2 (6)
patch applications
patch application, patching applications, patch_applications
Importance:
4
/10
Typical uses:
1-2
Current uses:
6
Examples
apps
Typical: 1-3 (1)
apps
app
Importance:
4
/10
Typical uses:
1-3
Current uses:
1
Examples
patch operating systems
Typical: 1-2 (1)
patch operating systems
patch operating system, patch_operating_systems
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
australia
Typical: 1-2 (1)
australia
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
essential eight maturity model
Typical: 1-2
essential eight maturity model
essential-eight-maturity-model
Importance:
4
/10
Typical uses:
1-2
Current uses:
–
Examples
cyberattacks
Typical: 1-3 (8)
cyberattacks
cyber attacks, cyber attack, cyberattack
Importance:
4
/10
Typical uses:
1-3
Current uses:
8
Examples
automate
Typical: 1-3 (1)
automate
automation, automates
Importance:
4
/10
Typical uses:
1-3
Current uses:
1
Examples
asd
Typical: 2-4 (8)
asd
Importance:
3
/10
Typical uses:
2-4
Current uses:
8
Examples
user application hardening
Typical: 1-2 (1)
user application hardening
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
australian government
Typical: 1-2 (1)
australian government
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
remediation
Typical: 1-2 (2)
remediation
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
mfa
Typical: 1-3 (10)
mfa
Importance:
3
/10
Typical uses:
1-3
Current uses:
10
Examples
malware
Typical: 1-3 (3)
malware
Importance:
3
/10
Typical uses:
1-3
Current uses:
3
Examples
access management
Typical: 2-4 (3)
access management
Importance:
3
/10
Typical uses:
2-4
Current uses:
3
Examples
webinar
Typical: 1-3
webinar
webinars
Importance:
3
/10
Typical uses:
1-3
Current uses:
–
Examples
privileged accounts
Typical: 2-4 (5)
privileged accounts
privileged account
Importance:
3
/10
Typical uses:
2-4
Current uses:
5
Examples
cyber risk
Typical: 1-2 (1)
cyber risk
cyber risks, cyber-risk
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
whitelisting
Typical: 1-3 (43)
whitelisting
whitelist
Importance:
3
/10
Typical uses:
1-3
Current uses:
43
Examples
regular backups
Typical: 1-2 (1)
regular backups
regular_backups
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
use cases
Typical: 1-2 (2)
use cases
use case, use-cases
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
microsoft office macro settings
Typical: 1-2
microsoft office macro settings
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
australian signals directorate
Typical: 1-2 (13)
australian signals directorate
Importance:
2
/10
Typical uses:
1-2
Current uses:
13
Examples
cybersecurity posture
Typical: 1-2 (1)
cybersecurity posture
cyber security posture
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
functionality
Typical: 2-4 (5)
functionality
function, functions, functionalities
Importance:
2
/10
Typical uses:
2-4
Current uses:
5
Examples
remote access
Typical: 1-3 (6)
remote access
Importance:
2
/10
Typical uses:
1-3
Current uses:
6
Examples
privileged access
Typical: 3-7 (6)
privileged access
Importance:
2
/10
Typical uses:
3-7
Current uses:
6
Examples
government agencies
Typical: 1-2
government agencies
government agency
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
sensitive data
Typical: 1-2 (1)
sensitive data
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
providers
Typical: 1-3 (2)
providers
provider
Importance:
2
/10
Typical uses:
1-3
Current uses:
2
Examples
vectors
Typical: 1-3 (1)
vectors
vector
Importance:
2
/10
Typical uses:
1-3
Current uses:
1
Examples
strategies to mitigate cyber security incidents
Typical: 1-2
strategies to mitigate cyber security incidents
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
daily backups
Typical: 1-2 (3)
daily backups
daily backup
Importance:
2
/10
Typical uses:
1-2
Current uses:
3
Examples
threat landscape
Typical: 1-2 (2)
threat landscape
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
templates
Typical: 1-3
templates
template
Importance:
2
/10
Typical uses:
1-3
Current uses:
–
Examples
patch management
Typical: 1-2 (1)
patch management
patch manager
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
incident response
Typical: 1-2 (2)
incident response
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
web browsers
Typical: 1-3 (5)
web browsers
web browser
Importance:
2
/10
Typical uses:
1-3
Current uses:
5
Examples