Guest mode
Help
Getting Started
Support Center
Contact Support
Sign in
Reports
Essential Eight Compliance Guide
EN
Editor
Term map
Competitors
Integrations
Created
Jul 6, 2023
by Edward Kost
Last edited
Jul 7, 2023
Term used
Importance
Unused
Heading
acsc
the essential eight
mitigation strategies
the australian cyber security centre
cyber security incidents
essential 8
multi-factor authentication
backups
maturity level
baseline
vulnerabilities
cyber threats
application control
ransomware
endpoint
acsc essential
administrative privileges
security controls
patch applications
apps
patch operating systems
australia
essential eight maturity model
cyberattacks
automate
asd
user application hardening
australian government
remediation
mfa
malware
access management
webinar
privileged accounts
cyber risk
whitelisting
regular backups
use cases
microsoft office macro settings
australian signals directorate
cybersecurity posture
functionality
remote access
privileged access
government agencies
sensitive data
providers
vectors
strategies to mitigate cyber security incidents
daily backups
threat landscape
templates
patch management
incident response
web browsers
Your working draft
learn.microsoft.com/en-us/compliance/essential-eight/e8-overview
#1 desktop
www.upguard.com/blog/essential-eight
#2 desktop
www.qualys.com/forms/whitepapers/essential-eight-cyber-security-guidelines/
#3 desktop
huntsmansecurity.com/resource/compliance-guides/essential-8-compliance-guide/
#4 desktop
info.zscaler.com/resources-ebooks-essential-8-compliance-through-zero-trust
#5 desktop
www.microsoft.com/en-au/business/topic/security/essential-eight/
#6 desktop
www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-compliance-guide-asd-essential-8.pdf
#6 mobile
www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight
#7 mobile
www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-assessment-process-guide
#8 mobile
www.beyondtrust.com/solutions/compliance/essential-8
#9 desktop
www.ivanti.com/en-au/lp/security/guide-to-acsc-essential-8-compliance
#9 mobile
www.puppet.com/resources/acsc-essential-8
#11 desktop
blog.6clicks.com/asd-essential-eight-cybersecurity-guide
#12 desktop
blog.6clicks.com/asd-essential-eight-cybersecurity-guide?hs_amp=true
#12 mobile
www.threatintelligence.com/blog/essential-8
#13 desktop
www.manageengine.com/essential-eight/
#13 mobile
www.cyberark.com/resources/meet-audit-and-compliance/addressing-the-australian-signals-directorate-asd-essential-eight
#14 desktop
www.manageengine.com/products/self-service-password/essential-eight.html
#14 mobile
www.data3.com/solutions/security/acsc-essential-eight/
#15 desktop
www.linkedin.com/posts/therealandrewlawrence_essential-eight-assessment-process-guide-activity-7004582636677459968-_wAB
#15 mobile
eosit.com.au/guides/what-is-essential-eight/
#17 mobile
www.atlassian.com/trust/compliance/resources/essential8
#18 desktop
docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-acsc_essential_8.html
#18 mobile
delinea.com/resources/acsc-essential-eight-whitepaper
#19 mobile
duo.com/resources/ebooks/duo-for-essential-8
#20 mobile
media.zones.com/images/pdf/jamf-mitigate-cyber-security-incidents-whitepaper.pdf
#22 mobile
scytale.ai/resources/essential-8-maturity-model-achieving-cyber-security-excellence/
#24 desktop
www.avepoint.com/blog/avepoint-blog/asd-essential-8-explained
#25 desktop
tesserent.com/solutions/essential-8-services
#26 desktop
www.tenable.com/whitepapers/the-asd-essential-eight
#27 desktop
www.compliancemanagergrc.com/blog/essential-8-maturity-model/
#28 desktop
land.fortmesa.com/australia-acsc-essential-8
#29 desktop
power-net.com.au/managed-it-services/it-security/essential-8/
#30 desktop
acsc
H
Typical: 2-4 (2)
the essential eight
H
Typical: 3-9 (21)
mitigation strategies
Typical: 1-3 (3)
the australian cyber security centre
Typical: 1-2 (1)
cyber security incidents
Typical: 1-3 (1)
essential 8
H
Typical: 3-7 (2)
multi-factor authentication
Typical: 1-3 (5)
backups
H
Typical: 2-4 (12)
maturity level
H
Typical: 4-10 (7)
baseline
Typical: 1-3 (3)
vulnerabilities
Typical: 1-3 (36)
cyber threats
Typical: 1-3 (5)
application control
Typical: 1-3 (5)
ransomware
Typical: 1-2 (1)
endpoint
Typical: 2-4 (2)
acsc essential
H
Typical: 1-3 (1)
administrative privileges
Typical: 1-3 (4)
security controls
Typical: 2-4 (7)
patch applications
Typical: 1-2 (6)
apps
Typical: 1-3 (1)
patch operating systems
Typical: 1-2 (1)
australia
Typical: 1-2 (1)
essential eight maturity model
Typical: 1-2
cyberattacks
Typical: 1-3 (8)
automate
Typical: 1-3 (1)
asd
Typical: 2-4 (8)
user application hardening
Typical: 1-2 (1)
australian government
Typical: 1-2 (1)
remediation
Typical: 1-2 (2)
mfa
Typical: 1-3 (10)
malware
Typical: 1-3 (3)
access management
Typical: 2-4 (3)
webinar
Typical: 1-3
privileged accounts
Typical: 2-4 (5)
cyber risk
Typical: 1-2 (1)
whitelisting
Typical: 1-3 (43)
regular backups
Typical: 1-2 (1)
use cases
Typical: 1-2 (2)
microsoft office macro settings
Typical: 1-2
australian signals directorate
Typical: 1-2 (13)
cybersecurity posture
Typical: 1-2 (1)
functionality
Typical: 2-4 (5)
remote access
Typical: 1-3 (6)
privileged access
Typical: 3-7 (6)
government agencies
Typical: 1-2
sensitive data
Typical: 1-2 (1)
providers
Typical: 1-3 (2)
vectors
Typical: 1-3 (1)
strategies to mitigate cyber security incidents
Typical: 1-2
daily backups
Typical: 1-2 (3)
threat landscape
Typical: 1-2 (2)
templates
Typical: 1-3
patch management
Typical: 1-2 (1)
incident response
Typical: 1-2 (2)
web browsers
Typical: 1-3 (5)
acsc
Importance:
9
/10
Heading presence:
Moderate
Typical uses:
2-4
Current uses:
2
Examples
the essential eight
Importance:
8
/10
Heading presence:
Moderate
Typical uses:
3-9
Current uses:
21
Examples
mitigation strategies
mitigation strategy
Importance:
8
/10
Typical uses:
1-3
Current uses:
3
Examples
the australian cyber security centre
Importance:
7
/10
Typical uses:
1-2
Current uses:
1
Examples
cyber security incidents
cyber security incident, cybersecurity incidents, cybersecurity incident
Importance:
7
/10
Typical uses:
1-3
Current uses:
1
Examples
essential 8
essential-8, essential8
Importance:
6
/10
Heading presence:
High
Typical uses:
3-7
Current uses:
2
Examples
multi-factor authentication
multifactor authentication, multi-factor_authentication
Importance:
6
/10
Typical uses:
1-3
Current uses:
5
Examples
backups
backup
Importance:
6
/10
Heading presence:
Low
Typical uses:
2-4
Current uses:
12
Examples
maturity level
maturity levels
Importance:
6
/10
Heading presence:
Low
Typical uses:
4-10
Current uses:
7
Examples
baseline
baselines
Importance:
6
/10
Typical uses:
1-3
Current uses:
3
Examples
vulnerabilities
vulnerability
Importance:
6
/10
Typical uses:
1-3
Current uses:
36
Examples
cyber threats
cyber threat, cyberthreats, cyber-threats
Importance:
5
/10
Typical uses:
1-3
Current uses:
5
Examples
application control
application controls, application_control
Importance:
5
/10
Typical uses:
1-3
Current uses:
5
Examples
ransomware
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
endpoint
endpoints, end points, end point
Importance:
4
/10
Typical uses:
2-4
Current uses:
2
Examples
acsc essential
acsc’s essential, acsc's essential
Importance:
4
/10
Heading presence:
Moderate
Typical uses:
1-3
Current uses:
1
Examples
administrative privileges
administrative privilege, administrative_privileges, administrator privileges
Importance:
4
/10
Typical uses:
1-3
Current uses:
4
Examples
security controls
security control
Importance:
4
/10
Typical uses:
2-4
Current uses:
7
Examples
patch applications
patch application, patching applications, patch_applications
Importance:
4
/10
Typical uses:
1-2
Current uses:
6
Examples
apps
app
Importance:
4
/10
Typical uses:
1-3
Current uses:
1
Examples
patch operating systems
patch operating system, patch_operating_systems
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
australia
Importance:
4
/10
Typical uses:
1-2
Current uses:
1
Examples
essential eight maturity model
essential-eight-maturity-model
Importance:
4
/10
Typical uses:
1-2
Current uses:
–
Examples
cyberattacks
cyber attacks, cyber attack, cyberattack
Importance:
4
/10
Typical uses:
1-3
Current uses:
8
Examples
automate
automation, automates
Importance:
4
/10
Typical uses:
1-3
Current uses:
1
Examples
asd
Importance:
3
/10
Typical uses:
2-4
Current uses:
8
Examples
user application hardening
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
australian government
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
remediation
Importance:
3
/10
Typical uses:
1-2
Current uses:
2
Examples
mfa
Importance:
3
/10
Typical uses:
1-3
Current uses:
10
Examples
malware
Importance:
3
/10
Typical uses:
1-3
Current uses:
3
Examples
access management
Importance:
3
/10
Typical uses:
2-4
Current uses:
3
Examples
webinar
webinars
Importance:
3
/10
Typical uses:
1-3
Current uses:
–
Examples
privileged accounts
privileged account
Importance:
3
/10
Typical uses:
2-4
Current uses:
5
Examples
cyber risk
cyber risks, cyber-risk
Importance:
3
/10
Typical uses:
1-2
Current uses:
1
Examples
whitelisting
whitelist
Importance:
3
/10
Typical uses:
1-3
Current uses:
43
Examples
regular backups
regular_backups
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
use cases
use case, use-cases
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
microsoft office macro settings
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
australian signals directorate
Importance:
2
/10
Typical uses:
1-2
Current uses:
13
Examples
cybersecurity posture
cyber security posture
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
functionality
function, functions, functionalities
Importance:
2
/10
Typical uses:
2-4
Current uses:
5
Examples
remote access
Importance:
2
/10
Typical uses:
1-3
Current uses:
6
Examples
privileged access
Importance:
2
/10
Typical uses:
3-7
Current uses:
6
Examples
government agencies
government agency
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
sensitive data
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
providers
provider
Importance:
2
/10
Typical uses:
1-3
Current uses:
2
Examples
vectors
vector
Importance:
2
/10
Typical uses:
1-3
Current uses:
1
Examples
strategies to mitigate cyber security incidents
Importance:
2
/10
Typical uses:
1-2
Current uses:
–
Examples
daily backups
daily backup
Importance:
2
/10
Typical uses:
1-2
Current uses:
3
Examples
threat landscape
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
templates
template
Importance:
2
/10
Typical uses:
1-3
Current uses:
–
Examples
patch management
patch manager
Importance:
2
/10
Typical uses:
1-2
Current uses:
1
Examples
incident response
Importance:
2
/10
Typical uses:
1-2
Current uses:
2
Examples
web browsers
web browser
Importance:
2
/10
Typical uses:
1-3
Current uses:
5
Examples