Latest publications 28 Oct 2024 Essential Eight Maturity Model FAQ This publication provides answers to frequency asked questions on how to implement the Essential Eight. 25 Oct 2024 Safe software deployment: how software manufacturers can ensure reliability for customers It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements. 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 26 Sep 2024 Detecting and mitigating Active Directory compromises This publication provides an overview of techniques used to compromise Active Directory, and recommended strategies to mitigate these techniques. By implementing the recommendations in this publication, organisations can significantly improve their Active Directory security, and therefore their overall network security posture. 22 Aug 2024 Best practices for event logging and threat detection This publication defines a baseline for event logging best practices to mitigate cyber threats. 16 Jul 2024 Hardening Microsoft Windows 10 and Windows 11 Workstations Workstations are often targeted by malicious actors using malicious websites, emails or removable media in an attempt to extract sensitive information. Hardening workstations is an important part of reducing this risk. This publication provides recommendations on hardening workstations using Enterprise and Education editions of Microsoft Windows 10 and Windows 11. 27 Jun 2024 Exploring memory safety in critical open source projects This publication follows the December 2023 release of The Case for Memory Safe Roadmaps, which recommended software manufacturers create memory safe roadmaps, including plans to address memory safety in external dependencies, which commonly include open source software (OSS). Today’s publication provides a starting point for these roadmaps by investigating the scale of memory safety risk in selected OSS. 12 Jun 2024 Managing the Risks of Legacy IT: Practitioner Guidance This publication provides guidance for practitioners on managing the risks posed by legacy IT and outlines low-cost mitigations that organisations can draw upon. 12 Jun 2024 Managing the Risks of Legacy IT: Executive Guidance This publication provides high-level and strategic guidance for an organisation’s executive seeking to manage the risks of legacy IT. Pagination Previous page ‹‹ Page 2 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats