Latest publications 28 Oct 2024 Essential Eight Maturity Model FAQ This publication provides answers to frequency asked questions on how to implement the Essential Eight. 25 Oct 2024 Safe software deployment: how software manufacturers can ensure reliability for customers It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements. 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 18 Jan 2024 Cloud Computing Security for Cloud Service Providers This publication is designed to assist Cloud Service Providers (CSPs) in offering secure cloud services. It can also assist assessors in validating the security posture of a cloud service, which is often verified through an Infosec Registered Assessors Program (IRAP) assessment of the CSP services. 18 Jan 2024 Cloud Assessment and Authorisation This publication is co-designed with industry to support the secure adoption of cloud services across government and industry. 17 Jan 2024 Practical Cyber Security Tips for Business Leaders Business leaders can be appealing targets for malicious actors due to the sensitive information they can access, the important people they interact with and the influence they hold. This publication includes a checklist of practical tips business leaders can implement to improve their cyber security. The checklist is followed by a brief explanation of each tip and why it is recommended. 14 Dec 2023 Planning for Critical Vulnerabilities – What Boards Need to Know This publication provides information on why it is important that Boards and their Directors are aware of and plan for critical vulnerabilities that have the potential to cause major cyber security incidents. 07 Dec 2023 The Case for Memory Safe Roadmaps This guidance provides manufacturers with steps to create memory safe roadmaps and implement changes to eliminate memory safety vulnerabilities from their products. 27 Nov 2023 Restricting Microsoft Office Macros This publication has been developed to discuss approaches that can be applied by organisations to secure systems against malicious Microsoft Office macros while balancing both their business and security requirements. Pagination Previous page ‹‹ Page 5 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats