Latest publications 28 Oct 2024 Essential Eight Maturity Model FAQ This publication provides answers to frequency asked questions on how to implement the Essential Eight. 25 Oct 2024 Safe software deployment: how software manufacturers can ensure reliability for customers It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements. 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 20 Apr 2023 Cybersecurity Best Practices for Smart Cities This guidance is the result of a collaborative effort from the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ). 28 Mar 2023 Remote Access to Operational Technology Environments Many critical infrastructure providers are moving to support remote working arrangements. In doing so, modifying cyber security defences for Operational Technology Environments (OTE) is not a decision that should be taken lightly. 27 Mar 2023 Preparing for and responding to denial-of-service attacks Although organisations cannot avoid being targeted by denial-of-service attacks, there are a number of measures that organisations can implement to prepare for and potentially reduce the impact if targeted. Preparing for denial-of-service attacks before they occur is by far the best strategy, it is very difficult to respond once they begin and efforts at this stage are unlikely to be effective. 01 Mar 2023 Small Business Cloud Security Guides: Technical Example - Patch Applications Patching applications is one of the most effective controls an organisation can implement to prevent cyber criminals from gaining access to their devices and sensitive information. Patches improve the security of applications by fixing known vulnerabilities. 16 Dec 2022 Small Business Cloud Security Guides: Executive Overview In recognition of the increasing prevalence of cloud computing, the Australian Cyber Security Centre (ACSC) has published the Small Business Cloud Security Guides. These guides are designed to provide protection against cyber incidents while remaining accessible to organisations which may not have the resources and expertise to implement a more sophisticated strategy. 16 Dec 2022 Small Business Cloud Security Guides: Introduction Securing your business can be a complex task. Among the numerous security priorities and configuration options, it can be difficult to know where to begin. These guides adapt ASD's ACSC’s Essential Eight mitigation strategies and outline an example of how each can be implemented to secure Microsoft 365 capabilities. The technical examples are designed to offer significant protection against cyber incidents while remaining accessible to organisations with limited resources and cyber security expertise. Pagination Previous page ‹‹ Page 9 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats