While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.
Essential Eight Explained
This publication provides an overview of the Essential Eight.
Essential Eight Assessment Process Guide
This publication provides advice on how to assess the implementation of the Essential Eight.
Essential Eight Maturity Model
This publication provides advice on how to implement the Essential Eight.
Essential Eight Maturity Model Changes
This publication provides an overview of the changes for the November 2023 release.
Essential Eight Maturity Model FAQ
This publication provides answers to frequency asked questions on how to implement the Essential Eight.
Essential Eight Maturity Model and ISM Mapping
This publication provides a mapping between the Essential Eight and the controls within the Information Security Manual (ISM).