ACSC Essential Eight Assessment

ACSC Essential Eight 

Assess Your Organisation Against the Australian Government's Recommended Framework

Formerly the ASD Essential Eight, the newly reviewed ACSC Essential Eight is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations by the Australian Government.  Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.

Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the PSPF and ACSC’s Strategies to Mitigate Cyber Security Incidents, aligned with the Essential Eight Maturity Model.

ACSC Essential Eight Mitigation Strategies

Assess Your Environment

This service begins with an analysis and assessment of your environment against the ACSC Essential Eight Framework. As part of our discovery, we will host interviews and workshops as required, conduct onsite inspections, and review documented policies and processes to form an understanding of your security risk profile and posture

Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the ACSC Strategies to Mitigate Cyber Security Incidents, which will align with the Essential Eight Maturity Model

Mitigate Cyber Threats

The outcome of the assessment is a report documenting the current state of each of the categories, identifying and assessing any threats and risks, and providing prioritised recommendations.

The assessment report will typically include the following items: High-level network diagram(s), Critical systems, applications, servers, and data held, a summary of existing controls, identified threats, risks, and opportunities for maturity improvement, security architecture recommendations, findings and recommendations, a cybersecurity roadmap (12-to-18-month view)

These recommendations can either be implemented by your internal IT team, or the security engineers at Security Centric can provide that service too.

Want More Information?


 

Don't Get Caught Out:

Unsure of what you should be looking for from your penetration test? We've compiled a checklist outlining the top five "must-haves" from your security provider.