- Managed Services
- Security Engineering
- About Us
- News & Blog
Formerly the ASD Essential Eight, the newly reviewed ACSC Essential Eight is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations by the Australian Government. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.
Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the PSPF and ACSC’s Strategies to Mitigate Cyber Security Incidents, aligned with the Essential Eight Maturity Model.
This service begins with an analysis and assessment of your environment against the ACSC Essential Eight Framework. As part of our discovery, we will host interviews and workshops as required, conduct onsite inspections, and review documented policies and processes to form an understanding of your security risk profile and posture
Once the initial review has been completed and technical assessments have commenced, we will assess the overall security maturity by evaluating the security policies and controls against the ACSC Strategies to Mitigate Cyber Security Incidents, which will align with the Essential Eight Maturity Model
The outcome of the assessment is a report documenting the current state of each of the categories, identifying and assessing any threats and risks, and providing prioritised recommendations.
These recommendations can either be implemented by your internal IT team, or the security engineers at Security Centric can provide that service too.
Ongoing cyber-supply chain, ransomware, and new software vulnerabilities are all part of the current cyber threat landscape. Many organisations are now insisting that their suppliers, vendors, and partners can demonstrate their cybersecurity maturity, and aligning with the ACSC Essential Eight is an important step towards lowering your organisational risk as it relates to cybersecurity. Benefits include:
Unsure of what you should be looking for from your penetration test? We've compiled a checklist outlining the top five "must-haves" from your security provider.