Essential Eight Explained

“There are an overwhelming number of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. The ACSC has compiled a list of mitigation strategies that organisations can use as starting points to improve their cyber resilience and establish a secure baseline. ACSC has identified eight essential mitigation strategies which should be implemented as a baseline where practicable.”

 

Australian Cyber Security Centre – “Essential Eight Explained
Australian Signals Directorate: Australian Cyber Security Centre
First published 2017; Latest version July 2019

Introduction

The Strategies to Mitigate Cyber Security Incidents is a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each organisation’s risk profile and the adversaries they are most concerned about.

The Essential Eight

While no single mitigation strategy is guaranteed to prevent cyber security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems. Furthermore, implementing the Essential Eight pro-actively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber security incident.

Before implementing any of the mitigation strategies, organisations should perform the following activities:

  • identify which systems require protection (i.e. which systems store, process or communicate sensitive information or other information with a high availability requirement)
  • identify which adversaries are most likely to target their systems (e.g. nation-states, cyber criminals or malicious insiders)
  • identify what level of protection is required (i.e. selecting mitigation strategies to implement based on the risks to business activities from specific adversaries).

There is a suggested implementation order for each adversary to assist organisations in building a strong cyber security posture for their systems. Once organisations have implemented their desired mitigation strategies to an initial level, they should focus on increasing the maturity of their implementation such that they eventually reach full alignment with the intent of each mitigation strategy.

Mitigation strategies to prevent malware delivery and execution

1) Application whitelisting of approved/trusted programs to prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers.

Why: All non-approved applications (including malicious code) are prevented from executing.

2) Patch applications e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers. Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.

Why: Security vulnerabilities in applications can be used to execute malicious code on systems.

3) Configure Microsoft Office macro settings to block macros from the Internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.

Why: Microsoft Office macros can be used to deliver and execute malicious code on systems.

4) User application hardening. Configure web browsers to block Flash (ideally uninstall it), ads and Java on the Internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.

Why: Flash, ads and Java are popular ways to deliver and execute malicious code on systems.

Mitigation strategies to limit the extent of cyber security incidents

5) Restrict administrative privileges to operating systems and applications based on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.

Why: Admin accounts are the ‘keys to the kingdom’. Adversaries use these accounts to gain full access to information and systems.

6) Patch operating systems. Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don’t use unsupported versions.

Why: Security vulnerabilities in operating systems can be used to further the compromise of systems.

7) Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository.

Why: Stronger user authentication makes it harder for adversaries to access sensitive information and systems.

Mitigation strategies to recover data and system availability

8) Daily backups of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.

Why: To ensure information can be accessed again following a cyber security incident (e.g. a ransomware incident).

Further information

The Australian Government Information Security Manual (ISM) assists in the protection of information that is processed, stored or communicated by organisations’ systems.

The Strategies to Mitigate Cyber Security Incidents complement the advice in the ISM.

The Essential Eight Maturity Model complements the advice in the Strategies to Mitigate Cyber Security Incidents.

Contact details

Organisations or individuals with questions regarding this advice can contact the ACSC by emailing [email protected] or calling 1300 CYBER1 (1300 292 371).