The Australian Signals Directorate Essential 8

Implementing a foundational cybersecurity framework to protect Australian organisations from modern Cyber Threats

OVERVIEW

What is the ASD Essential 8?

The Essential 8 is a prioritised list of mitigation strategies released by the Australian Signals Directorate to assist organisations in protecting their systems against a range of adversaries

Don't compromise your business reputation or your company's secrets!

Cog shape

SOLUTIONS

What are the 8 Key Pillars?

Application Control

Prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers

Microsoft Office Macros

Block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.

Application Patching

e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers. Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.

User Application Hardening

Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers

Administrative Privileges

Operating systems and applications based permissions on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.

Operating System Patching

Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don't use unsupported versions.

Multifactor Authentication

Including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository

Daily Backups

Important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes

SOLUTIONS

The Essential 8 Solution

Invotec can leverage the latest technology and services to Audit, Report, Recommend or implement an ASD Essential 8 compliance strategy for your organisation. Our QUANTEX™ Secure platform is Essential 8 Compliant and will enhance your organisational security posture.

Invotec Solutions IconInvotec Solutions

Unit 9/148 Chesterville Road, Cheltenham

5.0 6 reviews

  • Avatar Daniel McNairn ★★★★★ 8 months ago
    Invotec Solutions is a great company. Working in the education field they have been great support when we have had technical issues that have needed high level solutions. I know they have worked throughout the Catholic Education system … More and have always delivered a high level of service and support. Very easy to deal with and friendly support.
  • Avatar Marcia Reynolds ★★★★★ 7 months ago
    Invotec were fantastic! Being a small business owner and IT illiterate, Invotec helped me to get up and operating without an issue.
    I now feel secure knowing that they are there to back me up.
  • Avatar Aaron Hawke ★★★★★ a year ago
    I had the pleasure of working with the Invotec Solutions Team for our Cyber Security requirements. They really know their stuff and my expectations were well exceeded. Thanks Guys, You made it easy!
  • Avatar Jan Chapman ★★★★★ a year ago
    Invotec really know their stuff, a great company that want to provide the best service possible. I highly recommend them.
  • Avatar Korin Roehm ★★★★★ 2 years ago
    Invotec has been a great partner to our company. They're very quick and responsive. If you talk to anyone there you know that they're very knowledgeable in the work that they do.

Get a Quote