Latest publications 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. 02 Oct 2024 Essential Eight Assessment Process Guide This publication provides advice on how to assess the implementation of the Essential Eight. 02 Oct 2024 Essential Eight Maturity Model and ISM Mapping This publication provides a mapping between the Essential Eight and the controls within the Information Security Manual (ISM). All publications Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 61218243036424854606672788490200 03 Oct 2024 Mitigation strategies for edge devices: executive guidance This publication provides a high-level summary of ASD’s existing guidance to manage and secure edge devices effectively. It is intended for executives in large organisations and critical infrastructure providers that are responsible for the deployment, operation, security, and maintenance of enterprise networks. ASD is soon to release a comprehensive technical publication on mitigation strategies for edge devices for practitioners. 02 Oct 2024 Essential Eight Maturity Model FAQ This publication provides answers to frequency asked questions on how to implement the Essential Eight. 02 Oct 2024 Essential Eight Maturity Model and ISM Mapping This publication provides a mapping between the Essential Eight and the controls within the Information Security Manual (ISM). 02 Oct 2024 Principles of operational technology cyber security Critical infrastructure organisations provide vital services, including supplying clean water, energy, and transportation, to the public. These organisations rely on operational technology (OT) to control and manage the physical equipment and processes that provide these critical services. As such, the continuity of vital services relies on critical infrastructure organisations ensuring the cybersecurity and safety of their OT. 02 Oct 2024 Essential Eight Assessment Process Guide This publication provides advice on how to assess the implementation of the Essential Eight. 26 Sep 2024 Detecting and mitigating Active Directory compromises This publication provides an overview of techniques used to compromise Active Directory, and recommended strategies to mitigate these techniques. By implementing the recommendations in this publication, organisations can significantly improve their Active Directory security, and therefore their overall network security posture. Pagination Page 1 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats