Jul 4, 2019 - This document provides a mapping between Maturity Level 3 of the Essential Eight Maturity Model and the security controls within the Australian Government Information Security Manual (ISM). This mapping represents the minimum security controls organisations must implement to meet the intent of the Essential Eight.
Jul 2, 2019 - Cyber criminal activity is constantly evolving so the advice of the Australian Cyber Security Centre (ACSC) constantly evolves, too. As the lead agency on cyber security, the ACSC assists organisations by adopting a risk management approach and providing expert advice that best meets their specific needs. It’s never one-size-fits-all. Our expert advice helps government protect their networks, staff and customers.
Jul 2, 2019 - The Essential Eight Maturity Model provides advice on how to implement the Essential Eight in a phased approach. It also assists organisations in self-assessing the maturity of their implementation.
Jun 25, 2019 - This guidance advises practitioners and executives of government, critical infrastructure, and large organisations the key concepts of cyber supply chain risk management. It is delivered as two complimentary products, a guide for practitioners, and an executive companion.
Jun 12, 2019 - This publication provides guidance on strategies that individuals can take to secure the use of electronic devices when travelling overseas.
Apr 30, 2019 - Java applications are widely deployed by organisations. As such, exploiting security vulnerabilities in the Java platform is particularly attractive to adversaries seeking unauthorised access to organisations’ networks.
Apr 30, 2019 - This publication provides guidance on the configuration of Windows Event Logging and Forwarding functionality to support the detection and remediation of cyber security incidents.
Apr 30, 2019 - This publication discusses high-level topics that executives should know about cyber security within their organisations.
Apr 30, 2019 - This publication provides guidance on how to securely configure the use of Virtual Private Networks between geographically-separated office buildings (site-to-site VPNs) and in support of remote workers (remote access VPNs).
Apr 30, 2019 - This publication provides guidance on how to secure the use of remote desktop clients for individuals working remotely or from home.