The Essential Eight cyber strategies for an 85% better sleep

October 26, 2022

For Cyber Security Awareness Month, we talk to Kinetic IT’s Customer Development Manager, Mark Pacitti, about the  Essential Eight Assessment, how it protects you against cyber threats – and helps you sleep better at night.

Did you know that  more than 50%  of all businesses are not fully prepared for a cyber-attack and 95% of cyber security breaches are  caused by human error? With  over 50%  of all cyber-attacks targeting small and medium-sized businesses, there is a (reported) cyber-attack  every eight minutes  in Australia. 

These are just a few of the many keep-you-awake cyber statistics we now read about regularly in the media. To address this threat, there are numerous cyber services and solutions for many different aspects of cyber risk – but where do you begin in tackling this fast-growing concern? 

A solid starting point is the Essential Eight Assessment. Before we dive into it, let’s look at where the Essential Eight comes from, what it’s all about, and how it can help you sleep better at night. 

What is the Essential Eight?

Back in 2010 – a whole generation ago in cyber security time – the Australian Signals Directorate issued a set of 35 “Strategies to Mitigate Cyber Security Incidents”. Each of the 35 strategies has a Relative Security Effectiveness Rating (RSER) ranging from essential to excellent, very good, good, and limited. 

Put simply, the “essential” in Essential Eight refers to the eight mitigation strategies which have an RSER of essential. 

When these Essential Eight security strategies are implemented effectively, it is much harder for adversaries to breach your network. While no set of mitigation strategies can provide guaranteed protection against all cyber threats, organisations are recommended to implement and regularly revalidate the Essential Eight as a baseline

It is estimated that effective implementation of the Essential Eight can mitigate (but not eliminate) up to 85% of targeted cyber-attacks against Microsoft Windows-based networks. And that certainly helps us sleep better at night! 

The Essential Eight Mitigation Strategies
Table 1: The Essential Eight Mitigation Strategies
Application Control
User Application Hardening
Patch Applications
Restrict Administrative Privileges
Patch Operation Systems
Multi-Factor Authentication
Configure Microsoft Macros
Perform Regular Backups

Mitigation Strategy Controls

Each Mitigation Strategy has several security controls or requirements, which are used to determine its maturity level. As an example, below is a list of all the security controls for MFA (multi-factor authentication).

RELATED CONTENT: What is the most secure multi-factor authentication method?

Maturity Level
Mitigation Strategy Controls for MFA
Table 2: Security Controls for MFA
1
MFA is used by an organisation’s users if they authenticate to their organisation’s internet-facing services.
1
MFA is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store, or communicate their organisation’s sensitive data.
1
MFA (where available) is used by an organisation’s users if they authenticate to third-party internet-facing services that process, store, or communicate their organisation’s non-sensitive data.
1
MFA is enabled by default for non-organisational users (but users can choose to opt out) if they authenticate to an organisation’s internet-facing services.
2
MFA is used to authenticate privileged users of systems.
2
MFA uses either: something users have and something users know, or something users have that is unlocked by something users know or are.
2
Successful and unsuccessful multi-factor authentications are logged.
3
Successful and unsuccessful multi-factor authentications are centrally logged and protected from unauthorised modification and deletion, monitored for signs of compromise, and actioned when cyber security events are detected.

To be assessed as meeting the requirements of a maturity level, your organisation needs to have implemented  all the controls  for each mitigation strategy, up to and including, that maturity level.

Outside the Eight

For context, below is a snapshot of  some  of the 27 mitigation strategies with an RSER below that of essential. This is not to say that the other 27 mitigation strategies are not important. It is purely intended to highlight what the Essential Eight are not, as well as what can subsequently be tackled to mitigate the remaining 15% of risk from targeted attacks.

Migration Strategy
RSER
Table 3: Mitigation Strategies
Network segmentation
Excellent
Web content filtering
Excellent
Email content filtering
Excellent
Endpoint detection and response software on all computers
Very good
Anti-virus software with up-to-date signatures
Limited
IDS/IPS
Limited
Elevating Risk Awareness and Ownership

Unlike a Penetration Test, an Essential Eight Assessment does not physically or logically touch your network or systems in any way. Rather, the assessment is carried out via a series of interviews with key stakeholders. The Essential Eight Assessment will then rate your organisation’s effectiveness in implementing each of the eight mitigation strategies against its controls.

This can be summarised and reported as seen in the table below. An entire assessment and report production can take as little as a few days to complete, so it is a low-cost, high-value insightful asset.

Migration Strategy
Current Maturity
Level 1 Controls Implemented
Level 2 Controls Implemented
Partial Controls Implemented
Table 4: Essential Eight Assessment Report
Application Control
0
0/1
1/2
3
Patch Applications
0
4/5
4/7
3
Patch Operation Systems
2
4/4
6/6
1
Configure Microsft Macros
0
3/4
7/11
1
User Application Hardening
0
3/5
7/12
0
Restrict Admin Privileges
0
1/5
1/5
0
Multi-Factor Authentication
0
1/4
5/7
0
Perform Regular Backups
0
1/4
3/4
1

For each of the eight mitigation strategies, the Essential Eight Assessment Report will also describe the risks associated with the individual controls that are not implemented to the required maturity level. Quotes can then be obtained, and costs calculated to mitigate against the identified risks.

While the language of an Essential Eight Assessment will be technical and low-level in nature, it can be used to underpin and validate an Executive or Board Level Security Risk Report. As a starting point, this ensures it is made very clear to Executive Management and Board Members what the organizational security gaps are against an industry-recognized standard, along with ownership of the risks associated with choosing not to commit funds to address the gaps.

For more information on how Kinetic IT’s security solution PROTECT+  can help you get 85% of the way towards a better night’s sleep through an Essential Eight Assessment, please contact  protect@kineticit.com.au

About Mark Pacitti

Mark Pacitti

Mark Pacitti is an Account Manager within Kinetic IT’s cybersecurity practice, PROTECT+. Mark has more than 25 years experience in the ICT industry, including a focus on cybersecurity in recent years. Throughout his career he has taken pride in first and foremost building customer relationships based on value and trust.

Recent Posts

Become a
PROTECT+ Partner

Call Now

Click or Tap

Email Now

Click or Tap

    Speak with a
    PROTECT+ Expert

    Call Now

    Click or Tap

    Email Now

    Click or Tap