Essential Eight Assessment

A focused assessment covering the Australian Signals Directorate's Essential Eight mitigation strategies for cyber security incidents.
Essential Eight Assessment
A focused assessment covering the Australian Signals Directorate's Essential Eight mitigation strategies for cyber security incidents.
Progress: 0 of 8 questions answered
0%
1
Patch Management
How do you manage security patches for operating systems and applications?
Why this matters:
Apply security patches promptly to close vulnerabilities before they can be exploited by attackers.
2
Multi-Factor Authentication
Do you use multi-factor authentication (MFA) to protect accounts?
Why this matters:
Require MFA to significantly reduce the risk of account compromise from stolen credentials.
3
Restrict Administrative Privileges
How do you manage privileged (administrative) accounts?
Why this matters:
Limit administrative privileges to reduce the impact of credential compromise.
4
Application Whitelisting
Do you control what software can be installed on systems?
Why this matters:
Prevent unauthorized software installation to reduce malware infection risk.
5
Daily Backups
Do you have data backup and recovery procedures?
Why this matters:
Maintain secure backups to enable recovery from ransomware and other data loss incidents.
6
Restrict Web Browsers
How do you secure web browser usage?
Why this matters:
Restrict browser functionality to prevent malicious code execution from web content.
7
Email Attachments and Links
How do you protect against malicious email attachments and links?
Why this matters:
Block malicious email content to prevent malware infection and phishing attacks.
8
User Application Hardening
How do you harden user applications against security risks?
Why this matters:
Configure applications to mitigate common security vulnerabilities and attack vectors.
Please answer all 8 remaining questions.