Essential Eight
This page provides a template and guidance to assist organisations in documenting the Essential Eight Maturity levels associated with implementation of system(s) built on ASD's Blueprint for Secure Cloud.
Estimated reading time: 2 minutes
Instruction
The Essential Eight sections of a System Security Plan (SSP) should document the Essential Eight Maturity levels associated with implementation of a system. As with other sections of the SSP, information in this section should be documented according to the relevant controls outlined in ASD’s ISM and the SSP Annex.
All template text refers to a typical implementation of a system built using the Blueprint, and includes reference to organisational policies, processes and technical configurations to be implemented in addition to the technical controls that may be configured using guidance from the Blueprint. Any implementation implied by the below text should not be considered as prescriptive of how the organisation must scope, build, document, or assess its system.
When completing the below template, organisations should insert and update information where relevant to ensure it accurately represents the Essential Eight Maturity levels associated with implementation of their system. When complete, remove any instructional boxes throughout.
Blueprint guidance
As with implementation of ISM controls, the Blueprint does not itself achieve any particular Essential Eight Maturity levels, but rather assists organisations in designing and building systems to achieve their desired maturity level based on their own operating context.
<SYSTEM-NAME>
targets the following maturity levels against each Essential Eight Mitigation Strategy:
Mitigation Strategy | Targeted Maturity Level | Current Assessed Maturity Level |
---|---|---|
Patch applications | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Patch operating systems | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Multi-factor authentication | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Restrict administrative privileges | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Application control | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Restrict Microsoft Office macros | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
User application hardening | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Regular backups | <TARGET-LEVEL> | <ASSESSED-LEVEL> |
Patch Applications
This page provides a template and guidance to assist organisations in documenting their approach to patching applications, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Patch Operating Systems
This page provides a template and guidance to assist organisations in documenting their approach to patching operating systems, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Multi-factor Authentication
This page provides a template and guidance to assist organisations in documenting their approach to Multi-Factor Authentication, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Restrict Administrative Privileges
This page provides a template and guidance to assist organisations in documenting their approach to restricting administrative privileges, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Application Control
This page provides a template and guidance to assist organisations in documenting their approach to application control, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Restrict Microsoft Office Macros
This page provides a template and guidance to assist organisations in documenting their approach to restricting Microsoft Office macros, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
User Application Hardening
This page provides a template and guidance to assist organisations in documenting their approach to use application hardening, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.
Regular Backups
This page provides a template and guidance to assist organisations in documenting their approach to regular backups, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.