ASD's Blueprint for Secure Cloud

Essential Eight

This page provides a template and guidance to assist organisations in documenting the Essential Eight Maturity levels associated with implementation of system(s) built on ASD's Blueprint for Secure Cloud.

Estimated reading time: 2 minutes

<SYSTEM-NAME> targets the following maturity levels against each Essential Eight Mitigation Strategy:

Mitigation StrategyTargeted Maturity LevelCurrent Assessed Maturity Level
Patch applications<TARGET-LEVEL><ASSESSED-LEVEL>
Patch operating systems<TARGET-LEVEL><ASSESSED-LEVEL>
Multi-factor authentication<TARGET-LEVEL><ASSESSED-LEVEL>
Restrict administrative privileges<TARGET-LEVEL><ASSESSED-LEVEL>
Application control<TARGET-LEVEL><ASSESSED-LEVEL>
Restrict Microsoft Office macros<TARGET-LEVEL><ASSESSED-LEVEL>
User application hardening<TARGET-LEVEL><ASSESSED-LEVEL>
Regular backups<TARGET-LEVEL><ASSESSED-LEVEL>

Patch Applications

This page provides a template and guidance to assist organisations in documenting their approach to patching applications, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Patch Operating Systems

This page provides a template and guidance to assist organisations in documenting their approach to patching operating systems, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Multi-factor Authentication

This page provides a template and guidance to assist organisations in documenting their approach to Multi-Factor Authentication, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Restrict Administrative Privileges

This page provides a template and guidance to assist organisations in documenting their approach to restricting administrative privileges, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Application Control

This page provides a template and guidance to assist organisations in documenting their approach to application control, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Restrict Microsoft Office Macros

This page provides a template and guidance to assist organisations in documenting their approach to restricting Microsoft Office macros, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

User Application Hardening

This page provides a template and guidance to assist organisations in documenting their approach to use application hardening, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Regular Backups

This page provides a template and guidance to assist organisations in documenting their approach to regular backups, as per the Essential Eight Maturity Model, associated with their system(s) built on ASD's Blueprint for Secure Cloud.

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra