Android 13

BroadWeb

Essential Eight Maturity Model

What Is Essential Eight Maturity Model (E8MM)?

The Essential Eight Maturity Model (E8MM) is a framework that helps organizations assess and improve their implementation of the Essential Eight, a set of eight cybersecurity mitigation strategies that are proven to be effective against a wide range of cyber threats. The E8MM is based on the Australian Signals Directorate’s (ASD) experience in producing cyber threat intelligence, responding to cybersecurity incidents, conducting penetration testing, and assisting organizations to implement the Essential Eight.

 

The E8MM defines five maturity levels for each of the Essential Eight mitigation strategies:
  • Level 1: Ad hoc – The organization has not implemented the mitigation strategy or has implemented it in an ad hoc manner.
  • Level 2: Planned – The organization has a plan to implement the mitigation strategy but has not yet fully implemented it.
  • Level 3: Implemented – The organization has implemented the mitigation strategy but it is not fully mature.
  • Level 4: Mature – The organization has implemented the mitigation strategy and it is mature.
  • Level 5: Optimized – The organization has optimized the mitigation strategy and it is continually improving it.
Marketing Automation

What Can Essential Eight Maturity Model (E8MM) Be Used For?

The E8MM can be used to:
  • Assess the current maturity level of an organization’s implementation of the Essential Eight.
  • Identify areas where the organization can improve its implementation of the Essential Eight.
  • Develop a plan to improve the organization’s implementation of the Essential Eight.
  • Track the organization’s progress in improving its implementation of the Essential Eight.
The E8MM is a valuable tool for organizations that want to improve their cybersecurity posture and reduce their risk of cyberattacks.
Winning Content Strategy

What Are the 8 Mitigation Strategies That Make up Essential Eight Maturity Model (E8MM)?

Here are the eight mitigation strategies that make up the Essential Eight:
  1. Application control: This strategy involves controlling which applications can run on an organization’s systems. This helps to prevent malicious applications from being installed and executed.
  2. Patch applications: This strategy involves regularly patching software vulnerabilities. This helps to close security holes that attackers can exploit to gain access to systems.
  3. Configure Microsoft Office macro settings: This strategy involves configuring Microsoft Office macros to be disabled by default. This helps to prevent malicious macros from being executed.
  4. User application hardening: This strategy involves configuring user applications to make them more resistant to attacks. This can include disabling unnecessary features, enabling security settings, and using application whitelisting.
  5. Restrict administrative privileges: This strategy involves restricting administrative privileges to only those users who need them. This helps to limit the damage that can be caused if an account is compromised.
  6. Patch operating systems: This strategy involves regularly patching operating system vulnerabilities. This helps to close security holes that attackers can exploit to gain access to systems.
  7. Multi-factor authentication: This strategy involves requiring users to provide multiple pieces of evidence to authenticate their identities. This makes it more difficult for attackers to gain access to accounts.
  8. Regular backups: This strategy involves regularly backing up data so that it can be restored in the event of a cyberattack.
By implementing these eight mitigation strategies, organizations can significantly reduce their risk of cyberattacks.

Need an E8MM Assessment for Your Organisation?

Digital Insights Newsletter

Subscribe to our weekly newsletter to stay on top of the latest in Digital Marketing and give your business a competitive advantage by adopting best practices in digital marketing.

You're in! Well, almost!

Please click on the confirmation link we've just sent you to verify your email address. Thanks!