The mitigation strategies that constitute the Essential Eight are:
These strategies include:
1. Application Control: Ensures that only approved software can run on company systems, thereby reducing the risk of malware.
2. Patch Applications: Regularly updating and patching all applications to ensure that software is always equipped with the latest security fixes.
3. Microsoft Office Macro Settings: Adjusting the default settings in Microsoft Office to mitigate risks of malware being delivered through malicious macros in documents.
4. User Application Hardening: Strengthening user applications to prevent exploitation, such as scripting and ActiveX controls, and reduce the attack surface.
5. Restrict Administrative Privileges: Limiting administrative access minimises the risk of unauthorised changes or installations that could compromise system security.
6. Patch Operating Systems: Keep operating systems up-to-date with the latest security patches to protect against exploits targeting known vulnerabilities.
7. Multi-Factor Authentication (MFA): Provide an additional layer of security beyond just passwords. This requires users to verify their identity through multiple authentication methods, such as a text message or authentication app.
8. Regular Backups: Establish a routine for regular data backups to secure critical information and ensure that data can be restored in the event of an attack or other data loss incidents.