Australia's First Digital Essential Eight Assessments
Compatible with ACSC's latest updates (November 2022 & Processing Guide - January 2023)
Are you sending the essential eight questionnaires as documents & spreadsheet files?
Introducing a modern approach to securely create and collaborate on the digital platform to complete Essential Eight Assessment for your third-party suppliers and your own organisation.
Essential Eight Maturity Model
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight.
While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. It is recommended as a minimum that all organisations utilise the Essential Eight as their baseline.
The Essential Eight are designed to protect Microsoft Windows-based internet-connected networks. While the Essential Eight may be applied to cloud services and enterprise mobility, or other operating systems, it was not primarily designed for such purposes and alternative mitigation strategies may be more appropriate to mitigate unique cyber threats to these environments. In such cases, organisations should consider alternative guidance provided by the ACSC.
When implementing the Essential Eight, organisations should identify and plan for a target maturity level suitable for their environment. Organisations should then progressively implement each maturity level until that target is achieved.
As the mitigation strategies that constitute the Essential Eight have been designed to complement each other, and to provide coverage of various cyber threats, organisations should plan their implementation to achieve the same maturity level across all eight mitigation strategies before moving onto higher maturity levels.
Read more about Essential Eight at ACSC website: Essential Eight Maturity Model | Cyber.gov.au
Application
Application Lifecycle
Our application makes it easy to request and capture assessment responses, compile data, assess multiple operational areas and third-party suppliers. The smart data capture experience integrates with customised report & action items that provide streamlined risk governance.
Secure Setup
Setup your cyber risk assessment environment to match your team structure and operating model.
Easy to Complete
The text-heavy Essential Eight & NIST Models are presented in an easy to follow question-answer format to allow a focus-based for all users irrespective of role.
Visualise & Report
Easy to interpret reports present current and target state maturity levels along with action items. Reuse this report to communicate consistently with internal and external stakeholders.
Annual Cycles
Centralised storage and access control make it easy to roll out the next assessment cycle. Control access through Active Directory SSO.