top of page
MSA.png

Australia's First Digital Essential Eight Assessments

Compatible with ACSC's latest updates (November 2022 & Processing Guide - January 2023)

Are you sending the essential eight questionnaires as documents & spreadsheet files?

Introducing a modern approach to securely create and collaborate on the digital platform to complete Essential Eight Assessment for your third-party suppliers and your own organisation.

Essential Eight Maturity Model

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight.  

While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are  recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. It is recommended as a minimum that all organisations utilise the Essential Eight as their baseline.

The Essential Eight are designed to protect Microsoft Windows-based internet-connected networks. While the Essential Eight may be applied to cloud services and enterprise mobility, or other operating systems, it was not primarily designed for such purposes and alternative mitigation strategies may be more appropriate to mitigate unique cyber threats to these environments. In such cases, organisations should consider alternative guidance provided by the ACSC.

When implementing the Essential Eight, organisations should identify and plan for a target maturity level suitable for their environment. Organisations should then progressively implement each maturity level until that target is achieved.

As the mitigation strategies that constitute the Essential Eight have been designed to complement each other, and to provide coverage of various cyber threats, organisations should plan their implementation to achieve the same maturity level across all eight mitigation strategies before moving onto higher maturity levels.

Read more about Essential Eight at ACSC website: Essential Eight Maturity Model | Cyber.gov.au

Computer with Graph

Application

Move away from the manual documents and spreadsheet files for cyber governance.

Make Cyber Governance accessible, consistent, transparent & repeatable.

Application Lifecycle

Our application makes it easy to request and capture assessment responses, compile data, assess multiple operational areas and third-party suppliers. The smart data capture experience integrates with customised report & action items that provide streamlined risk governance.

MSA_edited.png
Software Programmer

Secure Setup

Setup your cyber risk assessment environment to match your team structure and operating model.

Typing on the Computer

Easy to Complete

The text-heavy Essential Eight & NIST Models are presented in an easy to follow question-answer format to allow a focus-based for all users irrespective of role.

Financial Report

Visualise & Report

Easy to interpret reports present current and target state maturity levels along with action items. Reuse this report to communicate consistently with internal and external stakeholders.

Touchscreen Computer

Annual Cycles

Centralised storage and access control make it easy to roll out the next assessment cycle. Control access through Active Directory SSO.

bottom of page