ASD Essential Eight Maturity Model
Eight prioritised mitigation strategies from the Australian Signals Directorate, each with four maturity levels (0-3). Covers application control, patching applications and operating systems, Microsoft Office macro settings, user application hardening, restricting administrative privileges, multi-factor authentication, and regular backups.
AC Access Control
AU Audit and Accountability
CM Configuration Management
| Control | Name | ASD Essential Eight References |
|---|---|---|
| CM-06 | Configuration Settings | E8-3E8-3 ML1E8-3 ML3E8-4E8-4 ML1E8-4 ML2E8-4 ML3 |
| CM-07 | Least Functionality | E8-1E8-1 ML1E8-1 ML2E8-1 ML3E8-3E8-3 ML1E8-3 ML2E8-3 ML3E8-4E8-4 ML1E8-4 ML2E8-4 ML3 |
| CM-08 | Information System Component Inventory | E8-2 ML3E8-6 ML3 |
| CM-11 | User-Installed Software | E8-1 |
| CM-12 | Information Location | E8-2 ML3 |
| CM-14 | Signed Components | E8-1E8-1 ML3E8-3 ML3 |
CP Contingency Planning
IA Identification and Authentication
RA Risk Assessment
| Control | Name | ASD Essential Eight References |
|---|---|---|
| RA-05 | Vulnerability Scanning | E8-2E8-2 ML1E8-2 ML2E8-2 ML3E8-6E8-6 ML1 |
SA System and Services Acquisition
| Control | Name | ASD Essential Eight References |
|---|---|---|
| SA-22 | Unsupported System Components | E8-6E8-6 ML3 |