Essential Eight Compliance Services
We'll work with your team to assess your Essential Eight compliance, establish a baseline against the required standard and work towards accreditation where required.
Have you completed a risk assessment on your Third-Party Supplier?
We'll work with your team to assess your Essential Eight compliance, establish a baseline against the required standard and work towards accreditation where required.
How we can assist:
Understanding the Essential Eight
The Essential 8 in New Zealand is a set of mitigation strategies, developed and maintained by the Australian Cyber Security Centre (ACSC), that are designed to help organisations of all sizes protect themselves from the online threats that are recognised as being the root cause of most intrusion events and unplanned outages.
These strategies can be applied across a broad spectrum of networks, systems and applications, from local installations through to cloud and other online services - although it is largely targeted at Microsoft Windows based networks. Essential 8 provides the building blocks of a robust cybersecurity strategy.
Each element of the Essential 8 focuses on a different aspect of cybersecurity strategy: the eight core elements identified as the most common areas resulting in cybersecurity incidents. The Essential Eight provide information and data management strategies, and guidance on secure configuration, to protect the confidentiality, integrity and availability of an organisation's critical information and data. The Essential 8 focus areas are:
Application control
Patch applications
Configure Microsoft Office macro settings
User application hardening
Restrict administrative privileges
Patch operating systems
Multi-factor authentication
Regular backups
As well as providing guidance on what New Zealand organisations should do to reduce the risk of a cyber-attack, and how to minimise the impact should a threat actor breach your defences, the ACSC has created the Essential 8 Maturity Model to assist organisations in assessing how well they are implementing the mitigation strategies.
Level 0: At this level, organisations exhibit weaknesses in their cybersecurity posture that can be exploited by threat actors using common tools and methods.
Level 1: Organisations at this level have basic protections in place that help prevent cyber criminals and other threat actors, using common tools and methods, to break into systems.
Level 2: Organisations that achieve this level of maturity have strategies in place to mitigate a variety of sophisticated security attacks that seek to exploit elevated user privileges and other potential weaknesses such as credential harvesting.
Level 3: The highest level of maturity: these organisations implement a range of tools such as specific application controls, workstation logging and monitoring to ensure anomalous activity can be quickly detected and investigated and they undertake rapid patching of known vulnerabilities.
Cyber crime is on the rise. Every organisation faces a variety of threats ranging from highly disruptive and destructive ransomware attacks, to online fraud and the theft of data. Threat actors have at their disposal a vast array of tools and methods they can use to identify and exploit vulnerabilities to your systems.
Building a strategy to defend against these adversaries requires a strategic focus. Otherwise, it can seem impossible to detect and block each different type of attack. The Essential Eight provides a strategic framework that can be used to build a baseline defence against the cyber risks your organisation faces.
The Essential Eight matters to your business because it provides the building blocks of a robust cybersecurity strategy that covers defensive measures to mitigate the risk of a breach and minimise the chances that a threat actor can compromise the confidentiality, integrity and availability of your data. Even at Essential Eight Maturity Level 1, organisations will be able to actively prevent many threats.
For government agencies, compliance with the Essential Eight is mandated. Many government agencies require that their suppliers also report on their Essential 8 measures. And while mandates are not in effect yet for commercial entities and the Not-For-Profit sector, we can expect Essential 8 compliance to become an emerging industry standard, as have ISO27001 and the NIST Cyber Security Framework.
Tesserent has deep expertise assisting both government and private organisations to implement relevant Essential Eight controls contextualised to our clients’ environments. Our proven methodology is based on a solid partnership with our clients. We start by understanding your goals and your specific cyber risks and threats.
Baseline: a current state assessment of your current controls
A baseline is established so that the current state of cybersecurity controls in your organisation are understood and assessed against the Essential Eight Maturity Model. You’ll work closely with Tesserent’s security experts, to identify where your strengths and weaknesses are.
Develop a roadmap to implement the Essential 8 controls
Our team of Advisory consultants will develop a plan to bridge the gaps between your current state and the right level of Essential Eight maturity required for your organisation.
Assistance with executing the roadmap recommendations
Once the strategic plan is agreed, Tesserent will leverage its team of over 400 cybersecurity experts to help you choose the best risk mitigation tools and strategies and help you to deploy them for maximum protection.
Essential 8 dashboards and audit reporting
Continuous Reporting and Monitoring
Develop a plan to conduct regular reviews and evaluation of the effectiveness of your cybersecurity controls.
Tesserent understands that there is no ‘one size fits all’ way to implement cybersecurity controls. We'll consider your organisation's objectives and needs and develop a bespoke solution that will deliver significant uplift in your organisation’s security posture. Tesserent, New Zealand's trusted cybersecurity company will work alongside you as your security partner to help ensure your people, systems, data and customers are protected.
The Essential Eight strategies are:
1. Application whitelisting
2. Patch applications
3. Configure Microsoft Office macro settings
4. User application hardening
5. Restrict administrative privileges
6. Patch operating systems
7. Multi-factor authentication
8. Daily backups
These strategies are important because they address common cybersecurity risks that organisations face. Implementing these strategies can reduce the likelihood of a successful cyber attack and minimise the impact of a successful attack.
Yes, the ACSC recommends implementing all eight strategies to improve your organisation's cybersecurity posture. Each strategy addresses a specific area of cybersecurity risk and is designed to work in conjunction with the other strategies.
Tesserent's New Zealand team provides detailed guidance on how to implement each of the Essential Eight strategies on their website. They recommend starting with the strategy that will provide the most immediate benefit to your organisation.
Yes, Tesserent recommends that organisation's implement a range of additional cybersecurity measures to further improve their cybersecurity posture. These measures include regular staff training, regular vulnerability scanning, and incident response planning.
Tesserent is a full-service cybersecurity and secure cloud services provider, partnering with clients from all industries and all levels of government. Let’s talk.