g2-tracking
Essential Eight Cyber security Framework

For All Our Australian Friends, You Can Now Streamline Essential Eight with Scytale

Shir Wegman

Director of Product

Linkedin
Summary: The Australian Cyber Security Centre has developed the Essential Eight, a cybersecurity framework to help protect against cyber threats.

If you missed the news, we recently added CSA STAR to our growing group of compliance frameworks and regulations that we support, alongside SOC 2, ISO 27001, HIPAA, PCI DSS and GDPR

And today, customers can implement the Essential Eight, the automated way, enabling relevant organizations to meet the minimum baseline of cyber threat protection recommended by the Australian Signals Directorate and streamline the process! By supporting the Essential Eight in our platform, we can help a wider range of organizations automate their unique security and compliance needs.

Hold up! What’s the Essential Eight, anyway?

The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, an Australian cybersecurity framework consisting of eight essential mitigation strategies, helping organizations protect themselves against various cyber threats. The Essential Eight is designed to protect Microsoft Windows-based internet-connected networks.

The mitigation strategies that constitute the Essential Eight are: 

  • Application control
  • Patch applications
  • Configure Microsoft Office macro settings
  • User application hardening
  • Restrict administrative privileges
  • Patch operating systems
  • Multi-factor authentication
  • Regular backups

GET COMPLIANT 90% FASTER WITH AUTOMATION

Meet the Essential Eight baseline with automation!

Implementing the framework’s mitigation strategies and its respective controls can be quite the complex task at hand that consumes many hours.

Leveraging our automation platform and compliance expertise means you don’t only centralize, complete and automate all your Essential Eight requirements in one place, but you also receive detailed insight into your cyber security controls posture and how to improve your controls maturity.

Take a look at what our customers are saying about streamlining their compliance with our automation platform and dedicated compliance team