The Australian Signals Directorate's Australian Cyber Security Centre drafted these mitigation strategies to assist organizations in preventing their digital environments from exposure to cyberthreats. The Essential Eight, in its own words, is "designed to protect organizations' internet-connected information technology networks."
In an overview, the Essential Eight discusses patching applications, patching operating systems, implementing multi-factor authentication, restricting administrative privileges, practicing application control, restricting Microsoft Office macros, performing user application hardening, and regulating backups.
PAM Maturity Model eBook
PAM Buyer’s Guide eBook
Ensuring compliance with the NIS2 Directive with PAM
Disclaimer: The complete implementation of ACSC Essential Eight maturity model requires a variety of process, policy, people, and technology controls. The solutions mentioned above are some of the ways in which privileged access management controls help with the ACSC Essential Eight requirements. Coupled with other appropriate solutions, processes, people controls, and policies, ManageEngine's PAM solutions can help organizations align with ACSC Essential Eight requisites. This material is provided for informational purposes only, and should not be considered as legal advice for the ACSC Essential Eight guidelines. ManageEngine makes no warranties, express, implied, or statutory, as to the information in this material. Please contact your legal advisor to learn how ACSC Essential Eight impacts your organization and what you need to do to comply with the ACSC Essential Eight maturity model.