Securing Government Agencies: Essential Eight and Other Efforts

This article has been indexed from The Duo Blog

Four years ago, the Australian Signals Directorate created the “Essential Eight” — recommendations to secure federal entities and improve cybersecurity protections. This month, the Attorney General’s Department announced plans to extend the protective security policy framework (PSPF) to require implementation and audit of all eight areas. This change reflects a movement we’re seeing in governments worldwide to be more assertive in improving government agency security.

The Australian Essential Eight identifies eight areas of focus for non-Corporate Commonwealth Entities (NCCEs) to improve their security. The eight areas are:

  1. Application Control
  2. Patch Applications
  3. Configure Microsoft Office Macro Settings
  4. User Application Hardening
  5. Restrict Administrative Privileges
  6. Patch Operating Systems
  7. Multi Factor Authentication
  8. Daily Backups

Each area comes with guidance to improve maturity of the area. So far, NCCEs appear to be struggling to implement the first four, but the Attorney General’s office intends to move forward with the recommendation to mandate implementation of all eight areas.

The Australian government’s plans to double down on cybersecurity for its own departments came at the same time President Biden issued an Executive Order on Improving US Cybersecurity aimed at improving efforts to “identify, deter, protect against, detect, and respond to these actions and actors.”

Though broader in scope than the Australian Essential Eight, and specifically targeted at improving supply chain security, there are areas of overlap that should be noted:

  1. Requirement for Zero Trust Architecture
  2. Requiring use of Multi-Factor Authentication
  3. Requiring use of Encryption at Rest and in Transit
  4. Use of trusted source code from vendors, including a Software Bill of Materials (SBOM)
  5. Standardizing incident response processes across all agencies
  6. Use of Endpoint Detection and Response (EDR) capabilities

Both governments recognize the need for their own agencies to improve their cyber defenses, as well as their depend

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Securing Government Agencies: Essential Eight and Other Efforts