Essential Eight (E8) and SASE
The Essential 8 is a set of eight key strategies recommended by the Australian Cyber Security Centre (ACSC) to enhance cyber security for organizations. These strategies are designed to make it much harder for adversaries to compromise systems.
The Essential 8 includes:
- Application Control: Ensuring only approved applications can execute on systems.
- Patch Applications: Keeping software up to date to mitigate vulnerabilities.
- Configure Microsoft Office Macro Settings: Restricting the use of macros to prevent malicious code execution.
- User Application Hardening: Reducing the attack surface by disabling or restricting unnecessary features.
- Restrict Administrative Privileges: Limiting the use of privileged accounts to reduce the risk of misuse.
- Patch Operating Systems: Regularly updating operating systems to protect against known vulnerabilities.
- Multi-Factor Authentication (MFA): Implementing MFA to add an extra layer of security.
- Regular Backups: Ensuring data is backed up regularly to recover from incidents like ransomware attacks
Essential 8 Strategy Realized
Secure Access Service Edge (SASE) provides the unified framework needed to implement the Australian Government’s Essential 8 effectively.
Application Control
Robust mechanisms ensuring only approved applications can execute on your systems.
Patch Applications
Automated patch management keeps third-party applications secure and up to date.
Configure MS Office Macros
Enforce strict policies to restrict or manage high-risk macro settings across the suite.
User Application Hardening
Disable unnecessary features and block web browser vulnerabilities to reduce your attack surface.
Restrict Admin Privileges
Manage and limit “keys to the kingdom,” ensuring only authorized users have elevated access.
Patch Operating Systems
Streamline OS updates to ensure timely protection against critical vulnerabilities.
Multi-Factor Auth (MFA)
Integrated MFA adds an essential extra layer of security for every user authentication.
Regular Backups
Integrated recovery options ensure your critical data is securely backed up and restorable.

