MacGov Cyber Security hub support

Essential 8 - Hardening user applications.

Hardening is the process of disabling the unnecessary or high-risk functions in common programs to make exploitation less likely, while still allowing them to be used by an organisation.

This usually doesn’t impact on the utility of these applications for end users and can even enhance it. For example, blocking web advertisements makes the internet easier to use. But it also prevents attackers using a malicious advertisement to infect your corporate network – keeping everyone happy.

Essential 8 Maturity Level 2 Controls and our Solution.

Web browsers do not process Java from the internet. SASE Policy Enforcement
Web browsers do not process web advertisements from the internet.
Web browser security settings cannot be changed by users. User Protection
Microsoft Office is blocked from creating child processes.
Microsoft Office is blocked from creating executable content.
Microsoft Office is blocked from injecting code into other processes.
Microsoft Office is configured to prevent activation of Object Linking and Embedding packages.
Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Office productivity suite security settings cannot be changed by users.
PDF software is blocked from creating child processes.
PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
PDF software security settings cannot be changed by users.
Event logs are protected from unauthorised modification and deletion.
PowerShell module logging, script block logging and transcription events are centrally logged. SOC-as-a-Service
Command line process creation events are centrally logged.
Event logs from internet-facing servers are analysed in a timely manner to detect cyber security events.
Cyber security events are analysed in a timely manner to identify cyber security incidents.
Cyber security incidents are reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered.
Cyber security incidents are reported to ASD as soon as possible after they occur or are discovered.
Following the identification of a cyber security incident, the cyber security incident response plan is enacted.
Internet Explorer 11 is disabled or removed.
Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.
climber image

We get you there and keep you there.

We deliver solutions to meet all of the mandated controls for Essential 8 Maturity Level 2, working hand-in-hand with your IT team. Whether it’s a comprehensive compliance program or closing critical gaps, we have the expertise you need.

We do the heavy lifting.

We’ve created solutions addressing the more difficult aspects of achieving, maintaining and reporting on ML2, reducing the risk on non-compliance. As Essential 8 is further developed and refined, we’ll be there to keep you complaint.

weightlifter

Get in touch with our Essential 8 experts now.

1800 004 943

Enquiry Sent.

Thank you for contacting us.