Essential Eight Assessment Quiz
Assess your cybersecurity maturity against the ACSC Essential Eight framework. Get your maturity level score and actionable improvement recommendations.
Essential Eight Assessment
Question 1 of 8
How does your organisation control which applications can run?
About the Framework
The Essential Eight is a prioritised list of mitigation strategies developed by the Australian Cyber Security Centre (ACSC) to help organisations protect themselves against cyber threats.
Application Control
Prevent execution of unapproved applications including .exe, DLL, scripts, and installers.
Prevent malware executionPatch Applications
Patch applications within 48 hours if a critical vulnerability exists.
Prevent malware executionConfigure Office Macros
Block macros from the internet, and only allow vetted macros in trusted locations.
Prevent malware executionUser App Hardening
Configure web browsers to block Flash, ads, and Java. Disable unneeded features.
Prevent malware executionRestrict Admin Privileges
Restrict administrative privileges to operating systems and applications based on user duties.
Limit cyber intrusionPatch Operating Systems
Patch operating systems within 48 hours if a critical vulnerability exists.
Limit cyber intrusionMulti-Factor Authentication
Implement MFA for VPNs, RDP, SSH, and other remote access.
Limit cyber intrusionRegular Backups
Perform daily backups of important data. Store backups disconnected and test restoration.
Recover data