<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The Australian Essential Eight is it enough? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47209#M5556</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&amp;nbsp; I have to agree with Steve's point, it does in fact provide a false sense of security, even though it is mandated for federal central government, it is often used by other regional government agencies as a baseline.&amp;nbsp; The intriguing issue, that many face is just how to do characterisation and application whitelisting to an agreed baseline, especially with change management controls and the overheads.&amp;nbsp; In the words and experience of delivery personnel, it is a royal pain in the proverbial and they just hate it with a vengeance.&amp;nbsp;&amp;nbsp; They see it as a barrier to getting the job in a timely basis, causing restrictions to the way they want to work, which always causes an overhead.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's a mindset problem - one that can be overcome with good application whitelisting toolset choices, good application whitelisting design, and some staff training.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the staff believe the security of application whitelisting is a hindrance:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;They're either correct, and there needs to be a more sensible whitelisting design; or&lt;/LI&gt;&lt;LI&gt;They're incorrect, and they need some encouragement / attitude adjustment.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With whitelisting, I usually find ways to encourage all levels of the organisation, on why persisting with it, even becoming a champion of it, will ultimately benefit them. I usually get them to come around in the end.&lt;/P&gt;</description>
    <pubDate>Sun, 29 Aug 2021 18:29:57 GMT</pubDate>
    <dc:creator>SWALTERS</dc:creator>
    <dc:date>2021-08-29T18:29:57Z</dc:date>
    <item>
      <title>The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47159#M5550</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those of us, who live in part of the Southern Hemisphere, have to abide by the Australian Essential Eight security controls.&amp;nbsp;&amp;nbsp; Which provided by the Australian Government as part of their Information Security Manual, and a means of improving the maturity and putting controls to protect organisations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an interesting piece today about the Essential Eight, which I thought I would circulate and let you read it for yourselves.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cybertheory.io/essential-eight-is-this-really-an-answer/" target="_blank"&gt;https://cybertheory.io/essential-eight-is-this-really-an-answer/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main question the article is asking is the essential eight really the answer?&amp;nbsp; What are your thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:57:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47159#M5550</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47165#M5551</link>
      <description>&lt;P&gt;It's somewhat in the flavour of NSCSs 10 steps to Cyber Security and CyberEssentials&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ncsc.gov.uk/collection/10-steps" target="_blank"&gt;https://www.ncsc.gov.uk/collection/10-steps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-IT-infrastructure-2-2.pdf" target="_blank"&gt;https://www.ncsc.gov.uk/files/Cyber-Essentials-Requirements-for-IT-infrastructure-2-2.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's probably a starting point for organisations that have no security programme or have lost there way, but there is danger in imagining these frameworks are an end state.&amp;nbsp; It can encourage a once and done mentality and a failure to focus on improvements and learning from incidents.&amp;nbsp; It where the NIST cyber security framework has advantages, but overall it's a maturity thing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 13:48:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47165#M5551</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2021-08-27T13:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47181#M5552</link>
      <description>&lt;P&gt;&lt;SPAN&gt;For almost all federal departments and agencies.&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;The federal government is set&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to mandate the Essential Eight cyber security controls for all 98 non-corporate Commonwealth entities, four years after they were first developed by the Australian Signals Directorate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.peryourhealth.us/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;peryourhealth bill&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Aug 2021 06:32:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47181#M5552</guid>
      <dc:creator>Taylor45</dc:creator>
      <dc:date>2021-08-30T06:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47186#M5553</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main question the article is asking is the essential eight really the answer?&amp;nbsp; What are your thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It is part of the answer.&amp;nbsp; It is a baseline to start with.&amp;nbsp; And a lot of good can come from properly implementing those 8 controls, as combined they do close off many attack classes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But any company implementing them as a compliance only measure, has a problem right there - they're not approaching security proactively.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yet, we have to start the stalwarts on their security journey somewhere..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem with questions about "is it enough?" is it implies there can ever be enough.&amp;nbsp; It also implies that security maturities and risk attitudes are universal amongst all organisations - which is never the case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we're forced to set a minimum baseline for all, and then expect individual organisation's assess their own levels of risk after that.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Aug 2021 15:10:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47186#M5553</guid>
      <dc:creator>SWALTERS</dc:creator>
      <dc:date>2021-08-28T15:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47193#M5554</link>
      <description>&lt;P&gt;MHOO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think these eight are a good start but probably not sufficient.&amp;nbsp; As the author states these are the common sense approaches to security.&amp;nbsp; Agree with Steve that this may leave an artificial feeling of comfort.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I read the list, I am not sure all of them are actually doable in a large organization due to reporting structures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my sense is that the are not sufficient and would make reference to other lists (SANS, NIST, etc.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Aug 2021 17:20:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47193#M5554</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2021-08-28T17:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47205#M5555</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&amp;nbsp; I have to agree with Steve's point, it does in fact provide a false sense of security, even though it is mandated for federal central government, it is often used by other regional government agencies as a baseline.&amp;nbsp; The intriguing issue, that many face is just how to do characterisation and application whitelisting to an agreed baseline, especially with change management controls and the overheads.&amp;nbsp; In the words and experience of delivery personnel, it is a royal pain in the proverbial and they just hate it with a vengeance.&amp;nbsp;&amp;nbsp; They see it as a barrier to getting the job in a timely basis, causing restrictions to the way they want to work, which always causes an overhead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has any one actually attempted to put in place NIST SP800-167 and won the battle smartly and consistently?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 29 Aug 2021 06:49:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47205#M5555</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-08-29T06:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: The Australian Essential Eight is it enough?</title>
      <link>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47209#M5556</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&amp;nbsp; I have to agree with Steve's point, it does in fact provide a false sense of security, even though it is mandated for federal central government, it is often used by other regional government agencies as a baseline.&amp;nbsp; The intriguing issue, that many face is just how to do characterisation and application whitelisting to an agreed baseline, especially with change management controls and the overheads.&amp;nbsp; In the words and experience of delivery personnel, it is a royal pain in the proverbial and they just hate it with a vengeance.&amp;nbsp;&amp;nbsp; They see it as a barrier to getting the job in a timely basis, causing restrictions to the way they want to work, which always causes an overhead.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's a mindset problem - one that can be overcome with good application whitelisting toolset choices, good application whitelisting design, and some staff training.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the staff believe the security of application whitelisting is a hindrance:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;They're either correct, and there needs to be a more sensible whitelisting design; or&lt;/LI&gt;&lt;LI&gt;They're incorrect, and they need some encouragement / attitude adjustment.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With whitelisting, I usually find ways to encourage all levels of the organisation, on why persisting with it, even becoming a champion of it, will ultimately benefit them. I usually get them to come around in the end.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Aug 2021 18:29:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/The-Australian-Essential-Eight-is-it-enough/m-p/47209#M5556</guid>
      <dc:creator>SWALTERS</dc:creator>
      <dc:date>2021-08-29T18:29:57Z</dc:date>
    </item>
  </channel>
</rss>

