The Mitigation Strategies
No single mitigation strategy will prevent all potential incidents, and organizations should apply all 8 of the mitigation strategies. These eight strategies form the Essential Eight and are detailed below.
- Application Control – prevent the execution of unapproved or malicious programs and installers.
- Patch applications – patch or mitigate any computers with ‘extreme risk’ security vulnerabilities within 48 hours. Use the latest versions of applications.
- Configure Microsoft Office macro settings to block macros downloaded from the internet. Allow only vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.
- User application hardening – Configure web browsers to block Flash (ideally uninstall Flash), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.
- Restrict administrative privileges to operating systems and applications based on user duties. Regularly validate the need for this level of access. Don’t use privileged accounts for regular work, reading email, and web browsing – log in as a restricted user and escalate privileges only as required.
- Patch operating systems (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Do not use unsupported versions.
- Users and administrators should use Multi-factor authentication for VPNs, RDP, SSH and other remote access, and all privileged actions or access to important (sensitive or high-availability) data repositories.
- Important new and changed data, software and configuration settings should have daily backups. These should be stored disconnected, retained for at least three months. Test restoration initially, annually, and when IT infrastructure changes.
These strategies are assessed for potential user resistance, upfront costs (staffing, support and hardware) and ongoing maintenance costs, with a rating provided for each.
Beyond Essential 8
The Australian Cyber Security Centre (ACSC) also details other mitigation strategies which businesses may require. There are nine mitigation strategies rated as having the effectiveness of “Excellent”, fifteen as “Very Good”, one as “Good”, and four with an effectiveness rating of “Limited”.
The process of checking for compliance within your VMware environments can be arduous and costly, and any kind of manual checks are subject to human error, so it is crucial to automate as much as possible.