ACSC - Essential 8 Maturity Model
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations mitigate cyber security incidents caused by various cyber threats. The most effective of these are known as the Essential Eight.
Maturity levels
To assist organisations in determining the maturity of their implementation of the Essential Eight, three maturity levels have been defined for each mitigation strategy. The maturity levels are defined as:
- Maturity Level Zero: Minimally aligned with the intent of the mitigation strategy
- Maturity Level One: Partly aligned with the intent of the mitigation strategy
- Maturity Level Two: Mostly aligned with the intent of the mitigation strategy
- Maturity Level Three: Fully aligned with the intent of the mitigation strategy
Further information
The Australian Government Information Security Manual (ISM) assists in the protection of information that is processed, stored or communicated by organisations' systems. It can be found at cyber.gov.au/acsc/view-all-content/ism.
The Strategies to Mitigate Cyber Security Incidents complements the advice in the ISM. The complete list of strategies can be found at cyber.gov.au.
Our ACSC outsourcing guidance offers specific mappings to each requirement and how Atlassian Cloud Enterprise assists you in meeting your obligations, including information on audit rights, the right to issue instructions, data security, termination, and chain outsourcing. To learn more about our commitment to safeguard customer data, visit our Security Practices page.
For more information, contact us.
Relevant products
Project and issue tracking
Jira Software
enterprise agile planning
Jira Align
high-velocity itsm
Jira Service Management
document collaboration
Confluence Cloud
Git code management
Bitbucket Cloud
VISUAL COLLABORATION
Trello
modern incident response
Opsgenie
incident communication
Statuspage
Our team is here to help
Have more questions about our compliance program?
Do you have cloud certifications? Can you complete my security & risk questionnaire? Where can I download more information?
Trust & security community
Join the Trust & Security group on the Atlassian Community to hear directly from our Security team and share information, tips, and best practices for using Atlassian products in a secure and reliable way.
Atlassian support
Reach out to one of our highly-trained support engineers to get answers to your questions.