#1 Global Leader in Data Resilience
Whitepaper
December 24, 2024

Essential Eight Maturity Level Three Compliance for Australian Federal and State Agencies

Register to Read

By registering, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
By registering, you are agreeing to receive information about Veeam products and events and to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply except as noted in our Privacy Policy.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend

ty icon

Thank you!

We have received your request and our team will reach out to you shortly.

OK

error icon

Oops! Something went wrong.

Please, try again later.

Essential Eight Maturity Level Three Compliance for Australian Federal and State Agencies

This white paper is designed for Australian Federal & State agencies as well as nominated critical infrastructure environments looking to achieve maturity level 2 or 3 compliance within the ASD & ACSC Essential Eight. The Essential Eight has been designed to protect organization’s internet and non-internet-connected information technology platforms and networks. It is a recommended security baseline for government and systems assigned to critical infrastructure. This is a guide focused on the evolving cyberthreat landscape to help agencies and organizations protect against the following:

  • Targeted cyber intrusions (advanced persistent threats) and other external adversaries who steal backup data
  • Ransomware and external adversaries who destroy backup data and prevent computers/networks from functioning
  • Malicious insiders who steal data
  • Malicious insiders who destroy backup data and prevent computers/networks from functioning

This is a guide only, built around both Industry best practices and recommendations highlighted by the Australian Signals Directorate and Australian Cyber Security Centre, and will not guarantee data loss or cyberthreats occurring. By implementing the recommendations in this white paper, organizations will significantly increase recovery efforts in the event of a cyberattack for faster return to business continuity. They will be able to remove non-activated dormant threats during recovery operations, as well as reduce the blast radius from a cyberattack.