"While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems." - ACSC
So we need to be Essential 8 Compliant across our entire IT Estate. I need you to own the Cloud component.
Past experience has shown this is a thankless, frustrating, paper-chase that does little to actually improve security posture.
Not this nightmare again!
Using the pre-built AWS Config ACSC Essential 8 Conformance Pack, and AWS Audit Manager; it is easy to implement, maintain, and prove conformance.
This is heavy lifting - there must be a way of doing this using AWS!
Once activated, wait 24 hours for full results.
We have guardrails in place, and can continually attest to compliance.
Image Attributions:2774556 (https://www.pexels.com/photo/people-sitting-on-gang-chairs-2774556/) - Luis Quintero - License: Free To Use / No Attribution Required / See https://www.pexels.com/license/ for what is not allowed
Billede Tilskrivelser
2774556 - Luis Quintero - (Licens Free To Use / No Attribution Required / See https://www.pexels.com/license/ for what is not allowed
)