Eight controls developed by the Australian Signals Directorate from real-world cyber incident response, penetration testing, and threat intelligence. Together they form the most effective baseline against the cyber threats Australian organisations actually face.
01
Application Control
Only approved applications are allowed to execute. Prevents unapproved binaries, scripts, installers, and dynamic-link libraries from running — the highest-impact control against malware and ransomware.
Infracom delivery: Allowlist scoping, ruleset assessment, exception governance, monitoring uplift.
02
Patch Applications
Internet-facing applications and productivity software are patched within risk-based windows after vulnerability disclosure. Critical patches at ML2/ML3 require deployment within 48 hours where exploits exist.
Infracom delivery: Patch SLA review, vulnerability scan reconciliation, exception register audit.
03
Configure Microsoft Office Macro Settings
Macros from the internet blocked. Macros only allowed where there is a demonstrated business requirement, with antivirus scanning and admin approval workflows. A primary phishing-payload vector.
Infracom delivery: GPO/Intune policy review, macro source-of-truth inventory, exception lifecycle.
04
User Application Hardening
Web browsers and PDF readers are configured to block Flash, ads, Java, and unnecessary features that adversaries exploit. ML2/ML3 extends to PowerShell logging and .NET hardening.
Infracom delivery: Browser baseline review, ASR rule mapping, PowerShell Constrained Language Mode validation.
05
Restrict Administrative Privileges
Privileged accounts are validated, time-bounded, separated from standard accounts, and used only on hardened administrative workstations. ML3 requires no internet, email, or web services access from privileged accounts.
Infracom delivery: Privileged-access lifecycle audit, jump-host review, PAM tooling alignment.
06
Patch Operating Systems
Operating systems on internet-facing servers, workstations, and network devices are patched within ACSC-defined windows. Unsupported OS versions retired. Vulnerability scanners run on automated cadence.
Infracom delivery: OS patch posture assessment, EOL inventory, scanner output reconciliation.
07
Multi-Factor Authentication
MFA is enforced for users of internet-facing services, third-party services holding sensitive data, and privileged accounts. ML2/ML3 increasingly favour phishing-resistant methods — passkeys, FIDO2/WebAuthn, hardware tokens.
Infracom delivery: MFA coverage gap analysis, phishing-resistance posture review, conditional-access policy validation.
08
Regular Backups
Backups of important data, software, and configuration settings are performed, retained, and tested for restoration. Retention aligned to business continuity needs. Restoration drills executed and evidenced.
Infracom delivery: Backup coverage assessment, restoration drill execution, immutability and air-gap validation.