Information security references

Strategies to Mitigate Cyber Security Incidents

  • Mitigation strategies
  • Essential eight explained
  • Essential eight maturity model
  • Implementation guides
  • Mandatory Top 4 requirement explained

Australian Government Information Security Manual

  • Executive Companion
  • Principles
  • Controls UPDATED November 2017

Evaluated Products List and emanation security

Cloud computing and BYOD

Search ASD website

Title Audience / type Published
Antivirus Software using Reputation Rating Checking UPDATED Everyone 29/01/2018
Assessing Security Vulnerabilities and Applying Patches Everyone 18/01/2018
Catch, Patch, Match educational video Everyone 15/01/2014
CyberSense educational video Everyone 13/05/2010
Cyber Security for Contractors UPDATED Everyone 20/03/2018
Cyber Security Incident Reporting Everyone 18/01/2018
Detecting Socially-Engineered Messages UPDATED Everyone 29/01/2018
Implementing Application Whitelisting Everyone 18/01/2018
Know and Minimise Your Vulnerabilities Before They Are Used Against You Everyone 20/12/2012
Passphrase Requirements Everyone 02/11/2017
Questions to ask Managed Service Providers UPDATED Everyone 20/03/2018
Restricting Administrative Privileges Everyone 18/01/2018
Security and Safety Tips for Social Media UPDATED Everyone 29/01/2018
Top Security Tips for Personal Device Use Everyone 24/03/2017
Essential Eight Explained UPDATED Senior managers 20/03/2018
Essential Eight Maturity Model Senior managers 27/10/2017
Questions Senior Management Need to be Asking about Cyber Security Senior managers 20/08/2012
Wireless Network Security Senior managers 30/01/2012
Cyber Security Incidents: Are You Ready? Government agencies 20/03/2014
High Profile and International Events Cyber Security Advice Government agencies 12/11/2015
Preparing for and Responding to Cyber Security Incidents Government agencies 13/09/2012
Preparing for and Responding to Denial of Service Activities Government agencies 24/10/2014
Travelling Overseas with an Electronic Device Government agencies 06/02/2017
Using Consumer-Grade Email Services Government agencies 19/01/2018
Hardening Microsoft Office 2013 Hardening guide 11/12/2017
Hardening Microsoft Office 2016 Hardening guide 11/12/2017
Hardening Microsoft Windows 7 SP1 Workstations Hardening guide 18/12/2017
Hardening Microsoft Windows 8.1 Update Workstations Hardening guide 18/12/2017
Hardening Microsoft Windows 10 Workstations Hardening guide 18/01/2018
Apple iOS Hardening Configuration Guide for iPod Touch, iPhones and iPads running iOS version 9 or higher Hardening guide 01/09/2016
Additional Security Considerations and Controls for Virtual Private Networks (VPNs) Technical advice 12/04/2013
An Examination of the Redaction Functionality in Adobe Acrobat Pro (PDF) Technical advice 12/11/2011
Data Spill Management Guide Technical advice 20/08/2012
Data Spill Sanitisation Guide Technical advice 20/08/2012
DNS Security Technical advice 20/08/2012
Drive-by Downloads Technical advice 20/12/2012
Essential Eight in Linux Environments NEW Technical advice 20/03/2018
Introduction to Cross Domain Solutions (CDS) Technical advice 18/01/2018
Malicious Email Mitigation Strategies Technical advice 01/08/2016
Microsoft Office Macro Security Technical advice 15/12/2016
Minimising the Threat from Java-based Intrusions Technical advice 24/06/2014
Mitigating Spoofed Emails – Sender Policy Framework (SPF) Explained Technical advice 20/12/2012
Mitigating the Use of Stolen Credentials to Access Agency Information Technical advice 20/08/2012
Multi-factor Authentication Technical advice 22/09/2017
Network Segmentation and Segregation Technical advice 04/09/2012
Perfect Forward Secrecy Technical advice 10/02/2015
Protecting Web Applications and Users – Technical guidance for improving web application security through implementing web browser-based mitigations Technical advice 28/02/2012
Secure Administration Technical advice 29/09/2015
Securing Content Management Systems (CMS) Technical advice 29/07/2015
Securing PowerShell in the Enterprise Technical advice 15/03/2016
Technical Guidance for Windows Event Logging Technical advice 31/07/2017
Travelling Overseas with an Electronic Device – Technical Advice Technical advice 20/12/2012
Using Remote Desktop Clients Technical advice 14/12/2011
Wireless Network Security – Technical Advice Technical advice 30/01/2012
Evaluation Pathway for Mobile Devices Broadcast 10/04/2014

Publications archive: past advice generally relating to old software, technology or events.