Learn about the Essential Eight / Essential 8 framework, its maturity model, passkeys & phishing-resistant MFA. See how Australian orgs improve security.
Vincent
Created: July 6, 2024
Updated: October 10, 2024
Get free passkey whitepaper for Australian organizations.
Get for FreeWhat is the Essential Eight Framework?
2.1 Purpose of the Essential Eight Framework
2.2 Key Mitigation Strategies of the Essential Eight Framework
Essential Eight Maturity Levels
3.1 Overview of the Essential Eight Maturity Model
3.2 Essential Eight Maturity Level 0: No Cyber Hygiene
3.3 Essential Eight Maturity Level 1: Basic Cyber Hygiene
3.4 Essential Eight Maturity Level 2: Enhanced Security Measures
3.5 Essential Eight Maturity Level 3: Advanced Security Posture
Why is Multi-Factor Authentication One of the Most Important Elements of Essential Eight
4.1 What Multi-Factor Authentication Factors Exist under Essential Eight?
4.2.1 What’s Sensitive Organizational Data Under Essential Eight?
4.2.2 What’s Sensitive Customer Data Under Essential Eight?
4.3 Essential Eight MFA Requirements
The 2023-2030 Australian Cyber Security Strategy underscores Australia’s commitment to strengthening its cyber defense mechanisms. Central to this strategy is the Essential Eight / Essential 8 Framework. In November 2023, significant revisions were made to the Essential Eight / Essential 8 and myGov launched passkeys in June 2024 and Hon. Bill Shorten MP announced days after the launch:
“within days of passkeys being available on myGov, over 20,000 Australians have already created a passkey for their myGov account.”
These adjustments and strong efforts of the government reflect the evolving cyber threat landscape and the necessity for more robust security measures. In this article, we will focus on the authentication aspects and answer the following questions:
The Essential Eight is a set of baseline mitigation strategies developed by the Australian Cyber Security Centre (ACSC) to help organizations strengthen their cyber defenses. Originally introduced in 2017, the Essential Eight framework was designed to provide a practical and effective foundation for mitigating cyber threats. The framework was created in response to the growing frequency and sophistication of cyberattacks, recognizing the need for a standardized approach to enhance the cyber resilience of Australian organizations.
The primary purpose of the Essential Eight is to protect systems and data from a wide range of cyber threats. It provides organizations with a clear, structured approach to implementing essential security measures. By adopting these strategies, organizations can significantly reduce the risk of cyber incidents and improve their overall security posture. The Essential Eight is applicable to all types of organizations, regardless of their size or industry, making it a versatile and comprehensive framework.
Historically, the Essential Eight has played a critical role in advancing Australia's cyber security strategy. It aligns with the broader objectives of the Australian Cyber Security Strategy, which aims to create a secure and resilient digital environment for the country. The framework is periodically reviewed and updated to address emerging threats and incorporate advancements in security technologies.
The Essential Eight framework consists of eight key mitigation strategies, each addressing a specific aspect of cyber security. These strategies include:
The framework also introduces the concept of Maturity Levels, which help organizations gauge their implementation progress and set security goals based on their size and the criticality of their service. By progressing through these maturity levels, organizations can continuously enhance their security capabilities and resilience.
Subscribe to our Passkeys Substack for the latest news, insights and strategies.
SubscribeThe Essential Eight framework introduces a maturity model to help organizations assess their current security posture and set achievable goals for improvement. This model consists of three distinct maturity levels, each representing a different stage of cyber hygiene and security measures (note that there is actually a fourth maturity level 0, but which is equal to having not maturity at all).
The maturity model provides a structured approach for organizations to enhance their cyber defenses progressively. Each maturity level corresponds to a set of security practices and measures appropriate for the organization's size, complexity, and the criticality of their data and services.
Maturity Level 0 represents organizations that have either incomplete or no cyber hygiene measures in place. These organizations are highly vulnerable to cyber threats and must begin implementing basic security practices.
Maturity Level 1 focuses on establishing foundational security practices. Organizations at this level typically have minimal cyber security measures in place and are beginning to address common threats. This level is suitable for:
Maturity Level 2 builds on the foundational practices established in Level 1, introducing more advanced security measures to address a broader range of threats. Organizations at this level should already have a strong understanding of cyber security and are working to enhance their defenses. This level is suitable for:
Maturity Level 3 represents the highest level of cyber security maturity within the Essential Eight framework. Organizations at this level must implement comprehensive and advanced security measures to protect against sophisticated threats and have already started to roll out passkeys:
Understanding these maturity levels helps organizations identify their current security posture and develop a roadmap for continuous improvement, aligning with the broader goals of Australia's 2023-2030 Cyber Security Strategy.
Become part of our Passkeys Community for updates and support.
JoinProtecting authentication is one of the most important aspects of cybersecurity. Authentication is the gate to data access and failing to protect credentials is the root of many cybersecurity incidents.
Multi-Factor Authentication (MFA) under the Essential Eight framework requires the use of multiple authentication methods from different authentication categories to verify the identity of users. The categories include:
The updated guidelines specify that MFA should not rely on two factors from the same category, e.g. two knowledge-based factors.
Prior to the update, security questions were often used as a secondary factor. However, this is no longer acceptable due to the increased risk of these factors being compromised. The Essential Eight now mandates the use of more secure and varied authentication methods to ensure robust protection against phishing and other cyber threats.
Factor Overview for Essential Eight MFA
The official Essential Eight Assessment Process Guide lays out more details and assessment of authentication factors:
Most current deployments use passwords as the first factor which is then combined with another factor. The table makes transparent that passkeys are the only authentication method that performs well on all characteristics.
While most characteristics do not need an explanation, the following require some background knowledge:
After we have discussed the MFA factor definitions of the Essential Eight framework and compared the most important MFA factors and their characteristics, we will now investigate how Essential Eight categorizes sensitive data.
Understanding the differences of sensitive data is important because different requirements follow. The Essential Eight Framework distinguishes between sensitive organizational and sensitive customer data.
Sensitive organizational data pertains to information that is crucial to the operations and security of an organization. Unauthorized access or disclosure of this data can have serious implications for the organization's functioning and security posture.
Non-sensitive organizational data includes information that is not critical to the organization's security or operations and does not pose a significant risk if disclosed. This type of data is still protected, but with less stringent measures compared to sensitive data.
Sensitive Organizational Data | Non-Sensitive Organizational Data |
---|---|
|
|
Around organizational data, there is low confusion about sensitivity, most of the time both data exist at the same place. Therefore, nearly all companies treat all organizational data as sensitive data, and the higher requirements are applied to authentication.
Sensitive customer data includes personal information that, if disclosed, could cause significant harm or distress to individuals. This type of data is protected under stricter security measures due to its critical nature.
Although the Essential Eight framework does not explicitly reference non-sensitive customer data, there might be situations where services might only process uncritical data. Non-sensitive customer data would include information that, if disclosed, does not pose a significant risk to the individual’s privacy or security. The following table can act as guidance to what customer data could be classified as sensitive customer data.
Sensitive Customer Data | Non-Sensitive Customer Data |
---|---|
|
|
Nearly all consumer-facing services that allow customers to purchase services or goods today include some sort of personal data or privacy-related information under Australian Privacy Principles (APPs). There is no clear definition of the extent to which sensitive customer data are covered.
We have now explained two of the three important components that determine the resulting MFA requirements:
The last important component is who is authenticated:
This structured approach ensures that the appropriate level of security is applied based on the risk and impact associated with a possible breach. Based on the associated risk, Essential Eight has three possible requirements and recommendations:
Name | Require MFA | Require MFA + offer one phishing-resistant MFA option (PR-MFA) | Only phishing-resistant-MFA allowed (PR-MFA) |
---|---|---|---|
Complexity | Low | Medium-High | High |
Explanation | Requiring MFA is the first step of security. When Multi-Factor Authentication is required, passwords can be combined with any of the above methods. | At least one phishing-resistant MFA option needs to be offered parallel to requiring MFA in general. | Only phishing-resistant MFA options are allowed for primary authentication. Moving into this category is challenging. |
The following table shows when the Essential Eight framework requires which authentication by Maturity Level, data sensitivity and type of user.
The red table cells show that companies at Maturity Level 2 or higher must implement phishing-resistant multi-factor authentication.
It is a clear commitment by the Australian Government and all its advisors to push for passkeys as a replacement for passwords. Enforcing phishing-resistance also for consumers was only made possible by the advent of passkeys (passkeys are referenced frequently on the governmental Essential 8 page).
While phishing-resistant authentication for “organizational users” / workforce can be done via workforce Single-Sign-On or Identity Providers (IdPs) like Azure AD or Google Workspace, phishing-resistant customer authentication is difficult:
Next, we will focus on how to implement phishing-resistant consumer MFA for companies and government agencies.
Why Are Passkeys Important For Australian Organizations?
The Australian Cyber Security Strategy and Essential Eight framework require organizations to implement phishing-resistant MFA (via passkeys). Our whitepaper provides an overview and shows how to implement passkeys efficiently and what the business impact is.
If you have questions, feel free to
contact usUnlock the Full Potential of Essential Eight Passkeys
Steps to Implement Phishing-Resistant MFA
Measuring Implementation Success
Integrating phishing-resistant MFA, specifically through passkeys, is important for future-proofing organizational cyber security in line with the Essential Eight framework. Here are several recommendations to ensure a successful transition:
By following these recommendations, organizations can not only comply with the Essential Eight requirements but also significantly enhance their overall cyber security posture. Transitioning to passkeys will position organizations to better handle emerging cyber threats, ensuring a safer and more resilient digital environment.
The Essential Eight framework, developed by the Australian Cyber Security Centre (ACSC), represents a critical component of Australia's national cyber security strategy. It aims to provide organizations with a comprehensive and structured approach to mitigating cyber threats. Through this article, we've explored the Essential Eight framework, focusing on the following key questions:
In conclusion, the Essential Eight framework offers a robust and adaptable approach to improving cyber security across organizations of all sizes. By progressing through the maturity levels, organizations can enhance their security posture and resilience against cyber threats. The shift towards phishing-resistant MFA, particularly through the adoption of passkeys, aligns with the framework's emphasis on strong authentication. As the Australian government continues to update and refine the Essential Eight, organizations should prioritize the implementation of these strategies to safeguard their systems and data effectively.
Table of Contents
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
We provide UI components, SDKs and guides to help you add passkeys to your app in <1 hour
Start for free
Recent Articles
Enterprise Passkeys: Apple, Google & Microsoft's Offerings
Lukas R. - November 9, 2023
Passkeys vs. 2FA: Why Passkeys are More Secure than Regular 2FA
Daniel - September 5, 2023