The Australian Signals Directorate (ASD) has published its “Strategies to Mitigate Cyber Security Incidents” based on its analysis of targeted cyber intrusion incidents across the Australian government. First published in 2010, an updated version of these strategies was published in February 2017. Initially aimed at government organizations, the strategies are equally valuable for commercial organizations seeking to protect their networks and users.

Sophos helps you to adopt most of
the ASD Top 35 Mitigation strategies.

Application Whitelisting

Intercept X blocks vulnerabilities in applications, OS and devices; Endpoint and Server Protection ensure unauthorized applications are not utilized; and Sophos Firewall/UTM offers application visibility and control with granular controls.

Patch Applications and OS

While Intercept X blocks vulnerabilities in applications, OS, and devices, Patch Assessment in Sophos Endpoint Protection identifies, prioritizes, and scans for critical-threat related patches; simplifies remediation for missing critical patches; sorts by patch vendor, threat, priority, and more.

Restrict Admin Privileges

Sophos Firewall Manager offers centralized security management with role-based administration. SafeGuard Encryption offers role-based management to separate authorization levels. Endpoint Protection allows granular administrative privileges with role-based administration.

User Application Hardening

User Application Hardening

App Control in Sophos Endpoint and Server Protection ensures unauthorized applications are not utilized. Intercept X blocks vulnerabilities in applications, OS, and devices.

Multi-factor authentication

Multi-factor authentication

SafeGuard Encryption authenticates users with user- or group-specific keys. Sophos Firewall/UTM facilitates two-factor authentication for VPN connections.

Network Segmentation

Network Segmentation

Sophos Firewall/UTM limits access between untrusted devices and critical servers with segmentation of internal network and by applying appropriate policies.

Incident Detection And Response

Incident Detection And Response

All Sophos products can generate security event logs that can be integrated into a centralized monitoring program for incident detection and response.

Email Content Filtering

Email Content Filtering

Sophos Email Appliance secures against phishing, provides advanced DLP and policy-based encryption. Anti-phishing in Sophos Mobile protects from malicious links in emails.

Web Content Filtering

Web Content Filtering

Sophos Firewall/UTM blocks known malicious domains and IPs. Secure Web Gateway offers targeted web malware protection, URL/Web App filtering, cloud-based filtering.

Protect Authentication Credentials

Protect Authentication Credentials

Sophos Firewall/UTM allows strong passphrase policy for admin accounts in terms of complexity, length, password reuse, and more. Sophos Central disables default passwords.

Disable local administrator accounts

Disable local administrator accounts

Sophos Central prevents shared administrator accounts. Each employee has his or her own account, with explicit permissions granted to each account.

What are you waiting for?

Let our experts at Sophos help to build the right solution for your needs.

This is not an exhaustive review of all elements of the Regulation, nor is it legal advice. Please consult your own legal experts if required.