ASD Strategies to Mitigate Cyber Security Incidents
A prioritised list of 37 mitigation strategies published by the Australian Signals Directorate to help organisations protect themselves against cyber threats. The Essential Eight is a subset of these strategies.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
Detecting Cyber Security Incidents and Responding
Strategies for detecting and responding to cyber security incidents
| Code | Title |
|---|---|
| ASD37-28 | Continuous incident detection and response (Excellent) |
| ASD37-29 | Host-based IDS/IPS (Very Good) |
| ASD37-30 | Endpoint detection and response (Very Good) |
| ASD37-31 | Hunt to discover incidents (Very Good) |
| ASD37-32 | Network-based IDS/IPS (Limited) |
| ASD37-33 | Capture network traffic (Limited) |
Limiting the Extent of Cyber Security Incidents
Strategies to limit the extent and impact of cyber security incidents
| Code | Title |
|---|---|
| ASD37-18 | Restrict administrative privileges (Essential) |
| ASD37-19 | Patch operating systems (Essential) |
| ASD37-20 | Multi-factor authentication (Essential) |
| ASD37-21 | Disable local administrator accounts (Excellent) |
| ASD37-22 | Network segmentation (Excellent) |
| ASD37-23 | Protect authentication credentials (Excellent) |
| ASD37-24 | Non-persistent virtualised sandboxed environment (Very Good) |
| ASD37-25 | Software firewall - inbound (Very Good) |
| ASD37-26 | Software firewall - outbound (Very Good) |
| ASD37-27 | Outbound data loss prevention (Very Good) |
Preventing Malicious Insiders
Strategies for preventing and detecting malicious insider threats
| Code | Title |
|---|---|
| ASD37-37 | Personnel management (Very Good) |
Preventing Malware Delivery and Execution
Strategies to prevent malware from being delivered to and executed on systems
| Code | Title |
|---|---|
| ASD37-01 | Application control (Essential) |
| ASD37-02 | Patch applications (Essential) |
| ASD37-03 | Configure Microsoft Office macro settings (Essential) |
| ASD37-04 | User application hardening (Essential) |
| ASD37-05 | Automated dynamic analysis of email and web content (Excellent) |
| ASD37-06 | Email content filtering (Excellent) |
| ASD37-07 | Web content filtering (Excellent) |
| ASD37-08 | Deny direct internet connectivity (Excellent) |
| ASD37-09 | OS generic exploit mitigation (Excellent) |
| ASD37-10 | Server application hardening (Very Good) |
| ASD37-11 | Operating system hardening (Very Good) |
| ASD37-12 | Antivirus software with heuristics (Very Good) |
| ASD37-13 | Control removable storage media (Very Good) |
| ASD37-14 | Block spoofed emails (Very Good) |
| ASD37-15 | User education (Limited) |
| ASD37-16 | Antivirus software with signatures (Limited) |
| ASD37-17 | TLS encryption between email servers (Limited) |
Recovering Data and System Availability
Strategies for recovering from cyber security incidents
| Code | Title |
|---|---|
| ASD37-34 | Regular backups (Essential) |
| ASD37-35 | Business continuity and disaster recovery plans (Very Good) |
| ASD37-36 | System recovery capabilities (Very Good) |
Maps to 546 other frameworks
Frequently Asked Questions
What is ASD Strategies to Mitigate Cyber Security Incidents?
ASD Strategies to Mitigate Cyber Security Incidents is a compliance framework from Australia with 5 domains and 37 controls. A prioritised list of 37 mitigation strategies published by the Australian Signals Directorate to help organisations protect themselves against cyber threats. The Essential Eight is a subset of these strategies. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ASD Strategies to Mitigate Cyber Security Incidents have?
ASD Strategies to Mitigate Cyber Security Incidents has 37 controls organised across 5 domains. The largest domains are Preventing Malware Delivery and Execution (17 controls), Limiting the Extent of Cyber Security Incidents (10 controls), Detecting Cyber Security Incidents and Responding (6 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ASD Strategies to Mitigate Cyber Security Incidents map to?
ASD Strategies to Mitigate Cyber Security Incidents maps to 546 other compliance frameworks. The top mapping partners are CSA CCM v4 (57% coverage), Oman National Cybersecurity Framework (54% coverage), DISA Security Technical Implementation Guides (STIGs) (54% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ASD Strategies to Mitigate Cyber Security Incidents compliance?
Start your ASD Strategies to Mitigate Cyber Security Incidents compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ASD Strategies to Mitigate Cyber Security Incidents requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 37 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required