Thycotic

Free Whitepaper: Privileged Access Management & ASD Compliance

How to align a PAM project for ASD Compliance and Maturity

Enforce least privilege and application whitelisting

Protect your passwords and privilege account access

Keep all your systems patched and up to date

The State of PAM in Australia Today

Despite this focus and advice from the ASD, recent attacks highlight a need for progress.

A recent audit carried out on New South Wales agencies where 62 agencies self-assessed their maturity against the top 8 (essential 8) ASD strategies. 85% of the 62 agencies marked themselves at level zero for application whitelisting, with restriction of admin privileges, seeing 28 marking themselves at level zero. Although patching of applications and operating systems are better (37% & 29% respectively), without proper PAM in place it is unconfirmed whether vulnerability scanners are being granted privileged access securely. 

Running a PAM Initiative with the ASD's Guidance

The Australian Signals Directorate first launched their “Strategies to Mitigate Cyber Security Incidents” in the early 2010s. 10 years on, the ASD continues to expand, elaborate, and refine this set of strategies, with a total of 37 strategies listed. And as well as going deeper in terms of guidance, the ASD’s reach continues to expand too, with more and more organisations within and without the Australian Federal sector looking to it’s principles and guidance as a benchmark.

Along with being accessible, clear, and effective, part of what makes the ASD’s work so compelling is that it is based on foundation of real-life security incidents and vulnerabilities that are facing Australian organisations. It is this grounding in reality that has led to the ASD’s guidance being so influential.

You’ll learn how to: 

Why Choose Thycotic?

The fastest growing provider of Privilege Management solutions, Thycotic secures more than 10,000 organisations worldwide including Fortune 500 enterprises - giving the company unique insight into the challenges enterprises are facing. Thycotic’s award-winning Privileged Account Management minimises risk, limits access, and controls applications on endpoints and servers.

Download the Whitepaper now! We explain all of this in detail so you can confidently understand ASD compliance, it’s implications for your organisation, and how PAM can be used to support this initiative.

What will I learn from this whitepaper?

Learn how Thycotic can help you run a PAM initiative with the ASD's guidance.

Our Privacy Policy
GET MY WHITEPAPER

© Copyright 2020 Thycotic. All Rights Reserved.

What's the Problem?
Why Choose Thycotic?
Cyber Catastrophe
Compromised Passwords
Hackers Capture
Anatomy of a Privileged Account Hack
Anatomy of a Privileged Account Hack
Hackers Capture

See how the Essential 8 model aligns with the ASDs ISM Security Controls

Compromised Passwords
Cyber Catastrophe
Cyber Catastrophe

Understand how a PAM project contributes to ASD compliance

See a step by step programme for PAM maturity and ASD compliance

Define PAM and it’s role in the ASD’s key priorities for the Federal vertical