Jellyfish For All Levels of Government
Jellyfish is a responsive platform designed to bring agility through the creation of a secure organisational ecosystem. Jellyfish provides organisations with the capability to aggregate Identity and Access Management and full Credential Management.
Jellyfish achieves this through modules that address system integration pain points. Designed as an integrated, cohesive stack, Jellyfish can address a single pain point or evolve with your security requirements. Each module is created with connectivity and emerging technologies in mind and can be layered to ensure clients can combat new and emerging threats in the cyber landscape.
While no single mitigation strategy is guaranteed to prevent cyber security incidents, the Australian Signals Directorate (ASD) has created a list of 8 baseline strategies, known as the Essential Eight. These strategies make it harder for adversaries to compromise systems and administrator accounts.
The Essential 8 represents an effective strategy for preventing, rather than having to respond to, a large-scale cyber security incident.
The ASD Essential 8 are shown below.
ASD Essential 8
Before implementing any of the mitigation strategies, organisations should:
1. Identify which systems require protection
2. Identify which adversaries are most likely to target their systems
3. Identify what level of protection is required
Create a list of approved/trusted programs to prevent execution of unapproved/malicious programs.
This strategy ensures that all non-approved applications, including malicious code, are prevented from executing.
Block macros from the Internet, and only allow vetted macros – with trusted locations, limited write access or a digitally signed a trusted certificate – in.
Restrict administrative privileges to operating systems and applications based on user duties. Regularly re-validate the need or privileges.
Admin accounts are the ‘keys to the kingdom’ and adversaries use these accounts to gain full access to information and systems.
Stronger user authentication makes it harder for adversaries to access sensitive information and systems. Multi-factor authentication should be used for all users perfoming privileged actions or accessing an important data repository.
Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.
This strategy prevents the possibility of security vulnerabilities in applications being used to execute malicious code in systems.
Configure web browsers to block Flash, ads and Java on the Internet. Disable unneeded features in Microsoft Office, web browsers and PDF viewers.
Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operation system version. Do not use unsupported versions.
Security vulnerabilities in operating systems can be used to further the compromise of systems.
Daily backups should be made for new, important/changed data, software and configuration settings. The backups should be stored, disconnected and retained for at least three months to ensure information can be accessed again following a cyber security incident.
Read About Jellyfish For SME’s
Read About Jellyfish For SME’s
For more information on safeguarding organisations, read NIST’s Ten Essential Activities to Protect Small Business Information, Systems and Networks.
WANT TO LEARN MORE ABOUT JELLYFISH?
1800 COGITO (264486)
or +61 2 6140 4494
0800 COGITO (264486)
or +64 4909 7580
Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Washington DC | Wellington