Efforts are being considered to map this to or Foundation for Public Private Collaboration.
This document, developed by the Australian Signals Directorate (ASD), replaces ASD’s publication Strategies to Mitigate Targeted Cyber Intrusions – Mitigation Details and directly complements ASD’s publication Strategies to Mitigate Cyber Security Incidents
Additional information is provided in this document to help organizations mitigate cyber security incidents caused by:
targeted cyber intrusions (e.g. executed by advanced persistent threats such as foreign intelligence services) and other external adversaries who steal data
ransomware denying access to data for monetary gain, and external adversaries who destroy data and prevent computers/networks from functioning
malicious insiders who steal data such as customer details or intellectual property malicious insiders who destroy data and prevent computers/networks from functioning
“business email compromise”
threats to industrial control systems.
Implementation guidance is provided for each of the associated mitigation strategies, including references to controls in ASD’s Australian Government Information Security Manual(ISM).
Readers are strongly encouraged to visit ASD’s website for the latest version of this document and additional information about implementing the mitigation strategies.
ASD’s website also has separate and specific guidance for mitigating denial of service, and securely using cloud computing and enterprise mobility including personally owned computing devices such as tablets, smartphones and laptops.
We do not provide links that are not https so you will have to search for these.