In the cyber world, the need for robust security measures is paramount. The Essential Eight cybersecurity framework, designed by the Australian Cyber Security Centre (ACSC), is often adopted by businesses to protect against a range of threats. For more information or assistance with Essential Eight implementation, reach out via email or call.
1 of 6
Download to read offline
More Related Content
Cost Analysis for Achieving Essential Eight Compliance Across Various Operating Environments
2. SCENARIO 1: HYBRID
ENVIRONMENT (WINDOWS
AND MACOS)
• ·HYBRID ENVIRONMENT: A MIX OF 30 WINDOWS
DEVICES AND 20 MACOS DEVICES OFTEN SEEN IN
MID-SIZED BUSINESSES TO CATER TO DIFFERENT
OPERATIONAL NEEDS.
• ·DIRECT COSTS: ESTIMATED TO BE $35 AUD PER
USER PER MONTH FOR TOOLS AND AUTOMATION.
• ·Time required: Approximately 100 hours initially for
implementing Essential Eight Baseline Level 1 and
20 hours per month for monitoring and maintaining.
3. SCENARIO 2: CHROMEBOOK
DEVICES
• CHROMEBOOK DEVICES: A UNIFORM IT
INFRASTRUCTURE WITH 50 CHROMEBOOK
DEVICES.
• DIRECT COSTS: ESTIMATED TO BE $10 AUD PER
USER PER MONTH FOR TOOLS AND
AUTOMATION.
• TIME REQUIRED: APPROXIMATELY 50 HOURS
INITIALLY FOR IMPLEMENTING ESSENTIAL EIGHT
BASELINE LEVEL 1 AND 10 HOURS PER MONTH
FOR MAINTENANCE.
4. SCENARIO 3: WINDOWS
ONLY DEVICES
• WINDOWS ONLY DEVICES: SOLE USAGE OF 50 WINDOWS
DEVICES, A COMMON SCENARIO IN BUSINESSES WITH
LEGACY SOFTWARE REQUIREMENTS OR INDUSTRY-
SPECIFIC APPLICATIONS.
• Discussion on the complexities and challenges associated with
managing a more complex operating system like Windows.
• Direct Costs: Estimated to be $30 AUD per user per month for
tools and automation.
• Time required: Approximately 80 hours initially for
implementing Essential Eight Baseline Level 1 and 20 hours
per month for maintenance.
5. COMPARATIVE ANALYSIS
OF SCENARIOS
• ·A DETAILED COMPARISON TABLE SHOWCASING THE
DIRECT, INDIRECT, AND TOTAL COSTS FOR EACH
SCENARIO.
• HIGHLIGHTING CHROMEBOOK DEVICES SCENARIO AS THE
MOST COST-EFFECTIVE OPTION IN TERMS OF BOTH DIRECT
AND INDIRECT COSTS.
• DISCUSSION ON HOW WINDOWS ONLY AND HYBRID
SCENARIOS HAVE HIGHER COSTS DUE TO THE
COMPLEXITIES OF IMPLEMENTING SECURITY AND
MONITORING.