Resources

The resources below are starting points for discussions, not complete frameworks. They are intentionally short and practical.

Essential 8 Checklist

A simple checklist used during discovery sessions to understand where you sit against the ACSC Essential 8 controls.

  • Covers all eight controls with practical questions.
  • Highlights common gaps in SMB environments.
  • Useful for internal conversations and planning.

Download the checklist (PDF) →

Incident Response Considerations

A short outline of questions and actions to consider during an incident, focused on Microsoft 365 and typical SMB networks.

  • Account compromise response basics.
  • Quick wins for containment and investigation.
  • Logging and evidence considerations.

Microsoft 365 Security Notes

Informal notes on common Microsoft 365 security pitfalls and patterns seen across multiple tenants.

  • Conditional Access patterns that work well.
  • Admin roles, break-glass, and MFA considerations.
  • Logging and anomaly detection ideas.

Essential 8 Compliance Platform

A brief overview of the automated platform we use to track and enforce Essential 8 controls across Windows and Linux hosts.

View the platform page →

More Detailed Material

If you would like more detailed material tailored to your industry or environment, please get in touch. We can prepare focused notes or run a short workshop for your team.