{"id":21261,"date":"2024-01-11T09:49:20","date_gmt":"2024-01-11T09:49:20","guid":{"rendered":"https:\/\/www.avolutionsoftware.com\/?p=21261"},"modified":"2024-05-13T11:35:01","modified_gmt":"2024-05-13T10:35:01","slug":"essential-eight-cybersecurity-framework-for-architects","status":"publish","type":"post","link":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/","title":{"rendered":"The Essential Eight Cybersecurity Framework for Enterprise Architects"},"content":{"rendered":"<h2 class=\"h4\"><em><span style=\"color: #ff9900;\"><strong>Guide to Strategies for Mitigating Cybersecurity Incidents<\/strong><\/span><\/em><\/h2>\n<p>Threats to an organization\u2019s cybersecurity present one of the chief challenges for modern enterprises. Cybersecurity attacks on Australian businesses more than doubled between the 2019-20 and 2021-22 financial years, as reported by the Australian Bureau of Statistics.<\/p>\n<p>An important element of cyber defences is a robust <a href=\"https:\/\/www.avolutionsoftware.com\/enterprise-architecture\/\">enterprise architecture<\/a>, and cybersecurity <a href=\"https:\/\/www.avolutionsoftware.com\/abacus\/enterprise-architecture-frameworks\/\">frameworks<\/a>, providing a scaffold for successful security practices. The Essential Eight cybersecurity framework stands out for its targeted technical controls. It offers three distinct maturity levels, providing enterprises with a clear roadmap towards progressively stronger defences.<\/p>\n<h2 class=\"h4\" style=\"text-align: left;\"><strong>What is the Essential Eight Framework?<\/strong><\/h2>\n<p>Developed by <span style=\"color: #000000;\">the <a style=\"color: #000000;\" href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/essential-eight\">Australian Signals Directorate<\/a> \u2013<\/span> an Australian federal government agency &#8211; the Essential Eight is a cybersecurity framework that sets out to assist organizations in protecting themselves against cyber threats.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-21274 size-medium\" src=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png\" alt=\"\" width=\"300\" height=\"297\" srcset=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png 300w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-150x150.png 150w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1.png 456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The framework outlines a series of mitigation strategies and principles designed to safeguard Microsoft Windows-based internet-connected networks. The strategies detail a minimum set of preventative measures required to achieve adequate protection.<\/p>\n<p>The eight controls identified are designed to complement each other, with organizations recommended master a maturity level before progressing onto the next.<\/p>\n<h2 class=\"h4\" style=\"text-align: left;\"><strong>Essential Eight and Other Cybersecurity Frameworks<\/strong><\/h2>\n<p>The Essential Eight\u2019s streamlined approach provides an accessible starting point to cybersecurity in comparison to other frameworks, such as the <a href=\"https:\/\/www.avolutionsoftware.com\/abacus\/enterprise-architecture-frameworks\/nist-cybersecurity\/\">NIST Cybersecurity Framework<\/a>\u00a0(from the US National Institute of Standards Technology). While NIST features 108 Mitigation Strategy Categories and 1,177 Security Controls, the Essential Eight framework lists 8 Categories and 69 Controls.<\/p>\n<p>With targeted security controls, focused preventative measures and condensed mitigation strategies, the Essential Eight offers an easier entry point for organizations.<\/p>\n<h2 class=\"h4\" style=\"text-align: left;\"><strong>Implementing Essential Eight with Your Enterprise Architecture<\/strong><\/h2>\n<p>The Essential Eight offers a staged approach to incorporating cybersecurity across an organization, allowing enterprises to steadily ramp up their defences. The framework defines four maturity levels, ranked from zero to three. These levels are aimed at progressively assessing, monitoring, and improving the framework\u2019s application.<\/p>\n<p>How can an enterprise architecture team apply the framework?<\/p>\n<ul>\n<li><strong>Identify your cybersecurity maturity level<\/strong>\n<ul>\n<li>An organization\u2019s maturity level considers the likelihood of being targeted and the consequences of a cyber-attack. Higher levels feature additional measures and controls.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"wp-image-21436 size-large aligncenter\" src=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-1024x457.jpg\" alt=\"Essential Eight Levels\" width=\"640\" height=\"286\" srcset=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-1024x457.jpg 1024w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-300x134.jpg 300w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-768x343.jpg 768w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-1536x685.jpg 1536w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-Eight-Levels-2048x914.jpg 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<ul>\n<li><strong>Incorporate the Essential Eight into the organization\u2019s existing metamodel<\/strong>\n<ul>\n<li>Once a maturity level has been chosen, the corresponding list of mitigation strategies and preventive measures can be incorporated into existing metamodels, similarly to how generic business strategies and processes are modelled.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Develop a cybersecurity compliance profile<\/strong>\n<ul>\n<li>Once a compliance profile is built, a scoring algorithm, which in nature awards compliance and punishes non-compliance, can be created to provide a visualized metric.<\/li>\n<li>Compliance metrics can be measured over time, with changes in architectural activities being monitored. Future state planning and gap analysis can be implemented to provide an actionable roadmap for organisations to build robust cybersecurity practices within EA functions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2 class=\"h4\" style=\"text-align: left;\"><strong>Modeling Essential Eight with the ABACUS Enterprise Architecture Software<\/strong><\/h2>\n<p>Using an architecture modeling tool such as <a href=\"https:\/\/www.avolutionsoftware.com\/abacus\/\">ABACUS<\/a> to implement your cybersecurity framework provides a more holistic and connected view of your security position. ABACUS provides a comprehensive store of enterprise architecture, security architecture and business processes. Your teams\u2019 ability to diagnose vulnerabilities, track implementation progress and streamline framework adoption is well supported. This includes<\/p>\n<ul>\n<li><strong>Boosting compliance with closer monitoring of framework implementation. <\/strong>Granular level visibility empowers teams to address compliance gaps and remain on track across domains.<\/li>\n<li><strong>Applying a high-level enterprise architecture approach to risk management means your team can:<\/strong>\n<ul>\n<li>Model future-state architectural cost\/benefit analysis to determine risk acceptance\/residual risk levels.<\/li>\n<li>Conduct <a href=\"https:\/\/www.avolutionsoftware.com\/use-cases\/business-process-management-tool\/\">process<\/a> and <a href=\"https:\/\/www.avolutionsoftware.com\/news\/how-to-create-a-business-capability-map\/\">business capability modeling<\/a> for organizational adoption of security practices.<\/li>\n<li>Perform gap analysis of current\/target state to plan for transition roadmap.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Set up analytics to automate and monitor progress on your security and risk scores<\/strong>.\n<ul>\n<li>Generate scripts for automatic diagram creation. Perform impact analysis with World According To diagrams.<\/li>\n<li>Machine learning assists by auto-filling gaps in your data with predictions based on existing patterns.<\/li>\n<li>Collaborative dashboards engage stakeholders from across the organization to track and allocate cybersecurity activities.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-21299 size-full\" src=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-catalog-1.jpg\" alt=\"\" width=\"1221\" height=\"454\" srcset=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-catalog-1.jpg 1221w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-catalog-1-300x112.jpg 300w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-catalog-1-768x286.jpg 768w, https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-catalog-1-1024x381.jpg 1024w\" sizes=\"(max-width: 1221px) 100vw, 1221px\" \/><\/p>\n<p style=\"text-align: center;\"><em><span class=\"small_text\">Essential Eight catalog in ABACUS<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guide to Strategies for Mitigating Cybersecurity Incidents Threats to an organization\u2019s cybersecurity present one of the chief challenges for modern enterprises. Cybersecurity attacks on Australian businesses more than doubled between the 2019-20 and 2021-22 financial years, as reported by the Australian Bureau of Statistics. An important element of cyber defences is a robust enterprise architecture, [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[586,1],"tags":[],"class_list":["post-21261","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-general","language-english"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential Eight Cybersecurity Framework for Enterprise Architects<\/title>\n<meta name=\"description\" content=\"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework &amp; learn how to implement it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Eight Cybersecurity Framework for Enterprise Architects\" \/>\n<meta property=\"og:description\" content=\"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework &amp; learn how to implement it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\" \/>\n<meta property=\"og:site_name\" content=\"Avolution\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-11T09:49:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-13T10:35:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png\" \/>\n<meta name=\"author\" content=\"Leahan Shimon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leahan Shimon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\"},\"author\":{\"name\":\"Leahan Shimon\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/db4f8cad1704b85e7ed8d7382dbd305e\"},\"headline\":\"The Essential Eight Cybersecurity Framework for Enterprise Architects\",\"datePublished\":\"2024-01-11T09:49:20+00:00\",\"dateModified\":\"2024-05-13T10:35:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\"},\"wordCount\":668,\"publisher\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png\",\"articleSection\":[\"Cybersecurity and Risk\",\"General\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\",\"url\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\",\"name\":\"Essential Eight Cybersecurity Framework for Enterprise Architects\",\"isPartOf\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png\",\"datePublished\":\"2024-01-11T09:49:20+00:00\",\"dateModified\":\"2024-05-13T10:35:01+00:00\",\"description\":\"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework & learn how to implement it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage\",\"url\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1.png\",\"contentUrl\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1.png\",\"width\":456,\"height\":451},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.avolutionsoftware.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Essential Eight Cybersecurity Framework for Enterprise Architects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#website\",\"url\":\"https:\/\/www.avolutionsoftware.com\/\",\"name\":\"Avolution\",\"description\":\"The Enterprise Architecture Tool That Transforms With You\",\"publisher\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.avolutionsoftware.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#organization\",\"name\":\"Avolution\",\"url\":\"https:\/\/www.avolutionsoftware.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2025\/06\/avoution-orange-favicon.png\",\"contentUrl\":\"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2025\/06\/avoution-orange-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Avolution\"},\"image\":{\"@id\":\"https:\/\/www.avolutionsoftware.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/db4f8cad1704b85e7ed8d7382dbd305e\",\"name\":\"Leahan Shimon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a30157b7cf452a4e960eb1918d4ef90195ed7727e8552d1db492d8ca5f26742?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a30157b7cf452a4e960eb1918d4ef90195ed7727e8552d1db492d8ca5f26742?s=96&d=mm&r=g\",\"caption\":\"Leahan Shimon\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essential Eight Cybersecurity Framework for Enterprise Architects","description":"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework & learn how to implement it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/","og_locale":"en_GB","og_type":"article","og_title":"Essential Eight Cybersecurity Framework for Enterprise Architects","og_description":"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework & learn how to implement it.","og_url":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/","og_site_name":"Avolution","article_published_time":"2024-01-11T09:49:20+00:00","article_modified_time":"2024-05-13T10:35:01+00:00","og_image":[{"url":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png","type":"","width":"","height":""}],"author":"Leahan Shimon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leahan Shimon","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#article","isPartOf":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/"},"author":{"name":"Leahan Shimon","@id":"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/db4f8cad1704b85e7ed8d7382dbd305e"},"headline":"The Essential Eight Cybersecurity Framework for Enterprise Architects","datePublished":"2024-01-11T09:49:20+00:00","dateModified":"2024-05-13T10:35:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/"},"wordCount":668,"publisher":{"@id":"https:\/\/www.avolutionsoftware.com\/#organization"},"image":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png","articleSection":["Cybersecurity and Risk","General"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/","url":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/","name":"Essential Eight Cybersecurity Framework for Enterprise Architects","isPartOf":{"@id":"https:\/\/www.avolutionsoftware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage"},"image":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1-300x297.png","datePublished":"2024-01-11T09:49:20+00:00","dateModified":"2024-05-13T10:35:01+00:00","description":"Defend against cybersecurity threats with the Essential Eight cybersecurity for enterprise architects framework & learn how to implement it.","breadcrumb":{"@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#primaryimage","url":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1.png","contentUrl":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2024\/01\/Essential-8-framework-1.png","width":456,"height":451},{"@type":"BreadcrumbList","@id":"https:\/\/www.avolutionsoftware.com\/news\/essential-eight-cybersecurity-framework-for-architects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.avolutionsoftware.com\/"},{"@type":"ListItem","position":2,"name":"The Essential Eight Cybersecurity Framework for Enterprise Architects"}]},{"@type":"WebSite","@id":"https:\/\/www.avolutionsoftware.com\/#website","url":"https:\/\/www.avolutionsoftware.com\/","name":"Avolution","description":"The Enterprise Architecture Tool That Transforms With You","publisher":{"@id":"https:\/\/www.avolutionsoftware.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.avolutionsoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.avolutionsoftware.com\/#organization","name":"Avolution","url":"https:\/\/www.avolutionsoftware.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.avolutionsoftware.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2025\/06\/avoution-orange-favicon.png","contentUrl":"https:\/\/www.avolutionsoftware.com\/wp-content\/uploads\/2025\/06\/avoution-orange-favicon.png","width":512,"height":512,"caption":"Avolution"},"image":{"@id":"https:\/\/www.avolutionsoftware.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/db4f8cad1704b85e7ed8d7382dbd305e","name":"Leahan Shimon","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.avolutionsoftware.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a30157b7cf452a4e960eb1918d4ef90195ed7727e8552d1db492d8ca5f26742?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a30157b7cf452a4e960eb1918d4ef90195ed7727e8552d1db492d8ca5f26742?s=96&d=mm&r=g","caption":"Leahan Shimon"}}]}},"_links":{"self":[{"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/posts\/21261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/comments?post=21261"}],"version-history":[{"count":4,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/posts\/21261\/revisions"}],"predecessor-version":[{"id":21403,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/posts\/21261\/revisions\/21403"}],"wp:attachment":[{"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/media?parent=21261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/categories?post=21261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.avolutionsoftware.com\/wp-json\/wp\/v2\/tags?post=21261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}