Back to Governance & ComplianceCompliance Framework

Essential Eight — ASD Cybersecurity Strategies

The Australian government's baseline cybersecurity standard

The Essential Eight is the Australian Signals Directorate's (ASD) prioritised set of eight mitigation strategies that, when implemented correctly, make it significantly harder for adversaries to compromise systems.

The Essential Eight is developed and maintained by the Australian Signals Directorate (ASD) as part of its Strategies to Mitigate Cyber Security Incidents. It represents the eight most effective cybersecurity controls that prevent the vast majority of cyber attacks. The strategies are organised into four maturity levels (0–3), allowing organisations to progressively improve their cybersecurity posture.

Compliance with the Essential Eight is mandatory for many Australian Government non-corporate Commonwealth entities (NCEs) and is increasingly adopted as a baseline standard by state and local governments, critical infrastructure operators, and private sector organisations. The ASD's 2023 Annual Cyber Threat Report consistently highlights that most successful attacks could have been prevented by implementing the Essential Eight to Maturity Level 2.

Who Needs It

Who Needs Essential 8?

Australian Government non-corporate Commonwealth entities (mandatory)

State and local government agencies adopting Commonwealth security standards

Critical infrastructure operators in sectors regulated under the Security of Critical Infrastructure Act

Private sector organisations seeking a practical, government-endorsed security baseline

Government contractors and suppliers handling Australian Government data

Organisations wanting to demonstrate security maturity to government and enterprise customers

Key Requirements

What It Covers

Application Control

Prevent execution of unapproved/malicious programs including .exe, DLL, scripts, and installers — one of the most effective controls against ransomware.

Patch Applications

Patch or mitigate vulnerabilities in internet-facing services within 48 hours (critical) and 2 weeks (non-critical) — essential against known exploit campaigns.

Configure Microsoft Office Macro Settings

Block Microsoft Office macros from the internet and restrict macro execution to vetted, signed macros — targeting a primary phishing payload delivery mechanism.

User Application Hardening

Configure web browsers, Office, and PDF viewers to block ads, disable unneeded features like Flash and OLE, and prevent web-based malware execution.

Restrict Administrative Privileges

Minimise admin accounts, use separate admin accounts for privileged tasks, and require Just-In-Time (JIT) administration — limiting lateral movement.

Patch Operating Systems

Patch or mitigate OS vulnerabilities, prioritising internet-exposed systems. Replace unsupported operating systems that no longer receive security updates.

Multi-Factor Authentication (MFA)

Implement phishing-resistant MFA for all remote access, privileged accounts, and third-party services storing sensitive data.

Regular Backups

Perform and test regular backups of important data, software, and configuration settings. Maintain offline or immutable copies to recover from ransomware.

Business Value

Benefits of Essential 8

Satisfy mandatory requirements for Australian Government entities and many government contracts

Prevent the vast majority of common cyber attacks with eight targeted controls

Provide a clear, measurable maturity roadmap from ML0 to ML3

Demonstrate practical security commitment to government and enterprise customers

Reduce cyber insurance premiums — insurers increasingly reference Essential Eight as a baseline

Our Process

How We Help You Achieve It

1

Maturity Assessment

We assess your current Essential Eight implementation against all four maturity levels using ASD assessment guidance.

2

Target Level Definition

We help you determine the appropriate target maturity level based on your regulatory obligations and risk profile.

3

Remediation Roadmap

We develop a prioritised roadmap to reach your target maturity level with realistic timelines and resource estimates.

4

Technical Implementation

We support technical implementation across all eight strategies — from application control to MFA configuration.

5

Evidence & Documentation

We document your implementation and controls evidence to satisfy government and enterprise due diligence requirements.

6

Independent Assessment

We conduct an independent maturity assessment and produce a report suitable for regulatory submission.

FAQ

Frequently Asked Questions

Ready to Start Your Essential 8 Journey?

Begin with a free cybersecurity gap assessment to understand where you stand, then let our experts guide you to certification.