ACSC Essential Eight

Fortify Your Defences

The Essential 8 is a risk management framework developed by the Australian Cyber Security Centre (ACSC) designed to help businesses tackle key security concerns. Made up of eight crucial mitigation strategies, it provides a proven baseline of security for Australian organisations.

Book an Assessment
The Framework

Eight Strategies. One Resilient Business.

Developed by the ACSC, the Essential Eight provides a practical, prioritised set of mitigation strategies that, when implemented together, form a robust baseline of cyber protection for any organisation.

Prevent Cyber Attacks

Application Whitelisting

Control which applications can execute on your systems, preventing malicious software and unapproved programs from running.

Patch Applications

Regularly update applications to address known vulnerabilities before attackers can exploit them.

Configure Microsoft Office Macro Settings

Restrict macro execution to reduce the risk of malware delivered via Office documents.

User Application Hardening

Configure web browsers and other applications to block malicious content and reduce your attack surface.

Limit Extent of Attacks

Restrict Administrative Privileges

Limit admin access to those who genuinely need it, reducing the potential damage from compromised accounts.

Patch Operating Systems

Keep operating systems updated to close known vulnerabilities targeted by attackers.

Multi-Factor Authentication

Require more than a password to access systems, significantly reducing the risk of credential-based attacks.

Recover Data & System Availability

Regular Backups

Maintain regular, tested backups of important data to ensure rapid recovery in the event of a ransomware attack or data loss incident. Backups should be stored securely and tested regularly to confirm they can be restored when needed.

Maturity Model

Essential Eight Maturity Levels

The ACSC defines four maturity levels for the Essential Eight, ranging from Level 0 (not aligned) to Level 3 (fully aligned). Understanding where your organisation sits on this scale is the first step toward meaningful improvement.

0
Level 0
Not Aligned

The organisation has not implemented any of the Essential Eight strategies, leaving critical vulnerabilities unaddressed.

1
Level 1
Partly Aligned

Basic security controls are in place but implementation is inconsistent or incomplete across the organisation.

2
Level 2
Mostly Aligned

Most strategies are implemented effectively with only minor gaps remaining. The organisation is well-positioned to resist targeted attacks.

3
Level 3
Fully Aligned

All eight strategies are fully implemented and regularly reviewed. The organisation demonstrates a mature, comprehensive security posture.

Ready to Close Your Security Gaps?

Our highly skilled security experts can work with you and your team to identify gaps in your IT operations via an internal audit against the Essential Eight Framework. Once identified, we deliver a tailored plan that fits your budget and business requirements.

Book an Assessment
Get In Touch

Let's Talk Security

Ready to protect your business? Get in touch and we'll tailor a solution for your specific needs and budget.

Office
Level 17, 45 Grenfell Street, Adelaide SA 5000