← Back to Resources

The Essential Eight Explained: What Australian Businesses Need to Implement

The ASD Essential Eight is Australia's most important cyber security baseline — mandatory for government agencies, increasingly expected across the private sector, and referenced by cyber insurers, regulators and government procurement. Here's what the eight controls are, what maturity levels mean in practice, and where your organisation should start.

The Australian Signals Directorate published the Essential Eight in 2017 with a simple premise: implementing these eight mitigation strategies would prevent the vast majority of cyber incidents affecting Australian organisations. The controls weren't invented for the occasion — they were derived from ASD's operational experience responding to real breaches, conducting penetration tests, and analysing the tradecraft of the threat actors actually targeting Australian networks.

Nearly a decade on, the Essential Eight remains the most widely referenced cyber security framework in Australia. It is mandatory for Commonwealth government entities, referenced in the Protective Security Policy Framework (PSPF), required for Defence Industry Security Program (DISP) members, and increasingly expected by organisations seeking government contracts, cyber insurance, or compliance with industry regulations that reference ASD guidance.

Despite this, implementation remains surprisingly low. ASD's own reporting shows that in 2025, only 22% of Commonwealth entities — the organisations legally required to comply — had achieved the mandated Maturity Level 2 across all eight strategies. For the private sector, which has no legal compulsion but significant practical incentive, meaningful implementation is rarer still.

This guide explains what the Essential Eight actually requires, what maturity levels mean, and how to assess where your organisation stands.

22%
of Commonwealth entities achieved Maturity Level 2 in 2025 — the level they're required to reach
8
mitigation strategies that ASD says prevent the majority of cyber incidents
ML2
mandatory target for Commonwealth entities under PSPF Policy 14 since July 2022

The Eight Strategies

The Essential Eight is not a checklist you can tick once and forget. Each strategy is a control domain with specific technical requirements that vary by maturity level. Here is what each one covers:

Strategy 1

Application Control

Prevents unapproved or malicious programs — including malware — from executing on workstations and servers. Only applications explicitly permitted are allowed to run.

Strategy 2

Patch Applications

Ensures internet-facing services and high-risk applications are patched within defined timeframes. At higher maturity levels, critical vulnerabilities must be addressed within 48 hours.

Strategy 3

Configure Microsoft Office Macros

Restricts macro execution to prevent macro-based malware delivery. Macros from the internet are blocked; only digitally signed macros from trusted locations are permitted at higher levels.

Strategy 4

User Application Hardening

Reduces the attack surface in web browsers, PDF viewers, and office applications — blocking web advertisements, Java from the internet, and other common exploit vectors.

Strategy 5

Restrict Administrative Privileges

Limits who holds admin rights and what they can do with them. Privileged users should use separate accounts for privileged and unprivileged tasks, and admin accounts should not be used for email or web browsing.

Strategy 6

Patch Operating Systems

Keeps Windows, macOS, and Linux systems current. Unsupported operating systems must be replaced. At higher maturity levels, critical OS patches must be applied within 48 hours of release.

Strategy 7

Multi-Factor Authentication

Requires additional verification beyond passwords. At higher maturity levels, MFA must be phishing-resistant — meaning SMS codes and authenticator apps are no longer sufficient; hardware tokens or passkeys are required.

Strategy 8

Regular Backups

Protects critical data, software, and configuration settings with regular, tested backups stored separately from production systems. Backups must be able to be restored — not just exist.

The weakest link rule: An organisation's overall maturity level is determined by its lowest-performing strategy. If seven of the eight controls are at Maturity Level 2 but backups are only at Level 1, the overall rating is Level 1. There is no averaging or credit for partial progress.

What Maturity Levels Actually Mean

The Essential Eight Maturity Model defines four levels — zero through three — each representing a progressively more robust implementation of the eight strategies.

Level What It Reflects Typical Organisation
ML 0 Controls not implemented or so incomplete they provide little meaningful protection Organisations yet to begin structured cyber security implementation
ML 1 Basic protection against opportunistic attacks using commodity tools and automated techniques ASD guidance suggests this is appropriate for small to medium enterprises
ML 2 Protection against moderately sophisticated adversaries — including those using spear phishing, credential harvesting, and lateral movement Mandatory for Commonwealth entities; appropriate for large enterprises and government suppliers
ML 3 Resilience against highly targeted attacks by advanced adversaries, including state-sponsored actors Critical infrastructure operators and organisations in high-threat environments

The jump from ML1 to ML2 is substantial. ASD hardened the ML2 requirements significantly in November 2023 — the update that caused measured compliance to drop from 25% of Commonwealth entities in 2023 to 15% in 2024, before recovering to 22% in 2025 as agencies adjusted. The key changes raised the bar on MFA (phishing-resistant authentication is now required at ML2 for some use cases) and application control (Microsoft's recommended application block-list must now be implemented at ML2, not just ML3).

Who Must Comply — and Who Should

Mandatory: Commonwealth government entities

Since 1 July 2022, PSPF Policy 14 requires all non-corporate Commonwealth entities to implement all eight Essential Eight strategies to Maturity Level 2, and to consider whether their threat environment warrants Maturity Level 3. This is a legal obligation, not a recommendation.

Mandatory: Defence industry suppliers

Members of the Defence Industry Security Program (DISP) are required to meet ML2 across all eight strategies on their corporate ICT systems. Defence is one of the largest procurement programmes in Australia; DISP membership is often a prerequisite for involvement in major contracts.

Strongly expected: Government contractors and suppliers

Organisations seeking government contracts across federal, state, and territory agencies are increasingly assessed against the Essential Eight through the Protective Security Policy Framework and IRAP assessment processes. While not always a hard legal requirement for private sector contractors, failure to demonstrate alignment is a practical disqualifier for significant government work.

Best practice: Private sector

For private sector organisations with no government contractual obligations, the Essential Eight is not legally mandated. However, ASD strongly recommends all Australian organisations — particularly those handling sensitive information — implement it as a security baseline. Cyber insurers increasingly reference the Essential Eight in underwriting criteria; boards and regulators in financial services and critical infrastructure also treat it as a recognised standard against which reasonable security practice can be measured. To understand concretely what the controls are protecting against, see what actually happens when a small business is hacked — the sequence of events makes the value of each mitigation tangible.

A note on industry-specific obligations: Some sectors overlay the Essential Eight with additional requirements. APRA-regulated entities (banks, insurers, superannuation funds) face CPS 234 obligations that go further than the Essential Eight in certain areas. Critical infrastructure operators under the SOCI Act must implement cyber security programs that ASD expects to be consistent with Essential Eight principles. Healthcare providers face Privacy Act obligations that intersect with Essential Eight controls around access management and data protection.

The Most Commonly Missed Controls

ASD's annual reporting consistently identifies certain strategies as harder to achieve than others. Understanding where organisations typically struggle helps prioritise assessment effort.

Restrict administrative privileges

Historically one of the lowest-performing strategies across Commonwealth entities. The challenge is cultural as much as technical: reducing admin rights creates friction for IT staff and power users who have grown accustomed to elevated access. At ML2, privileged users must use separate accounts for privileged and unprivileged tasks, and privileged accounts cannot access the internet or email. This is a significant operational change for most organisations.

User application hardening

Blocking web advertisements, disabling Java from the internet, and restricting PowerShell execution require careful tuning to avoid breaking legitimate business workflows. Many organisations apply these controls partially, which is insufficient — the maturity model requires complete implementation at each level, not partial credit.

Multi-factor authentication

The 2023 update to the maturity model raised the standard significantly. MFA using SMS one-time passwords or standard authenticator apps no longer meets ML2 requirements in all contexts. Phishing-resistant MFA — hardware security keys, passkeys, or certificate-based authentication — is increasingly required. This is a meaningful investment for organisations with large workforces or complex identity environments.

Application control

Application whitelisting remains difficult to implement comprehensively, particularly on endpoints where users run diverse software. The November 2023 update added a requirement to implement Microsoft's recommended application block-list — which targets living-off-the-land techniques — at ML2 rather than ML3, increasing the implementation burden for agencies and suppliers working toward that level.

Why Even "Voluntary" Organisations Should Take This Seriously

The gap between legal obligation and practical expectation is narrowing. Consider the vectors through which the Essential Eight becomes relevant for private sector organisations that have no direct government mandate:

  • Cyber insurance: Insurers increasingly use Essential Eight maturity as an underwriting criterion. Poor MFA or patching discipline can result in exclusions, sub-limits, or declined cover for ransomware events.
  • Customer due diligence: Enterprise customers — particularly in financial services, government, and critical infrastructure — increasingly require suppliers to demonstrate cyber security maturity. An Essential Eight assessment report is a recognised, defensible form of evidence.
  • Regulatory expectations: Even where Essential Eight compliance is not formally mandated, regulators may reference it when assessing whether an organisation took "reasonable steps" to protect information. Under the Privacy Act, the test for reasonable security is objective — what a reasonable organisation in your position would do — and ASD's own guidance sets that benchmark.
  • Post-incident scrutiny: After a breach, the first question is what controls were in place. An organisation that can demonstrate ML1 or ML2 compliance across the Essential Eight is in a materially stronger position than one with no structured framework at all.

Starting Your Assessment

Before you can improve your maturity level, you need an accurate baseline. This means evaluating each of the eight strategies against the specific technical requirements at your target maturity level — not a general impression of whether controls "exist", but whether they are implemented consistently, enforced, and evidenced.

A structured assessment should cover:

  • Which controls exist versus which are assumed to exist — these are often different
  • Whether controls cover all in-scope systems or only some
  • Whether controls are technically enforced or rely on policy and user compliance
  • The current maturity level for each strategy, not just the lowest
  • The gap between current state and your target maturity level, prioritised by risk
  • Documentary evidence for each control that would satisfy internal audit or external review

For most organisations targeting ML1, the immediate priorities are MFA on externally facing services and email, patching internet-facing applications within two weeks of release, removing unnecessary admin rights, and testing that backups can actually be restored. These four actions address the most common initial attack vectors and are achievable without significant infrastructure investment.

The path to ML2 — the level required for Commonwealth entities and increasingly expected by the market — involves more significant technical uplift, particularly around phishing-resistant MFA, application control coverage, and the specific patching timeframes (48 hours for critical OS vulnerabilities).

Assess Your Essential Eight Maturity

Our Essential Eight Maturity Assessment covers all eight strategies across all maturity levels, with scored results, a prioritised gap register, and an exportable Word report you can use as evidence of due diligence — or share with your board, auditors, or government customers.

View Enterprise Assessments

Related Product

Assessment Tool

Essential Eight Maturity Assessment

Evaluate your organisation against all eight ASD mitigation strategies across four maturity levels. Generates a prioritised gap register and board-ready report — runs entirely in your browser.

View the assessment

References

  1. Australian Signals Directorate, Essential Eight Maturity Model (October 2024 version). cyber.gov.au
  2. Australian Signals Directorate, The Commonwealth Cyber Security Posture in 2025 — 22% of entities achieved ML2 in 2025, up from 15% in 2024. cyber.gov.au
  3. Australian Signals Directorate, The Commonwealth Cyber Security Posture in 2024 — 15% of entities achieved ML2 in 2024, down from 25% in 2023 following November 2023 model hardening. cyber.gov.au
  4. Department of Home Affairs, Protective Security Policy Framework — Policy 14: Cyber Security Principles (PSPF Release 2025) — requirement for non-corporate Commonwealth entities to implement Essential Eight to ML2 since 1 July 2022. protectivesecurity.gov.au
  5. Department of Defence, Defence Industry Security Program (DISP) — requirement for DISP members to achieve Essential Eight ML2 on corporate ICT systems. defence.gov.au
  6. Australian Signals Directorate, Essential Eight Maturity Model FAQ (October 2024) — ML1 suitable for SMEs; ML2 for large enterprises; ML3 for critical infrastructure and high-threat environments. cyber.gov.au
  7. Australian Signals Directorate, Strategies to Mitigate Cybersecurity Incidents — the broader set of 37 strategies from which the Essential Eight is drawn. cyber.gov.au
  8. Grant Thornton Australia, Updates to Australia's Essential Eight Maturity Model, February 2024 — analysis of November 2023 model changes. grantthornton.com.au