AESCSF v2 Maturity Assessment
The Essential Eight underpins several AESCSF domains. Use both assessments together to satisfy AEMO reporting obligations and demonstrate broader cyber maturity.
Learn moreAssess your organisation's maturity against the ACSC Essential Eight Maturity Model — Australia's most widely adopted cyber security baseline for enterprise and government.
The Essential Eight Cyber Security Assessment provides a structured framework for evaluating your organisation's implementation of the Australian Cyber Security Centre's Essential Eight Maturity Model. With questions across all eight mitigation strategies, the assessment covers Maturity Levels 1, 2, and 3 in full — from foundational controls through to mature, hardened implementations.
Each mitigation strategy is assessed individually, giving your team a clear view of where implementation is strong, where gaps exist, and which gaps carry the highest residual risk. The assessment is aligned to the ACSC's current published guidance at cyber.gov.au and reflects the evidence expectations of real-world assurance reviews.
The tool runs entirely in your browser — no data leaves your device — making it suitable for use in sensitive environments, including government and regulated industry contexts where data sovereignty matters.
This assessment is designed for:
Organisations using this assessment typically gain:
The assessment covers all eight ACSC mitigation strategies across Maturity Levels 1–3:
Prevent Malware Delivery and Execution:
Limit the Extent of Cyber Security Incidents:
Recover Data and System Availability:
Board-ready maturity overview across all eight strategies with overall score, maturity level attainment, and highest-priority findings. Exportable to Word for executive and audit circulation.
Comprehensive findings register with risk ratings, evidence requirements, and maturity level mapping across all eight strategies. Exportable to Excel for remediation planning and tracking.
Strategy-by-strategy maturity charts and dashboard showing current ML attainment and gap profile, suitable for management review presentations and regulatory reporting.
Actionable recommendations ranked by risk severity and maturity level, designed to support structured uplift planning and investment prioritisation.
All data remains in your browser — nothing is transmitted externally. Consistent methodology supports reassessment for trend tracking and continuous improvement reporting.
Contact us to discuss access and how the assessment can be deployed in your organisation.
Contact UsOrganisations frequently combine the Essential Eight assessment with complementary frameworks to address broader governance and compliance requirements.
The Essential Eight underpins several AESCSF domains. Use both assessments together to satisfy AEMO reporting obligations and demonstrate broader cyber maturity.
Learn moreFor organisations with Systems of National Significance designation, combine Essential Eight maturity assessment with ECSO readiness to address all SOCI Act cyber obligations.
Learn moreFurther Reading
Resource
What the ASD's Essential Eight mitigation strategies actually require, how the maturity levels work, and what organisations typically find when they assess for the first time.
Read the guideHave questions about how our assessments work?
Read the Enterprise Assessment FAQ →Also assessing against ISO 27001?
View ISO 27001 Assessment →