Logo

The Essential Eight

Unlocking the Essential
Eight

What to expect from an Essential Eight audit

The Australian Cyber Security Centre (ACSC) developed a set of prioritised mitigation strategies to reduce the likelihood and impact of common cyber threats. The Essential Eight is the most impactful subset-a practical baseline of controls specifically focused on Microsoft Windows–based, internet-connected networks.

While technology stacks vary, the Essential Eight gives Australian organisations-small businesses, enterprises, and government agencies-a clear, measurable path to uplift security posture. It:

Bottom line: If you only do one formal security initiative this year, make it an Essential Eight assessment and uplift.

The Eight Strategies at a Glance

1) Application Control (Allow-listing) – Only approved apps/processes can execute.

2) Patch Applications – Rapidly patch browsers, PDF readers, Microsoft Office, Java, etc.

3) Configure Microsoft Office Macro Settings – Block untrusted macros; allow only signed macros where required.

4) User Application Hardening – Disable risky features (e.g., Flash-deprecated-, ads/Java in browsers where applicable), restrict web content.

5) Restrict Administrative Privileges – Grant least privilege, control and monitor admin access, and use separate admin accounts.

6) Patch Operating Systems – Apply OS patches quickly; maintain supported OS versions.

7) Multi-Factor Authentication (MFA) – Enforce MFA for remote, privileged, and high-risk access.

8) Regular Backups – Take frequent, tested backups and protect them from tampering.

These strategies are defence-in-depth: you gain real protection when they work together.

ACSC Maturity Levels (0–3): How Compliance Is Measured

The ACSC uses maturity levels to grade implementation quality and consistency:

Many insurers and larger customers expect Level 2 as a sensible minimum target for most organisations, with Level 3 for higher-risk environments (sensitive data, critical operations, high threat profile).

What to Expect From an Essential Eight Audit

We start most security engagements with an Essential Eight audit because it’s:

Our approach

1) Scoping & Stakeholders

Confirm your business context, critical systems, compliance drivers, and key contacts (IT lead, business owner, finance, HR).

2) Discovery & Evidence Collection

Workshops and technical reviews. We gather configurations, logs, policies, inventories, and test access paths.

3) Gap Analysis vs. Maturity Model

For each of the eight strategies, we assess current state and determine target maturity based on risk appetite and obligations.

4) Risk-Ranked Findings

We classify issues by likelihood/impact and map them to business outcomes (e.g., downtime, data loss, reputational harm).

5) Remediation Roadmap

A 30/60/90-day plan with quick wins, dependencies, and realistic owners, plus long-term improvements (e.g., privileged access redesign).

6) Executive Report + Technical Annex

Board-ready summary for decision-makers; detailed technical tasks for implementers.

Tone & Philosophy: Non-confrontational. The goal is risk reduction, not blame. Cyber security improves fastest when everyone-from leadership to helpdesk-pulls in the same direction.

Evidence Checklist: What We’ll Ask For

From Findings to Fixes: Your Remediation Plan

A good report doesn’t just say what’s wrong-it shows how to fix it with effort vs. impact and clear ownership.

Priority Example Fix Effort Impact Notes
P1 Enforce MFA for all remote and privileged access Low–Med High Roll out in phases; provide backup codes; train staff.
P1 Block untrusted Office macros; enable signed macros only where needed Low High Identify macro-dependent teams; sign critical macros.
P1 Patch browsers & PDF readers; auto-update policy Low High Leverage endpoint manager; track exceptions.
P2 Implement application allow-listing for high-risk groups Med High Start with IT/admin workstations; expand by wave.
P2 Separate admin & standard accounts; remove standing global admin Med High Introduce JIT/PIM; enforce strong auth.
P2 Immutable/offline backups; quarterly restore tests Med High Document runbooks; evidence restores for insurance.
P3 Browser and OS hardening baselines Med Med Use CIS/ACSC baselines via GPO/Intune.
P3 Legacy OS upgrade plan High High Business case: supportability, vulnerability exposure.

Cyber Insurance, SOCI & Reporting: Why the “Paper Trail” Matters

Takeaway: Your maturity level, backup tests, MFA coverage, and admin controls aren’t just “nice to haves”-they affect liability, compliance, and business continuity.

Essential Eight in Detail: Controls, Quick Wins, Common Pitfalls

Essential 8 inside Computing Australia Group

1) Application Control (Allow-listing)

Goal: Only trusted software runs.

Quick wins:

Pitfalls:

2) Patch Applications

Goal: Shrink the attacker’s window of opportunity.

Quick wins:

Pitfalls:

3) Configure Microsoft Office Macro Settings

Goal: Prevent malicious macro execution.

Quick wins:

Pitfalls:

4) User Application Hardening

Goal: Reduce attack surface in browsers and desktop apps.

Quick wins:

Pitfalls:

5) Restrict Administrative Privileges

Goal: Least privilege, always.

Quick wins:

Pitfalls:

6) Patch Operating Systems

Goal: Keep OS versions supported and current.

Quick wins:

Pitfalls:

7) Multi-Factor Authentication (MFA)

Goal: Add a strong second factor for risky access paths.

Quick wins:

Pitfalls:

8) Regular Backups

Goal: Rapid, reliable recovery with minimal data loss.

Quick wins:

Pitfalls:

People, Process, and Culture: Making Security “Stick”

Cloud, Macs & Mobile: Beyond Windows Networks

While the Essential Eight focuses on Windows environments, the principles apply broadly:

Timeframes, Budgeting & ROI

ROI drivers: Reduced incident likelihood/impact, faster recovery, improved insurability, less downtime, stronger customer trust, and better procurement outcomes with security-sensitive clients.

Sample Roadmap (90 Days)

Days 0–15

Days 16–45

Days 46–75

Days 76–90

If you do nothing else this year in terms of IT, we recommend that you do an Essential Eight audit.

To book an Essential Eight audit please contact Chris on 0438 855 884 Or email sales@computingaustralia.group

FAQ

Not universally; however, many sectors and contracts expect alignment, and insurers frequently assess against it.

Target maturity depends on your risk profile. Many organisations aim for Level 2 first, then uplift higher-risk areas to Level 3.

Yes. Use signed macros from controlled locations and maintain a trusted register.

Mitigate (isolate, restrict, monitor) while you plan upgrade or replacement. Compensating controls may be necessary to achieve target maturity.

Quarterly at minimum, with documented restore evidence. Increase frequency for critical systems.