Skip to content
IT Leader Company Logo
  • Services

    Overview

    Find every technology solution your organisation needs under one roof – with simplified, per-user pricing for all managed services.

    Learn More
    • IT Support
    • Managed Backup Solutions
    • Managed Firewall
    • Cloud
    • Cloud Migration
    • MS 365 Solutions
    • MS 365 Signature Management
    • MS 365 Migrations
    • Cyber Security
    • Cyber Security Audit
    • Cyber Awareness Training
    • Email Security
    • Endpoint Security
    • Essential Eight
    • UC / Voice
    • PBX
    • MS 365 Teams
    • Internet
    • NBN
    • IT Consulting
  • Industries

    Overview

    IT isn’t one-size-fits-all. Learn how our industry-specific expertise can help deliver the right outcomes for your organisation.

    Learn More
    • Manufacturing
    • Professional Services
    • Transportation
  • Resources
  • About
    • About Us
    • Technical Capability Summary
    • Careers
  • Support
    • Support Options
    • Remote Support
    • New User Form
    • Exit User Form
  • Get In Touch
Get In Touch

Essential Eight

Reduce your cyber risk with the Essential Eight, the security model recommended by the Australian government for SMBs.

Talk To Us

What Is the Essential Eight?

The Essential Eight is a set of cyber security strategies created by the Australian Signals Directorate.

Together, the 8 strategies provide a strong level of protection against modern attacks.

Because different organisations have different security needs, the Essential Eight has 4 maturity levels.

Small and medium businesses should meet Maturity Level 1 at minimum.

The Essential Eight

Each of the following strategies has multiple controls.

Patch Applications

Keep your apps up to date.

Patch Operating Systems

Keep your operating system up to date.

Multi-Factor Authentication

Use MFA to access your apps and online services.

Restrict Administrative Privileges

Only give admin access to people that need it.

Application Control

Control the apps people can download.

Restrict Microsoft Office Macros

Block unnecessary Microsoft macros

User Application Hardening

Block risky app activities.

Regular Backups

Keep your backups confidential, intact, and accessible.

Multi Factor Authentication on Phone

How to Implement the Essential Eight

Implementing the Essential Eight starts with choosing a maturity level.

Level 1 is the minimum – most SMBs should aim for Level 2, and some high-risk organisations may need Level 3.

Once you’ve chosen your target, work with your managed services provider to start implementing the different controls.

You may already have some in place.

Others might require modernising old systems or improving your current processes.

Cloud PBX phone call being made from a desktop computer using Linkus

How We Can Help

The Essential Eight aren’t always easy to implement – especially if you have lots of users or a complex IT environment.

We can help explain exactly what a given control means and work with you to action it.

If business requirements make that too difficult, we can even help you explore alternate controls that still satisfy the Essential Eight assessment criteria.

Get In Touch

Essential Eight Maturity Levels

All small and medium businesses should aim for a minimum of Maturity Level 1.

Level 0

Your cyber security posture has weaknesses.

Level 1

Your business is protected against basic cyber attacks.

Level 2

You’ve reduced the risk of personalised, targeted attacks.

Level 3

You’re capable of defeating more sophisticated adversaries.

Essential Eight Versus Other Standards

If you’re already certified to standards like ISO 27001, you may have met or exceeded Maturity Level 2.

Table Corner Essential Eight ISO 27001 NIST CSF
Description The Essential Eight is a set of 8 baseline mitigation strategies, each featuring multiple controls. ISO 27001 is a standard for information security that includes policies, procedures, and controls. The NIST Cybersecurity Framework (CSF) is a framework that includes 6 core functions.
Type Maturity model Standard Framework
Protection Level Baseline Holistic Holistic
Origin Australia International US
Approach Prescriptive Prescriptive Flexible
Located At cyber.gov.au iso.org nist.gov

Useful Resources

Essential Eight

Article

How to Implement the Essential Eight Maturity Model

photograph of patch being rolled out

Article

Patching Applications and Operating Systems

Woman with phone doing face scan

Article

Implementing MFA

two-young-business-colleagues-using-desktop-pc-reading-email-while-working-together-office-focus-is-man.jpg

Article

Restricting Administrative Privileges

Senior people attend a counseling meeting for future investments

Article

Implementing Application Control

The 7 top tips for using Microsoft 365

Article

Restricting Microsoft Office Macros

Essential Eight FAQs

My business is only small. Do I actually need the Essential Eight?

Yes, all businesses, regardless of their size, should meet Essential Eight Maturity Level 1. That’s the baseline for any IT environment, even if you’re running a one-person company.

Keep in mind that most of the controls for ML1 aren’t particularly difficult to meet, especially for micro-businesses. Using Microsoft 365 and Windows 11, running basic security software like Defender, having MFA for your apps, and having daily automated backups will satisfy the majority of the controls.

Compliance does get harder as your business gains more staff – but that’s also when the risk and potential cost of an attack becomes higher.

I have legacy systems. Can they be Essential Eight-compliant?

It depends on the legacy system in question. The Essential Eight is designed for modern organisations, so some applications and operating systems – particularly unsupported ones – may be unable to meet specific Essential Eight controls.

In those scenarios, it’s sometimes possible to still comply with the Essential Eight by implementing an alternate control. Essential Eight assessments recognise that IT environments are complex and vary hugely across different organisations; even if a specific control can’t be used for some reason, you can still address the intention of that control through one or more alternatives.

If you can’t meet the Essential Eight controls and using compensating controls is too costly, though, that’s generally a good indication that your legacy system is a security risk. Talk to us or another cyber security provider about the best way to migrate to something more secure – keeping an active vulnerability in play is almost never a good idea.

Is Essential Eight mandatory in Australia?

No, the Essential Eight isn’t legally required for most organisations in Australia. Government departments normally have to meet ML2 or ML3, though, and some insurers may make Essential Eight compliance a condition for cyber insurance.

Make the Switch

Talk to us to find out how changing IT providers could give your business the competitive edge it needs.
IT Leader Company Logo
  • service@itleaders.com.au
  • 1300 596 560
  • 07 5628 3260
  • 3/42 Lawrence Drive, Nerang QLD 4211
  • 8:30 am to 5 pm AEST, Monday to Friday
Linkedin-in Facebook-f

Services

  • Managed IT Services
  • Cloud Solutions and Infrastructure
  • Cyber Security and Compliance
  • Unified Communications and VoIP
  • Business Internet and Network Services
  • IT Consulting and Digital Transformation

Industries

  • Manufacturing
  • Professional Services
  • Transportation

Our Company

  • About Us
  • Technical Capability Summary
  • Careers
  • Contact Us

Resources

  • Blog

Support

  • Remote Support
  • New User Form
  • Exit User Form
  • Support Options
  • © 2026 IT Leaders
  • Privacy Policy
  • Terms of Service
  • Terms of Use