Skip to content

Strategic Compliance Service

Essential Eight Compliance Melbourne

DISP, PSPF, and insurer-ready compliance — from assessment to audit evidence.

Only 25% of government entities have reached Maturity Level 2—the mandatory requirement for PSPF and DISP compliance. With 84,000+ cybercrimes reported in FY24-25 and insurers demanding evidence of security controls, Essential Eight isn't optional anymore.

ASD-aligned assessmentsDISP & PSPF readyAssessments from $3,500
84,000+
Cybercrimes reported to ACSC in FY24-25
25%
Of government entities at Maturity Level 2
ML2
Required for PSPF & DISP compliance
Oct 2025
DISP ML2 deadline for defence contractors

What is the Essential Eight?

The Essential Eight is a prioritised set of mitigation strategies developed by the Australian Cyber Security Centre (ACSC). These eight strategies are the most effective at preventing cyber attacks and are considered the baseline for Australian organisations—mandatory for government, increasingly expected by insurers and partners.

Signs You Need an Essential Eight Assessment

If any of these sound familiar, it's time to get a baseline assessment and understand your path to compliance.

  • You're bidding on government contracts but can't prove compliance
  • DISP membership renewal requires Essential Eight evidence
  • Cyber insurance premiums are rising or applications rejected
  • Patching is ad-hoc with no documented schedule
  • No one knows if MFA is enforced everywhere
  • Admin privileges are granted too widely
  • Backups exist but haven't been tested for recovery
  • You have security tools but no baseline to measure against

Who Needs Essential Eight Compliance?

Essential Eight is increasingly required—not just for government, but for any organisation that values security maturity

Government Contractors

PSPF Policy 10 and DISP require Maturity Level 2

Defence Industry (DISP)

Essential Eight ML2 mandatory by Oct 2025

Cyber Insurance Renewals

Insurers increasingly require ML2 evidence

Critical Infrastructure

SOCI Act alignment with E8 controls

The 8 Mitigation Strategies

Each strategy targets a specific attack vector. Together they provide comprehensive protection against the most common threats.

  1. Application Control

    Prevent execution of unapproved/malicious programs including .exe, DLL, scripts, and installers.

    ML1
    Application control on workstations
    ML2
    Application control on servers
    ML3
    Microsoft recommended block rules
  2. Patch Applications

    Patch/mitigate computers with extreme risk vulnerabilities within 48 hours.

    ML1
    Patch within 1 month
    ML2
    Patch within 2 weeks
    ML3
    Patch within 48 hours
  3. Configure Microsoft Office Macros

    Block macros from the internet, allow only vetted macros.

    ML1
    Macros disabled for internet files
    ML2
    Only signed macros allowed
    ML3
    Macros from trusted locations only
  4. User Application Hardening

    Configure web browsers and other applications to block malicious content.

    ML1
    Block Flash, ads, Java
    ML2
    Block PowerShell 2.0
    ML3
    Constrained language mode
  5. Restrict Admin Privileges

    Restrict administrative privileges to operating systems and applications.

    ML1
    No admin for email/web
    ML2
    Separate admin accounts
    ML3
    Just-in-time admin
  6. Patch Operating Systems

    Patch/mitigate computers with extreme risk vulnerabilities within 48 hours.

    ML1
    Patch within 1 month
    ML2
    Patch within 2 weeks
    ML3
    Patch within 48 hours
  7. Multi-Factor Authentication

    Use MFA to protect access to sensitive data and systems.

    ML1
    MFA for internet-facing services
    ML2
    MFA for all users
    ML3
    Phishing-resistant MFA
  8. Regular Backups

    Daily backups of important data, software, and configuration settings. Immutable backups are required at ML2.

    ML1
    Daily backups, monthly tests
    ML2
    Immutable backups
    ML3
    Backup testing quarterly

Understanding Maturity Levels

The Essential Eight uses three maturity levels. Most government and defence contractors need Level 2.

Level 1

Partly Aligned

Basic implementation of the Essential Eight. Suitable for businesses with lower risk profiles or as a starting point.

Recommended for

Small businesses, low-risk industries

Level 2 — Most Required

Mostly Aligned

More comprehensive implementation with stronger controls. Required for government and defence contractors.

Recommended for

Government suppliers, DISP members, most businesses

Level 3

Fully Aligned

Complete implementation with the strongest controls. Required for high-risk or classified environments.

Recommended for

Classified systems, finance, critical infrastructure

Your 90-Day Essential Eight Roadmap

From assessment to compliance-ready in 12 weeks

  1. Week 1-2

    Assessment & Baseline

    Activities

    • Discovery & environment inventory
    • Current controls assessment against all 8 strategies
    • Maturity level scoring (ML0, ML1, ML2, ML3)
    • Stakeholder interviews (IT, Security, Exec)
    • Gap analysis report delivered

    Deliverables

    Essential Eight Maturity ReportGap Analysis DocumentPrioritised Remediation Roadmap
  2. Week 3-8

    Implementation & Hardening

    Activities

    • Application control deployment (workstations/servers)
    • Patch management automation & SLAs
    • MFA rollout (phishing-resistant where possible)
    • Macro & Office hardening configuration
    • Admin privilege review & PAM deployment
    • Backup testing & immutability configuration

    Deliverables

    Technical Controls DocumentationSecurity Policies (drafted/updated)Evidence Pack for DISP/PSPF
  3. Week 9-12

    Validation & Reporting

    Activities

    • Post-implementation maturity re-assessment
    • Compliance evidence collection
    • DISP CSQ preparation (if applicable)
    • Board-ready summary report
    • Ongoing monitoring handover

    Deliverables

    Updated Maturity ScorecardCompliance Evidence PackAudit-Ready DocumentationRecommendations for ML3 (if applicable)

Outcomes You Can Expect

After working with us on Essential Eight compliance, you'll have everything needed for audits, tenders, and insurance renewals.

  • Documented Essential Eight maturity level (ML1, ML2, or ML3)
  • DISP/PSPF compliance evidence ready for audit
  • Cyber insurance application support with evidence pack
  • Reduced attack surface through application control & hardening
  • Patch compliance within ASD timeframes (48hrs/2wks/1mo)
  • MFA enforced across all users and internet-facing services
  • Tested, immutable backups with documented recovery process
  • Audit-ready policies and control documentation

DIY vs Managed E8 vs E8 + vCISO

Choose the right approach for your organisation

DIYManaged E8E8 + vCISO
AssessmentSelf-assess with checklistExpert-led assessment with scoringStrategic alignment with security roadmap
ImplementationInternal IT does the workWe implement technical controlsControls integrated into security strategy
DocumentationYou create policies & evidenceAudit-ready documentation includedBoard-level reporting & policy lifecycle
DISP/PSPF SupportNavigate requirements yourselfCSQ & compliance guidanceEnd-to-end audit & tender support
Ongoing MonitoringQuarterly self-reviewsContinuous compliance trackingQuarterly board reports + continuous oversight
Best ForSmall orgs with mature ITMost businesses needing E8Security leadership + compliance

Deadline Alert

DISP Members: October 2025 Deadline

All Defence Industry Security Program (DISP) members must achieve Essential Eight Maturity Level 2 by October 2025. This includes completing the Cyber Security Questionnaire (CSQ) and undergoing a point-in-time assessment.

Don't wait. Our 90-day implementation sprints are designed to help you meet this deadline. Start your assessment now to ensure adequate time for remediation.

Discuss DISP Compliance

Complementary Service

Essential Eight + MDR = Complete Protection

Essential Eight provides the baseline controls. MDR provides the ongoing monitoring and threat detection that makes those controls effective. Together, they deliver comprehensive cybersecurity.

Learn About MDR Services

Industry Experience

We've helped organisations across these sectors achieve Essential Eight compliance

Defence & DISP
Government Contractors
Professional Services
Manufacturing
Healthcare

Frequently Asked Questions

Start Your Essential Eight Journey

Get a free assessment to understand your current maturity level and path to compliance

Get Your E8 Assessment