HomeAUEssential Eight

Essential Eight Assessment & Uplift
for Australian Organisations

ACSC-aligned cyber resilience baseline. Independent maturity assessment by CREST-certified operators. Built for ML2/ML3 expectations from regulators, insurers, and Defence primes.

ACSC Essential Eight ML0–ML3 maturity IRAP-aligned APRA CPS 234 CSP 2.0 MOU Reseller channel
🇸🇬 🇦🇺
NOW SERVING
Australian Organisations
CSP 2.0 · Feb 2026 MOU
ACSC Essential Eight aligned·ML0–ML3 maturity model·CREST Pathway+ Organisation·OSCP / CRT / CCT certified operators·SG–AU posture · CSP 2.0 MOU
AT A GLANCE

The Essential Eight is the Australian Cyber Security Centre (ACSC) baseline for protecting internet-connected IT networks against common cyber threats.

It defines eight prioritised mitigation strategies — application control, patch applications, patch operating systems, configure Microsoft Office macro settings, user application hardening, restrict administrative privileges, multi-factor authentication, and regular backups — measured against four maturity levels (ML0 through ML3). Independent assessment by CREST-certified operators gives boards, regulators, insurers, and Defence primes the evidence they need that controls are not just documented, but effective. Infracom delivers ACSC-aligned Essential Eight assessment and uplift for Australian organisations from our Singapore operations base, partnering with CREST Accredited Australian firms for tender sign-off where required.

The Eight Mitigation Strategies

Eight controls developed by the Australian Signals Directorate from real-world cyber incident response, penetration testing, and threat intelligence. Together they form the most effective baseline against the cyber threats Australian organisations actually face.

01

Application Control

Only approved applications are allowed to execute. Prevents unapproved binaries, scripts, installers, and dynamic-link libraries from running — the highest-impact control against malware and ransomware.

Infracom delivery: Allowlist scoping, ruleset assessment, exception governance, monitoring uplift.

02

Patch Applications

Internet-facing applications and productivity software are patched within risk-based windows after vulnerability disclosure. Critical patches at ML2/ML3 require deployment within 48 hours where exploits exist.

Infracom delivery: Patch SLA review, vulnerability scan reconciliation, exception register audit.

03

Configure Microsoft Office Macro Settings

Macros from the internet blocked. Macros only allowed where there is a demonstrated business requirement, with antivirus scanning and admin approval workflows. A primary phishing-payload vector.

Infracom delivery: GPO/Intune policy review, macro source-of-truth inventory, exception lifecycle.

04

User Application Hardening

Web browsers and PDF readers are configured to block Flash, ads, Java, and unnecessary features that adversaries exploit. ML2/ML3 extends to PowerShell logging and .NET hardening.

Infracom delivery: Browser baseline review, ASR rule mapping, PowerShell Constrained Language Mode validation.

05

Restrict Administrative Privileges

Privileged accounts are validated, time-bounded, separated from standard accounts, and used only on hardened administrative workstations. ML3 requires no internet, email, or web services access from privileged accounts.

Infracom delivery: Privileged-access lifecycle audit, jump-host review, PAM tooling alignment.

06

Patch Operating Systems

Operating systems on internet-facing servers, workstations, and network devices are patched within ACSC-defined windows. Unsupported OS versions retired. Vulnerability scanners run on automated cadence.

Infracom delivery: OS patch posture assessment, EOL inventory, scanner output reconciliation.

07

Multi-Factor Authentication

MFA is enforced for users of internet-facing services, third-party services holding sensitive data, and privileged accounts. ML2/ML3 increasingly favour phishing-resistant methods — passkeys, FIDO2/WebAuthn, hardware tokens.

Infracom delivery: MFA coverage gap analysis, phishing-resistance posture review, conditional-access policy validation.

08

Regular Backups

Backups of important data, software, and configuration settings are performed, retained, and tested for restoration. Retention aligned to business continuity needs. Restoration drills executed and evidenced.

Infracom delivery: Backup coverage assessment, restoration drill execution, immutability and air-gap validation.

Source: Australian Cyber Security Centre — Essential Eight (cyber.gov.au), November 2023 publication, the current standing version.

The Maturity Model — ML0 to ML3

Four maturity levels measure how effectively each of the eight controls is implemented. The levels reflect increasing adversary sophistication — from opportunistic attacks at ML1 to highly targeted, well-resourced threat actors at ML3.

ML0

Below baseline

Controls are missing, partially implemented, or ineffective. An organisation at ML0 has known exploitable weaknesses. This is not a defensible posture for any organisation handling regulated data or supplying Defence and critical infrastructure ecosystems.

Defends against: Nothing reliably.

ML1

Opportunistic adversaries

Defends against adversaries content with publicly available tradecraft. Basic application control, patching within defined windows, MFA on internet-facing services, and tested backups. The minimum credible baseline for any organisation with internet exposure.

Defends against: Commodity malware, mass phishing, opportunistic credential stuffing.

ML2

Targeted adversaries

Defends against adversaries willing to invest time and tooling to compromise a specific target. Tighter patch SLAs, broader MFA coverage, centralised event logging, and incident response planning. The expected standard for most Australian businesses handling sensitive data, Commonwealth contracts, or third-party trust obligations.

Defends against: Targeted phishing, credential harvesting campaigns, commodity ransomware operators.

ML3

Sophisticated adversaries

Defends against well-resourced, capable adversaries — including state-sponsored actors. Phishing-resistant MFA, application allowlisting validated under audit, isolation of privileged accounts from internet and email, and comprehensive event log correlation. Expected for Defence primes, critical infrastructure, and high-value targets.

Defends against: Advanced persistent threats, supply-chain compromise attempts, hands-on-keyboard targeted intrusions.

By 2026, regulators, cyber insurers, and supply chain partners increasingly expect ML2 or ML3 from organisations operating in Defence, government procurement, healthcare, financial services, and critical infrastructure ecosystems. ML0 and ML1 are no longer treated as acceptable for these sectors.

ASSESSMENT PATH COMPARISON

Three Paths to Essential Eight Assessment

Australian organisations meet Essential Eight expectations through one of three paths. Each has different evidential weight with regulators, insurers, and procurement teams. ACSC explicitly states there is no requirement for certification, but independent or partner-delivered assessment is increasingly demanded under contractual and regulatory conditions.

← Swipe to compare →

Dimension Self-Attestation Independent Assessment Partner-Delivered AssessmentINFRACOM MODEL
Who performs the assessment Internal team External assessor engaged by the organisation CREST-certified operators (CRT/CCT) delivering with an Australian CREST Accredited partner where sign-off is required
Independence from delivery teams None — same team that runs the controls Full external independence Full external independence; partnership posture for AU sovereignty-sensitive work
Evidential weight for procurement Lowest — accepted only where contracts do not specify otherwise High — accepted across most Commonwealth and enterprise procurement High — appropriate for SG-AU partner ecosystems and channel-delivered engagements
Suited to Small organisations with low contractual obligations Mid-market and enterprise with regulatory or insurance triggers Organisations with SG-AU operational footprint; MSP/MSSP partners reselling assessment
Re-assessment cadence Self-determined Typically annual, or on material control change Typically annual, with quarterly check-ins on uplift trajectory
Defence supply chain readiness Not accepted Accepted where assessor scope satisfies tender requirements Accepted with Australian CREST Accredited partner sign-off where the tender requires it

Table compares assessment paths on alignment, independence, and procurement evidential weight only. Commercial terms, scope, and contractual sign-off authority are determined per engagement. This is not legal or compliance advice — organisations should consult their procurement and legal teams to determine which assessment path satisfies their specific contractual obligations.

Why Infracom for Australian Essential Eight Work

A Singapore-based cybersecurity consultancy operating in the Australian market through a deliberate partnership posture. Three things shape what we bring to AU Essential Eight engagements.

CREDENTIAL POSTURE

CREST Pathway+ Organisation with CREST-certified operators

Infracom is a CREST Pathway+ Organisation. Our testing operators hold CREST-certified credentials (CRT, CCT) and complementary certifications including OSCP, CISSP, and CISA. For Australian engagements where the tender requires sign-off by a CREST Accredited firm, we partner with an established Australian CREST Accredited entity — our certified operators deliver the work, the partner provides the procurement-recognised attestation. This is the same model used by international consultancies entering the AU market.

REGIONAL POSITIONING

Singapore-Australia partnership posture under CSP 2.0

Singapore and Australia renewed their Memorandum of Understanding on Cyber Security Cooperation on 24 February 2026, signed by the Chief Executive of the Cyber Security Agency of Singapore and the Australian Ambassador for Cyber Affairs and Critical Technology. The MOU sits under Pillar 4 of the Singapore-Australia Comprehensive Strategic Partnership (CSP) 2.0, announced 8 October 2025. The bilateral framework explicitly covers information exchange, best practice sharing, and capacity building between SG and AU cyber ecosystems — the same framework that governs how Infracom operates across both markets.

OPERATING DISCIPLINE

ISO 27001, CSRO, and CTM Tier 3 operating baseline

Infracom operates under ISO/IEC 27001-aligned information security management, the Cybersecurity Services Regulation Office (CSRO) licensing framework administered by the Cyber Security Agency of Singapore, and Cyber Trust Mark (CTM) Tier 3 certification. The same operating discipline that satisfies Singapore regulatory expectations applies to every Australian engagement — control documentation, evidence trails, segregation of duties, and assessor independence are not optional extras.

How an Essential Eight Engagement Runs

A repeatable four-phase model. Each phase has defined inputs, activities, and outputs. Scope and timing flex with your environment size; the phases do not.

Phase 1

Discover

Scope confirmation, environment baseline, stakeholder identification. We agree what is in scope (workstations, servers, internet-facing services, third-party systems), what evidence sources are available, and which business stakeholders need to be involved. Outputs: scope statement, evidence checklist, assessment plan.

Phase 2

Assess

Control-by-control evaluation against the maturity model. Each of the eight strategies is examined for evidence of implementation, operating effectiveness, and coverage. Interviews, technical validation, configuration review, and sampling. Outputs: working papers, control maturity scoring, exception register.

Phase 3

Report

Findings, maturity rating, and prioritised uplift roadmap. A board-ready report with the uniform maturity rating, a per-strategy breakdown showing where the organisation sits on each control, gap analysis, and a prioritised remediation roadmap. Findings are evidenced — no opinion-only ratings. Outputs: assessment report, executive summary, remediation roadmap.

Phase 4

Uplift

Targeted remediation, control validation, ongoing maturity tracking. Working alongside your team to close the gaps identified in Phase 3 — policy updates, configuration changes, evidence collection cadences, control re-validation. Optional quarterly check-ins to track maturity trajectory between annual reassessments. Outputs: remediation evidence, re-tested control validation, uplift report.

Frequently asked

Common questions about Essential Eight

What Australian organisations ask before engaging an Essential Eight assessment — covering mandate, maturity levels, framework relationships, cross-jurisdictional delivery, and our CREST posture.

Is the Essential Eight mandatory for Australian organisations?
The Essential Eight is mandated for non-corporate Commonwealth entities under the Protective Security Policy Framework (PSPF) Policy 10, which requires Maturity Level Two implementation to achieve a PSPF maturity rating of 'Managing'. For private sector organisations it is not a legal mandate, but it is widely treated as the baseline standard for cyber hygiene in Australia — by regulators, by cyber insurers, by Defence and government procurement, and by enterprise supply chain partners. Many private sector contracts now name Essential Eight maturity expectations explicitly.
What is the difference between ML1, ML2, and ML3?
ML1 defends against opportunistic adversaries using publicly available tradecraft — the floor of credible posture for any internet-connected organisation. ML2 defends against targeted adversaries willing to invest in compromising a specific target — the expected standard for organisations with sensitive data, regulatory triggers, or supply chain obligations. ML3 defends against sophisticated, well-resourced adversaries including state-sponsored actors — the standard for Defence primes, critical infrastructure, and high-value targets. The Uniform Maturity Principle applies: an organisation's overall rating is the lowest level achieved across the eight controls.
Does Essential Eight maturity equal ISO 27001 certification?
No. They are different frameworks with different purposes. ISO 27001 is an information security management system (ISMS) standard with broad scope across governance, risk, and operational controls. The Essential Eight is a focused set of eight technical mitigation strategies for internet-connected IT networks. They are complementary, not interchangeable. Many Australian organisations operate under both — ISO 27001 for ISMS governance and Essential Eight for prioritised technical controls. ACSC publishes a mapping between Essential Eight controls and the Australian Government Information Security Manual (ISM), but does not publish an ISO 27001 mapping.
Can a Singapore-based firm assess an Australian organisation's Essential Eight maturity?
Yes. ACSC publishes no jurisdictional restriction on who may perform an Essential Eight assessment. What matters is assessor competence, independence from the delivery teams whose controls are being assessed, and — where the engagement is contractual — that the deliverable satisfies the specific procurement requirements of the engaging party. Infracom delivers assessments for Australian organisations through CREST-certified operators based in Singapore, partnering with Australian CREST Accredited firms where tender sign-off authority is specifically required. The bilateral Singapore-Australia cyber cooperation framework under CSP 2.0 (MOU renewed 24 February 2026) explicitly supports this kind of cross-jurisdictional engagement.
Does Infracom hold Australian CREST Accreditation as a company?
Infracom is a CREST Pathway+ Organisation — the published international CREST membership tier that recognises organisations demonstrating CREST-aligned operating practices. Our testing operators hold CREST-certified individual credentials (CRT, CCT) alongside OSCP, CISSP, and CISA. Where an Australian tender or contract specifically requires sign-off by a CREST Accredited firm, we partner with an established Australian CREST Accredited entity. Our certified operators deliver the technical work; the Accredited partner provides the procurement-recognised attestation. This partnership posture is the standard model used by international cyber consultancies entering the Australian market, and we are transparent about it because procurement teams need to know exactly what they are buying.
How long does an Essential Eight assessment take?
Engagement duration depends on environment size, evidence availability, the number of business units in scope, and the depth of control validation required. A focused gap assessment runs faster than a full multi-maturity-level assessment with technical validation and supporting evidence trails. Defence supply chain readiness engagements typically extend further to incorporate ISM mapping and additional control documentation. Scope, depth, and timeline are confirmed together during Phase 1 — we do not commit to durations before we understand the environment.

Talk to our Essential Eight team

Australian organisations needing ACSC-aligned assessment, ML0–ML3 uplift, or IRAP-adjacent advisory — delivered from our Singapore operations base with CREST-certified operators and (where required) partnered with CREST Accredited Australian firms for tender sign-off.

ACSC Essential Eight aligned — assessment, gap analysis, and uplift to ML1, ML2, or ML3.
CREST Pathway+ Organisation — testing by CREST-certified operators (CRT / CCT).
SG–AU posture — under the CSP 2.0 MOU (Feb 2026, CSA–DFAT), with Singapore delivery and AU partner sign-off.
Reseller-friendly — we support partner channel engagements and white-label delivery models.
📍
Office (HQ)
506 Chai Chee Lane, Singapore 469026
🏆
Certifications
CSRO · ISO 27001 · CREST Pathway+ · OSCP / CRT / CCT · CISSP · CISA
🌐
Markets served
Singapore · Australia · Global (delivered from SG, with AU partner sign-off where required)
Response time
Within 1 business day (SGT / AEDT)
🔒
Confidentiality
All enquiries strictly confidential
+65
Infracom Consultancy Integration Pte Ltd

Your one-stop IT & cybersecurity partner — Singapore HQ since 2008, expanding to Australia in 2026.

506 Chai Chee Lane

Singapore 469026

Consulting
Hours

Mon – Fri
9AM – 6PM SGT

LinkedIn →
© Infracom Consultancy Integration Pte Ltd. All rights reserved.Privacy Policy