HomeAUEssential Eight

Essential Eight Assessment & Uplift
for Australian Organisations

ACSC-aligned cyber resilience baseline. Independent maturity assessment by GRC advisors with SQEP service inside ISO 27001 certified scope — the people who design and assess controls, not the ones who only test them afterwards. Built for ML2/ML3 expectations from boards, regulators, insurers, and Defence primes.

ACSC Essential EightML0–ML3 maturity upliftGRC advisorySQEP in ISO 27001 scopeRemote delivery from SingaporeCSP 2.0 MOUAPRA CPS 234 aware
🇸🇬 🇦🇺
NOW SERVING
Australian Organisations
CSP 2.0 · Feb 2026 MOU
FRAMEWORK
ACSC Essential Eight ML0–ML3
DELIVERY
GRC advisory by SQEP within ISO 27001 certified scope
REGULATORY READINESS
APRA CPS 234 · SOCI · Audit-defensible evidence
REGIONAL POSTURE
SG primary · AU under CSP 2.0 MOU (Feb 2026)
AT A GLANCE

The Essential Eight is the Australian Cyber Security Centre (ACSC) baseline for protecting internet-connected IT networks against common cyber threats.

It defines eight prioritised mitigation strategies measured against four maturity levels (ML0 through ML3). Implementing and assessing those controls is governance, risk, and compliance (GRC) work — the discipline of designing, scoping, evidencing, and validating controls so they hold up in front of boards, regulators, insurers, and Defence primes. It is not penetration testing. A pentest can validate that a control works once it exists, but it cannot tell you which controls to design, how to scope them, or how to evidence them for an audit.

Infracom delivers ACSC-aligned Essential Eight assessment and uplift to Australian organisations as GRC advisory by Suitably Qualified and Experienced Personnel (SQEP) — consultants whose competence is not just claimed but audited annually inside our ISO 27001 certified scope. The result is a maturity statement whose evidence chain stands up to the people who will read it.

The Eight Mitigation Strategies

Eight controls developed by the Australian Signals Directorate from real-world cyber incident response, penetration testing, and threat intelligence. Together they form the most effective baseline against the cyber threats Australian organisations actually face.

01

Application Control

Only approved applications are allowed to execute. Prevents unapproved binaries, scripts, installers, and dynamic-link libraries from running — the highest-impact control against malware and ransomware.

Infracom delivery: Allowlist scoping, ruleset assessment, exception governance, monitoring uplift.

02

Patch Applications

Internet-facing applications and productivity software are patched within risk-based windows after vulnerability disclosure. Critical patches at ML2/ML3 require deployment within 48 hours where exploits exist.

Infracom delivery: Patch SLA review, vulnerability scan reconciliation, exception register audit.

03

Configure Microsoft Office Macro Settings

Macros from the internet blocked. Macros only allowed where there is a demonstrated business requirement, with antivirus scanning and admin approval workflows. A primary phishing-payload vector.

Infracom delivery: GPO/Intune policy review, macro source-of-truth inventory, exception lifecycle.

04

User Application Hardening

Web browsers and PDF readers are configured to block Flash, ads, Java, and unnecessary features that adversaries exploit. ML2/ML3 extends to PowerShell logging and .NET hardening.

Infracom delivery: Browser baseline review, ASR rule mapping, PowerShell Constrained Language Mode validation.

05

Restrict Administrative Privileges

Privileged accounts are validated, time-bounded, separated from standard accounts, and used only on hardened administrative workstations. ML3 requires no internet, email, or web services access from privileged accounts.

Infracom delivery: Privileged-access lifecycle audit, jump-host review, PAM tooling alignment.

06

Patch Operating Systems

Operating systems on internet-facing servers, workstations, and network devices are patched within ACSC-defined windows. Unsupported OS versions retired. Vulnerability scanners run on automated cadence.

Infracom delivery: OS patch posture assessment, EOL inventory, scanner output reconciliation.

07

Multi-Factor Authentication

MFA is enforced for users of internet-facing services, third-party services holding sensitive data, and privileged accounts. ML2/ML3 increasingly favour phishing-resistant methods — passkeys, FIDO2/WebAuthn, hardware tokens.

Infracom delivery: MFA coverage gap analysis, phishing-resistance posture review, conditional-access policy validation.

08

Regular Backups

Backups of important data, software, and configuration settings are performed, retained, and tested for restoration. Retention aligned to business continuity needs. Restoration drills executed and evidenced.

Infracom delivery: Backup coverage assessment, restoration drill execution, immutability and air-gap validation.

Source: Australian Cyber Security Centre — Essential Eight (cyber.gov.au), November 2023 publication, the current standing version.

The Maturity Model — ML0 to ML3

Four maturity levels measure how effectively each of the eight controls is implemented. The levels reflect increasing adversary sophistication — from opportunistic attacks at ML1 to highly targeted, well-resourced threat actors at ML3.

ML0

Below baseline

Controls are missing, partially implemented, or ineffective. An organisation at ML0 has known exploitable weaknesses. This is not a defensible posture for any organisation handling regulated data or supplying Defence and critical infrastructure ecosystems.

Defends against: Nothing reliably.

ML1

Opportunistic adversaries

Defends against adversaries content with publicly available tradecraft. Basic application control, patching within defined windows, MFA on internet-facing services, and tested backups. The minimum credible baseline for any organisation with internet exposure.

Defends against: Commodity malware, mass phishing, opportunistic credential stuffing.

ML2

Targeted adversaries

Defends against adversaries willing to invest time and tooling to compromise a specific target. Tighter patch SLAs, broader MFA coverage, centralised event logging, and incident response planning. The expected standard for most Australian businesses handling sensitive data, Commonwealth contracts, or third-party trust obligations.

Defends against: Targeted phishing, credential harvesting campaigns, commodity ransomware operators.

ML3

Sophisticated adversaries

Defends against well-resourced, capable adversaries — including state-sponsored actors. Phishing-resistant MFA, application allowlisting validated under audit, isolation of privileged accounts from internet and email, and comprehensive event log correlation. Expected for Defence primes, critical infrastructure, and high-value targets.

Defends against: Advanced persistent threats, supply-chain compromise attempts, hands-on-keyboard targeted intrusions.

By 2026, regulators, cyber insurers, and supply chain partners increasingly expect ML2 or ML3 from organisations operating in Defence, government procurement, healthcare, financial services, and critical infrastructure ecosystems. ML0 and ML1 are no longer treated as acceptable for these sectors.

ASSESSMENT PATHS

Three Paths to Essential Eight Assessment

Three ways Infracom can engage on Essential Eight — chosen by what your board, your regulator, or your customer is actually asking for. All three are delivered as GRC advisory by SQEP within ISO 27001 certified scope. None of the three is a penetration test.

PATH 1
Maturity Assessment

Independent point-in-time assessment of where you currently sit against ACSC ML0 to ML3 across all eight strategies. Evidence-based scoring, gap register, and prioritised uplift roadmap.

Best when: A board, insurer, or customer has asked for a current maturity statement with audit-defensible evidence.
PATH 2
Gap Analysis & Roadmap

Assessment plus a costed, sequenced uplift plan from your current level to a target level (typically ML2 or ML3). Control design recommendations, governance structures, evidence templates, KPIs.

Best when: You know the target maturity level and need a defensible path and budget to get there.
PATH 3
ML2 / ML3 Uplift Engagement

Full uplift advisory across all eight controls until target ML is achieved and demonstrably evidenced. Policy authoring, control implementation guidance, audit-ready evidence packs, ongoing oversight.

Best when: ML2 or ML3 is a regulatory, contractual, or insurer-driven obligation.

Whichever path you choose, the delivery model is the same: GRC advisory by Suitably Qualified and Experienced Personnel, with SQEP services explicitly within our ISO 27001 certified scope and audited annually. Penetration testing is not part of these paths; if technical control validation is needed, it is scoped and procured separately.

• THE INFRACOM POSITION

Why your board will accept Infracom's maturity statement

When an Australian board reads an Essential Eight maturity statement, the first thing they want to know — before the methodology, before the scores — is who signed it. They want a name and a credential stack their auditors recognise, their insurer accepts, and their procurement team can defend.

Infracom's signature carries that weight because of what stands behind it:

GRC advisory delivered by Suitably Qualified and Experienced Personnel (SQEP) — the discipline standard for the people who design, scope, and assess security controls. SQEP applies to advisory work; pentesting validates controls after they exist but does not design them.

SQEP service inside our ISO 27001 certified scope — competence audited annually, not just claimed in a marketing line.

Operating since 2008, trusted by Singapore Government, MAS-regulated banks, and CII operators — assurance bars higher than most Essential Eight engagements demand.

Independent maturity assessment, gap analysis, and ML2 or ML3 uplift delivered remotely from Singapore — no onsite footprint required for the advisory work.

Start with the form below. We'll come back with a scoping conversation, not a sales pitch.

How an Essential Eight Engagement Runs

A repeatable four-phase model. Each phase has defined inputs, activities, and outputs. Scope and timing flex with your environment size; the phases do not.

PHASE 1

Discover

Scope confirmation, environment baseline, stakeholder identification. We agree what is in scope (workstations, servers, internet-facing services, third-party systems), what evidence sources are available, and which business stakeholders need to be involved. Outputs: scope statement, evidence checklist, assessment plan.

PHASE 2

Assess

Control-by-control evaluation against the maturity model. Each of the eight strategies is examined for evidence of implementation, operating effectiveness, and coverage. Interviews, technical validation, configuration review, and sampling. Outputs: working papers, control maturity scoring, exception register.

PHASE 3

Report

Findings, maturity rating, and prioritised uplift roadmap. A board-ready report with the uniform maturity rating, a per-strategy breakdown showing where the organisation sits on each control, gap analysis, and a prioritised remediation roadmap. Findings are evidenced — no opinion-only ratings. Outputs: assessment report, executive summary, remediation roadmap.

PHASE 4

Uplift

Targeted remediation, control validation, ongoing maturity tracking. Working alongside your team to close the gaps identified in Phase 3 — policy updates, configuration changes, evidence collection cadences, control re-validation. Optional quarterly check-ins to track maturity trajectory between annual reassessments. Outputs: remediation evidence, re-tested control validation, uplift report.

Frequently asked

Common questions about Essential Eight

What Australian organisations commonly ask before engaging on Essential Eight — covering the relationship to penetration testing, the SQEP discipline, delivery from Singapore, timing, alignment with APRA CPS 234 and SOCI, and what day one of an engagement looks like.

Is Essential Eight assessment a penetration test?
No. Essential Eight assessment is governance, risk, and compliance (GRC) advisory work — the discipline of designing, scoping, evidencing, and validating controls so they hold up in front of boards, regulators, insurers, and Defence primes. A penetration test can validate that a specific control works once it exists, but it cannot tell you which controls to design, how to scope them, or how to evidence them for an audit. Pentesting is a useful complement after the control set is in place, but it does not substitute for SQEP advisory.
Why does it matter that your SQEP service is inside ISO 27001 certified scope?
Suitably Qualified and Experienced Personnel (SQEP) is the discipline standard for advisory consultants. Many firms claim SQEP in their marketing, but very few have it audited. Our SQEP service sits explicitly inside our ISO 27001 certified scope, which means an external certification body audits our consultant competence, training records, scoping discipline, and engagement methodology annually. When your auditor asks how we know Infracom's consultants are qualified to assess your controls, the answer is in a certified ISMS — not a marketing claim.
Can you deliver remotely from Singapore?
Yes. The advisory work — scoping, evidence review, control assessment, gap analysis, maturity rating, uplift roadmap — is delivered remotely from Singapore. We use the same secure delivery patterns we use for Singapore Government, MAS-regulated banks, and CII operators. For organisations whose policies require an onsite presence for specific phases (e.g. interviews with operational staff, data centre walkthroughs), those phases are scoped separately and arranged as needed.
How long does a typical Essential Eight engagement take?
Duration depends on the path chosen, the scope of systems, the target maturity level, and the readiness of existing evidence. A point-in-time maturity assessment is faster than a full uplift programme. We confirm timing during the Phase 1 Discover conversation against your specific environment rather than quoting a generic range that would not apply to your circumstances.
How does Essential Eight relate to APRA CPS 234, SOCI, and ISM?
The Essential Eight is the ACSC's prioritised baseline for protecting internet-connected IT networks. It sits inside the broader Australian regulatory landscape rather than replacing it. APRA CPS 234 requires regulated financial entities to maintain information security capability proportional to vulnerabilities and threats — Essential Eight maturity is one of the most defensible ways to demonstrate that. SOCI Act obligations for critical infrastructure operators include risk management programmes where Essential Eight maturity is commonly mapped as the technical control baseline. ISM is the wider information security manual that government entities and Defence supply chain organisations follow; Essential Eight is the foundational subset within ISM. Our advisory work maps your Essential Eight position to whichever of these frameworks apply to you.
What does engagement actually look like on day one?
A scoping conversation, not a sales pitch. We ask what is driving the engagement (a board ask, an insurer requirement, a customer or regulator question, a tender obligation), what systems are in scope, what evidence is already available, and what maturity level you are aiming for. From that conversation we produce a written scope, an evidence checklist, and a phased plan with the appropriate path (Maturity Assessment, Gap Analysis & Roadmap, or ML2/ML3 Uplift Engagement). No commitment is required until you have a written scope you are comfortable with.

Start Your Essential Eight Engagement

Tell us about your Essential Eight maturity needs — our consultants will respond within 1 business day with a tailored proposal.

E8 ENQUIRY TYPES
Maturity Assessment Gap Analysis ML2 Uplift ML3 Uplift APRA CPS 234 SQEP Advisory GRC Advisory
📍
Office
506 Chai Chee Lane, Singapore 469026
🏆
Certifications
CISSP · CISM · CISA · CRISC · CCSP · ISO 27001
🌏
Markets served
Singapore · Australia · Global
Response time
Within 1 business day (SGT / AEDT)
🔒
Confidentiality
All enquiries strictly confidential
+61
Infracom Consultancy Integration Pte Ltd

Your one-stop IT & cybersecurity partner — Singapore HQ since 2008, expanding to Australia in 2026.

506 Chai Chee Lane

Singapore 469026

Consulting
Hours

Mon – Fri
9AM – 6PM SGT

LinkedIn →
© Infracom Consultancy Integration Pte Ltd. All rights reserved.Privacy Policy