Live · Tue, May 19, 2026 · 10:06 UTC Block 843,917 Fees 14 sat/vB Fear & Greed 72 · Greed
Newsletter Pro Terminal Sign in
ITop Field News.
Order flow,
protocol.
Subscribe →
Live · 10:06 UTC Block 843,917 F&G 72
Cybersecurity Cybersecurity desk

Essential Eight maturity model: a practical guide for 2026

The Essential Eight maturity model is the baseline cyber framework every Australian organisation needs to understand in 2026, with the ASD continually refining its guidance. Here is what the controls require and how to reach the level that fits your risk profile.

red padlock on black computer keyboard

Photo by FlyD on Unsplash

The Essential Eight maturity model remains the most referenced cybersecurity baseline for Australian organisations in 2026. Published and maintained by the Australian Signals Directorate (ASD), the framework sets out eight mitigation strategies and three maturity levels that give IT teams a structured path from basic hygiene to a genuinely resilient posture. Whether you are a federal agency under mandatory obligation or a private-sector firm looking for a credible benchmark, understanding what each control actually demands in practice is the starting point.

What the Essential Eight is, and why it matters now

The Essential Eight grew out of the ASD's "Top 35 Mitigations" list, which was later distilled to the eight strategies judged most effective against the adversary techniques most commonly used against Australian networks. The framework covers application control, patching of applications, configuring Microsoft Office macros, user application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication (MFA), and regular backups. Each strategy is assessed at Maturity Level 0 (ML0) through to Maturity Level 3 (ML3), with ML0 representing gaps and ML3 representing a near-complete implementation aligned with ASD intent.

The model matters right now because the threat environment has kept pace with, and in some areas outpaced, the controls. Ransomware crews increasingly target gaps in patching cadences and weak MFA implementations. As covered in our analysis of ransomware in Australia, local organisations across critical infrastructure, healthcare, and professional services continued to face disruptive attacks into 2026. A well-implemented Essential Eight posture directly raises the cost of those attacks for adversaries.

Breaking down the eight controls

Application control

Application control prevents unapproved executables, software libraries, scripts, and installers from running. At ML1, the focus is workstations and internet-facing servers. ML2 extends coverage to non-internet-facing servers and adds logging. ML3 tightens allowlisting to the point where only explicitly approved applications can execute anywhere on the network, including in user-writable directories. The practical challenge for most organisations is maintaining a current allowlist as software changes; automation is almost unavoidable at higher maturity levels.

Patch applications and operating systems

The patching controls split internet-facing applications and operating systems into their own categories, reflecting different risk profiles. For internet-facing services, ASD's current guidance at ML2 and ML3 expects critical patches to be applied within 48 hours of release. Non-internet-facing systems have a two-week window at ML2 and 48 hours at ML3 for critical vulnerabilities. The 48-hour expectation is a significant operational demand for teams without automated patch orchestration, and many organisations are still building toward it.

Configure Microsoft Office macros

Macro-based delivery of malicious payloads remains a live threat vector. The control requires organisations to block macros by default and allow only digitally signed macros from trusted sources. At higher maturity levels, macro use is restricted to a limited set of approved users, and sandboxed antivirus scanning is applied to all files before they reach the endpoint. The increasing adoption of Microsoft 365 across Australian enterprise has made this control both easier to enforce technically and more visible to auditors.

User application hardening

This control covers web browser hardening (disabling Flash, web advertisements, and Java from the internet), PDF viewer hardening, and the blocking of web-based code from arbitrary locations. At ML3, organisations are expected to have eliminated web browser plug-ins that cannot be hardened to ASD's specifications and to validate that hardening persists after updates.

Restrict administrative privileges

Privilege restriction is often where assessors find the largest gap between stated policy and actual practice. At ML1, admin accounts must not be used for email or web browsing. By ML3, privileged access workstations (PAWs) or equivalent controls must be in place, just-in-time access should be the norm, and all privileged actions must be logged and audited. The rise of cloud-based identity platforms has created new attack surfaces here, and the ASD guidance has been updated to reflect hybrid on-premises and cloud privilege models.

Multi-factor authentication

MFA is arguably the highest-impact single control in the framework. At ML1, MFA is required for remote access and for all users accessing internet-facing services. ML3 demands phishing-resistant MFA (such as FIDO2 hardware keys or certificate-based authentication) for all privileged users and for any access to systems storing sensitive data. SMS-based one-time passwords no longer satisfy ML2 or ML3 requirements under current ASD guidance, a change that has forced many organisations to accelerate their hardware token or passkey rollouts.

Regular backups

The backup control requires organisations to take complete, tested backups of important data, software, and configuration settings. At ML3, backups must be stored offline or in an immutable state, restoration must be tested at least quarterly, and backup access must be restricted to accounts that are separate from production administration. Given the prevalence of ransomware that targets backup systems before encrypting production data, the offline and immutable requirements are no longer optional for organisations serious about recovery capability.

Choosing the right maturity level for your organisation

Federal government agencies classified as systems handling data up to PROTECTED are required to reach ML2 at a minimum, with ML3 expected for higher-sensitivity systems. For private-sector organisations, the target maturity level should be driven by a risk assessment that considers data sensitivity, regulatory obligations (including obligations under the Privacy Act and sector-specific frameworks), and the organisation's ability to detect and respond to incidents. Many organisations target ML2 as a credible baseline and treat ML3 as an aspirational state for their highest-risk systems. This tiered approach aligns with how the ASD guidance is structured and avoids the trap of aiming for uniform ML3 across environments where the cost and operational overhead would be disproportionate.

Regulatory pressure is also shaping ambition levels. Boards and audit committees are increasingly asking CISOs to report on Essential Eight maturity, and some industries are beginning to see it referenced in procurement and contract requirements. If your organisation handles government data or operates in critical infrastructure, an independent maturity assessment is worth commissioning to establish a credible baseline before a regulator or partner asks for one. This intersects closely with evolving data residency and sovereignty requirements; our complete guide to Australian data residency covers how those obligations shape your infrastructure choices.

Common implementation pitfalls

Several failure patterns show up repeatedly in Essential Eight assessments. The first is scope creep in reverse: organisations achieve ML2 on a subset of systems and assume the whole environment is covered, when in fact crown-jewel systems sit outside the assessed boundary. The second is configuration drift, where controls are implemented correctly at a point in time but degrade as new software is deployed and exceptions accumulate. The third is treating the framework as a compliance tick-box rather than a living security programme, which leads to high maturity scores on paper but poor detection and response capability in practice.

Automated continuous monitoring tools, integrated with a SIEM or security operations platform, are now essential for maintaining maturity levels above ML1 in any organisation of meaningful size. Tooling that maps control states directly to the Essential Eight taxonomy makes assessments faster and gives operations teams real-time visibility into drift.

Getting started with an assessment

If your organisation has not completed a formal Essential Eight assessment recently, the ASD publishes a detailed assessment process guide alongside the maturity model documentation. Engaging an ASD-certified assessor provides a defensible, independent baseline. From there, a remediation roadmap should prioritise by risk: patching internet-facing systems and enforcing phishing-resistant MFA typically deliver the highest risk reduction per effort invested, and they are the controls adversaries probe first. A phased approach over 12 to 18 months is realistic for most organisations moving from ML1 to ML2 across their full environment.

→ The Confirmations · Daily newsletter

One email at 06:00 UTC. Six minutes. The only digest written for desks, not for retail.