CYBER SECURITY

Essential Eight Cyber Security

Australia's cyber security baseline. We implement and manage all eight strategies.

20sec

Avg Answer

87%

First-Call Fix

E8

Aligned

24+

Years Experience

ACSC FRAMEWORK

The Essential Eight - Australia's Cyber Security Baseline

The Essential Eight is a set of eight cyber security strategies developed by the Australian Cyber Security Centre (ACSC). Together, they form the most effective baseline for mitigating cyber security incidents - from ransomware and data breaches to phishing and insider threats.

Milnsbridge can implement and manage all eight strategies through a scoped uplift program. Our managed IT plans include the core foundations - patching, EDR, monitoring, and email security - with assessment and staged maturity uplift available as an add-on. Whether you need a baseline assessment, a staged uplift program, or ongoing Essential Eight operations, we handle it end to end.

THE 8 STRATEGIES

What the Essential Eight Covers

1. Application Control

Block unauthorised software with ThreatLocker zero-trust allowlisting. Only approved applications can execute.

2. Patch Applications

Critical patches deployed within 48 hours. Automated patching via N-able N-central.

3. Configure M365 Macros

Restrict macro execution to digitally signed, trusted documents only. Block a primary malware delivery vector.

4. User Application Hardening

Browser and Office hardening - Flash blocked, Java restricted, OLE controls, and attack surface reduction.

5. Restrict Admin Privileges

Separate admin accounts, just-in-time elevation, and regular access reviews. No standing admin rights.

6. Patch Operating Systems

Windows and macOS patches within 48 hours for critical vulnerabilities. N-able N-central managed centrally.

7. Multi-Factor Authentication

MFA enforced on all accounts via Duo or Microsoft Entra ID (MFA platform scoped separately as an add-on). Phishing-resistant methods prioritised.

8. Regular Backups

Cove Backup with automated daily backups (cloud backup is a separately priced add-on; daily backup monitoring included in every plan), offsite replication, and immutable storage for ransomware recovery.

Ongoing Compliance

Continuous monitoring and quarterly reviews to maintain your Essential Eight maturity level as threats evolve.

Want to See How This Works for Your Business?

We'll assess your current setup and show you exactly what we'd change. No obligation.

MATURITY LEVELS (ML0-ML3)

Which Essential Eight maturity level do you need?

The Essential Eight is not pass/fail. The ACSC measures each of the eight strategies across maturity levels (ML0 to ML3). Your overall posture is usually described as the lowest maturity level you can demonstrate (with evidence) across the eight strategies. That is why the question most businesses should ask is not "Do we have Essential Eight?" but "What maturity are we operating at, and what level do we actually need?"

ML0 - Incomplete

No or inconsistent controls across the eight strategies. Patching is ad hoc, application control is absent, and MFA is not enforced. Most businesses start here before a formal assessment.

ML1 - Baseline

Core controls in place to block opportunistic attacks. Automated patching, basic application whitelisting, and MFA on internet-facing services. The minimum sensible target for most SMBs.

ML2 - Standard

Stronger, validated controls designed to resist targeted attackers. Centralised logging, MFA on all systems, tested backups, and hardened configurations. Common target for businesses handling sensitive data.

ML3 - Advanced

High-assurance controls with continuous monitoring and an assumed breach posture. Validated through regular testing and evidence collection. Typically required for defence supply chain and government programs.

Practical target for most SMBs: ML1 is the minimum sensible baseline, and ML2 is a common target when email compromise, ransomware, and supplier obligations are real risks. ML3 is typically required for defence supply chain, government programs, or environments where a very capable adversary is assumed.

A common gotcha: maturity is evidence-based. It is not enough to have a setting enabled once; you need repeatable operations (policy, monitoring, access reviews, patch compliance, backup testing) that you can demonstrate. In practice, uplift work is usually a mix of technical changes (Entra ID, M365 hardening, EDR, app control, N-able N-central) and process changes (change control, asset and identity hygiene, exception handling). That is why many organisations choose staged uplift: stabilise to ML1 quickly, then harden and formalise to ML2.

Strategy ML1 (baseline) ML2 (strong) ML3 (advanced)
Application controlBlock common unapproved appsAllowlisting with stronger coverageTight control incl. scripts and admin tools
Patch applicationsCritical apps patched quicklyBroader app coverage and reportingTighter SLAs, validation, exception control
Configure macrosBlock or restrict macrosSigned macros only, controlled sourcesTight controls with monitoring and review
User app hardeningReduce common browser/Office riskStronger policies + attack surface reductionHardened builds, verified drift control
Restrict admin privilegesSeparate admin accountsReduced standing admin + regular reviewsJust-in-time, strong PAM and auditing
Patch operating systemsCritical OS patches rapidlyBroader OS coverage + compliance reportingTight change control and assurance evidence
Multi-factor authenticationMFA for key remote/admin accessMFA widely enforced (incl. cloud apps)Phishing-resistant methods prioritised
Regular backupsDaily backups + restore test basicsBetter coverage, monitoring, and testingImmutable/offline options + stronger recovery assurance

How Milnsbridge helps: Our managed IT plans include the core foundations. We offer Essential Eight assessment and staged maturity uplift as a separately scoped engagement. Start with an evidence-based maturity assessment, then uplift in phases so you can reach (and maintain) the target level without disrupting the business.

Source: ACSC Essential Eight Maturity Model

WHO NEEDS IT

Is Essential Eight Right for Your Business?

Defence Supply Chain

DISP membership requires Essential Eight alignment. Mandatory for businesses handling defence-related information.

Government Contractors

Australian government agencies increasingly require Essential Eight compliance from suppliers and contractors.

Any Business Serious About Security

Even without regulatory requirements, Essential Eight is the most practical framework for reducing cyber risk in any Australian business.

8Strategies
ML0-3Maturity Levels
20secAvg Answer
24+Years Experience
OUR E8 SERVICES

How We Help

Essential Eight Assessment →

Evidence-based assessment with maturity scoring and a prioritised uplift roadmap.

Uplift Program →

Staged implementation from 90-day stabilisation to target maturity over 6-12 months.

ThreatLocker (App Control) →

Zero-trust application control - the most effective single strategy in the Essential Eight.

WHY MILNSBRIDGE

Trusted by Sydney Businesses Since 2002

24+

Years experience

E8

Essential Eight aligned

87%

First-call resolution

20sec

Average answer time

FAQ

Essential Eight - Common Questions

What is the Essential Eight?

The Essential Eight is a set of eight cyber security mitigation strategies published by the Australian Cyber Security Centre (ACSC). It provides a prioritised baseline for organisations to protect against common cyber threats including ransomware, phishing, and credential theft. The eight strategies cover application control, patching, Microsoft Office macro settings, user application hardening, restricting admin privileges, patching operating systems, multi-factor authentication, and regular backups.

What are the Essential Eight maturity levels?

The ACSC defines four maturity levels (ML0 to ML3). ML0 means the strategy is not implemented or has significant gaps. ML1 is a basic implementation that addresses the most common threats. ML2 targets more sophisticated adversaries. ML3 provides the highest level of protection against the most advanced threats. Most Sydney SMBs aim for ML1 or ML2 as a practical starting point.

Is Essential Eight compliance mandatory?

Essential Eight is mandatory for Australian federal government entities. For private sector businesses, it is not legally required but is widely recognised as best practice and increasingly expected by insurers, auditors, and clients in regulated industries such as defence, finance, and healthcare. Milnsbridge can assist with Essential Eight assessment and phased uplift programs.

How does Milnsbridge help with Essential Eight?

Milnsbridge offers two services: an Essential Eight assessment that establishes your current maturity baseline with a prioritised roadmap, and an uplift program that implements the recommended controls in staged phases with quarterly progress reporting. Both are scoped separately from managed IT plans.

What does "Essential Eight aligned" mean on your managed IT plans?

It means our standard managed IT controls (patching, endpoint protection, email security, backup monitoring) broadly map to Essential Eight strategies. It does not mean your organisation automatically meets an Essential Eight maturity level. Achieving a formal maturity level requires assessment, evidence, and ongoing operation, which is what the assessment and uplift services deliver.

How long does Essential Eight uplift take?

It depends on your starting position, target maturity level, and environment complexity. A typical uplift from ML0 to ML1 takes 3 to 6 months. ML1 to ML2 typically takes 6 to 12 months. Milnsbridge delivers uplift in staged phases with clear milestones so progress is measurable and you are not locked into a single large project.

ESSENTIAL EIGHT

Ready to Assess Your Essential Eight Maturity?

Start with an assessment and get a prioritised roadmap. We handle the implementation and ongoing management.