The ASD Essential Eight has become the most referenced cyber security framework in Australian business. It appears in government procurement requirements, enterprise vendor questionnaires, insurance underwriting assessments, and Board cyber risk discussions. Every organisation of any size that engages with regulated industries, government contracts, or enterprise clients will encounter it.
The problem is that most organisations have learned to talk about the Essential Eight without having genuinely implemented it. There is a significant and growing gap between the organisations that claim Essential Eight alignment and the organisations that can actually demonstrate it under scrutiny. That gap has consequences — and as regulatory and procurement expectations tighten, those consequences are becoming increasingly difficult to avoid.
What You Need to Understand
- The Essential Eight is a maturity model — there are four levels, and most organisations are at a lower level than they believe
- Claiming alignment without evidence is not a defensible position under regulatory scrutiny or following an incident
- The framework was updated in 2023 — organisations aligned to the previous version may no longer meet current requirements
- Government and enterprise procurement teams are increasingly requiring demonstrated maturity, not self-assessed claims
- Cyber insurers are beginning to use Essential Eight maturity as a direct input to coverage terms and premium pricing
What the Essential Eight Actually Is
The Essential Eight is a set of eight baseline mitigation strategies developed by the Australian Signals Directorate. It was designed in response to analysis of actual cyber attacks against Australian organisations — specifically, the finding that the vast majority of successful attacks could have been prevented or significantly mitigated by a relatively small number of controls implemented consistently and well.
The framework is not a compliance checklist. It is a maturity model. Each of the eight strategies is assessed across four maturity levels, from zero — where the control has not been implemented — to three, where the control is implemented comprehensively, tested regularly, and embedded in operational practice. The difference between maturity level one and maturity level three is not a matter of ticking additional boxes. It is a fundamental difference in the depth, consistency, and verifiability of implementation.
The Eight Strategies and Where Organisations Typically Fail
Each of the eight strategies targets a specific category of threat. Understanding where organisations most commonly fail — and why — gives a clearer picture of what genuine alignment actually demands.
Application Control
This control restricts which applications can execute on an organisation's systems to a pre-approved list. In practice, most organisations have no such list, and the concept of preventing unapproved software from running is entirely foreign to their operational environment. Ransomware and malware execution is precisely what this control prevents. Organisations that do not have it are relying on detection after the fact — which is consistently too late.
Patching Applications and Operating Systems
The ASD's research consistently finds that the majority of successful attacks exploit known vulnerabilities for which patches were available but not applied. The Essential Eight requires that critical patches be applied within specific timeframes. Many organisations patch on irregular schedules, patch some systems and not others, or have no visibility into which systems are running outdated software. The gap between believing patching is being done and having evidence that it is being done consistently across all systems is wider than most leadership teams recognise.
Restricting Administrative Privileges
Administrative access should be held only by those who genuinely require it, used only for tasks that require it, and subject to specific controls around how it is accessed and authenticated. In many Australian SMEs, IT administrative credentials are shared informally, used for daily computing tasks, and have never been reviewed against the principle of least privilege. When an attacker gains access to administrative credentials — through phishing, credential stuffing, or insider action — there are effectively no boundaries on what they can do.
Multi-Factor Authentication
Multi-factor authentication requires something beyond a password to authenticate to systems and accounts. The Essential Eight is specific about where MFA must apply — not just email, but remote access systems, privileged accounts, and critical data repositories. Many organisations have deployed MFA for some accounts and believe they have addressed the control. They have not. The question is not whether MFA exists somewhere in your environment. The question is whether it is consistently applied everywhere the framework requires it, and whether there are paths to authentication that bypass it.
Regular Backups
Backups are the control that determines whether a ransomware attack is catastrophic or merely disruptive. The Essential Eight is specific: backups must be comprehensive, tested, stored in a way that prevents them from being encrypted or deleted in an attack, and restorable within a timeframe that the organisation has actually verified. Many organisations have backup systems that have never been tested to confirm they actually work, stored in locations that are accessible from the same compromised network an attacker would control. Discovering that your backups are either incomplete or inaccessible during a ransomware incident is among the most consequential failures an organisation can experience.
The 2023 Updates and Why They Matter
The ASD updated the Essential Eight Maturity Model in 2023 with material changes to several controls. Organisations that conducted Essential Eight assessments prior to 2023 and have not revisited their alignment since are assessing themselves against an outdated version of the framework. This matters in two specific contexts: government and enterprise procurement requirements that reference current maturity levels, and cyber insurance assessments that increasingly use the framework as a standard for coverage eligibility and premium calculation.
An organisation that believes it is aligned to the Essential Eight on the basis of work done two or more years ago should treat that belief as unverified until it has been tested against the current version of the model.
What Genuine Alignment Looks Like
Genuine Essential Eight alignment has two distinguishing characteristics. First, it is evidenced rather than asserted. For every strategy, there is documentation, testing records, and observable evidence that the control is implemented at the claimed maturity level. Second, it is independently verified. The assessment of alignment was conducted by someone other than the team responsible for implementation — someone with no incentive to overstate maturity and with the technical knowledge to test it accurately.
Organisations that can demonstrate these two characteristics occupy a meaningfully different position from those that cannot — in procurement conversations, in Board reporting, in regulatory engagement, and in the event of an incident. The question a Board should be asking is not "what maturity level have we self-assessed at?" It is "what evidence do we have, and who validated it?"
The Stakes of Getting This Wrong
The Essential Eight is transitioning from a recommended framework to an increasingly enforced one. For organisations that contract with Australian Government entities, alignment to specified maturity levels is a condition of continued engagement. For organisations in regulated sectors, cyber insurers are moving toward requiring demonstrated Essential Eight maturity as a condition of coverage. For organisations seeking enterprise clients, procurement due diligence increasingly includes assessment of cyber security framework alignment.
The organisations that have invested in genuine alignment — with evidence to demonstrate it — will find these conversations straightforward. The organisations that have been reporting self-assessed maturity without independent verification will find them increasingly uncomfortable. The gap between those two positions is closing, and it is closing in one direction.