What is the Essential Eight?
The Essential Eight is a set of baseline mitigation strategies developed by the Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC). These strategies are designed to make it much harder for adversaries to compromise systems. While originally developed for government agencies, the framework has become the gold standard for cybersecurity across all Australian organisations.
The Eight Strategies Explained
1. Application Control
Prevent execution of unapproved or malicious programs including .exe, DLL, scripts, and installers. This is your first line of defence against malware and ransomware. For Sydney SMBs, this means implementing software whitelisting to ensure only approved applications can run on your systems.
2. Patch Applications
Security vulnerabilities in applications pose extreme risk. Patches for internet-facing services like web browsers, Microsoft Office, Java, and PDF viewers should be applied within 48 hours of release. Regular patching closes the doors that attackers commonly exploit.
3. Configure Microsoft Office Macro Settings
Microsoft Office macros are a common attack vector. Block macros from the internet and only allow vetted macros in trusted locations with limited write access. This simple configuration change can prevent countless malware infections.
4. User Application Hardening
Configure web browsers to block Flash, ads, and Java on the internet. Disable unneeded features in Microsoft Office, web browsers, and PDF viewers. These hardening measures reduce your attack surface significantly.
5. Restrict Administrative Privileges
Admin accounts are high-value targets. Restrict privileged access to operating systems and applications based on user duties. Regularly review admin privileges and remove unnecessary access. This limits the damage an attacker can do even if they gain initial access.
6. Patch Operating Systems
Like application patching, operating system patches for internet-facing services should be applied within 48 hours. Use the latest operating system versions and don't use unsupported versions. Windows 10 and 11 receive regular security updates—make sure they're applied promptly.
7. Multi-Factor Authentication (MFA)
MFA should be used for all users to access internet-facing services and when performing privileged actions. This means something you know (password) combined with something you have (phone, token) or something you are (biometrics). MFA blocks 99.9% of account compromise attacks.
8. Regular Backups
Perform regular backups of important data, software, and configuration settings. Store backups disconnected from your network and test restoration regularly. When ransomware strikes, your backups are your lifeline.
Essential Eight Maturity Levels
The ACSC defines four maturity levels for Essential Eight implementation:
- Maturity Level Zero: Limited or no alignment with the intent of the strategy
- Maturity Level One: Partially aligned with the intent (suitable for most SMBs as a starting point)
- Maturity Level Two: Mostly aligned with the intent (target level for businesses handling sensitive data)
- Maturity Level Three: Fully aligned with the intent (required for critical infrastructure and government)
Most Sydney SMBs should aim for Maturity Level One as a minimum, progressing to Level Two if handling sensitive client data or operating in regulated industries like healthcare or finance.
Implementation Steps for SMBs
Implementing the Essential Eight doesn't have to be overwhelming. Here's a practical approach for Sydney businesses:
- Assess your current state: Understand where you are against each strategy. A professional IT assessment can identify gaps quickly.
- Prioritise based on risk: Focus on strategies that address your highest risks first. For most businesses, MFA and patching deliver immediate security improvements.
- Implement incrementally: Don't try to achieve Level Three overnight. Start with Level One across all eight strategies.
- Document and automate: Create policies and procedures. Use tools to automate patching and monitoring where possible.
- Test and verify: Regularly test your controls and verify they're working as intended.
- Review and improve: Security is not set-and-forget. Review your implementation quarterly and adapt to new threats.
Costs and ROI of Essential Eight Implementation
The cost of implementing Essential Eight varies based on your starting point and target maturity level. However, consider these statistics:
- The average cost of a data breach in Australia is $4.03 million (IBM Cost of a Data Breach Report 2024)
- Australian businesses report a cyber attack every 6 minutes (ACSC Annual Cyber Threat Report)
- SMBs are increasingly targeted as they often lack robust security measures
- Essential Eight implementation at Level One typically costs $15,000-$50,000 for a 20-50 person business
"The Essential Eight provides a solid foundation for cyber security. For small businesses, achieving Maturity Level One across all eight strategies significantly reduces cyber risk." — Australian Cyber Security Centre
How We Researched This Article
This article was compiled using information from authoritative industry sources to ensure accuracy and relevance for Australian businesses.
Sources & References
-
•
Australian Cyber Security Centre (ACSC)
Official Essential Eight documentation and maturity model guidance
-
•
Australian Signals Directorate (ASD)
The Australian Government agency responsible for cybersecurity policy and the Essential Eight framework
-
•
ACSC Annual Cyber Threat Report 2023-2024
Annual report on cyber threats facing Australian organisations
-
•
IBM Cost of a Data Breach Report 2024
Global research on the financial impact of data breaches
* Information is current as of the publication date. Cybersecurity guidelines and best practices evolve regularly. We recommend verifying current recommendations with the original sources.
Frequently Asked Questions
Is the Essential Eight mandatory for Australian businesses?
While the Essential Eight is mandatory for Australian Government entities, it is not legally required for private businesses. However, it is strongly recommended as a baseline security standard, and some industries (healthcare, finance) may have regulatory requirements that align with Essential Eight controls.
How long does it take to implement the Essential Eight?
Implementation timeframes vary based on your current security posture and target maturity level. Most SMBs can achieve Maturity Level One within 3-6 months with proper planning and resources. Progressing to Level Two typically takes an additional 6-12 months.
Can we implement Essential Eight ourselves or do we need external help?
While some strategies like MFA and backup can be implemented internally, others like application control and proper patch management often require specialised expertise. A managed IT services provider can accelerate implementation and ensure controls are properly configured.
What happens if we don't implement the Essential Eight?
Without these baseline controls, your organisation faces significantly higher risk of cyber attacks including ransomware, data breaches, and business email compromise. The financial and reputational costs of a breach typically far exceed the investment in preventive security measures.
Peer 2 Peer IT
With over two decades of experience in IT solutions for Sydney businesses, Peer 2 Peer IT provides expert insights on technology, security, and digital transformation.
Learn more about us