ACSC Framework

The Essential Eight,
Actually essential.

The ACSC Essential Eight is Australia's government-endorsed cyber security framework. It covers the eight controls most likely to prevent a serious cyber incident. We build our managed security programs around it.

The ACSC Essential Eight Framework

The ACSC reviewed thousands of real cyber incidents across Australia and identified the controls that would have stopped or significantly reduced the damage in most of them. The Essential Eight is the result. Eight controls that, when implemented together, address the most common attacks including ransomware, credential theft, phishing, and system compromise.

It is also the framework the Australian Government mandates for Commonwealth entities, which gives it real credibility as a baseline for private sector businesses. Many Australian cyber insurers and regulators now reference it directly when assessing security posture.

📊 Maturity Levels
Four maturity levels from 0 to 3 most businesses should target Level 2.
🏛️ Government Standard
Mandated for Commonwealth entities and adopted across regulated sectors.
🔄 Living Framework
Updated by the ACSC as the threat landscape evolves.
The Eight Strategies

Eight controls that address the most common attacks

🚫 1. Application Control

Only software that you have approved is allowed to run. Everything else is blocked before it can execute. This stops a wide range of malware and ransomware at the point of delivery.

🔄 2. Patch Applications

Keep software up to date. Attackers regularly exploit known vulnerabilities in applications that have not been patched. Setting clear timelines for applying updates reduces that risk significantly.

📄 3. Configure Microsoft Office Macros

Limit which macros can run in Office documents. Malicious macros embedded in Word and Excel files are a common way attackers gain a foothold through phishing emails.

🌐 4. User Application Hardening

Configure browsers and user-facing applications to remove features that create risk. This includes disabling outdated plugins, controlling ad execution, and removing unnecessary browser extensions.

🔑 5. Restrict Admin Privileges

Limit who has admin access, what they can access, and when. Admin accounts used for everyday tasks create unnecessary risk. This control keeps privileged access tightly controlled.

💻 6. Patch Operating Systems

Keep operating systems up to date and remove any that are no longer supported. Unpatched operating systems are a well-known attack path and one of the easier ones to close.

🔐 7. Multi-Factor Authentication

Require a second verification step for all users, particularly those with admin access. Even when a password is stolen, MFA stops it from being useful to an attacker.

💾 8. Regular Backups

Keep tested, offline backups of your critical data and system configurations. When ransomware hits, a reliable backup is the difference between recovering quickly and paying a ransom.

Maturity Levels

Where do you sit?

The ACSC defines four maturity levels for each of the eight strategies. Level 0 means controls are not in place. Level 3 is full implementation against targeted and sophisticated attackers. Most businesses should be working towards Maturity Level 2 at a minimum.

Maturity 0
Controls not in place or ineffective. Significant gaps across one or more strategies.
Maturity 1
Partially implemented. Protects against opportunistic threats and commodity attacks.
Maturity 2
Broadly implemented. Recommended for most businesses. Protects against more targeted adversaries.
Maturity 3
Fully implemented. Protects against sophisticated, targeted attackers. Required for government entities.
Ready to talk?

Find out where your business sits on the Essential Eight.

We assess your current position across all eight strategies and give you a plain-language view of where you stand and what to address first.