The ASD Essential Eight for Australian SMEs: a practical 2026 guide
Insights & News The ASD Essential Eight for Australian SMEs: a practical 2026 guide May 4, 2026 The Australian Signals Directorate’s Essential Eight is the country’s de facto baseline cybersecurity maturity standard. It defines eight technical controls that mitigate the most common cyber attacks against Australian organisations, with three maturity levels from “starting point” to “advanced.” For Australian SMEs, hitting Maturity Level 1 across all eight controls typically requires moderate investment and addresses the bulk of practical cyber risk. Maturity Level 1 is also increasingly the threshold at which cyber insurance becomes available at reasonable rates and government and large enterprise contracts become winnable. Key facts The Essential Eight is published by the Australian Signals Directorate (ASD) Australian Cyber Security Centre (ACSC) and is freely available at cyber.gov.au. Three maturity levels: ML1 (mitigates adversaries with basic capabilities), ML2 (mitigates adversaries with moderate capabilities), ML3 (mitigates state-sponsored adversaries). ML1 is the baseline expectation for most Australian SMEs in 2026. The eight controls: application control, patch applications, configure Microsoft Office macro settings, user application hardening, restrict administrative privileges, patch operating systems, multi-factor authentication, regular backups. Federal government non-corporate Commonwealth entities are required to implement Maturity Level 2 as a minimum. Most Australian cyber insurers and large enterprise customers reference Essential Eight in their vendor due diligence processes. What is the Essential Eight? The Essential Eight is a set of eight prioritised mitigation strategies developed by the ASD’s Australian Cyber Security Centre. The strategies were originally distilled from the Top 35 Strategies to Mitigate Cyber Security Incidents and represent the controls ASD considers most effective against common cyber attack patterns. The Essential Eight was originally published in 2017 and has been refined multiple times since, including the introduction of the Maturity Model in 2018 and significant revisions through 2022 and 2023 to address contemporary threats. The current version focuses on Microsoft Windows-based environments, though most controls have direct equivalents in Mac, Linux, and cloud-native contexts. The eight controls cover three categories: prevent malicious code execution (application control, patch applications, configure macros, user application hardening), limit the extent of incidents (restrict admin privileges, patch operating systems, MFA), and recover data and system availability (regular backups). Together, they address the most common entry points and lateral movement techniques used in real-world attacks. What are the eight controls? Each of the eight controls has specific Maturity Level requirements. The summary below covers what ML1 looks like for an Australian SME. 1. Application control. Block executable files, software libraries, scripts, installers, compiled HTML, HTML applications, and control panel applets from running on workstations and servers. ML1 typically uses Microsoft AppLocker, Windows Defender Application Control, or third-party tools like AirLock or ThreatLocker. 2. Patch applications. Identify missing patches and update applications, particularly internet-facing ones, within strict timeframes. ML1 requires patching exploitable vulnerabilities in internet-facing applications within two weeks (or 48 hours if exploit code exists), and other applications within one month. 3. Configure Microsoft Office macro settings. Block macros from the internet, validate macros only from trusted locations, and disable macros for users that don’t need them. Macro-based attacks remain a significant vector, particularly for Australian SMEs where Microsoft Office is ubiquitous. 4. User application hardening. Web browsers configured to block ads, Java, Flash (now legacy), and unnecessary features that introduce risk. Microsoft Office configured to block OLE packages and similar high-risk content. PDF readers configured to block JavaScript. 5. Restrict administrative privileges. Privileged accounts limited to specific tasks, separated from user accounts, with strong authentication. Domain admins shouldn’t browse the web or read email. Standard users shouldn’t have local admin rights on their workstations. 6. Patch operating systems. Same approach as patching applications: identify, test, and apply OS patches within strict timeframes based on severity and exploit availability. For SMEs, Microsoft Intune or Windows Autopatch handles this for managed Windows fleets. 7. Multi-factor authentication. MFA on remote access (VPN, RDP), privileged accounts, important data repositories, and external services accessing sensitive data. ML1 expects MFA on the obvious accounts; ML2 and ML3 expand the scope. 8. Regular backups. Backups of important data, software, and configuration settings; backups stored offline, online, or remotely; backups tested for integrity and accessibility. Recovery testing is the bit most SMEs skip and most regret skipping. Why does Maturity Level 1 matter for SMEs? Three reasons. It’s the practical security floor. An SME at ML1 has addressed the bulk of common cyber attacks. The remaining gap to ML2 and ML3 is mostly diminishing returns for typical SME threat models. ML1 is enough to make your business a substantially harder target than the unhardened SME next door. Cyber insurance and customer contracts. Most Australian cyber insurers map their underwriting questions to Essential Eight controls. Hitting ML1 typically unlocks reasonable cyber cover at standard premiums; below ML1, cover gets expensive or unavailable. Government and large enterprise customers increasingly require ML1 or ML2 attestation in vendor due diligence. Regulatory alignment. The Essential Eight aligns with the “reasonable steps” expectation under the Privacy Act’s APP 11. An SME implementing ML1 has documented evidence of technical and organisational measures meeting current security standards, which materially helps if the OAIC investigates after a breach. What does it actually cost an SME to hit Maturity Level 1? For most Australian SMEs already on Microsoft 365, the cost is moderate. The bulk of ML1 controls are achievable using tools the organisation already pays for: Microsoft Intune for endpoint management, Microsoft Defender for application control, Microsoft Entra for MFA, Microsoft 365 backup for SaaS data backup. The investment is mostly configuration and process, not new license fees. For SMEs with mature M365 Business Premium or E3/E5 subscriptions, achieving ML1 typically takes 2-4 months of configuration work, mostly focused on application control rollout, macro policy, OS patching cadence, and user application hardening. Costs are mostly internal time or partner advisory fees, with some hardware refresh for older Windows fleets that don’t support modern controls. For SMEs not yet on M365 Business Premium or with older or third-party stacks, the investment is higher: M365








