

30 Mar 2026, by Slade Baylis
There are many different approaches and strategies that organisations can choose when looking to secure their systems. And one of the most widely adopted frameworks in Australia is the Essential Eight maturity model. This is the official framework published and endorsed by the Australian Signals Directorate (ASD), who is Australia’s statutory agency responsible for cyber security and signals intelligence.
The Essential Eight - in what may sound like a sequel to a Tarantino movie - has been designed to protect Australian organisations’ internet-connected IT networks. It encompasses various mitigation strategies, each of which is essential for ensuring your systems remain secure, especially with the growing number, frequency, and severity of cyberattacks.
That’s why in this month’s blog we’ll be exploring what the Essential Eight is, what strategies are included in it, and how organisations are evaluated against these strategies in its maturity model approach.
As implied in the name, the Essential Eight encompass eight different cybersecurity mitigation strategies. These have been deemed essential as baseline protection to make it harder for adversaries to compromise your IT systems, ensuring you remain secure in the face of modern threats.
The mitigation strategies that constitute the Essential Eight are:
As you can see from the above, at their most basic, they just list the high-level concepts and areas that organisations need to address in order to be secure. However, it’s in the evaluation of compliance against these strategies that you’re able to know how secure you really are.
Compliance with these strategies is measured via a maturity model, which evaluates how well each strategy has been implemented to protect against increasing types and severity of threat. The more your organisation and systems are protected against these increasing levels of threat – also known as levels of “tradecraft”, which are the tactics, techniques, and procedures (TTP) used by malicious actors – then the more “mature” that protection is deemed to be.
When determining how secure your systems are, it’s important to consider the types of threats and level of targeting that you’re secure against. Threats can vary in terms of their sophistication, both in terms of the TTP used as well as the time invested by the malicious actor to try and break into your systems.
The systems, policies, and techniques you implement may protect you against more common threats, but may not protect you should a cyber-criminal take a special interest in breaking into your systems. They may spend countless hours probing, evaluating, and attempting to learn all the weaknesses in your infrastructure and organisation. The mitigation strategies you use to protect against the more basic threats will likely not protect you against these more diligent and persistent threats, which is why it’s important to know where you stand.
The lowest of the Maturity Levels is Level Zero, and it doesn’t so much describe a level of threat that has been protected against, but rather the opposite. For an organisation to have been deemed Maturity Level Zero for a particular control, it simply means that they aren’t protected – not even to the low level of Maturity Level One.
Any system that’s deemed to be vulnerable to even commonly available, widely used, and non-targeted attacks will fall into this category. With these systems, it’s not so much a matter of “if” they will be compromised, but a case of “when”.
Some threats are non-targeted, launched against a wide array of potential victims, which use commodity tradecraft, which are less sophisticated approaches and TTP to try and break into systems. This includes a wide range of different types of attacks, from generic phishing emails that are sent en-masse to hundreds of thousands of recipients, to automatic probing of servers for known vulnerable applications that can automatically be breached.
These types of attacks differ in one substantial way from other types of threat. The attackers who launch these attacks are often searching for vulnerabilities and choosing their targets based on who is vulnerable, rather than the inverse, which is choosing a target and then looking and probing them to see how they are vulnerable to different types of attack.
If your organisation is able to adequately protect against these broad non-targeted threats, but not able to protect themselves from more sophisticated and targeted levels of threats, this Maturity Level One rating is what you would receive for the associated mitigation strategy.
The natural next level of threat, compared to untargeted and broad reaching attacks, are those that are specifically aimed against a particular target. These threats usually originate from malicious actors that are a step up in terms of their abilities and the quality of the attacks that they launch against their unfortunate victims.
These types of attacks are often ongoing, persisting over larger spans of time, with more time invested from the malicious actor to try and break into their targets systems. Often attacks will be hand-crafted, such as attacks aimed at deceiving particular staff members through phishing and social engineering attacks, launched after doing research about who that staff member is to improve the likelihood of the attack succeeding.
Similarly to before, if your organisation is positioned and set up to defend against these attacks, Level Two is the maturity level rating you would receive for the control being assessed.
This is the highest standard within the Essential Eight framework. Organisations that meet Maturity Level Three are able to demonstrate that all the Essential Eight controls are thoroughly implemented, documented, and regularly reviewed. Not only are they able to defend against automated attacks and more sophisticated and targeted attacks, but they’re able to greatly mitigate threats from adversaries that are much more adaptive, such as state-sponsored actors and well-funded cybercriminals.
As mentioned by the ASD1, threats that need to be mitigated under this Maturity Level Three come from malicious actors that are “willing and able to invest some effort into circumventing the idiosyncrasies and particular policy and technical controls implemented by their targets”. Due to this, they are able to find vulnerabilities that other, more automated, methods may not usually find. They are also “less reliant on public tools and techniques”, may exploit vulnerabilities not yet known to the wider security community, and are swift to act on new vulnerabilities.
These malicious actors will aim to breach systems, evade detection, spread throughout systems after gaining a foothold. In this category, monetary gain and extortion may not even be the primary goal, with the category including state-actors and connected groups that aim to breach systems for espionage reasons rather than monetary ones.
Overall, the controls at this level require very short timeframe for action and remediation. Additionally it requires detailed logging and constant monitoring of activity on networks and systems. This Maturity Level Three sets the gold standard when it comes to ensuring your systems are as secure as possible against the latest threats.
If you have any questions about the different strategies listed within the Essential Eight, or alternatively are looking for someone to speak to about how to improve your cybersecurity posture, let us know!
We can work with you directly and discuss your own infrastructure and organisational cybersecurity posture to offer guidance, as well as help implement recommended changes together. We also have a range of software and services to provide compliance with the Essential Eight and to improve your overall maturity levels in cybersecurity.
You can reach us via email at sales@micron21.com or calling us on 1300 769 972 (choose option #1).
1, Australian Signals Directorate, Essential Eight Maturity Model, <https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model>
Simple, transparent pricing from Australia's leading cloud provider