๐Ÿ‡ฆ๐Ÿ‡บ Australia โ† All posts

Essential Eight in 2026: What Australian SMBs Actually Need to Do

Cyber insurers are asking for it. Government contracts require it. Here is what ML1 actually requires โ€” and what most businesses are still missing.

De4sec Technology  ยท  March 2026  ยท  5 min read

The Australian Signals Directorate's Essential Eight has been around since 2017 โ€” but in 2026, it's no longer a 'nice to have'. Cyber insurers are asking for it. Government contracts require it. Investors and boards are starting to expect it. And yet most Australian SMBs still treat it as something that happens to bigger organisations.

What the Essential Eight actually is

It's eight specific security controls, ranked by how effectively they prevent the most common attack types. They were developed by the Australian Cyber Security Centre (ACSC) based on real incident data โ€” not theory. Each control is rated at Maturity Level 1, 2 or 3 depending on how rigorously it's implemented.

Most SMBs need ML1 as a baseline. Government suppliers typically need ML2. ML3 is for high-value targets and critical infrastructure.

The eight controls, briefly

โ†’Application control โ€” only approved software can execute
โ†’Patch applications โ€” browsers, Office, PDF readers patched within 48h
โ†’Configure macros โ€” Microsoft Office macros blocked or restricted by default
โ†’User application hardening โ€” browser extensions, Flash, Java locked down
โ†’Restrict admin privileges โ€” admin accounts used only when required
โ†’Patch operating systems โ€” OS patches applied within 48h (ML2) or 2 weeks (ML1)
โ†’Multi-factor authentication โ€” enforced for email, remote access, admin
โ†’Regular backups โ€” tested, offline or offsite, restorable within 12 hours

The controls most businesses are missing

In our experience reviewing Australian SMB environments, the most commonly missed controls are patching, MFA and admin privilege restriction โ€” not because they're difficult, but because they've been deprioritised to avoid disruption.

Most businesses say: 'We'll do patching when things are quieter.' But patching doesn't work that way. Vulnerabilities don't wait for a quiet week. The businesses that get hit are the ones that kept deferring.

Why it matters more in 2026

โœ“Cyber insurance: most policies now require evidence of ML1 controls
โœ“Government contracts: many tenders now include Essential Eight as a prerequisite
โœ“Capital raises: investors and due diligence processes increasingly ask about security posture
โœ“Client contracts: professional services, legal and accounting firms are being asked by their own clients
โœ“Incident recovery: businesses without documented controls face longer, more expensive recoveries

What implementation actually looks like

The implementation approach matters as much as the controls themselves. Too many IT providers 'align to Essential Eight' on paper โ€” meaning they tick boxes in a spreadsheet โ€” without actually changing anything in the environment.

A proper implementation using the Microsoft stack (which most Australian SMBs already have) looks like this:

โœ“Microsoft Intune deployed โ€” all devices enrolled, policies applied
โœ“Patch policies configured โ€” automated, out of hours, staged ring rollout
โœ“MFA enforced via Conditional Access โ€” not optional, not per-user
โœ“Admin accounts separated from daily-use accounts
โœ“Microsoft Defender baseline applied โ€” not just installed
โœ“Backup policy documented, tested restore confirmed

Essential Eight is not a one-time project. It's a baseline you maintain. The first implementation gets you to ML1. Staying there requires ongoing management โ€” which is why we include compliance reporting in every managed support plan.

// NOT SURE WHERE YOU STAND?

Get a free IT & security check.

We identify the gaps and tell you exactly what to fix first.

Book a Free Discovery Call โ†’
RELATED SERVICES:
Essential Eight CompliancePatch ManagementCybersecurity & Risk