De4sec
De4sec Technology
de4sec.technology
๐Ÿ‡ฆ๐Ÿ‡บ Australia

Essential Eight Simplified Guide

A plain-language guide to the Australian Signals Directorate Essential Eight framework โ€” what each control means, what implementation looks like, and how to reach Maturity Level 1.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
Edition
2026 ยท Updated March
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. What the Essential Eight Is โ€” and Why It Now Applies to You
  2. Control 1 โ€” Application Control
  3. Control 2 โ€” Patch Applications
  4. Control 3 โ€” Configure Microsoft Office Macros
  5. Control 4 โ€” User Application Hardening
  6. Control 5 โ€” Restrict Administrative Privileges
  7. Control 6 โ€” Patch Operating Systems
  8. Controls 7 & 8 โ€” MFA and Backups
  9. De4sec Essential Eight Implementation
01

What the Essential Eight Is โ€” and Why It Now Applies to You

The Essential Eight is a set of baseline cybersecurity controls developed by the Australian Signals Directorate (ASD) based on analysis of real-world attack data. It was originally designed for government agencies, but in 2026 it has become the de facto benchmark referenced by cyber insurers, enterprise clients, and government procurement.

If you're applying for cyber insurance, bidding on government contracts, or onboarding large enterprise clients, you will be asked about your Essential Eight maturity level. Maturity Level 1 (ML1) is now the minimum expectation for most commercial relationships.

The Essential Eight isn't theoretical. Each control was chosen because it stops specific attack types that are actively being used against Australian businesses.

02

Control 1 โ€” Application Control

Prevents unauthorised software from executing on endpoints. If a user is tricked into downloading malware, application control stops it from running โ€” regardless of whether antivirus detects it.

What ML1 requires

โœ“An application allowlist is in place โ€” only approved applications can execute
โœ“Implemented via Microsoft Intune AppLocker or WDAC (Windows Defender Application Control)
โœ“Covers executables, scripts, installers, compiled HTML, and libraries

Common gap

Many businesses rely on antivirus to catch malware after it runs. Application control prevents it from running in the first place. The two are complementary, not substitutes.

03

Control 2 โ€” Patch Applications

Internet-facing and productivity applications (browsers, Office, PDF readers, Java) must be patched within defined timeframes. Most breaches exploit known vulnerabilities with available patches.

Maturity LevelTimeframe for critical patches
ML1Within 1 month
ML2Within 2 weeks
ML3Within 48 hours for internet-facing services

De4sec implementation

โœ“Patch deployment via Microsoft Intune โ€” automated, scheduled out of hours
โœ“Staged ring deployment โ€” test group first, broader rollout if no issues
โœ“Patch compliance reporting โ€” monthly report showing all devices and patch status
04

Control 3 โ€” Configure Microsoft Office Macros

Microsoft Office macros are a primary delivery mechanism for malware. Attackers send Word or Excel files with malicious macros โ€” when the user enables them, the attack executes.

What ML1 requires

โœ“Macros disabled by default for all users
โœ“Macro execution only permitted for signed macros from trusted publishers
โœ“Enabled via Microsoft 365 security policies or Intune

Most businesses don't need macros. For the few that do (typically finance teams with Excel-based reports), signed macro policies allow legitimate use while blocking malicious ones.

05

Control 4 โ€” User Application Hardening

Restricts features in applications that attackers exploit โ€” particularly browsers and Office applications.

What ML1 requires

โœ“Internet Explorer disabled (now enforced in Windows 11)
โœ“Web advertisement blocking enabled in browsers
โœ“Microsoft Office โ€” OLE packages blocked, ActiveX controls disabled

Browser hardening is the highest-value action here. Enterprise browser policies deployed via Intune restrict which extensions can be installed and enforce safe browsing settings across all managed devices.

06

Control 5 โ€” Restrict Administrative Privileges

Admin accounts are the highest-value target in any attack. An attacker who compromises an admin account can do everything: create new accounts, disable security tools, exfiltrate data, and deploy ransomware across the entire environment.

What ML1 requires

โœ“Admin accounts used only for administrative tasks
โœ“Daily tasks performed with standard user accounts
โœ“Users do not have local admin rights on their own machines (unless a documented requirement)
โœ“Admin accounts have separate credentials from standard user accounts

Most businesses have their IT administrator's daily email account as a global admin. If that account is phished, the attacker gets full control of the Microsoft 365 tenant.

07

Control 6 โ€” Patch Operating Systems

The same patching principles that apply to applications apply to operating systems. Ransomware and worms routinely exploit known OS vulnerabilities.

Maturity LevelTimeframeScope
ML1Within 1 monthAll devices โ€” workstations and servers
ML2Within 2 weeksAll devices
ML3Within 48 hoursInternet-facing systems; 2 weeks for others

End-of-life operating systems (Windows 10, Server 2012) do not receive security patches. If your environment includes end-of-life OS versions, this control cannot be met until those systems are upgraded or replaced.

08

Controls 7 & 8 โ€” MFA and Backups

Control 7: Multi-Factor Authentication

MFA must be enforced โ€” not just available โ€” for all internet-facing services, especially email, remote access, and cloud portals.

โœ“ML1: MFA for all users on all internet-facing services
โœ“ML2: Phishing-resistant MFA for privileged users
โœ“ML3: Phishing-resistant MFA for all users (hardware security keys or passkeys)

Control 8: Regular Backups

Backups must be tested, offsite, and protected from encryption.

โœ“ML1: Backups of important data performed at minimum weekly
โœ“Backups stored offline or in a separate cloud account
โœ“Recovery from backup tested at least annually
โœ“Backup access restricted โ€” not accessible from primary environment
09

De4sec Essential Eight Implementation

De4sec provides structured Essential Eight implementation for Australian SMBs โ€” from gap assessment through to ML1 compliance with documentation.

Gap Assessment
Two-hour review of your current environment against all eight controls. Compliance report produced with prioritised remediation plan.
ML1 Implementation
Full implementation of all controls at Maturity Level 1, including Intune deployment, Conditional Access, patch policy, macro policy, and backup.
Compliance Evidence
Evidence package for insurers and clients โ€” policy screenshots, compliance reports, test restore documentation.
Ongoing Maintenance
Monthly compliance reporting, patch management, and quarterly review to maintain ML1 posture.
// NEXT STEP

Ready to implement this in your environment?

De4sec provides hands-on implementation, not just advice. Book a free discovery call โ€” we assess your environment at no cost, no obligation.

Book a Free Discovery Call โ†’or visit de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.