The Essential 8 is a set of eight controls designed to help organisations protect their networks and systems against cybersecurity threats.
The Maturity Levels of the Essential 8 refer to the degree to which an organisation has implemented each of the eight controls.
There are four maturity levels, as follows:
At this level, the organisation has no formal processes or procedures in place for implementing the Essential 8 strategies. Any implementation that occurs is ad-hoc and inconsistent.
At this level, the organization has started to develop formal processes and procedures for implementing the Essential 8 strategies. Implementation is still inconsistent and may not be fully integrated into the organisation's operations.
At this level, the organisation has established formal processes and procedures for implementing the Essential 8 strategies. Implementation is consistent across the organisation and is integrated into the organisation's operations.
At this level, the organisation has fully embedded the Essential 8 strategies into its operations. Implementation is consistent and ongoing, and the organisation regularly reviews and updates its processes and procedures to ensure they remain effective.
You might think that all organisations should be aiming for the highest Maturity Level 3, but that may not be necessary or appropriate for many businesses.
The Essential 8 controls are designed to be adaptable and scalable to suit different organisational requirements and risk profiles.
Achieving Maturity Level 3 will be a worthwhile goal for many organisations, however, the maturity level that each organisation should aspire to will depend on its risk profile, the types of data being handled, and the potential impact of a cybersecurity breach on its operations.
The Essential 8 Maturity Level that an organisation should aim for depends on: its risk profile, the types of data it handles, and the potential impact of a cybersecurity breach on its operations.
a. Risk Profile
What is an organisation's risk profile? Organisations need to consider how attractive they would be as a target for cyber criminals, as this will increase the likelihood of being attacked.
Some of the key factors that can affect an organisation's cybersecurity risk profile include:
Larger networks potentially having more vulnerabilities and attracting a higher level of cyber threat than smaller organisations.
Some cybercriminals are content to take aim at sole operators and small businesses with the assumption these are more likely to quietly pay for their systems to be released, while others will target larger organisations with sensitive data they can sell if a ransom is not paid.
Industry sector
Different industry sectors may have different cybersecurity risks. For example, organisations in the financial sector may be at a higher risk of cyberattacks due to the sensitive nature of the data they handle.
Geographical location
The location of an organization can also impact its cybersecurity risk profile. Organisations in regions with a high incidence of cyberattacks may be at a higher risk than organisations in areas with lower cybercrime rates.
Internal policies and procedures
The policies and procedures an organisation has in place can also impact its cybersecurity risk profile. For example, an organisation with strong password policies and regular employee training on cybersecurity may be at a lower risk of cyberattacks than an organization with lax security policies.
Third-party relationships
The cybersecurity risks associated with third-party relationships should also be considered. Organisations that work with vendors, contractors, or other third-party service providers may be at a higher risk of cyberattacks due to the potential for those third parties to introduce vulnerabilities into the organisation's systems.
b. Data Sensitivity
The type of data an organisation handles will have a significant impact on its cybersecurity risk profile. Organisations that handle sensitive data such as financial information, medical records, or personally identifiable information (PII) will be at a higher risk of cyberattacks than organisations that handle less sensitive data.
c. Impact of a Cyber Breach
The impact of a cyber security incident on an organisation can vary from being inconvenient to being catastrophic.
Regardless of the level of breach, all cyber breaches will be expensive.
There may be an immediate and direct financial impact through the requirement to pay a ransom, loss of business while networks and systems are down, or the cost of bringing in experts to manage a breach.
There is also the broader financial impacts of reputational damage, loss of future business, legal action from parties whose data has been compromised, and potentially being fined by the OAIC or ASIC.
The ACSC prioritises the implementation of all eight controls as a package. The eight controls have been designed to complement each other at each level, and to provide coverage across various types of cyber threats.
The ACSC recommends that organisations should fully achieve a maturity level across all eight controls, before moving onto a higher maturity level.
The first step is to assess the current state of your cyber security strategies against the Essential 8 framework.
This will require matching each Essential 8 Control and the associated benchmarks against your current environment.
In essence, you need to undertake a structured audit which assesses your existing compliance levels.
In completing an Audit it is important to consider the quality of the evidence that is being provided to demonstrate compliance.
In deciding whether the organisation is compliant, there should be evidence that can be quantified, proven, and documented.
"I'd love a dollar for every time we have been told pre-Audit that 'patching is done regularly and is up-to-date', only to find on inspection that patching has not been carried out for more than two years."
There is no 'easy' way to assess your organisation's Essential 8 Maturity Level.
The assessment process understandably requires a thorough investigation of your environment to benchmark the current state against each Essential 8 Control.
This audit process can be completed through manual checklists or through automated software.
Many cyber security companies offer a labour-intensive Essential 8 Audit which comprises of manual checklists and workshops requiring significant input from an organisation's internal IT team.
These Audits often take months to complete and at the conclusion an organisation is presented with a comprehensive assessment report, which may or may not provide a remediation roadmap.
It is not uncommon for these Audits to be priced around AUD$20,000 or more depending on the size and complexity of the networks and systems.
As an alternative to a manual audit, some organisations are utilising enterprise-grade audit software to carry out an independent audit which can be completed in hours and is able to be repeated as required.
We are biased at MobileCorp because we have been through the automated software Essential 8 Audit journey. As a mid-market company, we are now Maturity Level 3 compliant.
We appreciate the benefits of being able to run the audit software through our environment monthly or more often should we wish to do so.
The audit has identified our gaps, informed our remediation roadmap, and shifted us progressively to Maturity Level 3.
It is also significantly less expensive than a manual audit, and took up less of our IT team's time.
Being compliant with the Essential 8 framework is not a one-off exercise, it is a continuous process.
The E8 controls require regular specific activity undertaken continuous to remain compliant.
It is not ideal to complete an Essential 8 Audit as a massive exercise at the start of this journey, and then not audit again.
It makes sense to have a means of auditing that is repeatable, allows organisations to to understand their E8 risk profile at all times, and that provides an evidential record of continuous improvement.
MobileCorp's Essential 8 Audit-as-a-Service utilises automated audit software that provides
In order to understand how to progress your Essential 8 Maturity Level, you need to understand the requirements of each level.
The tables below summarise the varying compliance requirements at each Maturity Level for each Essential 8 control.