Before you can fix your Essential Eight posture, you need to know exactly where you stand. This kit scores you across all 8 strategies (ML0–ML3), surfaces your gaps, and gives you a board-ready report — without a $15,000 consultant invoice.
30-Day Money-Back Guarantee
The Essential Eight is the ACSC's baseline framework for Australian cyber resilience — mandatory for government, best practice for every Australian business. Yet compliance rates remain critically low, and the rules tightened significantly in November 2023.
In 2024, only 15% of Australian Government entities — with dedicated security teams and budgets — achieved overall Maturity Level 2 across all eight strategies, down from 25% in 2023. For under-resourced SMBs, the picture is significantly worse. (Source: ASD Commonwealth Cyber Security Posture 2024, cyber.gov.au)
A formal Essential Eight gap assessment from an Australian MSSP or cybersecurity firm typically costs $8,000–$25,000 for an SMB — and takes 2–6 weeks. This kit gives you the same structured output in 2–4 hours for $47. (Source: itnetworks.com.au, cybercx.com.au)
The ASD's November 2023 maturity model update introduced significant changes: 48-hour patching timelines for critical vulnerabilities, phishing-resistant MFA now required at ML2, centralised logging moved from ML3 to ML2, and new cloud service requirements. If your last assessment predates November 2023, you are measuring against the wrong standard. (Source: ASD Essential Eight Maturity Model Changes, November 2023)
The Insurance Council of Australia explicitly endorses the Essential Eight for SMEs seeking cyber insurance. Without a documented assessment and maturity baseline, insurers will deny coverage or inflate premiums. Government supply chain contracts increasingly require ML2 evidence. The average cost of a cybercrime incident for small businesses rose 14% to $56,600 AUD in 2024–25. (Source: ASD Annual Cyber Threat Report 2024–25, Insurance Council of Australia)
Five documents purpose-built for an efficient, structured Essential Eight self-assessment — from raw scoring through to board-ready output.
The core scoring tool. Structured criteria for every maturity level (ML0, ML1, ML2, ML3) across each of the 8 strategies — 64 criteria sets in total. Score your current state objectively, see your aggregate maturity profile at a glance, and identify exactly which criteria you pass or fail in each strategy.
An executive-ready report template that translates your workbook scores into a structured gap analysis. Documents each shortfall against the November 2023 maturity model criteria, with space for evidence notes and risk context. Ready to share with management, your board, insurers, or government procurement officers.
Not all gaps are equal. The matrix ranks your identified shortfalls by security risk and implementation effort — so you know which fixes deliver the most protection per hour of IT effort. Stops you from getting lost in the detail and helps you build a credible remediation roadmap.
A non-technical summary template designed for board or senior management presentation. Converts your ML scores into plain-language findings, business risk context, and a prioritised action plan. Gives executives the information they need to make resource decisions without wading through technical criteria.
30 targeted actions to reach Maturity Level 1 as quickly as possible. Grouped by strategy and sequenced by ease of implementation. Each action is mapped to the specific ML1 criterion it satisfies — so you can tick off compliance criteria in the most efficient order possible.
The workbook scores you against every ACSC-defined criterion for each strategy at each maturity level. No strategy left unscored.
Patch or mitigate vulnerabilities in internet-facing services. Critical CVEs within 48 hours at ML2; within two weeks for standard patches.
Keep operating systems and firmware current. Critical vulnerabilities addressed within 48 hours. Vulnerability scanning required.
MFA for all users at ML1. Phishing-resistant MFA for all remote access and privileged accounts at ML2. Mandatory for sensitive data portals.
Least-privilege access. Privileged accounts must not browse the internet. Secure admin workstations required. Break-glass accounts and governance at ML2+.
Only approved, signed applications execute. Annual ruleset reviews at ML2. Microsoft's recommended application blocklist implemented.
Block macros originating from the internet. Only allow vetted, signed macros from trusted publishers. Disable macros in high-risk Office applications.
Disable IE11 (mandatory), Flash, Java where not needed. Apply ASD and vendor hardening guides. PowerShell logging and command-line process creation events at ML2.
Backup critical data regularly. Test restoration. Offline or immutable copies required. Business criticality-based prioritisation. Recovery objectives defined and verified.
Anyone who needs to know where they stand against the Essential Eight — without a five-figure consulting engagement.
Tasked with improving security posture but lacking a structured framework to diagnose gaps. Use this kit to baseline your current state, prioritise your roadmap, and report to leadership with evidence.
Need to assess SMB clients efficiently before recommending remediation work. The scoring workbook lets you run a structured assessment in a single client session and deliver a professional gap report.
Responsible for cyber insurance applications, government contract bids, or board-level cyber risk reporting. The board report template gives you the output you need without writing anything from scratch.
Who know the Essential Eight matters for insurance and contracts but have no clear picture of where they sit. Get a factual baseline without committing to an expensive consulting engagement first.
There are three ways to assess your Essential Eight maturity. Here is how they compare.
| Feature | DIY from ACSC Website | Consultant-Led Assessment | This Kit |
|---|---|---|---|
| Structured scoring workbook | No | Yes | Yes |
| November 2023 criteria included | Manual interpretation | Yes | Yes |
| Gap analysis report template | No | Yes | Yes |
| Board executive report | No | Yes (extra cost) | Yes — included |
| Remediation priority guidance | No | Yes | Yes |
| Done today (not weeks away) | Yes | No (2–6 weeks) | Yes |
| Price | Free (but unstructured) | $8,000 – $25,000 | $47 |
This kit tells you where your gaps are. The Australian Compliance Bundle gives you everything you need to close them.
Score your current maturity level across all 8 strategies. Identify gaps. Produce a board-ready gap report. Know exactly where to focus your remediation effort. Start here.
Implementation templates to fix the gaps this kit identifies. Five ready-to-deploy documents: Essential Eight policies, security procedures, incident response plan, board reporting templates, and a 12-month compliance roadmap to ML2. Learn more →
A $56,600 average cybercrime cost. A $47 assessment. The choice is clear. Get your Essential Eight baseline today and stop flying blind on your security posture.
30-Day Money-Back Guarantee