Checklist

ACSC Essential Eight Compliance Checklist

The Essential Eight is a cybersecurity maturity model developed by the Australian Cyber Security Centre (ACSC) that features eight cyber risk mitigation strategies designed to mitigate the most common cyber threats. Originally developed to mitigate risks within Australian public agencies, the Essential Eight model now serves as a reliable guideline for cyber risk mitigation for the private sector.

While no mitigation strategy is guaranteed to protect against all cyber threats, the ACSC’s Essential Eight mitigation strategies serve as a baseline to limit your cyber risks. To help organizations implement the Essential Eight, the ACSC defined three maturity levels:

  • Maturity Level One: partly aligned with the recommended mitigation strategies
  • Maturity Level Two: mostly aligned with the best practices but looking to implement a stronger risk-reduction strategy
  • Maturity Level Three: fully aligned with the intent of the mitigation strategy

We’ve broken down the mitigation strategies for each maturity level to provide tangible recommendations on how you can comply with them and build long-term cyber resilience, preventing business disruption.

Download this Essential Eight checklist to learn how eSentire multi-signal Managed Detection and Response (MDR) and Exposure Management Services map to the Essential Eight requirements.

2000+ Organizations Choose eSentire

Logo of Emirates Hospitals Group featured on a landing page for the ACSC Essential 8 Checklist. Logo of Iris Software Group featured on a landing page for the ACSC Essential Eight Checklist. Logo of Quarles & Brady featured on a landing page for the ACSC Essential 8 Checklist. Logo of Elemica featured on a landing page for the ACSC Essential 8 Checklist. Logo of THL featured on a landing page for the ACSC Essential 8 Checklist.

Get The Checklist