Compliance & Regulations/APAC/Essential Eight
Sovereign / National · Australia

Australia ACSC Essential Eight

ASD's Essential Eight Maturity Model — the foundational cyber baseline for Australian government and broadly used in the private sector.

Regulator
Australian Cyber Security Centre (ACSC) / ASD
Jurisdiction
Australia
Status
Active — November 2023 update.
In force since
Active
Regulator's source
Who it applies to

Commonwealth entities (mandatory at Maturity Level 2+) and broadly adopted in the private sector.

Audit / certification status

Continuous evidence pipeline available; audit support included for all customers.

What it requires

What Essential Eight actually requires.

These are the obligations a regulated entity owes — the things an assessor or supervisor will ask about.

01

Eight mitigation strategies: application control, patch applications, configure Microsoft Office macros, user application hardening, restrict admin privileges, patch operating systems, MFA, regular backups.

02

Maturity Levels 1 / 2 / 3.

How Safeguard maps to it

Pre-mapped controls. Continuous evidence.

Each requirement above is bound to live telemetry — not screenshots. The mapping below is what your auditor or regulator sees.

Essential Eight maturity dashboard with per-strategy evidence.

Crosswalks to ISM controls and SOCI Act expectations.

Evidence we produce

Artifacts your auditor accepts.

Each evidence artifact is signed and timestamped. Auditors can verify integrity without trusting Safeguard.

Essential Eight maturity assessment.

Per-strategy evidence pack.

Ready for Essential Eight?

Bring the framework. We'll walk the controls with you — section by section, evidence packet by evidence packet, with the regulators you actually have to answer to.

Safeguard | Software Supply Chain Security Platform | Zero CVE + Self-Healing