How We Work About Services Results FAQ Blog
Book a 30-Min Call →
Build · Essential Eight

Essential Eight Maturity
Built for Your Risk Profile.

Australia's ACSC Essential Eight framework — assessed, prioritised, and implemented for your specific context and maturity level. Not a generic checklist handed to your IT team. We assess what actually works, sequence controls by impact, and stay accountable until maturity targets are met.

8
Strategies assessed and implemented
ML0→ML2
Typical maturity uplift for SMBs
24+
Years practitioner-led, tech, FinTech
Essential Eight
Sound Familiar?

Your E8 Assessment Exists.
Your Maturity Hasn't Moved.

Most Essential Eight work stalls at the assessment stage. Here's why and what's really blocking progress.

📋
Your board or regulator is asking about E8 maturity and you don't have a clear answer

The ACSC framework is increasingly referenced in Australian government contracts, regulated industries, and board risk discussions. "We're working on it" isn't a defensible answer.

📄
You've run a checklist assessment but nothing has actually changed

A maturity assessment report without implementation is just documentation. The gap from ML0 to ML2 requires hands-on technical work, not another gap list.

🎯
You don't know which of the 8 strategies to prioritise

Not every control is equally impactful for your environment. Generic roadmaps that implement strategies alphabetically waste effort on the wrong things first.

⚠️
Your IT team is implementing controls without a security lens

Technical controls need to be implemented correctly, a misconfigured application allowlist can cause operational disruption without providing meaningful protection.

The Framework

Eight Mitigation Strategies.
One Prioritised Roadmap.

The Essential Eight targets the most common attack vectors against Australian organisations. We assess all eight, then sequence implementation based on your risk profile, not alphabetical order.

Strategy 1

Application Control

Prevent execution of unapproved software and malicious code on workstations and servers.

Strategy 2

Patch Applications

Reduce attack surface from unpatched vulnerabilities in internet-facing and office productivity applications.

Strategy 3

Configure Macro Settings

Block malicious macros in Microsoft Office documents, one of the most common initial access vectors.

Strategy 4

User Application Hardening

Harden web browsers and office applications against exploit techniques targeting end users.

Strategy 5

Restrict Admin Privileges

Limit the blast radius when credentials are compromised. Privileged access should be the exception, not the default.

Strategy 6

Patch Operating Systems

Eliminate OS-level vulnerabilities before attackers exploit them, especially on internet-facing systems.

Strategy 7

Multi-Factor Authentication

Prevent unauthorized access even when passwords are known. MFA is the single highest-impact control for most organisations.

Strategy 8

Regular Backups

Ensure operational resilience and recovery capability are tested, not just assumed to be in place.

Maturity Levels

Where Are You Now?
Where Do You Need to Be?

The ACSC defines four maturity levels. For most SMBs, ML2 provides meaningful protection against targeted attacks without disproportionate effort.

ML0

Not Implemented

Controls are not in place. Organisation is exposed to basic opportunistic attacks.

ML1

Partially Implemented

Controls reduce risk from basic, largely opportunistic threats. Starting point for most SMBs.

ML2
Recommended target

Substantially Implemented

Controls reduce risk from adversaries who invest more time. The recommended target for most Australian SMBs.

ML3

Fully Implemented

Controls reduce risk from sophisticated, targeted adversaries. Appropriate for high-value targets and critical infrastructure.

How We Deliver

Assess, Prioritise,
Implement, Verify.

Four phases from baseline to maturity target. We own the implementation, not just the assessment report.

01

Baseline Assessment

Evidence-based assessment of current maturity across all 8 strategies. We test what actually works, not just what's documented or assumed. Findings are scored against ACSC criteria.

Current maturity mapped across all 8 strategies
02

Gap Register & Roadmap

Prioritised gap register with effort and risk weighting. We sequence controls by impact, restricting admin privileges and enabling MFA before tackling application hardening edge cases.

Impact-sequenced roadmap to your target maturity level
03

Implementation

Hands-on control implementation with your IT team. We configure, document, and test controls are effective, not just technically present. We own the outcome.

Controls implemented and verified as effective
04

Retest & Reporting

Post-implementation maturity retest to verify uplift. Formal report for stakeholders, regulators, or board. Aligned with ISO 27001 and GRC as a Service if required.

Verified maturity uplift with formal evidence report
Why Logic Weave

24+ years implementing these controls in real environments, not writing reports about them. We sequence by impact, integrate with your broader security program, and stay accountable past the deliverable.

See how we work →

Common Questions

Frequently Asked.

Is Essential Eight mandatory for us?
Government contractors and regulated industries (financial services, health, critical infrastructure) face growing E8 expectations, sometimes contractual requirements. For any Australian SMB, it's the most practical attack-protection baseline.
What maturity level should we target?
For most Australian SMBs, ML2 provides meaningful protection without disproportionate effort. ML3 suits high-value targets, critical infrastructure, or specific regulatory requirements. We'll assess your risk profile and recommend honestly.
How long does an E8 assessment and implementation take?
A baseline assessment takes 2–3 weeks. Moving from ML0 to ML2 typically takes 3–6 months depending on resources. Some controls (MFA) can be done in days; others (application allowlisting) require careful testing.
How does E8 relate to ISO 27001?
E8 controls map directly to ISO 27001 Annex A. If you're pursuing both, we design work to satisfy both simultaneously, no duplicate assessments. E8 also supports SOC 2 and NIST CSF requirements.

Ready for Essential Eight
that actually moves your maturity?

Book a free 30-minute call. No pitch, we'll understand your context and tell you honestly what your maturity path looks like.

Book a Free 30-Min Call →

No obligation · Melbourne-based · Nationwide