Back to Frameworks

ASD Essential Eight Maturity Model

Australia
v2024
8 domains
57 controls

Defines four maturity levels (0-3) for each of the ASD Essential Eight mitigation strategies, with specific ISM control requirements at each level. Published by the Australian Signals Directorate.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (8)

Application Control

9 controls

Prevent execution of unapproved/malicious programs on workstations and servers

Controls in the Application Control domain of ASD Essential Eight Maturity Model9 controls
CodeTitle
E8MM-AC-ML1-0843ML1: Application control on workstations
E8MM-AC-ML1-1657ML1: Restrict execution to approved set
E8MM-AC-ML1-1870ML1: Control in user profiles and temp folders
E8MM-AC-ML2-1490ML2: Application control on internet-facing servers
E8MM-AC-ML2-1544ML2: Microsoft recommended application blocklist
E8MM-AC-ML2-1582ML2: Annual ruleset validation
E8MM-AC-ML3-1656ML3: Application control on non-internet-facing servers
E8MM-AC-ML3-1658ML3: Restrict driver execution
E8MM-AC-ML3-1659ML3: Microsoft vulnerable driver blocklist

Configure Microsoft Office Macro Settings

7 controls

Configure Microsoft Office macro settings to block macros from the internet and only allow vetted macros

Controls in the Configure Microsoft Office Macro Settings domain of ASD Essential Eight Maturity Model7 controls
CodeTitle
E8MM-MACRO-1488ML1: Block macros from the internet
E8MM-MACRO-1585ML1: Prevent users from changing macro settings
E8MM-MACRO-1671ML1: Disable macros for users without business need
E8MM-MACRO-1672ML1: Enable macro antivirus scanning
E8MM-MACRO-1673ML1: Block macros from Win32 API calls
E8MM-MACRO-1674ML1: Only allow vetted macros to execute
E8MM-MACRO-1890ML1: Check macros before signing/trusting

Multi-factor Authentication

7 controls

Use multi-factor authentication for access to systems and data

Controls in the Multi-factor Authentication domain of ASD Essential Eight Maturity Model7 controls
CodeTitle
E8MM-MFA-0974ML2: MFA for unprivileged users of systems
E8MM-MFA-1173ML2: MFA for privileged users of systems
E8MM-MFA-1401ML1: MFA factors
E8MM-MFA-1504ML1: MFA for organisation online services (sensitive data)
E8MM-MFA-1505ML3: MFA for data repositories
E8MM-MFA-1679ML1: MFA for third-party online services (sensitive data)
E8MM-MFA-1682ML2: Phishing-resistant MFA for systems

Patch Applications

7 controls

Patch vulnerabilities in applications to reduce risk of exploitation

Controls in the Patch Applications domain of ASD Essential Eight Maturity Model7 controls
CodeTitle
E8MM-PA-ML1-1690ML1: Patch online services within 2 weeks (non-critical)
E8MM-PA-ML1-1691ML1: Patch office/browser/email/PDF within 2 weeks
E8MM-PA-ML1-1698ML1: Daily vulnerability scanning for online services
E8MM-PA-ML1-1704ML1: Remove unsupported software
E8MM-PA-ML1-1876ML1: Patch online services within 48 hours (critical)
E8MM-PA-ML2-1693ML2: Patch other applications within 1 month
E8MM-PA-ML3-1692ML3: Patch office/browser/email/PDF within 48 hours (critical)

Patch Operating Systems

5 controls

Patch vulnerabilities in operating systems to reduce risk of exploitation

Controls in the Patch Operating Systems domain of ASD Essential Eight Maturity Model5 controls
CodeTitle
E8MM-POS-1501ML1: Replace unsupported operating systems
E8MM-POS-1694ML1: Patch internet-facing OS within 2 weeks (non-critical)
E8MM-POS-1695ML1: Patch other OS within 1 month
E8MM-POS-1696ML3: Patch other OS within 48 hours (critical)
E8MM-POS-1877ML1: Patch internet-facing OS within 48 hours (critical)

Regular Backups

6 controls

Perform regular backups and test restoration to ensure business continuity

Controls in the Regular Backups domain of ASD Essential Eight Maturity Model6 controls
CodeTitle
E8MM-RB-1511ML1: Backups of data, applications, and settings
E8MM-RB-1515ML1: Test restoration from backups
E8MM-RB-1705ML2: Privileged users cannot access others' backups
E8MM-RB-1708ML3: Backup admin cannot modify during retention
E8MM-RB-1812ML1: Unprivileged users cannot access others' backups
E8MM-RB-1814ML1: Unprivileged users cannot modify/delete backups

Restrict Administrative Privileges

8 controls

Restrict and control privileged access to reduce the impact of account compromise

Controls in the Restrict Administrative Privileges domain of ASD Essential Eight Maturity Model8 controls
CodeTitle
E8MM-RAP-0445ML1: Dedicated privileged accounts
E8MM-RAP-1175ML1: Block privileged accounts from internet
E8MM-RAP-1380ML1: Separate privileged operating environments
E8MM-RAP-1507ML1: Validate privileged access requests
E8MM-RAP-1508ML3: Just-in-time access
E8MM-RAP-1647ML2: Disable after 12 months without revalidation
E8MM-RAP-1648ML2: Disable after 45 days of inactivity
E8MM-RAP-1898ML2: Secure Admin Workstations

User Application Hardening

8 controls

Configure web browsers and other user applications to reduce the attack surface

Controls in the User Application Hardening domain of ASD Essential Eight Maturity Model8 controls
CodeTitle
E8MM-UAH-1485ML1: Block web advertisements
E8MM-UAH-1486ML1: Block Java from the internet in browsers
E8MM-UAH-1612ML2: Disable PowerShell 2.0
E8MM-UAH-1655ML2: Disable .NET Framework 3.5
E8MM-UAH-1666ML1: Disable or remove Internet Explorer 11
E8MM-UAH-1667ML1: Block Office from creating child processes
E8MM-UAH-1668ML1: Block Office from creating executable content
E8MM-UAH-1670ML1: Block PDF software from creating child processes

Maps to 323 other frameworks

57 total controls
CSA CCM v4
12 source controls mapped|20 target controls covered
21%
CISA Cross-Sector Cybersecurity Performance Goals (CPG) 2.0
12 source controls mapped|7 target controls covered
21%
NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
12 source controls mapped|11 target controls covered
21%
ASD Information Security Manual (ISM)
12 source controls mapped|19 target controls covered
21%
FAA Cybersecurity Framework for Aviation
12 source controls mapped|6 target controls covered
21%
Oman National Cybersecurity Framework
12 source controls mapped|5 target controls covered
21%
ASD Strategies to Mitigate Cyber Security Incidents
11 source controls mapped|10 target controls covered
19%
BSIMM
11 source controls mapped|6 target controls covered
19%
3GPP Security
11 source controls mapped|6 target controls covered
19%
California IoT Security Law
11 source controls mapped|6 target controls covered
19%
MITRE D3FEND
11 source controls mapped|6 target controls covered
19%
NIST SP 800-171A — Assessing CUI Security Requirements
11 source controls mapped|13 target controls covered
19%
OWASP ASVS
11 source controls mapped|6 target controls covered
19%
NIST SP 800-150
11 source controls mapped|6 target controls covered
19%
ISO/SAE 21434
11 source controls mapped|6 target controls covered
19%
OWASP SAMM
11 source controls mapped|6 target controls covered
19%
OWASP MASVS
11 source controls mapped|6 target controls covered
19%
TISAX — Trusted Information Security Assessment Exchange
11 source controls mapped|5 target controls covered
19%
ETSI EN 303 645
11 source controls mapped|6 target controls covered
19%
NIST SP 800-128
11 source controls mapped|6 target controls covered
19%
NIST SP 800-137
11 source controls mapped|6 target controls covered
19%
NIST SP 800-181
11 source controls mapped|6 target controls covered
19%
NIST SP 800-160
11 source controls mapped|6 target controls covered
19%
NIST SP 800-63
11 source controls mapped|6 target controls covered
19%
DISA Security Technical Implementation Guides (STIGs)
11 source controls mapped|10 target controls covered
19%
NIST SP 800-161
11 source controls mapped|6 target controls covered
19%
SSDF (NIST)
11 source controls mapped|6 target controls covered
19%
TSA Pipeline Security
11 source controls mapped|6 target controls covered
19%
ISO 27043
11 source controls mapped|6 target controls covered
19%
UNECE WP.29 R156
11 source controls mapped|6 target controls covered
19%
SIG (Shared Assessments)
11 source controls mapped|6 target controls covered
19%
MITRE ATT&CK
11 source controls mapped|6 target controls covered
19%
NIST SP 800-123
11 source controls mapped|6 target controls covered
19%
NIST SP 800-61
11 source controls mapped|6 target controls covered
19%
UK PSTI Act
11 source controls mapped|6 target controls covered
19%
SLSA
11 source controls mapped|6 target controls covered
19%
EU Cyber Resilience Act
11 source controls mapped|6 target controls covered
19%
ISO 27002:2022
11 source controls mapped|6 target controls covered
19%
NIST SP 800-218
11 source controls mapped|6 target controls covered
19%
PTES
11 source controls mapped|6 target controls covered
19%
NIST SP 800-183
11 source controls mapped|6 target controls covered
19%
NIST SP 800-88
11 source controls mapped|6 target controls covered
19%
NIST SP 800-187
11 source controls mapped|6 target controls covered
19%
NIST SP 800-207
11 source controls mapped|6 target controls covered
19%
ISO 27001:2022
11 source controls mapped|9 target controls covered
19%
UNECE WP.29 R155
11 source controls mapped|6 target controls covered
19%
NIST SP 800-115
11 source controls mapped|6 target controls covered
19%
OpenSSF Scorecard
11 source controls mapped|6 target controls covered
19%
NIST SP 800-92
11 source controls mapped|6 target controls covered
19%
CSA STAR (Security, Trust, Assurance, and Risk)
11 source controls mapped|6 target controls covered
19%
NIS2 Directive Implementing Acts
11 source controls mapped|11 target controls covered
19%
South Korea ISMS-P
11 source controls mapped|6 target controls covered
19%
NIST SP 800-82 Rev 3 — Guide to OT Security
10 source controls mapped|7 target controls covered
18%
UK Gambling Commission — Cyber Resilience Requirements
10 source controls mapped|6 target controls covered
18%
Azure Security Benchmark
10 source controls mapped|5 target controls covered
18%
C5 (Germany)
10 source controls mapped|5 target controls covered
18%
CAIQ (CSA)
10 source controls mapped|5 target controls covered
18%
AWS Well-Architected Security Pillar
10 source controls mapped|5 target controls covered
18%
FedRAMP Rev 5
10 source controls mapped|15 target controls covered
18%
NIST Privacy Framework 1.0
10 source controls mapped|9 target controls covered
18%
NIST SP 800-53 Rev 5
10 source controls mapped|11 target controls covered
18%
CISA ICS-CERT Advisories and Industrial Control Systems Security Guidelines
10 source controls mapped|11 target controls covered
18%
NIST SP 800-144
10 source controls mapped|5 target controls covered
18%
NIST SP 800-145
10 source controls mapped|5 target controls covered
18%
NIST SP 800-146
10 source controls mapped|5 target controls covered
18%
NIST SP 800-190
10 source controls mapped|5 target controls covered
18%
ISMAP (Japan)
10 source controls mapped|5 target controls covered
18%
MTCS (Singapore)
10 source controls mapped|5 target controls covered
18%
SSAE 18 — Attestation Standards (SOC Reporting)
10 source controls mapped|6 target controls covered
18%
ISO 27018
10 source controls mapped|5 target controls covered
18%
TSA Pipeline Cybersecurity Directives
10 source controls mapped|3 target controls covered
18%
ISO 27017
10 source controls mapped|5 target controls covered
18%
CNCF Cloud Native Security (Cloud Native Computing Foundation)
9 source controls mapped|5 target controls covered
16%
ISO/IEC 27011:2024
9 source controls mapped|4 target controls covered
16%
ASIC Cyber Resilience Good Practices
9 source controls mapped|5 target controls covered
16%
NIST SP 800-171A Rev 3 — Assessing CUI Security Requirements
9 source controls mapped|5 target controls covered
16%
DAMA-DMBOK2 — Data Management Body of Knowledge (2nd Edition)
9 source controls mapped|2 target controls covered
16%
NAIC Insurance Data Security Model Law (MDL-668)
9 source controls mapped|6 target controls covered
16%
NIST Cybersecurity Framework 2.0
9 source controls mapped|6 target controls covered
16%
WCO Authorised Economic Operator (AEO) Framework
9 source controls mapped|8 target controls covered
16%
Defence Security Principles Framework (DSPF)
9 source controls mapped|10 target controls covered
16%
Protective Security Policy Framework (PSPF) Release 2024
9 source controls mapped|10 target controls covered
16%
FBI CJIS Security Policy
8 source controls mapped|9 target controls covered
14%
PCI DSS v4.0
8 source controls mapped|8 target controls covered
14%
BSI IT-Grundschutz
8 source controls mapped|4 target controls covered
14%
Belgium CyberFundamentals
8 source controls mapped|4 target controls covered
14%
CMMC 2.0
8 source controls mapped|4 target controls covered
14%
DoD Zero Trust Reference Architecture
8 source controls mapped|4 target controls covered
14%
Australian Energy Sector Cyber Security Framework (AESCSF)
8 source controls mapped|5 target controls covered
14%
CISA Zero Trust Maturity Model
8 source controls mapped|4 target controls covered
14%
ANSSI Cybersecurity Framework
8 source controls mapped|4 target controls covered
14%
Cyber Essentials Plus
8 source controls mapped|4 target controls covered
14%
O-RAN Alliance Security Specifications (O-RAN.WG11)
8 source controls mapped|4 target controls covered
14%
Saudi NCA ECC
8 source controls mapped|4 target controls covered
14%
Ghana Cybersecurity Act
8 source controls mapped|4 target controls covered
14%
NIST SP 800-172
8 source controls mapped|4 target controls covered
14%
FISMA
8 source controls mapped|4 target controls covered
14%
NIST SP 800-171
8 source controls mapped|4 target controls covered
14%
NIST SP 800-53A
8 source controls mapped|4 target controls covered
14%
Singapore Government Instruction Manual on ICT&SS Management (IM8)
8 source controls mapped|5 target controls covered
14%
Spain ENS
8 source controls mapped|4 target controls covered
14%
FTC GLBA Safeguards Rule (16 CFR Part 314)
8 source controls mapped|7 target controls covered
14%
EBA Guidelines on ICT and Security Risk Management (EBA/GL/2019/04)
8 source controls mapped|7 target controls covered
14%
FTC Safeguards Rule (16 CFR Part 314)
8 source controls mapped|7 target controls covered
14%
SWIFT Customer Security Programme (CSP)
7 source controls mapped|4 target controls covered
12%
NIST SP 800-124 Rev 2 — Mobile Device Security
7 source controls mapped|4 target controls covered
12%
OWASP DevSecOps Maturity Model (DSOMM)
7 source controls mapped|4 target controls covered
12%
OWASP Top 10 for LLM Applications 2025
7 source controls mapped|4 target controls covered
12%
US NRC 10 CFR 73.54 — Cyber Security for Nuclear Power Plants
7 source controls mapped|2 target controls covered
12%
C-TPAT — Customs-Trade Partnership Against Terrorism
7 source controls mapped|7 target controls covered
12%
CISA Secure by Design Principles
7 source controls mapped|7 target controls covered
12%
FFIEC Cybersecurity Assessment Tool (CAT)
6 source controls mapped|4 target controls covered
11%
ISO/IEC 27010:2015
6 source controls mapped|3 target controls covered
11%
CWE Top 25 Most Dangerous Software Weaknesses (2024)
6 source controls mapped|6 target controls covered
11%
OWASP API Security Top 10:2023
6 source controls mapped|4 target controls covered
11%
OWASP Top 10:2025
6 source controls mapped|5 target controls covered
11%
HL7 FHIR Security Framework
6 source controls mapped|6 target controls covered
11%
ISO/IEC 27400:2022
6 source controls mapped|1 target controls covered
11%
3GPP 5G Security Architecture (TS 33.501)
6 source controls mapped|5 target controls covered
11%
Zimbabwe Data Protection Act (2021)
6 source controls mapped|2 target controls covered
11%
UK Telecommunications (Security) Act 2021
6 source controls mapped|2 target controls covered
11%
PropTech Security Standards — Smart Building Cybersecurity
6 source controls mapped|3 target controls covered
11%
MDS2 (Medical Device)
6 source controls mapped|3 target controls covered
11%
NIST SP 800-66
6 source controls mapped|3 target controls covered
11%
FDA 21 CFR Part 11
6 source controls mapped|3 target controls covered
11%
SSAE 18 SOC 1 — Report on Controls at a Service Organisation (ICFR)
6 source controls mapped|2 target controls covered
11%
ISO 13485
6 source controls mapped|3 target controls covered
11%
MARS-E
6 source controls mapped|3 target controls covered
11%
SOC 2
6 source controls mapped|4 target controls covered
11%
ISO 27799
6 source controls mapped|3 target controls covered
11%
Digital Economy Partnership Agreement (DEPA)
6 source controls mapped|3 target controls covered
11%
eIDAS 2.0 — EU Digital Identity Regulation
6 source controls mapped|2 target controls covered
11%
NIST Privacy Framework Version 1.0
6 source controls mapped|1 target controls covered
11%
EU Critical Raw Materials Act (Regulation (EU) 2024/1252)
6 source controls mapped|2 target controls covered
11%
Connecticut Data Privacy Act (CTDPA)
6 source controls mapped|6 target controls covered
11%
Colorado Privacy Act (CPA)
6 source controls mapped|5 target controls covered
11%
Wisconsin Data Privacy Act (SB 670)
6 source controls mapped|4 target controls covered
11%
Tennessee Information Protection Act (TIPA)
6 source controls mapped|3 target controls covered
11%
Canada ITSG-33 — IT Security Risk Management
6 source controls mapped|8 target controls covered
11%
New Zealand Information Security Manual (NZISM)
6 source controls mapped|7 target controls covered
11%
MARS-E — Minimum Acceptable Risk Standards for Exchanges
6 source controls mapped|7 target controls covered
11%
South Korea Cloud Security Assurance Program (CSAP)
6 source controls mapped|7 target controls covered
11%
NRC 10 CFR 73.54 — Nuclear Facility Cybersecurity
6 source controls mapped|7 target controls covered
11%
CFTC System Safeguards (17 CFR 37, 38, 39, 49)
6 source controls mapped|7 target controls covered
11%
EIOPA Guidelines on ICT Security and Governance (2020)
6 source controls mapped|6 target controls covered
11%
BCBS 239
5 source controls mapped|3 target controls covered
9%
Bermuda Monetary Authority (BMA) Cyber Risk Management Code of Conduct
5 source controls mapped|3 target controls covered
9%
APRA CPS 234
5 source controls mapped|3 target controls covered
9%
DORA
5 source controls mapped|3 target controls covered
9%
SWIFT CSP
5 source controls mapped|3 target controls covered
9%
FFIEC IT Examination Handbook
5 source controls mapped|3 target controls covered
9%
PCI SSF
5 source controls mapped|3 target controls covered
9%
GLBA
5 source controls mapped|3 target controls covered
9%
OSFI B-13
5 source controls mapped|3 target controls covered
9%
AICPA SOC 1
5 source controls mapped|3 target controls covered
9%
AICPA SOC 3
5 source controls mapped|3 target controls covered
9%
SWIFT CSCF
5 source controls mapped|3 target controls covered
9%
PCI PIN Security
5 source controls mapped|3 target controls covered
9%
PCI P2PE
5 source controls mapped|3 target controls covered
9%
PSD2 SCA
5 source controls mapped|3 target controls covered
9%
ECB TIBER-EU
5 source controls mapped|3 target controls covered
9%
HKMA SPM
5 source controls mapped|3 target controls covered
9%
Open Banking Security
5 source controls mapped|3 target controls covered
9%
MAS TRM
5 source controls mapped|3 target controls covered
9%
HKMA Cyber Resilience Assessment Framework (C-RAF)
5 source controls mapped|3 target controls covered
9%
UK Defence Standard 05-138 — Cyber Security for Defence Suppliers
5 source controls mapped|3 target controls covered
9%
FIRST CSIRT Services Framework and Standards
5 source controls mapped|3 target controls covered
9%
APRA CPS 230 Operational Risk Management
5 source controls mapped|4 target controls covered
9%
Japan FSA Cybersecurity Guidelines for Financial Institutions
5 source controls mapped|4 target controls covered
9%
Nevada Gaming Control Board Cybersecurity Requirements
5 source controls mapped|4 target controls covered
9%
Lloyd's Minimum Standards — Cyber Security
5 source controls mapped|4 target controls covered
9%
DO-326A
4 source controls mapped|4 target controls covered
7%
API 1164
4 source controls mapped|4 target controls covered
7%
BIMCO Cyber Security
4 source controls mapped|4 target controls covered
7%
C2M2
4 source controls mapped|4 target controls covered
7%
US Executive Order 14028 — Improving the Nation's Cybersecurity
4 source controls mapped|3 target controls covered
7%
NIST SP 1800-32
4 source controls mapped|4 target controls covered
7%
IEC 62443
4 source controls mapped|4 target controls covered
7%
SANS Incident Handler's Handbook and PICERL Methodology
4 source controls mapped|4 target controls covered
7%
ISO 27019
4 source controls mapped|4 target controls covered
7%
IEEE 1686
4 source controls mapped|4 target controls covered
7%
NERC CIP
4 source controls mapped|4 target controls covered
7%
NIS2 Directive
4 source controls mapped|4 target controls covered
7%
Australia Consumer Data Right — Banking (CDR)
4 source controls mapped|4 target controls covered
7%
EDM Council CDMC — Cloud Data Management Capabilities Framework
4 source controls mapped|2 target controls covered
7%
EAR — Export Administration Regulations
4 source controls mapped|4 target controls covered
7%
Security of Critical Infrastructure Act 2018 (SOCI)
4 source controls mapped|2 target controls covered
7%
Notifiable Data Breaches Scheme (Australia)
4 source controls mapped|2 target controls covered
7%
EU Digital Markets Act
4 source controls mapped|2 target controls covered
7%
FTC Health Breach Notification Rule
4 source controls mapped|2 target controls covered
7%
UK Product Security and Telecommunications Infrastructure Act (PSTI)
4 source controls mapped|2 target controls covered
7%
European Accessibility Act (Directive (EU) 2019/882)
4 source controls mapped|2 target controls covered
7%
EU Deforestation-Free Products Regulation (EUDR)
4 source controls mapped|2 target controls covered
7%
US ITAR and EAR — Export Control and Data Security
4 source controls mapped|2 target controls covered
7%
US SEC Digital Assets and Crypto Regulatory Framework
4 source controls mapped|2 target controls covered
7%
Australia eSafety Commissioner — Online Safety Expectations for Industry
4 source controls mapped|2 target controls covered
7%
US Gramm-Leach-Bliley Act (GLBA) — Higher Education Safeguards Rule
4 source controls mapped|6 target controls covered
7%
NRF Cybersecurity and Data Privacy Framework (National Retail Federation)
4 source controls mapped|2 target controls covered
7%
Modern Slavery Act 2018 (Australia)
4 source controls mapped|4 target controls covered
7%
BSI C5 — Cloud Computing Compliance Criteria Catalogue
4 source controls mapped|2 target controls covered
7%
RBI Cybersecurity Framework for Banks
4 source controls mapped|4 target controls covered
7%
IMO Maritime Cybersecurity Guidelines (MSC-FAL.1/Circ.3/Rev.2)
4 source controls mapped|3 target controls covered
7%
GLI-33 — Gaming Laboratories International Event Wagering Systems
4 source controls mapped|3 target controls covered
7%
EU Taxonomy Regulation
4 source controls mapped|2 target controls covered
7%
ISO/IEC 27031:2011
4 source controls mapped|6 target controls covered
7%
ASIS SPC.1-2009 — Organizational Resilience Standard
4 source controls mapped|1 target controls covered
7%
EU NIS2 Directive — Transport Sector Requirements
4 source controls mapped|1 target controls covered
7%
SOC for Cybersecurity — Cybersecurity Risk Management Examination
4 source controls mapped|1 target controls covered
7%
ISO 22318
4 source controls mapped|5 target controls covered
7%
ISO 22317
4 source controls mapped|5 target controls covered
7%
NFPA 1600 — Standard on Continuity, Emergency, and Crisis Management
4 source controls mapped|4 target controls covered
7%
ISO 22301
4 source controls mapped|5 target controls covered
7%
ISO 22316
4 source controls mapped|5 target controls covered
7%
Angola Personal Data Protection Law (Law No. 22/11)
3 source controls mapped|1 target controls covered
5%
EU Clinical Trials Regulation (CTR 536/2014)
3 source controls mapped|1 target controls covered
5%
MiFID II / MiFIR
3 source controls mapped|1 target controls covered
5%
ICAO Annex 17 — Aviation Security (AVSEC)
3 source controls mapped|1 target controls covered
5%
US Automated Commercial Environment (ACE) — CBP Trade Data Requirements
3 source controls mapped|1 target controls covered
5%
IEC 62351 — Power Systems Communication Security
3 source controls mapped|1 target controls covered
5%
Authorised Economic Operator (AEO) Programmes — Global Standards
3 source controls mapped|1 target controls covered
5%
5%
HITECH Act
3 source controls mapped|1 target controls covered
5%
EU Markets in Crypto-Assets Regulation (MiCA)
3 source controls mapped|3 target controls covered
5%
ITAR — International Traffic in Arms Regulations
3 source controls mapped|2 target controls covered
5%
Philippines Data Privacy Act (RA 10173)
3 source controls mapped|2 target controls covered
5%
Samoa Telecommunications Act (2005) — Privacy & Data Protection
3 source controls mapped|2 target controls covered
5%
Uganda Data Protection and Privacy Act (2019)
3 source controls mapped|1 target controls covered
5%
ISO/IEC 27006:2024
3 source controls mapped|1 target controls covered
5%
HIPAA Security Rule
3 source controls mapped|5 target controls covered
5%
3GPP Security Architecture (TS 33.501 — 5G Security)
3 source controls mapped|2 target controls covered
5%
ISO/IEC 29115:2023 — Entity Authentication Assurance Framework
3 source controls mapped|3 target controls covered
5%
US EPA Safe Drinking Water Act (SDWA) — Cybersecurity Requirements
3 source controls mapped|1 target controls covered
5%
5%
Customs-Trade Partnership Against Terrorism (C-TPAT)
3 source controls mapped|1 target controls covered
5%
EU Chips Act (Regulation (EU) 2023/1781)
3 source controls mapped|1 target controls covered
5%
EMV 3-D Secure (3DS2) — Payment Authentication Protocol
3 source controls mapped|3 target controls covered
5%
ISO/IEC 23837 — Security Requirements for Quantum Key Distribution
3 source controls mapped|1 target controls covered
5%
DFARS 252.204-7012 — Safeguarding Covered Defense Information
3 source controls mapped|3 target controls covered
5%
Illinois Biometric Information Privacy Act (BIPA)
3 source controls mapped|3 target controls covered
5%
Russia Federal Law on Personal Data (152-FZ)
3 source controls mapped|1 target controls covered
5%
TEFCA — Trusted Exchange Framework and Common Agreement
3 source controls mapped|2 target controls covered
5%
USMCA Chapter 19 — Digital Trade (United States-Mexico-Canada Agreement)
3 source controls mapped|1 target controls covered
5%
Bank Secrecy Act / Anti-Money Laundering (BSA/AML)
3 source controls mapped|1 target controls covered
5%
US Consumer Product Safety Commission (CPSC) — Connected Product Safety
3 source controls mapped|1 target controls covered
5%
AML/CTF Act 2006 (Australia)
3 source controls mapped|1 target controls covered
5%
Vermont Artificial Intelligence and Consumer Data Act (AICDA)
3 source controls mapped|2 target controls covered
5%
Armenia Law on Protection of Personal Data (2015)
3 source controls mapped|2 target controls covered
5%
Chile Personal Data Protection Law (Law No. 21.719)
3 source controls mapped|1 target controls covered
5%
UK Open Banking Standard
3 source controls mapped|3 target controls covered
5%
ITU-T X.805 — Security Architecture for End-to-End Communications
3 source controls mapped|1 target controls covered
5%
Florida Digital Bill of Rights (SB 262)
3 source controls mapped|2 target controls covered
5%
FIDO2 and W3C WebAuthn Standard
3 source controls mapped|3 target controls covered
5%
IRS Publication 1075 — Tax Information Security Guidelines
3 source controls mapped|1 target controls covered
5%
Regional Comprehensive Economic Partnership (RCEP) — E-Commerce Chapter
3 source controls mapped|1 target controls covered
5%
EU PSD3 and Payment Services Regulation (Proposed)
3 source controls mapped|3 target controls covered
5%
EU European Health Data Space (EHDS)
3 source controls mapped|1 target controls covered
5%
WCAG 2.2
3 source controls mapped|2 target controls covered
5%
FIDO2 / WebAuthn — Passwordless Authentication Standard
3 source controls mapped|3 target controls covered
5%
ISO 28001:2007 Supply Chain Security Management
3 source controls mapped|2 target controls covered
5%
W3C Verifiable Credentials (VC) Data Model 2.0
3 source controls mapped|3 target controls covered
5%
EN 301 549 — ICT Accessibility Requirements
3 source controls mapped|1 target controls covered
5%
RFC 2350 — Expectations for Computer Security Incident Response (BCP 21)
3 source controls mapped|1 target controls covered
5%
Papua New Guinea National Cybersecurity Policy & Cybercrime Act (2016)
3 source controls mapped|2 target controls covered
5%
Kuwait National Cybersecurity Framework
3 source controls mapped|2 target controls covered
5%
NIST SP 800-34 Rev 1 — Contingency Planning Guide
3 source controls mapped|3 target controls covered
5%
EU Taxonomy Regulation (Regulation 2020/852)
3 source controls mapped|1 target controls covered
5%
NABERS — National Australian Built Environment Rating System
3 source controls mapped|1 target controls covered
5%
ISO 22320:2018
3 source controls mapped|1 target controls covered
5%
TNFD Recommendations
3 source controls mapped|1 target controls covered
5%
ISPE GAMP 5 — A Risk-Based Approach to Compliant GxP Computerised Systems
3 source controls mapped|1 target controls covered
5%
Washington My Health My Data Act (MHMD)
3 source controls mapped|1 target controls covered
5%
Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)
3 source controls mapped|1 target controls covered
5%
Florida Digital Bill of Rights (FDBR)
3 source controls mapped|1 target controls covered
5%
UK Security and Emergency Measures Direction (SEMD) — Water Industry
3 source controls mapped|1 target controls covered
5%
Telecommunications Sector Security Reforms (TSSR)
2 source controls mapped|2 target controls covered
4%
EU GMP Annex 11 — Computerised Systems
2 source controls mapped|1 target controls covered
4%
BS 65000:2014 — Guidance on Organizational Resilience
2 source controls mapped|1 target controls covered
4%
ISO 56002
2 source controls mapped|3 target controls covered
4%
ISO 41001:2018 — Facility Management Systems
2 source controls mapped|3 target controls covered
4%
ISO 39001:2012 — Road Traffic Safety Management
2 source controls mapped|3 target controls covered
4%
ISO 37002:2021 — Whistleblowing Management Systems
2 source controls mapped|3 target controls covered
4%
ISO 50001:2018 — Energy Management Systems
2 source controls mapped|3 target controls covered
4%
ISO 22313:2020 — Guidance on Business Continuity Management Systems
2 source controls mapped|3 target controls covered
4%
Cyber Security Act 2024 (Australia)
1 source controls mapped|3 target controls covered
2%
Defence Industry Security Program (DISP)
1 source controls mapped|1 target controls covered
2%
2%
IATA Operational Safety Audit (IOSA) Standards Manual
1 source controls mapped|1 target controls covered
2%
Space ISAC (Information Sharing and Analysis Center) — Threat Framework
1 source controls mapped|1 target controls covered
2%
APEC Cross-Border Privacy Rules (CBPR) System
1 source controls mapped|1 target controls covered
2%
ISO/IEC 29147:2018
1 source controls mapped|4 target controls covered
2%
ISO/IEC 30111:2019
1 source controls mapped|3 target controls covered
2%
NIST AI Risk Management Framework (AI RMF 1.0)
1 source controls mapped|1 target controls covered
2%
NIST AI 600-1 Generative AI Profile
1 source controls mapped|1 target controls covered
2%
ASEAN Guide on AI Governance and Ethics
1 source controls mapped|1 target controls covered
2%
EDM Council DCAM — Data Management Capability Assessment Model
1 source controls mapped|1 target controls covered
2%
ISO/IEC 29134:2023
1 source controls mapped|1 target controls covered
2%
APRA Prudential Standard CPS 234 — Information Security (Australia)
1 source controls mapped|1 target controls covered
2%
Singapore Cybersecurity Act 2018
1 source controls mapped|1 target controls covered
2%
UK FCA/PRA Operational Resilience Framework
1 source controls mapped|1 target controls covered
2%
UN Guiding Principles on Business and Human Rights (UNGPs)
1 source controls mapped|1 target controls covered
2%
US OFAC Sanctions Compliance Framework
1 source controls mapped|1 target controls covered
2%
AICPA Privacy Management Framework (PMF)
1 source controls mapped|1 target controls covered
2%
UK Building Safety Act 2022
1 source controls mapped|1 target controls covered
2%
SEC Cybersecurity Disclosure Rules
1 source controls mapped|1 target controls covered
2%
ECB TIBER-EU Framework
1 source controls mapped|1 target controls covered
2%
SA8000:2014 — Social Accountability Standard
1 source controls mapped|1 target controls covered
2%

Frequently Asked Questions

What is ASD Essential Eight Maturity Model?

ASD Essential Eight Maturity Model is a compliance framework from Australia with 8 domains and 57 controls. Defines four maturity levels (0-3) for each of the ASD Essential Eight mitigation strategies, with specific ISM control requirements at each level. Published by the Australian Signals Directorate. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does ASD Essential Eight Maturity Model have?

ASD Essential Eight Maturity Model has 57 controls organised across 8 domains. The largest domains are Application Control (9 controls), Restrict Administrative Privileges (8 controls), User Application Hardening (8 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does ASD Essential Eight Maturity Model map to?

ASD Essential Eight Maturity Model maps to 323 other compliance frameworks. The top mapping partners are CSA CCM v4 (21% coverage), CISA Cross-Sector Cybersecurity Performance Goals (CPG) 2.0 (21% coverage), NYDFS Cybersecurity Regulation (23 NYCRR Part 500) (21% coverage). Use our comparison tool to explore control-level mappings between frameworks.

How do I get started with ASD Essential Eight Maturity Model compliance?

Start your ASD Essential Eight Maturity Model compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ASD Essential Eight Maturity Model requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 57 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.

Get Started Free →

Free forever — no credit card required