ASD Essential Eight Maturity Model
Defines four maturity levels (0-3) for each of the ASD Essential Eight mitigation strategies, with specific ISM control requirements at each level. Published by the Australian Signals Directorate.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (8)
Application Control
Prevent execution of unapproved/malicious programs on workstations and servers
| Code | Title |
|---|---|
| E8MM-AC-ML1-0843 | ML1: Application control on workstations |
| E8MM-AC-ML1-1657 | ML1: Restrict execution to approved set |
| E8MM-AC-ML1-1870 | ML1: Control in user profiles and temp folders |
| E8MM-AC-ML2-1490 | ML2: Application control on internet-facing servers |
| E8MM-AC-ML2-1544 | ML2: Microsoft recommended application blocklist |
| E8MM-AC-ML2-1582 | ML2: Annual ruleset validation |
| E8MM-AC-ML3-1656 | ML3: Application control on non-internet-facing servers |
| E8MM-AC-ML3-1658 | ML3: Restrict driver execution |
| E8MM-AC-ML3-1659 | ML3: Microsoft vulnerable driver blocklist |
Configure Microsoft Office Macro Settings
Configure Microsoft Office macro settings to block macros from the internet and only allow vetted macros
| Code | Title |
|---|---|
| E8MM-MACRO-1488 | ML1: Block macros from the internet |
| E8MM-MACRO-1585 | ML1: Prevent users from changing macro settings |
| E8MM-MACRO-1671 | ML1: Disable macros for users without business need |
| E8MM-MACRO-1672 | ML1: Enable macro antivirus scanning |
| E8MM-MACRO-1673 | ML1: Block macros from Win32 API calls |
| E8MM-MACRO-1674 | ML1: Only allow vetted macros to execute |
| E8MM-MACRO-1890 | ML1: Check macros before signing/trusting |
Multi-factor Authentication
Use multi-factor authentication for access to systems and data
| Code | Title |
|---|---|
| E8MM-MFA-0974 | ML2: MFA for unprivileged users of systems |
| E8MM-MFA-1173 | ML2: MFA for privileged users of systems |
| E8MM-MFA-1401 | ML1: MFA factors |
| E8MM-MFA-1504 | ML1: MFA for organisation online services (sensitive data) |
| E8MM-MFA-1505 | ML3: MFA for data repositories |
| E8MM-MFA-1679 | ML1: MFA for third-party online services (sensitive data) |
| E8MM-MFA-1682 | ML2: Phishing-resistant MFA for systems |
Patch Applications
Patch vulnerabilities in applications to reduce risk of exploitation
| Code | Title |
|---|---|
| E8MM-PA-ML1-1690 | ML1: Patch online services within 2 weeks (non-critical) |
| E8MM-PA-ML1-1691 | ML1: Patch office/browser/email/PDF within 2 weeks |
| E8MM-PA-ML1-1698 | ML1: Daily vulnerability scanning for online services |
| E8MM-PA-ML1-1704 | ML1: Remove unsupported software |
| E8MM-PA-ML1-1876 | ML1: Patch online services within 48 hours (critical) |
| E8MM-PA-ML2-1693 | ML2: Patch other applications within 1 month |
| E8MM-PA-ML3-1692 | ML3: Patch office/browser/email/PDF within 48 hours (critical) |
Patch Operating Systems
Patch vulnerabilities in operating systems to reduce risk of exploitation
| Code | Title |
|---|---|
| E8MM-POS-1501 | ML1: Replace unsupported operating systems |
| E8MM-POS-1694 | ML1: Patch internet-facing OS within 2 weeks (non-critical) |
| E8MM-POS-1695 | ML1: Patch other OS within 1 month |
| E8MM-POS-1696 | ML3: Patch other OS within 48 hours (critical) |
| E8MM-POS-1877 | ML1: Patch internet-facing OS within 48 hours (critical) |
Regular Backups
Perform regular backups and test restoration to ensure business continuity
| Code | Title |
|---|---|
| E8MM-RB-1511 | ML1: Backups of data, applications, and settings |
| E8MM-RB-1515 | ML1: Test restoration from backups |
| E8MM-RB-1705 | ML2: Privileged users cannot access others' backups |
| E8MM-RB-1708 | ML3: Backup admin cannot modify during retention |
| E8MM-RB-1812 | ML1: Unprivileged users cannot access others' backups |
| E8MM-RB-1814 | ML1: Unprivileged users cannot modify/delete backups |
Restrict Administrative Privileges
Restrict and control privileged access to reduce the impact of account compromise
| Code | Title |
|---|---|
| E8MM-RAP-0445 | ML1: Dedicated privileged accounts |
| E8MM-RAP-1175 | ML1: Block privileged accounts from internet |
| E8MM-RAP-1380 | ML1: Separate privileged operating environments |
| E8MM-RAP-1507 | ML1: Validate privileged access requests |
| E8MM-RAP-1508 | ML3: Just-in-time access |
| E8MM-RAP-1647 | ML2: Disable after 12 months without revalidation |
| E8MM-RAP-1648 | ML2: Disable after 45 days of inactivity |
| E8MM-RAP-1898 | ML2: Secure Admin Workstations |
User Application Hardening
Configure web browsers and other user applications to reduce the attack surface
| Code | Title |
|---|---|
| E8MM-UAH-1485 | ML1: Block web advertisements |
| E8MM-UAH-1486 | ML1: Block Java from the internet in browsers |
| E8MM-UAH-1612 | ML2: Disable PowerShell 2.0 |
| E8MM-UAH-1655 | ML2: Disable .NET Framework 3.5 |
| E8MM-UAH-1666 | ML1: Disable or remove Internet Explorer 11 |
| E8MM-UAH-1667 | ML1: Block Office from creating child processes |
| E8MM-UAH-1668 | ML1: Block Office from creating executable content |
| E8MM-UAH-1670 | ML1: Block PDF software from creating child processes |
Maps to 323 other frameworks
Frequently Asked Questions
What is ASD Essential Eight Maturity Model?
ASD Essential Eight Maturity Model is a compliance framework from Australia with 8 domains and 57 controls. Defines four maturity levels (0-3) for each of the ASD Essential Eight mitigation strategies, with specific ISM control requirements at each level. Published by the Australian Signals Directorate. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does ASD Essential Eight Maturity Model have?
ASD Essential Eight Maturity Model has 57 controls organised across 8 domains. The largest domains are Application Control (9 controls), Restrict Administrative Privileges (8 controls), User Application Hardening (8 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does ASD Essential Eight Maturity Model map to?
ASD Essential Eight Maturity Model maps to 323 other compliance frameworks. The top mapping partners are CSA CCM v4 (21% coverage), CISA Cross-Sector Cybersecurity Performance Goals (CPG) 2.0 (21% coverage), NYDFS Cybersecurity Regulation (23 NYCRR Part 500) (21% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with ASD Essential Eight Maturity Model compliance?
Start your ASD Essential Eight Maturity Model compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about ASD Essential Eight Maturity Model requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 57 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required