Professional Services
Assessments against the Essential Eight are conducted using the Essential Eight Maturity Model, which defines four maturity levels:
While the specific approach to conducting an assessment may vary depending on the size and complexity of the system, all assessments are grounded in the foundational principles of the eight mitigation strategies outlined in the Essential Eight.
In addition to using the ASD-approved assessment method, our process incorporates a custom maturity rating. This enhancement goes beyond a simple pass/fail outcome by providing deeper insight into identified gaps, helping organizations better understand their security posture and areas for improvement.
Essential Eight has multiple controls for each of the eight mitigation strategies, the assessor will test each of these controls with a simulated activity designed to confirm it is in place and effective (e.g. attempting to run an application to check application control rulesets). Where this is not possible the assessor will review the configuration of a system through the system’s interface to determine whether it should enforce an expected policy, or review and assess the evidence provided by the customer.
The assessor will consider the following:
The four stages are:
A report will be provided based on the ASD template which includes finding and recommendations for improvement.
Also an E8 summary presentation pack will be also produced for stakeholders:
Get in touch today to schedule your Essential Eight assessment and gain clear, actionable insights into your cybersecurity maturity. Our team is ready to help you identify gaps, strengthen controls, and align with ASD’s standards.