Essential Eight Implementation Guide for Australian SMBs
Cybersecurity isn’t optional for Australian businesses anymore. With cyber attacks increasing by 23% in the past year and the Australian Signals Directorate (ASD) strengthening its guidance, implementing the Essential Eight has moved from “nice to have” to business-critical. The good news? These eight mitigation strategies are designed to be practical and achievable for businesses of all sizes.
The Essential Eight framework represents the ASD’s distilled wisdom from years of cyber incident response. These aren’t theoretical recommendations—they’re the strategies that would have prevented 85% of the cyber intrusions the ASD investigated last year. For Australian SMBs, this framework offers a clear roadmap for cybersecurity without requiring a massive security team or unlimited budget.
Understanding the Essential Eight Framework
The Essential Eight consists of eight mitigation strategies prioritized by the Australian Cyber Security Centre (ACSC). Each strategy targets specific attack vectors that cybercriminals actively exploit. The framework operates on maturity levels from 0 (not implemented) to Level 3 (maximum protection).
The eight strategies are divided into two categories. The first four prevent malware delivery and execution:
- Application Control - Prevents unauthorized applications from running
- Patch Applications - Closes security vulnerabilities in software
- Configure Microsoft Office Macro Settings - Blocks macro-based attacks
- User Application Hardening - Disables risky application features

The remaining four limit the impact of successful attacks:
- Restrict Administrative Privileges - Limits damage from compromised accounts
- Patch Operating Systems - Fixes OS-level vulnerabilities
- Multi-Factor Authentication - Adds extra authentication layers
- Regular Backups - Ensures recovery from ransomware attacks
For most Australian SMBs, achieving Maturity Level 1 provides solid baseline protection. Level 2 offers stronger security suitable for businesses handling sensitive data. Level 3 is typically reserved for organizations with critical infrastructure or high-risk profiles.
Strategy 1: Application Control
Application control prevents unauthorized software from executing on your systems. This single measure stops most malware infections before they start. Implementation requires creating an approved application list and blocking everything else.
Practical Implementation Steps:
Start with Windows built-in AppLocker (available in Windows Pro and Enterprise) or consider third-party solutions like Airlock Digital (Australian-based) or CrowdStrike. For small businesses with 10-20 computers, AppLocker provides adequate protection at no additional cost.
Begin by running an audit mode for two weeks to identify all legitimate applications your team uses. Document every application including version numbers. Create your baseline policy allowing only these applications plus Microsoft-signed executables and applications from trusted vendors.

Deploy the policy in audit mode first, monitoring for legitimate applications that get blocked. After two weeks of clean audit logs, switch to enforcement mode. Establish a clear process for employees to request new applications—typically a simple form submitted to IT for review.
Cost Considerations:
- Windows AppLocker: Included with Windows Pro/Enterprise
- Third-party solutions: $30-60 per device annually
- Initial setup time: 15-20 hours for 50 devices
- Ongoing maintenance: 2-3 hours monthly
Common pitfall: Don’t allow execution from user-writable directories like Downloads or Desktop. Require applications to be installed to Program Files where they can be properly controlled.
Strategy 2: Patch Applications
Unpatched applications are the entry point for 60% of successful cyber attacks. Adobe Reader, Java, web browsers, and other common applications contain vulnerabilities that criminals actively exploit. Patching these applications quickly closes these security holes.
Practical Implementation Steps:
Identify all applications across your organization. Tools like PDQ Inventory (for Windows) or Jamf (for Mac) automate this discovery. Focus initially on high-risk applications: web browsers, PDF readers, Java, Flash, Office applications, and media players.
Implement automatic updates wherever possible. Modern browsers handle this well—Chrome, Edge, and Firefox update automatically by default. For other applications, consider patch management tools:
- Small businesses (under 50 devices): Windows Update, Microsoft Intune, or free tools like Chocolatey
- Medium businesses (50-200 devices): PDQ Deploy ($500/year), ManageEngine Patch Manager Plus
- Larger organizations: SCCM, Ivanti, or other enterprise solutions

Set a patching cadence: critical vulnerabilities within 48 hours, high-severity patches within two weeks, and regular patches monthly. The ASD requires patches for internet-facing services within 48 hours and all other applications within two weeks for Maturity Level 2.
Cost Considerations:
- Patch management software: $0-2,000 annually depending on scale
- Testing environment setup: $500-2,000 one-time
- Monthly patching time: 4-8 hours
- Emergency patching for critical vulnerabilities: 2-4 hours as needed
Document your patching schedule and maintain records. During audits or cyber insurance reviews, this documentation demonstrates due diligence.
Strategy 3: Configure Microsoft Office Macro Settings
Malicious Office macros remain a popular attack vector. Email attachments with weaponized macros bypass many security controls because they’re technically legitimate Office features. Proper macro configuration blocks this attack path while allowing necessary business functionality.
Practical Implementation Steps:
Use Group Policy or Microsoft Intune to configure macro settings organization-wide. The recommended configuration for SMBs:
- Block macros from the internet completely
- Allow only digitally signed macros from trusted publishers
- Disable Excel 4.0 (XLM) macros entirely
- Block Office from creating child processes (prevents macro-initiated executables)
For businesses using legitimate macros internally, implement a code-signing process. Purchase a code-signing certificate ($150-400 annually) and require developers to sign all approved macros. Import these trusted publisher certificates to all computers via Group Policy.
Configure Windows to block downloaded files from running macros using Mark of the Web (MotW) protection. Files downloaded from email or web browsers are automatically tagged, and your Office configuration prevents their macros from executing.
Cost Considerations:
- Code-signing certificate: $150-400 annually (if needed)
- Implementation time: 3-5 hours
- Testing time: 5-10 hours
- Ongoing maintenance: Minimal (1-2 hours annually)
Document legitimate macro use cases before implementation. Meet with department heads to identify business-critical macros that need code-signing or alternative solutions.
Strategy 4: User Application Hardening
Web browsers and document readers contain powerful features that attackers exploit. Application hardening disables these risky features while maintaining normal business functionality. This strategy focuses on web browsers, PDF readers, and Microsoft Office applications.
Practical Implementation Steps:
For web browsers (Chrome, Edge, Firefox):
- Disable Flash Player (still common in August 2024, though being phased out)
- Block web advertisements (reduces malvertising risk)
- Disable Java in web browsers
- Prevent browsers from running ActiveX controls
- Configure browsers to block untrusted fonts
For PDF readers:
- Disable JavaScript in Adobe Reader
- Block PDF files from launching executables
- Configure protected mode/sandbox features
- Prevent PDFs from accessing internet locations
For Microsoft Office:
- Disable legacy protocols (SMB v1)
- Block untrusted fonts
- Prevent Office applications from creating child processes
- Disable OLE package activation
Deploy these configurations via Group Policy or mobile device management (MDM) solutions. Most security settings have minimal impact on legitimate business use. Test with a pilot group of 5-10 users before organization-wide deployment.
Cost Considerations:
- Configuration time: 8-12 hours initial setup
- Testing time: 10-15 hours
- User training time: 2-3 hours (group session)
- Ongoing maintenance: Minimal
The ACSC provides specific Group Policy templates for Essential Eight compliance. Download these from cyber.gov.au and customize for your environment rather than building from scratch.
Strategy 5: Restrict Administrative Privileges
Administrative accounts have full system access. When attackers compromise an admin account, they control your entire network. Restricting administrative privileges limits attack impact by ensuring most users and accounts operate with minimal necessary permissions.
Practical Implementation Steps:
Start with a privilege audit. Document every user with administrative access and their business justification. Most employees need zero administrative rights for daily work. Create a three-tier access model:
Standard Users (95% of staff):
- No local administrator rights
- Access only to required applications and data
- Cannot install software or change system settings
Privileged Users (IT staff, developers):
- Separate accounts for admin tasks vs daily work
- Admin accounts named distinctly (e.g., john.smith vs john.smith-admin)
- Admin accounts lack email access or internet browsing
- All admin actions logged and monitored
Emergency Accounts (break-glass scenarios):
- Stored securely with complex passwords
- Used only during critical incidents
- Every use triggers alert and requires documentation
Implement Microsoft Local Administrator Password Solution (LAPS) to randomize local admin passwords on each computer. This free Microsoft tool prevents lateral movement attacks where attackers use the same local admin password across multiple systems.
Cost Considerations:
- LAPS deployment: Free, 5-8 hours implementation
- Privileged access management (PAM) tools: $20-50 per user annually
- Initial cleanup of excessive permissions: 15-25 hours
- Ongoing access reviews: 3-4 hours quarterly
Expect resistance from power users accustomed to admin rights. Provide a streamlined software request process (response within 4 business hours) to minimize friction while maintaining security.
Strategy 6: Patch Operating Systems
Operating system vulnerabilities provide direct system access to attackers. Unlike application vulnerabilities that might compromise one program, OS vulnerabilities can give attackers complete control. Patching operating systems quickly is critical for security.
Practical Implementation Steps:
For Windows environments: Configure Windows Update for Business using Group Policy or Intune. Deploy patches in a phased approach:
- Test group (5-10 devices): Deploy patches within 48 hours of release
- Business users: Deploy after one-week testing period
- Critical systems: Deploy after two-week testing period
- Servers: Deploy during maintenance windows after thorough testing
For macOS environments: Use Jamf, Mosyle, or Apple Business Manager to manage updates. Enable automatic security updates for clients while managing major OS updates manually.
For Linux servers: Configure unattended-upgrades for security patches. Test in staging environment first, then deploy to production during maintenance windows.
Maintain a testing environment mirroring production. Even for small businesses, a single test computer representing your standard build helps identify problematic patches before wide deployment.
Cost Considerations:
- Update management tools: $0-3,000 annually depending on scale
- Test environment: $1,000-5,000 one-time
- Monthly patching time: 6-12 hours
- Emergency patching for zero-day exploits: 4-8 hours
The ASD requires operating system patches within 48 hours for internet-facing systems and two weeks for internal systems (Maturity Level 2). Document your patch deployment timeline and maintain records of patch installations.
Strategy 7: Multi-Factor Authentication (MFA)
Passwords alone are insufficient security. Multi-factor authentication requires a second verification method—something you have (phone, hardware token) in addition to something you know (password). MFA prevents 99.9% of automated credential attacks according to Microsoft’s research.
Practical Implementation Steps:
Implement MFA in this order of priority:
Phase 1 (Week 1-2): Critical cloud services
- Microsoft 365 (all users)
- Cloud-hosted business applications
- Remote access (VPN, Remote Desktop)
- Administrative accounts (everywhere)
Phase 2 (Week 3-4): Financial and HR systems
- Accounting software (Xero, MYOB, QuickBooks)
- Banking portals
- Payroll systems
- HR management systems
Phase 3 (Week 5-6): Remaining business applications
- CRM systems
- Project management tools
- Cloud storage (Dropbox, Google Drive, OneDrive)
For Australian SMBs, Microsoft Authenticator (free) works well for Microsoft 365 environments. Google Authenticator provides alternative MFA for other services. For stronger security or regulated industries, consider hardware tokens like YubiKey ($50-80 per token).
Configure appropriate MFA policies:
- Require MFA for all users, not just administrators
- Remember MFA on trusted devices for 7-30 days (balance security with usability)
- Require MFA re-authentication when accessing sensitive data
- Block legacy authentication protocols that bypass MFA
Cost Considerations:
- Software-based MFA (Authenticator apps): Free
- SMS-based MFA: $0.01-0.05 per verification
- Hardware tokens: $50-80 per user one-time
- Implementation time: 15-25 hours
- User training: 3-5 hours
- Ongoing support: 1-2 hours monthly (forgotten devices, etc.)
Plan for MFA recovery scenarios. Users lose phones or hardware tokens. Implement backup codes and a clear reset process that maintains security without creating excessive IT burden.
Strategy 8: Daily Backups
Backups are your insurance policy against ransomware, accidental deletion, hardware failure, and malicious insiders. The ASD requires daily backups of important data, and weekly testing to verify restoration works. This strategy is your last line of defense when all other security controls fail.
Practical Implementation Steps:
Implement the 3-2-1 backup strategy: three copies of data, on two different media types, with one copy offsite.
Primary backup (onsite):
- Network-attached storage (NAS) or local backup server
- Daily incremental backups, weekly full backups
- Retention: 30 days of daily backups, 3 months of weekly backups
Cloud backup (offsite):
- Microsoft Azure Backup, AWS Backup, or Australian providers like Macquarie Cloud or Vault Cloud
- Daily synchronization from primary backup
- Immutable backups (cannot be deleted or encrypted by ransomware)
- Retention: 90 days or longer for compliance requirements
For Microsoft 365: Native Microsoft 365 backup has limitations. Consider third-party backup solutions like Veeam Backup for Microsoft 365, AvePoint, or Datto SaaS Protection ($3-6 per user monthly).
Critical implementation requirements:
- Backup all servers, user workstations, and cloud data
- Exclude backups from network access (prevent ransomware encryption)
- Store backup credentials separately from network credentials
- Test restoration monthly—actually restore files to verify backup integrity
- Document restoration procedures step-by-step
Cost Considerations for 50-user business:
- NAS device: $2,000-5,000 one-time
- Cloud backup storage: $300-800 monthly
- Backup software licenses: $500-2,000 annually
- Initial configuration: 15-25 hours
- Monthly testing: 2-4 hours
- Ongoing monitoring: 1-2 hours weekly
Schedule backup tests during business hours so staff see IT performing restorations. This builds confidence in backup systems and ensures everyone understands recovery procedures.
Implementation Roadmap and Costs
For a typical 50-person Australian SMB, here’s a realistic implementation timeline and budget:
Month 1: Foundation (Strategies 2, 6, 8)
- Deploy patch management
- Configure automatic OS updates
- Implement backup solution
- Cost: $8,000-15,000 upfront, $500-1,000 monthly ongoing
Month 2: Access Control (Strategies 5, 7)
- Remove excessive admin rights
- Deploy MFA across all critical systems
- Cost: $2,000-4,000 upfront, $100-300 monthly ongoing
Month 3: Application Security (Strategies 1, 3, 4)
- Implement application control
- Configure Office macro settings
- Harden user applications
- Cost: $3,000-6,000 upfront, $200-400 monthly ongoing
Total Essential Eight Implementation:
- Initial investment: $13,000-25,000
- Ongoing monthly: $800-1,700
- Annual cost: $22,600-45,400
These costs include software licenses, hardware, implementation labor, and ongoing management. Costs vary based on existing infrastructure, technical complexity, and whether you use internal IT staff or managed service providers.
Compare this to the average cost of a ransomware attack for Australian SMBs: $270,000 according to recent research. The Essential Eight implementation pays for itself if it prevents a single successful attack.
Verification and Compliance
Document your Essential Eight implementation for audits, cyber insurance, and ASD assessment. The ACSC provides a self-assessment tool at cyber.gov.au/acsc/view-all-content/publications/essential-eight-assessment-process-guide.
Create an Essential Eight register documenting:
- Current maturity level for each strategy (0, 1, 2, or 3)
- Implementation date
- Technology used
- Testing procedures
- Responsible staff member
- Next review date
Review your Essential Eight compliance quarterly. Technology changes, new employees join, and configurations drift over time. Schedule quarterly reviews to verify:
- Patch management remains current
- Administrative privileges haven’t expanded
- MFA remains enforced
- Backup testing continues
- Application controls function correctly
Many cyber insurance policies now require Essential Eight implementation. Document your maturity levels clearly when applying for cyber insurance—it may reduce premiums by 10-30% depending on the insurer.
Moving Forward with Essential Eight
The Essential Eight framework provides Australian businesses with a clear, proven path to cybersecurity. These eight strategies prevent the vast majority of cyber attacks without requiring enterprise-scale security teams or budgets.
Start with the strategies that provide immediate risk reduction: backups (Strategy 8) and MFA (Strategy 7) can be implemented quickly and prevent the most damaging attacks. Build from this foundation, systematically implementing each strategy over 3-6 months.
The regulatory environment is moving toward mandatory security standards. The Security of Critical Infrastructure Act already requires Essential Eight compliance for critical infrastructure sectors. Voluntary adoption now positions your business ahead of future requirements while providing immediate security benefits.
Work with Australian-based cybersecurity consultants or managed service providers familiar with Essential Eight requirements. They understand the local context, compliance requirements, and can recommend Australia-based vendors for backup, disaster recovery, and security monitoring services.
The cyber threat landscape continues to evolve, but the Essential Eight remains relevant because it addresses fundamental security principles rather than specific threats. Implement these strategies now, and you’ll build a security foundation that serves your business for years to come.
Need help implementing the Essential Eight? Our team specializes in practical cybersecurity for Australian SMBs. Contact us for a free Essential Eight assessment.