// Risk & Compliance

ASD Essential Eight
Assessment.

The Australian Signals Directorate's Essential Eight is the baseline cyber security framework for Australian organisations. HackLabs delivers evidence-based maturity assessments that go beyond tick-box compliance.

Talk to an Expert
// The Essential Eight Framework

Maturity you can measure. Gaps you can close.

The ASD Essential Eight Maturity Model provides Australian organisations with a prioritised set of mitigation strategies across four maturity levels. HackLabs conducts rigorous technical assessments of your Essential Eight implementation — testing actual control effectiveness rather than relying on self-reported compliance.

// What We Cover
  • Application control implementation and testing
  • Patch applications — coverage and timeliness
  • Configure Microsoft Office macro settings
  • User application hardening assessment
  • Restrict administrative privileges review
  • Patch operating systems — coverage and timeliness
  • Multi-factor authentication coverage
  • Regular backups — integrity and recoverability testing
  • Maturity level scoring (ML0-ML3) per control
  • Remediation roadmap with prioritised uplift actions
// Assessment Coverage

The eight mitigation strategies

Application Control

Technical testing of application whitelisting implementation including bypass techniques, coverage gaps, and effectiveness against commodity and targeted threats.

Patch Applications & OS

Assessment of patch management processes and coverage for both applications and operating systems. We test actual patch status across your environment.

Macro & Application Hardening

Review of Microsoft Office macro settings, web browser configuration, and user application hardening against ASD guidance and ML requirements.

Restrict Admin Privileges

Assessment of privileged access management, just-in-time access, admin account hygiene, and separation of administrative and standard user activities.

Multi-Factor Authentication

Coverage assessment of MFA implementation across internet-facing services, privileged access, remote access, and user accounts accessing sensitive data.

Regular Backups

Testing of backup implementation including coverage, frequency, integrity, and recoverability. We test whether backups can actually survive a ransomware incident.

// Methodology

Our engagement process

01

Kickoff & Scoping

Define assessment scope, identify systems in scope for each of the eight controls, and establish access requirements for technical testing.

02

Technical Testing

Evidence-based assessment of each control's implementation using a combination of configuration review, technical testing, and staff interviews.

03

Maturity Scoring

Score each control against ML0-ML3 maturity levels based on objective evidence. Identify gaps and the effort required to reach the target maturity level.

04

Remediation Roadmap

Deliver a prioritised remediation roadmap that accounts for your target maturity level, risk appetite, and operational constraints.

// Why HackLabs
ASD
Authorised Assessors

HackLabs assessors are accredited under the Essential Eight framework, ensuring credible and recognised assessment outcomes.

CREST
Accredited

CREST certification underpins our technical assessment quality across all cyber security disciplines.

20+
Years Established

Decades of experience with Australian government and enterprise security frameworks, including the ISM and Essential Eight.

100%
Technical Evidence

We test controls technically — not just through documentation review. Your maturity score reflects actual implementation effectiveness.

// Related Services

Explore related services

// Get Started

Understand your Essential Eight maturity.

Talk to a HackLabs Essential Eight specialist and get a tailored assessment proposal within one business day.

Talk to an Expert