essential-eightcomplianceaustraliacyber-securitymaturity-model

Essential Eight Maturity Levels Explained: What ML1, ML2, and ML3 Actually Require (2026)

A practical breakdown of Essential Eight maturity levels for Australian business owners. What each level requires, what it costs, which controls to tackle first, and whether your Microsoft 365 licence already covers it.

Robbie Cronin
Robbie Cronin
ยท18 min read

You've been told your business needs to meet "Essential Eight Maturity Level 2." You Googled it. You found a wall of government PDFs written for IT security professionals.

This guide is the plain-English version. What each maturity level actually requires, what it costs, which controls are hardest, and what your Microsoft 365 licence already covers.

The Maturity Levels at a Glance

The Essential Eight framework has four maturity levels: 0 through 3. Each level builds on the one below it. The higher the level, the more rigorous the requirements.

Maturity Level Overview

FeatureLevel 1Level 2
Designed for
Basic cyber hygiene
Most Australian businesses
MFA requirement
Any MFA (app, SMS, hardware)
Phishing-resistant only (security keys, Windows Hello)
Patching deadline
Internet-facing: 2 weeks. Critical: 48 hours
All systems: 2 weeks. Critical: 48 hours
Application control
Basic allowlisting (AppLocker or equivalent)
Full allowlisting via WDAC, Microsoft's blocklist, annual review
Admin privileges
Separate admin accounts, no web/email
Separate admin workstations, enhanced logging
Backups
Daily, tested, offsite
Privileged access restricted, tested quarterly
Logging
Basic event logging
Centralised collection and monitoring
Cost (50-person SME)
$15,000-$35,000
$20,000-$45,000 on top of ML1
Timeline
3-4 months
4-6 months beyond ML1

Level 0 means you haven't started. No meaningful controls in place.

Level 1 is the basics. MFA turned on, high-risk apps patched within two weeks, macros blocked from the internet. It stops opportunistic attacks.

Level 2 is where most businesses should aim. Phishing-resistant MFA, faster patching, full application control, centralised logging. It's what cyber insurers expect and what the Protective Security Policy Framework (PSPF) requires for Commonwealth entities.

Level 3 is for organisations facing nation-state level threats. Defence contractors, critical infrastructure, intelligence agencies. Most private businesses don't need it and shouldn't pay for it.

22%
Of Australian federal agencies met Maturity Level 2 in 2025
ASD Commonwealth Cyber Security Posture report. Dropped from 25% to 15% in 2024 after the November 2023 update raised the bar, then recovered to 22% in 2025. If government agencies with dedicated security teams struggle, this isn't a simple checkbox exercise.

What Changed in November 2023

The ASD published a major update to the maturity model in November 2023. It didn't add new controls, but it raised the requirements significantly. If you're reading older guides, they're likely out of date.

The three biggest changes:

MFA got much stricter at ML2. Before the update, any MFA met ML2. After the update, ML2 requires phishing-resistant MFA only. That means FIDO2 security keys, Windows Hello for Business, or smart cards. SMS codes no longer meet any maturity level (they don't satisfy the "something you have" requirement since SIMs can be swapped). Authenticator app push notifications were downgraded to ML1. This was the most disruptive change for most organisations.

Patching deadlines rebalanced. Internet-facing applications now need patching within two weeks at ML2 (tightened from one month). Critical vulnerabilities need patching within 48 hours across all levels. However, OS patching for workstations and non-internet-facing systems was relaxed from two weeks to one month at ML2, shifting focus to higher-risk systems.

Application control moved earlier. Microsoft's recommended application blocklist is now required at ML2, moved down from ML3. This was a shift targeting "living off the land" attacks where attackers use legitimate Windows tools.

These changes are why government compliance rates dropped from 25% to 15% in 2024 (before recovering to 22% in 2025). The controls didn't get worse. The measurement got more honest.

Control by Control: What Each Level Requires

1. Application Control

This is the control that trips up most organisations. It decides which software is allowed to run on your systems.

ML1ML2ML3
ToolAppLocker or equivalentWDAC (Windows Defender Application Control)WDAC with advanced config
ApproachBasic allowlisting of approved executablesMicrosoft's recommended blocklist, full allowlisting with vendor hardening guidanceOrganisation-wide enforcement, no exceptions
ReviewBest practice (not formally required)Annual or more frequentContinuous monitoring via SIEM
LoggingAllowed/blocked events logged centrallyAll events monitored centrallyIntegrated into SIEM for analysis

The hard part: WDAC at ML2 requires deep Windows security knowledge. Misconfigured policies can render devices unbootable. Expect 8-12 weeks for a 50-person business, including an audit mode discovery phase where you identify every legitimate application before enforcing anything.

The shortcut that doesn't work: Windows Defender SmartScreen (reputation-based blocking) does not meet ML2. You need explicit application allowlists.

2. Patch Applications

How fast you patch third-party software: browsers, PDF readers, Office, email clients.

ML1ML2ML3
Critical vulnerabilities48 hours48 hours48 hours
Internet-facing apps2 weeks2 weeks48 hours (all apps)
Other appsNot explicitly required1 monthRunning latest or previous version
Vulnerability scanningWeekly (high-risk apps)Weekly (high-risk) + fortnightly (other apps)Weekly + continuous

The hard part: Microsoft Intune patches Microsoft products natively and has limited third-party patching via Winget integration, but it's not comprehensive enough for ML2 compliance across apps like Chrome, Adobe, or Zoom. Most organisations still need a dedicated patch management tool (Patch My PC, ManageEngine, Automox). Budget $5,000-$10,000 per year.

Chrome alone releases security patches every 1-2 weeks. Manual patching is not viable at ML2 cadence.

3. Configure Microsoft Office Macros

How macros are handled in Word, Excel, PowerPoint.

ML1ML2ML3
Internet macrosBlockedBlockedBlocked
Internal macrosDisabled unless business needOnly from signed, trusted locationsOrganisational approval + annual audit
EnforcementUsers can't change settingsWindows Defender ASR rules block API callsTrusted publisher list reviewed annually
LoggingBasicAllowed and blocked executions loggedCentralised + analysed

The hard part: Many businesses still rely on Excel macros for internal reporting, finance, or operations. You'll need to either sign all macros with a code-signing certificate, migrate to modern tools (Power BI, Python), or accept exceptions that reduce your security posture.

Most SMEs go with: macros blocked everywhere except a restricted Finance folder, with all macros in that folder signed by IT.

4. User Application Hardening

Locking down risky features in browsers, email clients, and PDF viewers.

ML1ML2ML3
Browser featuresFlash, Java, and web ads blocked from internetUntrusted add-ins disabled, enhanced hardeningPowerShell constrained language mode
Office featuresBasicASR rules block child processes and code injectionFull enforcement, no exceptions
PDF viewersBasic hardeningBlock PDF from creating child processesCentrally enforced

The hard part at ML3: PowerShell constrained language mode restricts legitimate admin scripts. You'll need a process for signing approved scripts and exceptions. At ML2, the main effort is deploying browser and Office hardening policies via Group Policy or Intune.

5. Restrict Administrative Privileges

Who has admin access and how they use it.

ML1ML2ML3
Account separationSeparate admin and standard accountsSeparate admin workstationsSecure Admin Workstations (SAWs)
Internet/emailAdmin accounts can't browse web or use emailEnhanced credential managementFull hardware isolation
MFARequired for admin accountsRequired with loggingPhishing-resistant, session-limited
LoggingBasicEnhanced, centralisedSIEM integration

The hard part: People resist using two accounts. Admins want to check email from their admin session. That's exactly the behaviour this control prevents. Expect 8-12 weeks of enforcement, including pushback.

At ML3, Secure Admin Workstations are dedicated hardened devices used only for admin tasks. They add $2,000-$5,000 per workstation for hardware and management.

6. Patch Operating Systems

How fast you patch Windows, macOS, and Linux.

ML1ML2ML3
Internet-facing2 weeks (48 hours if exploit exists)2 weeks (48 hours if exploit exists)48 hours for everything
Other systems1 month1 monthRunning latest or previous version
Vulnerability scanningFortnightlyWeeklyWeekly + continuous
End-of-life systemsShould be replacedMust be replacedNo exceptions

The reality: Microsoft ended support for Windows 10 in October 2025. If you still have Windows 10 machines, they're receiving no security updates and they fail this control at every maturity level. Budget for hardware upgrades if needed.

Intune setup: Create update rings with 0-day deferral for security patches, auto-restart at 2am, and a 14-day deadline for forced installation if users haven't rebooted.

7. Multi-Factor Authentication

The control that changed the most in November 2023.

ML1ML2ML3
Type required"Something you have" + "something you know"Phishing-resistant onlyPhishing-resistant, no exceptions
What qualifiesAuthenticator apps, hardware tokensFIDO2 security keys, Windows Hello for Business, smart cardsSame as ML2, universally enforced
CoverageInternet-facing servicesAll systems including workstationsAll systems, all users
SMS Codes No Longer Meet ML1

The November 2023 update requires ML1 MFA to include "something you have" (physical token or device) plus "something you know" (password/PIN). SMS-only authentication no longer qualifies at any maturity level. If your MFA is just SMS codes, you're at Level 0.

Cost of phishing-resistant MFA: FIDO2 security keys (YubiKey, Titan) cost $30-$80 each. For 50 users plus backup keys, budget $3,000-$8,000 in hardware. Windows Hello for Business is free if your devices have TPM 2.0 and requires Intune for management (works on both Windows 10 and 11).

For SMEs, Windows Hello for Business is the most practical path to ML2. It uses your existing devices (if they have TPM 2.0 hardware), integrates with Intune, and users are already familiar with biometric authentication. Check your devices with the Get-Tpm PowerShell command.

8. Regular Backups

Your last line of defence when everything else fails.

ML1ML2ML3
FrequencyPer business continuity requirements (daily recommended)Per business continuity requirements (daily recommended)Daily for critical assets
RetentionPer business continuity requirements (90 days recommended)Per business continuity requirements3+ months
TestingTested as part of disaster recovery exercisesRegular restore testing (quarterly recommended)Tested as part of disaster recovery exercises
Access controlStored separatelyPrivileged access restrictedOnly backup admins + break-glass account
ImmutabilityRecommendedStrongly recommendedRequired

The 3-2-1 rule: Three copies of your data, on two different storage types, with one copy offsite. For ransomware protection, add: one copy immutable (can't be modified or deleted even by admin), and zero unscheduled access.

The hard part: Quarterly restore testing. Not checking that backups are running. Actually restoring data and timing how long it takes. Most businesses set up backups and never test them until something goes wrong.

What Your Microsoft 365 Licence Covers

Most Australian SMEs already have Microsoft 365. The question is whether your licence tier covers what you need.

Microsoft 365 Coverage for Essential Eight ML2

FeatureBusiness Premium (~A$30/user/mo)E5 (~A$87/user/mo)
Basic MFA
Yes (Entra ID P1)
Yes
Phishing-resistant MFA enforcement
Yes (via Conditional Access P1 authentication strength)
Yes (plus risk-based policies with P2)
Intune device management
Yes
Yes
Windows Update management
Yes
Yes
Third-party app patching
No (needs Patch My PC or similar)
No (same gap)
Defender for Endpoint (EDR)
Basic (Defender for Business)
Full (Plan 2)
Centralised logging / SIEM
No
Sentinel available separately (E5 gets data ingestion grant)
Macro lockdown (full ASR rules)
Partial
Yes
Application control (WDAC)
Basic via Intune
Full support

The honest answer for most SMEs: Business Premium gets you further than most people think. It includes Conditional Access (P1) for phishing-resistant MFA enforcement and Intune for device management. ML2 requires either E5 or Business Premium plus the E5 Security add-on (~A$12/user/month extra) for advanced EDR and risk-based policies. Both options still leave a gap for third-party application patching, and Sentinel (SIEM) is a separate Azure service regardless of licence tier.

The M365 Gap Nobody Mentions

Neither Business Premium nor E5 includes third-party application patching. Chrome, Adobe, Zoom, Slack, and every other non-Microsoft app needs a separate tool. This is the most common gap in Essential Eight implementations that rely entirely on the Microsoft stack. Tools like Patch My PC or ManageEngine integrate with Intune and cost $5,000-$10,000 per year.

What It Costs

Real estimates for a 50-person Australian SME. These are industry ranges, not exact quotes. Your costs will vary based on environment complexity, existing tools, and how many gaps you have.

Cost to Reach Each Maturity Level (50-person SME)

1ML0 to ML1: $15,000-$35,000
MFA rollout, basic patching, macro lockdown. 3-4 months.
2ML1 to ML2: $20,000-$45,000
Phishing-resistant MFA, WDAC, SIEM, EDR. 4-6 months.
3ML2 to ML3: $25,000-$60,000+

Biggest Cost Drivers

  1. Phishing-resistant MFA hardware. Security keys at $30-$80 per user, plus backup keys. Windows Hello for Business is free if your hardware supports TPM 2.0 (works on both Windows 10 and 11).

  2. Endpoint Detection and Response (EDR). $100-$300 per device annually. Required for proper threat detection and logging at ML2.

  3. SIEM / centralised logging. $5,000-$15,000 setup plus $200-$500 per month ongoing. Required at ML2 for centralised event collection and analysis.

  4. Third-party patch management. $5,000-$10,000 per year for tools like Patch My PC, ManageEngine, or Automox.

  5. Professional services. Implementation consulting runs $150-$250 per hour. Budget 100-300 hours depending on scope.

Ongoing Annual Costs

ML2 isn't a one-time expense. Budget $15,000-$25,000 per year for:

  • EDR and SIEM licensing
  • Patch management tooling
  • Quarterly backup testing
  • Annual application control review
  • Reassessment (typically 40-60% of the initial assessment cost)

Which Controls to Tackle First

Not all controls are equally hard or equally impactful. This is the implementation order that maximises risk reduction while building momentum.

Recommended Implementation Sequence

1Phase 1: MFA + Macros + OS Patching
Weeks 1-8. Quick wins. Blocks ~70% of common attacks.
2Phase 2: Admin Privileges + App Patching + App Control (audit)
Weeks 8-16. Core security backbone.
3Phase 3: User App Hardening + Backup Automation
Weeks 16-24. Defence in depth.
4Phase 4: App Control (enforce) + Full MFA rollout

Phase 1: The Quick Wins (Weeks 1-8)

Multi-factor authentication. Highest impact per dollar spent. Start with authenticator apps for immediate protection, then plan the phishing-resistant hardware rollout for ML2. Two weeks to deploy across the organisation.

Macro lockdown. Pure policy change, no hardware needed. Deploy "disable all except digitally signed" via Group Policy. One week. Immediately stops the most common ransomware delivery method.

OS patching. Configure Windows Update for Business through Intune. Set security patches to auto-install with 0-day deferral. One week of setup, then it runs itself.

These three controls alone would have prevented or limited most major Australian breaches in the last three years.

Phase 2: The Backbone (Weeks 8-16)

Restrict admin privileges. Create separate admin accounts. Block admin accounts from web browsing and email. Four to six weeks including training and pushback management.

Patch applications. Deploy third-party patch management. Set up vulnerability scanning. Three to four weeks for setup, then ongoing.

Application control (audit mode). Start WDAC in audit mode to discover all legitimate applications. No enforcement yet. Four to six weeks of discovery.

Phase 3: Defence in Depth (Weeks 16-24)

User application hardening. Browser lockdown, PDF restrictions, Office ASR rules. Three to four weeks.

Backup automation. Deploy backup solution with immutable storage, offsite copy, and quarterly testing schedule. Two to three weeks of setup, then ongoing discipline.

Phase 4: Complete ML2 (Weeks 20-28)

Application control (enforcement). After the audit phase, gradually enforce WDAC policies. Expect some breakage. Four to six weeks of gradual rollout.

Full phishing-resistant MFA. Complete the hardware rollout (security keys or Windows Hello for Business) across all users and systems.

The Hardest Parts (What Actually Stalls Projects)

Application Control (WDAC)

The longest implementation timeline. Requires identifying every legitimate application in your environment (2-4 weeks in audit mode), testing enforcement without breaking anything (4-6 weeks), and then gradually rolling out. Misconfigured policies can make devices unbootable. This is where most businesses bring in outside help.

Admin Privilege Separation

Technically simple. Organisationally hard. Admins don't want to switch between accounts. IT support staff need elevated access for routine tasks like printer drivers. Expect resistance and plan for 8-12 weeks of change management.

Third-Party Patching

The operational burden never goes away. Chrome patches every 1-2 weeks. Adobe has multiple products with different release cycles. Legacy applications stop receiving updates entirely, and you need to decide: retire them or accept the risk and document the exception.

Backup Testing Discipline

Setting up backups is easy. Testing them quarterly is where organisations fail. Restore tests take 2-4 hours each. Recovery documentation goes stale. Most businesses discover their backup gaps during an actual incident, which is the worst time to discover them.

Legacy Systems: The Reality

Every business has them. The 15-year-old accounting package. The manufacturing software from 2008. The Access database that runs a critical process.

These systems often can't support modern controls. They need macro access. They can't handle application control policies. They run on unsupported operating systems.

The approach that works:

  1. Isolate the system. Dedicated workstation or network segment. No internet access. Only users who need it.
  2. Compensating controls. Enhanced monitoring, restricted access, network-level detection.
  3. Document the exception. Risk register entry with business justification and planned retirement date.
  4. Plan the migration. Even if it's 12-24 months away, having a timeline matters for your assessment report.

An assessor won't fail you for having a documented, compensated legacy exception. They will fail you for pretending it doesn't exist.

Do You Need ML2 or Will ML1 Do?

Which Maturity Level Do You Need?

Do you have cyber insurance or government contracts?

2 questionsQuestion 1 of 2

For most Australian SMEs handling customer data, working with government, or carrying cyber insurance, ML2 is the target. ML1 is a reasonable interim step if you're starting from zero and need to show progress quickly.

ML3 is almost never the right target for a private business. If you're not sure whether you need ML3, you don't.

Getting Started

The gap between "knowing what ML2 requires" and "actually being compliant" is where most businesses get stuck. The framework is well documented. The implementation is where it gets hard.

Three things to do this week:

  1. Take the free scorecard. The Innitor compliance scorecard maps to Essential Eight controls and tells you roughly where you stand. Five minutes, no email required.

  2. Check your M365 licence. If you're on Business Premium, understand the gaps before assuming you're covered. The third-party patching gap and phishing-resistant MFA gap affect most SMEs.

  3. Start with MFA. If you haven't already, turn on MFA for every account in your organisation today. Even basic app-based MFA puts you ahead of most Australian businesses. Plan the phishing-resistant upgrade for the next quarter.

Not Sure Where Your Gaps Are?

The compliance scorecard covers the same eight controls mapped to maturity levels. Five minutes, no sign-up, results stay in your browser. If your score is under 70, it's worth getting a formal assessment. If it's under 40, don't wait.

Get posts like this in your inbox

Practical takes on engineering, compliance, and building products that work. No spam, unsubscribe anytime.

Robbie Cronin

Robbie Cronin

Fractional CTO helping non-technical founders make better technical decisions. Based in Melbourne.

More about Robbie

Related articles