Essential Eight Maturity Levels Explained: What ML1, ML2, and ML3 Actually Require (2026)
A practical breakdown of Essential Eight maturity levels for Australian business owners. What each level requires, what it costs, which controls to tackle first, and whether your Microsoft 365 licence already covers it.
You've been told your business needs to meet "Essential Eight Maturity Level 2." You Googled it. You found a wall of government PDFs written for IT security professionals.
This guide is the plain-English version. What each maturity level actually requires, what it costs, which controls are hardest, and what your Microsoft 365 licence already covers.
The Maturity Levels at a Glance
The Essential Eight framework has four maturity levels: 0 through 3. Each level builds on the one below it. The higher the level, the more rigorous the requirements.
Maturity Level Overview
| Feature | Level 1 | Level 2 |
|---|---|---|
| Designed for | Basic cyber hygiene | Most Australian businesses |
| MFA requirement | Any MFA (app, SMS, hardware) | Phishing-resistant only (security keys, Windows Hello) |
| Patching deadline | Internet-facing: 2 weeks. Critical: 48 hours | All systems: 2 weeks. Critical: 48 hours |
| Application control | Basic allowlisting (AppLocker or equivalent) | Full allowlisting via WDAC, Microsoft's blocklist, annual review |
| Admin privileges | Separate admin accounts, no web/email | Separate admin workstations, enhanced logging |
| Backups | Daily, tested, offsite | Privileged access restricted, tested quarterly |
| Logging | Basic event logging | Centralised collection and monitoring |
| Cost (50-person SME) | $15,000-$35,000 | $20,000-$45,000 on top of ML1 |
| Timeline | 3-4 months | 4-6 months beyond ML1 |
Level 0 means you haven't started. No meaningful controls in place.
Level 1 is the basics. MFA turned on, high-risk apps patched within two weeks, macros blocked from the internet. It stops opportunistic attacks.
Level 2 is where most businesses should aim. Phishing-resistant MFA, faster patching, full application control, centralised logging. It's what cyber insurers expect and what the Protective Security Policy Framework (PSPF) requires for Commonwealth entities.
Level 3 is for organisations facing nation-state level threats. Defence contractors, critical infrastructure, intelligence agencies. Most private businesses don't need it and shouldn't pay for it.
What Changed in November 2023
The ASD published a major update to the maturity model in November 2023. It didn't add new controls, but it raised the requirements significantly. If you're reading older guides, they're likely out of date.
The three biggest changes:
MFA got much stricter at ML2. Before the update, any MFA met ML2. After the update, ML2 requires phishing-resistant MFA only. That means FIDO2 security keys, Windows Hello for Business, or smart cards. SMS codes no longer meet any maturity level (they don't satisfy the "something you have" requirement since SIMs can be swapped). Authenticator app push notifications were downgraded to ML1. This was the most disruptive change for most organisations.
Patching deadlines rebalanced. Internet-facing applications now need patching within two weeks at ML2 (tightened from one month). Critical vulnerabilities need patching within 48 hours across all levels. However, OS patching for workstations and non-internet-facing systems was relaxed from two weeks to one month at ML2, shifting focus to higher-risk systems.
Application control moved earlier. Microsoft's recommended application blocklist is now required at ML2, moved down from ML3. This was a shift targeting "living off the land" attacks where attackers use legitimate Windows tools.
These changes are why government compliance rates dropped from 25% to 15% in 2024 (before recovering to 22% in 2025). The controls didn't get worse. The measurement got more honest.
Control by Control: What Each Level Requires
1. Application Control
This is the control that trips up most organisations. It decides which software is allowed to run on your systems.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Tool | AppLocker or equivalent | WDAC (Windows Defender Application Control) | WDAC with advanced config |
| Approach | Basic allowlisting of approved executables | Microsoft's recommended blocklist, full allowlisting with vendor hardening guidance | Organisation-wide enforcement, no exceptions |
| Review | Best practice (not formally required) | Annual or more frequent | Continuous monitoring via SIEM |
| Logging | Allowed/blocked events logged centrally | All events monitored centrally | Integrated into SIEM for analysis |
The hard part: WDAC at ML2 requires deep Windows security knowledge. Misconfigured policies can render devices unbootable. Expect 8-12 weeks for a 50-person business, including an audit mode discovery phase where you identify every legitimate application before enforcing anything.
The shortcut that doesn't work: Windows Defender SmartScreen (reputation-based blocking) does not meet ML2. You need explicit application allowlists.
2. Patch Applications
How fast you patch third-party software: browsers, PDF readers, Office, email clients.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Critical vulnerabilities | 48 hours | 48 hours | 48 hours |
| Internet-facing apps | 2 weeks | 2 weeks | 48 hours (all apps) |
| Other apps | Not explicitly required | 1 month | Running latest or previous version |
| Vulnerability scanning | Weekly (high-risk apps) | Weekly (high-risk) + fortnightly (other apps) | Weekly + continuous |
The hard part: Microsoft Intune patches Microsoft products natively and has limited third-party patching via Winget integration, but it's not comprehensive enough for ML2 compliance across apps like Chrome, Adobe, or Zoom. Most organisations still need a dedicated patch management tool (Patch My PC, ManageEngine, Automox). Budget $5,000-$10,000 per year.
Chrome alone releases security patches every 1-2 weeks. Manual patching is not viable at ML2 cadence.
3. Configure Microsoft Office Macros
How macros are handled in Word, Excel, PowerPoint.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Internet macros | Blocked | Blocked | Blocked |
| Internal macros | Disabled unless business need | Only from signed, trusted locations | Organisational approval + annual audit |
| Enforcement | Users can't change settings | Windows Defender ASR rules block API calls | Trusted publisher list reviewed annually |
| Logging | Basic | Allowed and blocked executions logged | Centralised + analysed |
The hard part: Many businesses still rely on Excel macros for internal reporting, finance, or operations. You'll need to either sign all macros with a code-signing certificate, migrate to modern tools (Power BI, Python), or accept exceptions that reduce your security posture.
Most SMEs go with: macros blocked everywhere except a restricted Finance folder, with all macros in that folder signed by IT.
4. User Application Hardening
Locking down risky features in browsers, email clients, and PDF viewers.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Browser features | Flash, Java, and web ads blocked from internet | Untrusted add-ins disabled, enhanced hardening | PowerShell constrained language mode |
| Office features | Basic | ASR rules block child processes and code injection | Full enforcement, no exceptions |
| PDF viewers | Basic hardening | Block PDF from creating child processes | Centrally enforced |
The hard part at ML3: PowerShell constrained language mode restricts legitimate admin scripts. You'll need a process for signing approved scripts and exceptions. At ML2, the main effort is deploying browser and Office hardening policies via Group Policy or Intune.
5. Restrict Administrative Privileges
Who has admin access and how they use it.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Account separation | Separate admin and standard accounts | Separate admin workstations | Secure Admin Workstations (SAWs) |
| Internet/email | Admin accounts can't browse web or use email | Enhanced credential management | Full hardware isolation |
| MFA | Required for admin accounts | Required with logging | Phishing-resistant, session-limited |
| Logging | Basic | Enhanced, centralised | SIEM integration |
The hard part: People resist using two accounts. Admins want to check email from their admin session. That's exactly the behaviour this control prevents. Expect 8-12 weeks of enforcement, including pushback.
At ML3, Secure Admin Workstations are dedicated hardened devices used only for admin tasks. They add $2,000-$5,000 per workstation for hardware and management.
6. Patch Operating Systems
How fast you patch Windows, macOS, and Linux.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Internet-facing | 2 weeks (48 hours if exploit exists) | 2 weeks (48 hours if exploit exists) | 48 hours for everything |
| Other systems | 1 month | 1 month | Running latest or previous version |
| Vulnerability scanning | Fortnightly | Weekly | Weekly + continuous |
| End-of-life systems | Should be replaced | Must be replaced | No exceptions |
The reality: Microsoft ended support for Windows 10 in October 2025. If you still have Windows 10 machines, they're receiving no security updates and they fail this control at every maturity level. Budget for hardware upgrades if needed.
Intune setup: Create update rings with 0-day deferral for security patches, auto-restart at 2am, and a 14-day deadline for forced installation if users haven't rebooted.
7. Multi-Factor Authentication
The control that changed the most in November 2023.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Type required | "Something you have" + "something you know" | Phishing-resistant only | Phishing-resistant, no exceptions |
| What qualifies | Authenticator apps, hardware tokens | FIDO2 security keys, Windows Hello for Business, smart cards | Same as ML2, universally enforced |
| Coverage | Internet-facing services | All systems including workstations | All systems, all users |
The November 2023 update requires ML1 MFA to include "something you have" (physical token or device) plus "something you know" (password/PIN). SMS-only authentication no longer qualifies at any maturity level. If your MFA is just SMS codes, you're at Level 0.
Cost of phishing-resistant MFA: FIDO2 security keys (YubiKey, Titan) cost $30-$80 each. For 50 users plus backup keys, budget $3,000-$8,000 in hardware. Windows Hello for Business is free if your devices have TPM 2.0 and requires Intune for management (works on both Windows 10 and 11).
For SMEs, Windows Hello for Business is the most practical path to ML2. It uses your existing devices (if they have TPM 2.0 hardware), integrates with Intune, and users are already familiar with biometric authentication. Check your devices with the Get-Tpm PowerShell command.
8. Regular Backups
Your last line of defence when everything else fails.
| ML1 | ML2 | ML3 | |
|---|---|---|---|
| Frequency | Per business continuity requirements (daily recommended) | Per business continuity requirements (daily recommended) | Daily for critical assets |
| Retention | Per business continuity requirements (90 days recommended) | Per business continuity requirements | 3+ months |
| Testing | Tested as part of disaster recovery exercises | Regular restore testing (quarterly recommended) | Tested as part of disaster recovery exercises |
| Access control | Stored separately | Privileged access restricted | Only backup admins + break-glass account |
| Immutability | Recommended | Strongly recommended | Required |
The 3-2-1 rule: Three copies of your data, on two different storage types, with one copy offsite. For ransomware protection, add: one copy immutable (can't be modified or deleted even by admin), and zero unscheduled access.
The hard part: Quarterly restore testing. Not checking that backups are running. Actually restoring data and timing how long it takes. Most businesses set up backups and never test them until something goes wrong.
What Your Microsoft 365 Licence Covers
Most Australian SMEs already have Microsoft 365. The question is whether your licence tier covers what you need.
Microsoft 365 Coverage for Essential Eight ML2
| Feature | Business Premium (~A$30/user/mo) | E5 (~A$87/user/mo) |
|---|---|---|
| Basic MFA | Yes (Entra ID P1) | Yes |
| Phishing-resistant MFA enforcement | Yes (via Conditional Access P1 authentication strength) | Yes (plus risk-based policies with P2) |
| Intune device management | Yes | Yes |
| Windows Update management | Yes | Yes |
| Third-party app patching | No (needs Patch My PC or similar) | No (same gap) |
| Defender for Endpoint (EDR) | Basic (Defender for Business) | Full (Plan 2) |
| Centralised logging / SIEM | No | Sentinel available separately (E5 gets data ingestion grant) |
| Macro lockdown (full ASR rules) | Partial | Yes |
| Application control (WDAC) | Basic via Intune | Full support |
The honest answer for most SMEs: Business Premium gets you further than most people think. It includes Conditional Access (P1) for phishing-resistant MFA enforcement and Intune for device management. ML2 requires either E5 or Business Premium plus the E5 Security add-on (~A$12/user/month extra) for advanced EDR and risk-based policies. Both options still leave a gap for third-party application patching, and Sentinel (SIEM) is a separate Azure service regardless of licence tier.
Neither Business Premium nor E5 includes third-party application patching. Chrome, Adobe, Zoom, Slack, and every other non-Microsoft app needs a separate tool. This is the most common gap in Essential Eight implementations that rely entirely on the Microsoft stack. Tools like Patch My PC or ManageEngine integrate with Intune and cost $5,000-$10,000 per year.
What It Costs
Real estimates for a 50-person Australian SME. These are industry ranges, not exact quotes. Your costs will vary based on environment complexity, existing tools, and how many gaps you have.
Cost to Reach Each Maturity Level (50-person SME)
Biggest Cost Drivers
-
Phishing-resistant MFA hardware. Security keys at $30-$80 per user, plus backup keys. Windows Hello for Business is free if your hardware supports TPM 2.0 (works on both Windows 10 and 11).
-
Endpoint Detection and Response (EDR). $100-$300 per device annually. Required for proper threat detection and logging at ML2.
-
SIEM / centralised logging. $5,000-$15,000 setup plus $200-$500 per month ongoing. Required at ML2 for centralised event collection and analysis.
-
Third-party patch management. $5,000-$10,000 per year for tools like Patch My PC, ManageEngine, or Automox.
-
Professional services. Implementation consulting runs $150-$250 per hour. Budget 100-300 hours depending on scope.
Ongoing Annual Costs
ML2 isn't a one-time expense. Budget $15,000-$25,000 per year for:
- EDR and SIEM licensing
- Patch management tooling
- Quarterly backup testing
- Annual application control review
- Reassessment (typically 40-60% of the initial assessment cost)
Which Controls to Tackle First
Not all controls are equally hard or equally impactful. This is the implementation order that maximises risk reduction while building momentum.
Recommended Implementation Sequence
Phase 1: The Quick Wins (Weeks 1-8)
Multi-factor authentication. Highest impact per dollar spent. Start with authenticator apps for immediate protection, then plan the phishing-resistant hardware rollout for ML2. Two weeks to deploy across the organisation.
Macro lockdown. Pure policy change, no hardware needed. Deploy "disable all except digitally signed" via Group Policy. One week. Immediately stops the most common ransomware delivery method.
OS patching. Configure Windows Update for Business through Intune. Set security patches to auto-install with 0-day deferral. One week of setup, then it runs itself.
These three controls alone would have prevented or limited most major Australian breaches in the last three years.
Phase 2: The Backbone (Weeks 8-16)
Restrict admin privileges. Create separate admin accounts. Block admin accounts from web browsing and email. Four to six weeks including training and pushback management.
Patch applications. Deploy third-party patch management. Set up vulnerability scanning. Three to four weeks for setup, then ongoing.
Application control (audit mode). Start WDAC in audit mode to discover all legitimate applications. No enforcement yet. Four to six weeks of discovery.
Phase 3: Defence in Depth (Weeks 16-24)
User application hardening. Browser lockdown, PDF restrictions, Office ASR rules. Three to four weeks.
Backup automation. Deploy backup solution with immutable storage, offsite copy, and quarterly testing schedule. Two to three weeks of setup, then ongoing discipline.
Phase 4: Complete ML2 (Weeks 20-28)
Application control (enforcement). After the audit phase, gradually enforce WDAC policies. Expect some breakage. Four to six weeks of gradual rollout.
Full phishing-resistant MFA. Complete the hardware rollout (security keys or Windows Hello for Business) across all users and systems.
The Hardest Parts (What Actually Stalls Projects)
Application Control (WDAC)
The longest implementation timeline. Requires identifying every legitimate application in your environment (2-4 weeks in audit mode), testing enforcement without breaking anything (4-6 weeks), and then gradually rolling out. Misconfigured policies can make devices unbootable. This is where most businesses bring in outside help.
Admin Privilege Separation
Technically simple. Organisationally hard. Admins don't want to switch between accounts. IT support staff need elevated access for routine tasks like printer drivers. Expect resistance and plan for 8-12 weeks of change management.
Third-Party Patching
The operational burden never goes away. Chrome patches every 1-2 weeks. Adobe has multiple products with different release cycles. Legacy applications stop receiving updates entirely, and you need to decide: retire them or accept the risk and document the exception.
Backup Testing Discipline
Setting up backups is easy. Testing them quarterly is where organisations fail. Restore tests take 2-4 hours each. Recovery documentation goes stale. Most businesses discover their backup gaps during an actual incident, which is the worst time to discover them.
Legacy Systems: The Reality
Every business has them. The 15-year-old accounting package. The manufacturing software from 2008. The Access database that runs a critical process.
These systems often can't support modern controls. They need macro access. They can't handle application control policies. They run on unsupported operating systems.
The approach that works:
- Isolate the system. Dedicated workstation or network segment. No internet access. Only users who need it.
- Compensating controls. Enhanced monitoring, restricted access, network-level detection.
- Document the exception. Risk register entry with business justification and planned retirement date.
- Plan the migration. Even if it's 12-24 months away, having a timeline matters for your assessment report.
An assessor won't fail you for having a documented, compensated legacy exception. They will fail you for pretending it doesn't exist.
Do You Need ML2 or Will ML1 Do?
Do you have cyber insurance or government contracts?
For most Australian SMEs handling customer data, working with government, or carrying cyber insurance, ML2 is the target. ML1 is a reasonable interim step if you're starting from zero and need to show progress quickly.
ML3 is almost never the right target for a private business. If you're not sure whether you need ML3, you don't.
Getting Started
The gap between "knowing what ML2 requires" and "actually being compliant" is where most businesses get stuck. The framework is well documented. The implementation is where it gets hard.
Three things to do this week:
-
Take the free scorecard. The Innitor compliance scorecard maps to Essential Eight controls and tells you roughly where you stand. Five minutes, no email required.
-
Check your M365 licence. If you're on Business Premium, understand the gaps before assuming you're covered. The third-party patching gap and phishing-resistant MFA gap affect most SMEs.
-
Start with MFA. If you haven't already, turn on MFA for every account in your organisation today. Even basic app-based MFA puts you ahead of most Australian businesses. Plan the phishing-resistant upgrade for the next quarter.
The compliance scorecard covers the same eight controls mapped to maturity levels. Five minutes, no sign-up, results stay in your browser. If your score is under 70, it's worth getting a formal assessment. If it's under 40, don't wait.
Get posts like this in your inbox
Practical takes on engineering, compliance, and building products that work. No spam, unsubscribe anytime.

Robbie Cronin
Fractional CTO helping non-technical founders make better technical decisions. Based in Melbourne.
More about RobbieRelated articles
What Is the Essential Eight? The Complete Australian Guide (2026)
The Essential Eight explained for business owners, not IT departments. What the eight controls actually do, real breaches that prove why they matter, and how to figure out what your business needs.
essential-eightPatch Management for Essential Eight: Timelines, Tools, and What Auditors Actually Check
The Essential Eight patching requirements are aggressive by design. 48 hours for critical vulnerabilities. Two weeks for internet-facing apps. Here's how to actually meet them, which tools work, and where most Australian businesses fail.
essential-eightPhishing-Resistant MFA: What It Means and Why Essential Eight ML2 Demands It
SMS codes and authenticator apps no longer meet Essential Eight Maturity Level 2. Here's what phishing-resistant MFA actually is, which methods qualify, and how to roll it out with FIDO2 security keys, Windows Hello for Business, or passkeys.