Essential Eight Checklist

Strengthen your cyber resilience with a practical, step-by-step Essential Eight Checklist based on the Australian Cyber Security Centre (ACSC) framework. This checklist helps organisations identify gaps across key security controls, reduce the risk of cyberattacks, and improve recovery capabilities in the event of an incident. With clear guidance and prioritised actions, businesses can confidently enhance their maturity level and protect critical systems from common exploitation techniques.

Application Control

Ensure only trusted and approved applications can run on your systems to prevent unknown or malicious programs from executing.

Patch Applications

Keep software, browsers, and plugins updated to close vulnerabilities and block attackers from exploiting outdated components.

Configure Microsoft Office Macros

Restrict or disable macros to limit the risk of malicious scripts being loaded through phishing attachments or unsafe documents.

User Application Hardening

Turn off unnecessary features like Flash, ads, or browser plugins to reduce exposure to drive-by threats and malicious content.

Restrict Administrative Privileges

Limit admin-level access to authorised staff only, reducing the impact of compromised credentials and improving control of sensitive settings.

Patch Operating Systems

Regularly update and maintain OS versions to minimise weaknesses in core infrastructure and maintain compatibility with modern security tools.

Multi-Factor Authentication (MFA)

Add additional verification steps for account logins to prevent unauthorised access, even if passwords are stolen.

Regular Backups

Implement scheduled backups of critical data, test recovery processes, and store copies offline to ensure business continuity after an attack.

What This Checklist Helps You Achieve

✔ Reduced likelihood of ransomware and malware incidents
✔ Stronger access control and user accountability
✔ Improved threat detection and response capability
✔ Confidence in data recovery after disruption

Who Should Use It

  • Small and medium businesses
  • Government organisations
  • Healthcare and education providers
  • Any organisation protecting sensitive information

Outcome

By following the Essential Eight, you can significantly increase your cyber maturity, reduce attack surfaces, and elevate your overall security posture — without overwhelming complexity.

Shopping Cart