Cybersecurity Maturity Assessment
Cybersecurity Maturity Assessment
This 'tool' is designed to assist in assessing the status of an organisation's cyber security posture against controls
objectives review. This considers the risk level defined for the organisation (Essential 8 Maturity Levels) and the
improvement strategy can be defined for the organisation to ensure an effective level of cyber security control is
This should be augmented by a programme of 'Continuous Assurance' to ensure the controls remain operational
Source Publications
The following publications have been used as a source of information to prepare this assessment:
Assessment against the ACSC Essential 8 criteria using the Maturity Levels (ML1 to ML3) - 2018
Adversaries who are more adaptive and much less reliant on public tools a
Maturity Level 3
sensitive area where compromise could have significant impact on both the
The following criteria for improvement are not used directly in this assessment tool; they appear in the ASD37 To
begiven to the objectives for priority outlined below.
Score
9 Immediate
7 to 8 Within 3 to 6 months
5 to 6 Within 12 Months
3 to 4 Within 24 Months
Changes
5/24/2024 Initial release
5/29/2024 Updated to allow filtering on columns
ber security posture against controls defined by the ACSC in their initial Essential 8 control
(Essential 8 Maturity Levels) and the maturity status of the implemented control. From this, an
ctive level of cyber security control is in place.
tion’s overall cyber security posture. The organisation should assess all cyber security controls
dditional controls would improve the overall security posture.
content to simply leverage commodity tradecraft that is widely available. The organisation is
hey would be targeted for information or financial gain.
tep-up in capability from the previous maturity level. The organisation is operating in a more
d have a significant impact on services.
d much less reliant on public tools and techniques. The organisation is operating in a highly
d have significant impact on both the organisation and national undertakings.
ent tool; they appear in the ASD37 Tool. However, consideration should
Office Addresses
Primary Contact
Contact Email
Contact Phone
Scope of Work
Environment Assessed
In conducting an assessment, assessors need to gather and review credible evidence to support conclusions they
draw on the effectiveness of controls. In general terms, the evidence used to determine the effectiveness of
controls will vary in quality depending on the approach taken. As such, when conducting an assessment, assessors
should seek to gather and use the highest quality evidence where reasonably practicable. This guide defines four
levels of evidence quality:
Excellent evidence: Testing a control with a simulated activity designed to confirm it is in place and effective
(e.g. attempting to run a test application to check application control rulesets).
Good evidence: Reviewing the configuration of a system through the system’s interface to determine whether it
should enforce an expected policy.
Fair evidence: Reviewing a copy of a system’s configuration (e.g. using reports or screenshots) to determine
whether it should enforce an expected policy.
Poor evidence: A policy or verbal statement of intent (e.g. sighting mention of controls within documentation or
controls being discussing during interviews with personnel administering or managing system security).
Assessment Rating
Recommendations
Remediation Priority
Rationale
Results
rmation
Essential 8 Assessment
ment, assessors need to gather and review credible evidence to support conclusions they
ss of controls. In general terms, the evidence used to determine the effectiveness of
ty depending on the approach taken. As such, when conducting an assessment, assessors
nd use the highest quality evidence where reasonably practicable. This guide defines four
y:
Testing a control with a simulated activity designed to confirm it is in place and effective
a test application to check application control rulesets).
ewing the configuration of a system through the system’s interface to determine whether it
ected policy.
For each of the Essential 8 elements an target objectives, assign a rating based on
those in the drop down lists. These will provide a compliance rating that will go
towards the overall Ess8 compliance rating for the Element. These will be rated
against the criteria outlined on the previous page.
NB: If the organisation is only intending to achieve ML-1 compliance, only the criteria
listed under ML-1 in each of the Elements needs to be completed. It would, however,
be beneficial to consider the other (ML-2 and ML-3) criteria for completeness.
A brief recommendation on how to address any failings should be given. These do not
need to be detailed but may reference an ongoing project or business case.
Define the priority for the remediation activity. Consideration should be given to:
Business benefit;
Addressing identified risks;
Ease of implementation.
If applicable, a rationale for the priority recommendation can be included. This will
give more context to decision makers.
The results show a summary of each of the Essential 8 Elements and there overall
status. Note, all criteria in the element need to be achieved or an alternative control
in place for the Element to be compliant.
All Elements in each of the Maturity Levels must be compliant to enable the next level
up to be deemed compliant. That is, all Elements of ML-1 must be compliant before
any Elements in ML-2 can be considered compliant.
Stewart Hayes
peopleconcepts@outlook.com.au
1) Application Control 0
2) Patch Applications 0
7) Multi-factor authentication 0
8) Regular backups 0
he previous Maturity Leve (ML) must have been met (green) before the higher Level can be achieved in each of the objective areas.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
There are weaknesses in the cyber There are weaknesses in the cyber
0 0
security posture. security posture.
of the objective areas.
Status
Essential 8 criteria
Criteria Definition
1) Application control ML-1
Application control is applied to all locations other than user profiles and
temporary folders used by operating systems, web browsers and email clients.
Cyber security incidents are reported to the Chief Information Security Officer,
or one of their delegates, as soon as possible after they occur or are discovered.
Cyber security incidents are reported to ASD as soon as possible after they occur
or are discovered.
Once a patch is released by a vendor, the An automated method of asset discovery is used at least fortnightly to support
patch should be applied in a timeframe the detection of assets for subsequent vulnerability scanning activities.
commensurate with an organisation’s
exposure to the security vulnerability and the
level of cyber threat the organisation is aiming
to protect themselves against. For example, A vulnerability scanner with an up-to-date vulnerability database is used for
once a security vulnerability in an internet- vulnerability scanning activities.
facing service is made public, it can be
expected that malicious code will be
developed by adversaries within 48 hours. In
fact, there are cases in which adversaries have A vulnerability scanner is used at least daily to identify missing patches or
developed malicious code within hours of updates for vulnerabilities in online services.
newly discovered security vulnerabilities
Office productivity suites, web browsers and their extensions, email clients, PDF
software, Adobe Flash Player, and security products that are no longer
supported by vendors are removed.
Applications other than office productivity suites, web browsers and their
extensions, email clients, PDF software, Adobe Flash Player, and security
products that are no longer supported by vendors are removed.
Microsoft Office macros are checked to ensure they are free of malicious code
before being digitally signed or placed within Trusted Locations.
Only privileged users responsible for checking that Microsoft Office macros are
free of malicious code can write to and modify content within Trusted Locations.
Office productivity suites are hardened using ASD and vendor hardening
guidance, with the most restrictive guidance taking precedence when conflicts
occur.
PDF software is hardened using ASD and vendor hardening guidance, with the
most restrictive guidance taking precedence when conflicts occur.
Cyber security events are analysed in a timely manner to identify cyber security
incidents.
Cyber security incidents are reported to the Chief Information Security Officer,
or one of their delegates, as soon as possible after they occur or are discovered.
Cyber security incidents are reported to ASD as soon as possible after they occur
or are discovered.
Event logs from workstations are analysed in a timely manner to detect cyber
security events.
Ess 8 Maturity Level
5) Restrict administrative privileges ML-1
Users with administrative privileges for Privileged users are assigned a dedicated privileged account to be used solely
operating systems and applications are able to for duties requiring privileged access.
make significant changes to their
configuration and operation, bypass critical
security settings and access sensitive
information. Domain administrators have Requests for privileged access to systems, applications and data repositories are
similar abilities for an entire network domain, validated when first requested.
which usually includes all of the workstations
and servers on the network
Privileged accounts (excluding those explicitly authorised to access online
services) are prevented from accessing the internet, email and web services.
Credentials for break glass accounts, local administrator accounts and service
accounts are long, unique, unpredictable and managed.
Privileged access events are centrally logged.
Cyber security events are analysed in a timely manner to identify cyber security
incidents.
Cyber security incidents are reported to the Chief Information Security Officer,
or one of their delegates, as soon as possible after they occur or are discovered.
Cyber security incidents are reported to ASD as soon as possible after they occur
or are discovered.
Event logs from workstations are analysed in a timely manner to detect cyber
security events.
Applying patches to applications and An automated method of asset discovery is used at least fortnightly to support
operating systems is critical to ensuring the the detection of assets for subsequent vulnerability scanning activities.
security of system. Once a patch is released
by a vendor, the patch should be applied in a
timeframe commensurate with an
organisation’s exposure to the security A vulnerability scanner with an up-to-date vulnerability database is used for
vulnerability and the level of cyber threat the vulnerability scanning activities.
organisation is aiming to protect themselves
against. For example, once a security
vulnerability in an internet-facing service is
made public, it can be expected that malicious A vulnerability scanner is used at least daily to identify missing patches or
code will be developed by adversaries within updates for vulnerabilities in operating systems of internet-facing servers and
internet-facing network devices.
48 hours.
The latest release, or the previous release, of operating systems are used.
Multi-factor authentication is one of the most Multi-factor authentication is used to authenticate users to their organisation’s
effective controls an organisation can online services that process, store or communicate their organisation’s sensitive
implement to prevent malicious actors from data.
gaining access to a system, online service or
application. When implemented correctly,
multi-factor authentication can make it Multi-factor authentication is used to authenticate users to third-party online
significantly more difficult for malicious actors services that process, store or communicate their organisation’s sensitive data.
to steal and abuse legitimate credentials as it
is not as susceptible to brute force attacks that
target traditional single-factor authentication
methods based on memorised secrets (e.g. Multi-factor authentication (where available) is used to authenticate users to
personal identification numbers [PINs], third-party online services that process, store or communicate their
organisation’s non-sensitive data.
passwords and passphrases).
Cyber security events are analysed in a timely manner to identify cyber security
incidents.
Cyber security incidents are reported to the Chief Information Security Officer,
or one of their delegates, as soon as possible after they occur or are discovered.
Cyber security incidents are reported to ASD as soon as possible after they occur
or are discovered.
Event logs from workstations are analysed in a timely manner to detect cyber
security events.
A backup is a digital copy of your important Backups of data, applications and settings are performed and retained in
data, such as photos, documents, and financial accordance with business criticality and business continuity requirements.
records. If your data is lost, you can use your
backup to restore it. Backups can be stored
using cloud storage or on physical media (such
as external hard drives). The data backed up Backups of data, applications and settings are synchronised to enable
should be determined by how important it is restoration to a common point in time.
to the organisation and the impact it would
have if it was lost. Note; this is likely to
increase over time.
Backups of data, applications and settings are retained in a secure and resilient
manner.
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
0
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
Not applicable: The control does not apply to the system or environment.
-
-
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
Not assessed: The control has not yet been assessed.
0
Findings/Recommendations Priority
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
<Select> <Select>
Rationale
Service accounts are now included as Privileged Accounts