Essential Eight

Simple, stress-free Essential Eight compliance from just $99 per month

Essential Eight Compliance

The Essential Eight is a set of cyber security strategies designed to mitigate cyber threats and protect information systems. It focuses on practical measures, including application whitelisting, patching applications, restricting administrative privileges, and more.

de.iterate streamlines Essential Eight compliance, ensuring it’s simple and stress-free.

The de.iterate platform encompasses policies, employee training modules, a risk register, an asset register, a compliance calendar, and reporting tools.

What are the Essential Eight?

With cyberthreats posing an increasing risk to Australian businesses, the Australian Cyber Security Centre (ASCS) has developed a set of mitigation strategies, as a framework for organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act. The key strategies are known as the Essential Eight.

The Essential Eight are designed to protect Microsoft Windows-based internet-connected networks – although they may also be applied to cloud services and other operating systems. The ACSC recommends the Essential Eight as a baseline to build cyber resilience and minimise the risk of systems being compromised.

Why the Essential Eight?

Compliance with the Essential Eight is critical for safeguarding against cyber threats and vulnerabilities. This set of strategies is not just a defensive measure but a proactive approach to building a resilient cyber security posture. It addresses the most common attack vectors, reducing the likelihood of successful cyber intrusions and data breaches.

Adhering to the Essential Eight demonstrates a commitment to best practices in cyber security, enhancing trust among customers, partners, and stakeholders. It helps you ensure long-term security and business continuity.

Frequently Asked Questions

What is the Essential Eight?

With cyberthreats posing an increasing risk to Australian businesses, the Australian Cyber Security Centre (ASCS) has developed a set of mitigation strategies, as a framework for organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act. The key strategies are known as the Essential Eight.


Which Essential Eight maturity level does my business need?

The Essential Eight maturity model is used to determine an organisation’s existing security status, as well as identify and plan for a target maturity level suitable for their operating environment. The business can then progressively implement each strategy, achieving the same maturity level across all of the Essential Eight before moving to the next maturity level. 

Four maturity levels have been defined, based on an organisation’s ability to mitigate security risks associated with increasingly sophisticated tools, techniques, and procedures used by cybercriminals.


How do I implement the Essential Eight mitigation strategies?

You’re in luck, de.iterate will provide you with all the practical items you need to implement to meet the standard, and a suite of tasks to help you demonstrate you have implemented them too. If you have the IT talent in-house to do this yourself you will find it easy, if not we have a list of IT partners who are on standby to help.


How long does it take to implement the Essential Eight and ensure compliance?

The Essential Eight implementation process can take anywhere from a few hours to a few weeks, depending on your pace. Once you’re onboard in de.iterate, you’ll have all the tools and information you need to get certified in the fastest, easily way possible.


Can I be Essential Eight certified?

If we could, we would. But unfortunately no such certification exists. Don’t worry though, using de.iterate effectively demonstrates to your customers, the privacy regulator and your insurers that you take security seriously and have considered all the elements of data security and data privacy.


How much does Essential Eight compliance cost?

de.iterate has price plans available to suit just about any size business. Our plans start from just $99 per month. We can help you work out which plan is right for you.Talk to one of the team today about your options at hello@deiterate.com.

Our pricing

Our simple monthly subscription model is built to be affordable for everyone from small start-ups, through to huge enterprises.

STARTER

The essential first step into data privacy and cyber security. Ideal for businesses seeking foundational compliance tools.


  • Access to the Privacy Act and Essential Eight frameworks only
  • Templated controls
  • Dynamic privacy policy
  • 1 x user
  • 1 x domain name
  • Compliance calendar
  • Evidence store
  • Compliance reports
  • AI-powered assistant
  • Admin panel
  • Microsoft and Google SSO

*Certification audit fees are not included in monthly subscription. Contact us for details.

BASIC

The starting line for serious data and cyber defence. Perfect for start ups and small companies embarking on a robust compliance program.


  • 1 x compliance framework
  • BYO policies
  • BYO assurance program
  • 1 x user
  • 1 x domain name
  • Risk register
  • Asset register
  • Incident register
  • Compliance calendar
  • Evidence store
  • ISMS scope and manual
  • Compliance reports
  • AI-powered assistant
  • Admin panel
  • Microsoft and Google SSO

*Certification audit fees are not included in monthly subscription. Contact us for details.