Simple, stress-free Essential Eight compliance from just $99 per month

Essential Eight Compliance
The Essential Eight is a set of cyber security strategies designed to mitigate cyber threats and protect information systems. It focuses on practical measures, including application whitelisting, patching applications, restricting administrative privileges, and more.
de.iterate streamlines Essential Eight compliance, ensuring it’s simple and stress-free.
The de.iterate platform encompasses policies, employee training modules, a risk register, an asset register, a compliance calendar, and reporting tools.
What are the Essential Eight?
With cyberthreats posing an increasing risk to Australian businesses, the Australian Cyber Security Centre (ASCS) has developed a set of mitigation strategies, as a framework for organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act. The key strategies are known as the Essential Eight.
The Essential Eight are designed to protect Microsoft Windows-based internet-connected networks – although they may also be applied to cloud services and other operating systems. The ACSC recommends the Essential Eight as a baseline to build cyber resilience and minimise the risk of systems being compromised.


Why the Essential Eight?
Compliance with the Essential Eight is critical for safeguarding against cyber threats and vulnerabilities. This set of strategies is not just a defensive measure but a proactive approach to building a resilient cyber security posture. It addresses the most common attack vectors, reducing the likelihood of successful cyber intrusions and data breaches.
Adhering to the Essential Eight demonstrates a commitment to best practices in cyber security, enhancing trust among customers, partners, and stakeholders. It helps you ensure long-term security and business continuity.

Simple, stress-free Essential Eight compliance with de.iterate
Benefits of Essential Eight Compliance

For You (and Your Business)
- Safeguards your intellectual property (IP), brand and reputation
- Enhances your credibility and reputation to win new and retain existing clients
- Improves efficiency by enhancing internal processes to save time and money
- Avoids the costs associated with remedial action due to breaches or incidents

For Your Team
- Instils trust and confidence in company sustainability and long-term viability
- Provides clear guidelines so employees understand their role in data protection
- Improves person development, with training in data security extending beyond the workplace to employees’ personal lives

For Your Customers
- Enhances trust and assurance of security and confidentiality of their data, fostering stronger relationships
- Lowers the risk of costly breaches, mitigating potential financial impacts on customers
- Streamlines supplier onboarding for your customers, reducing costs and time
Frequently Asked Questions
What is the Essential Eight?
With cyberthreats posing an increasing risk to Australian businesses, the Australian Cyber Security Centre (ASCS) has developed a set of mitigation strategies, as a framework for organisations to protect themselves against possible cyberattacks and protect sensitive information in line with the Privacy Act. The key strategies are known as the Essential Eight.
Which Essential Eight maturity level does my business need?
The Essential Eight maturity model is used to determine an organisation’s existing security status, as well as identify and plan for a target maturity level suitable for their operating environment. The business can then progressively implement each strategy, achieving the same maturity level across all of the Essential Eight before moving to the next maturity level.
Four maturity levels have been defined, based on an organisation’s ability to mitigate security risks associated with increasingly sophisticated tools, techniques, and procedures used by cybercriminals.
How do I implement the Essential Eight mitigation strategies?
You’re in luck, de.iterate will provide you with all the practical items you need to implement to meet the standard, and a suite of tasks to help you demonstrate you have implemented them too. If you have the IT talent in-house to do this yourself you will find it easy, if not we have a list of IT partners who are on standby to help.
How long does it take to implement the Essential Eight and ensure compliance?
The Essential Eight implementation process can take anywhere from a few hours to a few weeks, depending on your pace. Once you’re onboard in de.iterate, you’ll have all the tools and information you need to get certified in the fastest, easily way possible.
Can I be Essential Eight certified?
If we could, we would. But unfortunately no such certification exists. Don’t worry though, using de.iterate effectively demonstrates to your customers, the privacy regulator and your insurers that you take security seriously and have considered all the elements of data security and data privacy.
How much does Essential Eight compliance cost?
de.iterate has price plans available to suit just about any size business. Our plans start from just $99 per month. We can help you work out which plan is right for you.Talk to one of the team today about your options at hello@deiterate.com.
Our pricing
Our simple monthly subscription model is built to be affordable for everyone from small start-ups, through to huge enterprises.
STARTER
The essential first step into data privacy and cyber security. Ideal for businesses seeking foundational compliance tools.
- Access to the Privacy Act and Essential Eight frameworks only
- Templated controls
- Dynamic privacy policy
- 1 x user
- 1 x domain name
- Compliance calendar
- Evidence store
- Compliance reports
- AI-powered assistant
- Admin panel
- Microsoft and Google SSO
*Certification audit fees are not included in monthly subscription. Contact us for details.
BASIC
The starting line for serious data and cyber defence. Perfect for start ups and small companies embarking on a robust compliance program.
- 1 x compliance framework
- BYO policies
- BYO assurance program
- 1 x user
- 1 x domain name
- Risk register
- Asset register
- Incident register
- Compliance calendar
- Evidence store
- ISMS scope and manual
- Compliance reports
- AI-powered assistant
- Admin panel
- Microsoft and Google SSO
*Certification audit fees are not included in monthly subscription. Contact us for details.
COMPLETE
Our most popular package, offering expansive tools and templates for businesses ready to boost their compliance.
Everything in Basic, plus…
- Access to all compliance frameworks
- Templated policies
- Automated assurance program with itemised tasks
- Unlimited users
- Library of ready-to-use controls
- Templated key documents
- Dedicated auditor portal
- Dynamic privacy policy
- Customised trust centre
- Smart policies for employee training
- Automated onboarding for easy set-up
*Certification audit fees are not included in monthly subscription. Contact us for details.
