Skip to content
BISTEC IT Services
Definition

What is Essential Eight Maturity Level 2 (ML2)?

Essential Eight Maturity Level 2 (ML2) is the Australian Cyber Security Centre's (ACSC) cybersecurity baseline for organisations facing targeted threats from adversaries with moderate capability. Published by ACSC and maintained as part of the Information Security Manual, the Essential Eight comprises eight mitigation strategies — application control, patching applications, configuring Microsoft Office macros, user-application hardening, restricting administrative privileges, patching operating systems, multi-factor authentication, and regular backups. Each control is rated across three maturity levels (ML1, ML2, ML3). ML2 is the level most APRA-regulated and government-adjacent mid-market firms target. ML2 evidence is a common APRA expectation alongside CPS 234.
Last reviewed: May 2026

Essential Eight Maturity Level 2 (ML2)

Essential Eight ML2 alignment for mid-market firms.

Documented uplift roadmap. ML2 to ML3 ratchet. Senior named delivery.

ML2 evidence is designed to drop into a CPS 234 §13 capability section. We do not separate them.

The problem ML2 actually solves

Most mid-market FS firms sit at ML1 with two or three controls leaning toward ML2. APRA, internal audit and cyber-insurance underwriters all increasingly expect ML2 across the eight. The work is rarely a single project — it is a 9-to-18-month uplift programme touching identity, endpoint, server, Microsoft 365, network and backup posture.

The three patterns that fail most ML1-to-ML2 audits in mid-market FS

  • Application controlEndpoint allow-listing has not moved past pilot. Workstations are unmanaged for ML2 purposes.
  • Restrict admin privilegesDomain admin accounts are still in daily use. Privileged Access Management has not been deployed or has been deployed but bypassed.
  • Multi-factor authenticationMFA covers cloud SaaS but not legacy on-premises systems, VPN-without-MFA pockets remain, and break-glass accounts have no documented control.

A documented ML2 uplift programme that hits these three first closes 60% of the audit gap.

ML1 vs ML2 vs ML3

We work the eight controls to ML2 specifics, with documented per-control adoption notes and a 12-month uplift roadmap. The roadmap is shared with your CISO and Head of Risk monthly.

ControlML1 (baseline)ML2 (target)ML3 (advanced)
Application controlApp control on workstations for executable filesApp control on workstations and servers for executables, scripts, installers, libraries and HTML appsApp control with Microsoft-signed driver enforcement and validated rule sets
Patch applicationsInternet-facing apps patched within 2 weeksInternet-facing within 2 weeks; office productivity, browsers, email, PDF and security products within 1 monthAll apps within 48 hours for critical, 2 weeks for non-critical, with vulnerability scanning
Configure MS Office macrosMacros disabled for users without business needMacros from the internet blocked; macro execution logged; antivirus scans macrosOnly signed macros from trusted publishers permitted; full macro telemetry
User application hardeningWeb browsers do not process Java or FlashBrowsers, Office and PDF readers hardened to ASD configuration; ads, IE11, .NET 3.5 disabledAll hardening from ML2 plus Microsoft Edge mode enforcement and PowerShell command-line logging
Restrict admin privilegesPrivileged accounts cannot access internet, email or web servicesPrivileged access requested and validated; privileged accounts separate from standard accounts; PAM deployedJust-in-time privileged access; jump servers; full session recording
Patch operating systemsInternet-facing OS patched within 2 weeksInternet-facing within 2 weeks; workstations and non-internet-facing servers within 1 monthAll OS within 48 hours for critical; vulnerability scanning weekly
Multi-factor authenticationMFA for internet-facing services with sensitive dataMFA for all internet-facing services, privileged users, and important data repositories; phishing-resistant where availableMFA phishing-resistant across the board (FIDO2, smart cards); break-glass accounts MFA'd
Regular backupsBackups of important data and configs; daily-coordinated restore tested annuallyBackups daily, retention adequate, restoration tested quarterly, privileged accounts cannot modify or deleteBackups with immutability, off-network copy, tested monthly with documented RTOs/RPOs

Per-control BISTEC delivery

  1. 01

    Application control

    We deploy and operate Microsoft Defender Application Control or third-party allow-listing across workstations and servers, with documented exception process and quarterly review.

  2. 02

    Patch applications

    Co-managed patching across the application stack, with monthly patch evidence to your CISO and quarterly attestation to your Head of Risk.

  3. 03

    MS Office macros

    Group Policy + Defender for Office 365 configuration; macro telemetry into the SIEM.

  4. 04

    User application hardening

    Standard Operating Environment (SOE) hardened to ACSC configuration baselines; documented variance log.

  5. 05

    Restrict admin privileges

    PAM deployment (CyberArk, Delinea or BeyondTrust depending on stack); privileged-account inventory; quarterly access review.

  6. 06

    Patch operating systems

    Server and workstation patching at ML2 cadence; documented patching SLA; reporting into the CPS 234 §13 capability evidence pack.

  7. 07

    Multi-factor authentication

    MFA across all internet-facing services and privileged users; phishing-resistant MFA where the platform supports it; break-glass account control documented.

  8. 08

    Regular backups

    Daily backups with immutability; quarterly restoration test with named participants; documented RTO/RPO per critical workload, mapped to your CPS 230 critical-operations register.

What’s on the contract

What's on the contract

  • Senior security operations running ML2-aligned monitoring across the eight controls
  • Named lead + named senior security analysts (CREST-certified)
  • Documented uplift roadmap delivered monthly to your CISO and Head of Risk
  • ISO 27001 certified · Microsoft Solutions Partner · AWS Partner
  • ML2 evidence pack designed to drop into a CPS 234 board pack
  • We do not claim AI in our monitoring. Humans do the analyst work.

24-question self-assessment

Essential Eight ML2 Self-Assessment

A 24-question self-assessment, one to two questions per control, with a maturity scoring rubric. Tells you which of the eight is furthest from ML2 — and which uplift to do first. Free. Email-gated. Built from real ML1-to-ML2 uplift engagements with mid-market firms.

Frequently asked

  • Essential Eight Maturity Level 2 is the Australian Cyber Security Centre's intermediate maturity level for the eight mitigation strategies in the Essential Eight. ML2 is calibrated for organisations facing adversaries with moderate capability who target the organisation specifically. It is the level APRA-regulated mid-market firms, government suppliers, and most cyber-insurance underwriters expect across the eight controls.