Essential Eight maturity model
The Essential Eight maturity model (E8MM) can be used in two ways. First, and primarily, it can be used to assist organizations in implementing the Essential Eight in a gradual manner based on the different levels of tradecraft and targeting used by malicious actors. Second, it can also be used to assess an organization’s cybersecurity maturity. The E8MM consists of three levels. The maturity levels build off of each other, with each level representing a step towards a more resilient cybersecurity posture. This ensures the framework adapts to different organizational needs. Higher maturity levels require organizations to implement more controls associated with each mitigation strategy. For example, there are seven controls associated with multi-factor authentication at Level One and twelve controls at Level Two. Organizations will need to meet the previous level in order to get compliant with the next level. For example, an organization must be compliant with Maturity Level One prior to getting compliant with Maturity Level Two.