ACSC Essential Eight
Best for: Australian government agencies subject to the Protective Security Policy Framework (PSPF) must implement the Essential Eight. The ACSC recommends it for all Australian businesses, especially critical infrastructure sectors under the Security of Critical Infrastructure Act 2018 (SOCI Act). Organizations reporting to the Australian Signals Directorate or undergoing ACSC assessments should treat it as a baseline.
๐ Australian Cyber Security Centre (ACSC), part of the Australian Signals Directorate (ASD) ยท Essential Eight (Nov 2023 update) Official source โ
Get Started
module "..." {
source = "acscessentialeight.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}
What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Regular Backups: Runs 4 controls validating AWS Backup plan retention periods (minimum 35 days), recovery point encryption, and deletion protection. Detects backup vaults without manual deletion locks.
- Audit Logging: Ten-plus controls cover CloudTrail enablement across all regions, S3 data event logging, API Gateway stage logging, AppSync field-level logging, and CloudFront access log configuration, including CloudTrail integration with CloudWatch Logs.
- Log Integrity: Checks that CloudTrail log file validation is enabled, trail logs are encrypted with KMS CMKs, and CloudWatch alarms have associated actions configured.
- Administrative Privilege Restriction: Checks that AWS accounts belong to AWS Organizations for centralized policy enforcement. Detects CodeBuild projects running in privileged mode and publicly accessible CloudTrail S3 buckets.
- Encryption at Rest: Validates encryption for backup recovery points and CloudTrail logs using KMS CMKs. Detects unencrypted data stores relevant to the backups and logging controls in scope.
What you handle
- Regular Backups: Testing backup restoration procedures, documenting Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), and verifying that backups are stored offline or in an isolated account for Maturity Level 3 compliance.
- Audit Logging: Defining log retention policies aligned to your maturity level target, configuring SIEM ingestion, and establishing alert triage workflows for security-relevant events.
- Log Integrity: Periodic review of CloudTrail digest files, KMS key rotation schedules, and incident response procedures triggered by CloudWatch alarm actions.
- Administrative Privilege Restriction: Implementing least-privilege IAM policies, separating privileged and unprivileged accounts, running periodic access reviews, and enforcing multi-factor authentication for all privileged users.
- Encryption at Rest: Defining a key management policy, assigning key administrators, and ensuring CMK access policies follow least-privilege principles.
Controls by Category
Audit and Accountability Logging (7 controls)
Comprehensive logging underpins detection across all eight strategies, so assessors check coverage gaps first. Expect scrutiny on CloudTrail multi-region enablement, S3 data event capture, and API Gateway and AppSync logging; application-layer audit trails are the most frequently missed. At Maturity Level 3, the ACSC expects logs flowing into a centralized analysis platform with alerting on indicators of compromise.
Log Integrity and Protection (3 controls)
Log file validation and KMS encryption together prevent an attacker from covering tracks after a compromise. Assessors will ask whether digest files are actually checked during incident response, not just that validation is toggled on. A CloudWatch alarm with no configured action is a finding; it signals that the organization is collecting data but not acting on it.
Regular Backups (1 control)
Deletion locks on backup vaults are the first check; without them, ransomware can wipe recovery points before a response team engages. Maturity Level 2 and above also require recovery point encryption and documented, tested restoration procedures.
Restrict Administrative Privileges (1 control)
Publicly accessible CloudTrail buckets and CodeBuild projects running in privileged mode are immediate findings. AWS Organizations membership demonstrates centralized governance; at Maturity Level 1, the ACSC expects privileged accounts are not used for everyday tasks, which in cloud environments means least-privilege service role configurations across all service principals.
Additional Controls (53)
AWS Database Migration Service (1)
AWS Lambda (1)
AWS Step Functions (1)
AWS WAF (1)
Amazon CloudWatch Logs (1)
Amazon DocumentDB (1)
Amazon DynamoDB (1)
Amazon EC2 (3)
Amazon ECR (1)
Amazon ECS (1)
Amazon EFS (2)
Amazon EKS (1)
Amazon ElastiCache (1)
Amazon Neptune (3)
Amazon OpenSearch Service (3)
Amazon RDS (8)
Amazon Redshift (5)
Amazon S3 (11)
Amazon SageMaker (2)
Elastic Load Balancing (2)
Other (3)
Related Frameworks
Frequently Asked Questions
Does the Essential Eight apply to my organization if we are not an Australian government entity?
The ACSC recommends the Essential Eight for all Australian organizations, but the mandate applies only to non-corporate Commonwealth entities under the PSPF. Organizations covered by the SOCI Act (critical infrastructure) face increasing pressure to adopt it. If you operate in Australia and handle sensitive data or provide essential services, treat it as a de facto requirement. Outside Australia, it is a practical baseline but carries no regulatory weight.
What maturity level should we target?
Target the same maturity level across all eight strategies. Reaching Level 3 in some while sitting at Level 0 in others is explicitly what the ACSC advises against. Most organizations start at Maturity Level 1. Government entities handling sensitive or classified information are expected to reach Maturity Level 2 or 3. Your target depends on your threat profile, which the ACSC outlines in the Maturity Model documentation.
How does the Essential Eight relate to the ASD Information Security Manual (ISM)?
The Essential Eight is a prioritized subset of the ISM. The ISM contains over 800 controls covering the full spectrum of information security. The Essential Eight extracts the eight mitigation strategies that the ACSC considers most effective against commodity and targeted cyber threats. Compliance at Maturity Level 3 covers a meaningful portion of the ISM's technical controls, but does not satisfy the ISM in full.
How do the 50 mapped controls in compliance.tf relate to the eight strategies?
The mapped controls primarily address 'Regular Backups' and 'Restrict Administrative Privileges' directly, with extensive coverage of audit logging requirements that support detection across all strategies. Strategies like 'Patch Applications,' 'Patch Operating Systems,' and 'Configure Microsoft Office Macro Settings' require endpoint management tools (WSUS, SCCM, Intune) and are not measurable through AWS resource configuration checks.
Is there a formal certification for the Essential Eight?
No. Organizations self-assess their maturity level against the Essential Eight Maturity Model, and government entities report through internal governance channels. Some engage external assessors for independent validation, but this is voluntary. The ACSC may conduct assessments of Commonwealth entities directly.