// MFA
Multi-factor authentication
Insurer requires: Enforced on all admin accounts and remote access. Many policies extend this to all email accounts.
Essential Eight: Mitigation 7. ML1 baseline; ML2 for phishing-resistant factors.
Cyber Node validates: Test MFA bypass paths, identify phishable factors (SMS, push fatigue), check coverage gaps in admin and SSO.
// Patching
Patching cadence
Insurer requires: Critical patches applied within 14 to 30 days. End-of-life software replaced or contained.
Essential Eight: Mitigations 2 (Patch applications) and 6 (Patch operating systems).
Cyber Node validates: Scan perimeter and internal services for known CVEs. Cross-reference against vendor patching SLAs. Flag the gap between claim and reality.
// Backups
Isolated, tested backups
Insurer requires: Backups isolated from production, tested for restore, and out of reach of a compromised admin account.
Essential Eight: Mitigation 8. ML2 requires that backups be isolated from production and that restore is tested.
Cyber Node validates: Test whether a compromised admin can reach, encrypt, or delete the backups. Verify restore tests are actually run.
// Privileged access
Privileged access controls
Insurer requires: Tiered admin model. No shared accounts. Privileged access workstations or equivalent separation.
Essential Eight: Mitigation 5. ML1 baseline; ML2 introduces the tiered model.
Cyber Node validates: Identify privileged accounts, day-to-day separation, attempt privilege escalation from a standard user account where in scope.
// Application control
Application control / EDR
Insurer requires: Endpoint controls preventing unauthorised executables. EDR deployed and monitored.
Essential Eight: Mitigation 1. ML2 introduces application control on workstations; ML3 extends to servers.
Cyber Node validates: Test whether unauthorised executables actually fail to run. Verify the bypass techniques known to work in the wild do not succeed here.
// Macro hardening
Office macro hardening
Insurer requires: Office macros disabled by default or restricted to signed-only.
Essential Eight: Mitigation 3. ML1 baseline.
Cyber Node validates: Validate macro execution policy against ACSC guidance. Attempt delivery of test payloads via common phishing vectors. Measure actual outcome, not GPO setting.
Beyond the Essential Eight, modern cyber policies increasingly require email authentication (SPF, DKIM, DMARC), a tested incident response plan, and an independent technical security assessment within a defined window. All three sit inside the same readiness assessment.