INTRODUCTION
The Defence Industry Security Program (DISP) has announced an important update to its cybersecurity requirements. Previously, members were required to implement the ACSC Top 4 security controls to protect sensitive data and systems. However, DISP now mandates the adoption of the Essential 8 (E8) at Maturity Level 2 (ML2).
This change reflects the evolving cybersecurity landscape and aims to provide more comprehensive protections against sophisticated threats. If you're a DISP member, this shift requires action — you must meet the new requirements before your next Annual Security Review (ASR) or if you’re w new applicant you will have to demonstrate ML2 as part of the application process. If you can’t demonstrate ML2 you will be put into what DISP calls their Uplift Program and your DISP application will be suspended until full compliance is demonstrated.
This article outlines the key differences between the ACSC Top 4 and the Essential 8 ML2, what the transition entails, the potential timeframes, and indicative costs.
WHAT’S INVOLVED IN MOVING FROM THE TOP 4 TO ESSENTIAL 8 ML2?
The ACSC Top 4 cybersecurity controls include:
While the Top 4 was an effective baseline when it was first released more than 10 years ago, it has well and truly been overtaken by the threat posed by our adversaries. To be brutally honest if you don’t have these minimum controls in place you’re not serious about cybersecurity and I wouldn’t want you in my supply chain: you’re too great a risk of compromise.
The Essential 8 at Maturity Level 2 (ML2) focuses on preventing more sophisticated cyber threats, which requires:
CHALLENGES IN THE TRANSITION TO ESSENTIAL 8 ML2
Moving from the Top 4 to Essential 8 ML2 is not just an incremental upgrade—it requires significant changes in processes, systems, and policies. The jump to ML2 emphasises consistency and enforcement rather than just ad-hoc compliance. For most organisations this represents a shift from a compliance-focussed approach to a security-focussed
Below are some key areas to address:
HOW LONG WILL THE TRANSITION TAKE?
The timeline to transition from Top 4 to Essential 8 ML2 will vary depending on the size and maturity of your organisation’s cybersecurity capabilities. For smaller organisations with basic controls already in place, the transition could take 3-6 months. However, for larger or more complex environments, the process may extend to 9-12 months or more.
Key Time Factors:
Staff training: Teams will need to understand and adopt new practices.
System upgrades: Ensuring that legacy systems can meet the requirements of E8.
Policy and procedural development: Refining backup processes, MFA enforcement, and patching schedules amongst other things.
Indicative Costs
Transitioning to Essential 8 ML2 will involve both direct and indirect costs. Below is a breakdown of typical expenses DISP members might encounter:
Software Licenses: Implementing MFA and advanced backup solutions can cost $5,000–$20,000, depending on the tools selected.
Application Control Tools: Solutions to enforce application control range from $10,000–$50,000.
Hiring a consultant to perform a security gap analysis and help with policy development may cost $10,000–$40,000.
Training: Staff training on new processes and tools might cost $5,000–$10,000.
Time and Labor: Internal IT teams may need to dedicate hundreds of hours to implement new controls, review accounts, and reconfigure systems.
Monitoring and Audits: Regular security audits and monitoring tools could cost an additional $5,000–$15,000 annually.
NEXT STEPS: ACT BEFORE YOUR NEXT ASR
If you're a DISP member, proactive planning is essential. The Essential 8 ML2 requirements represent a more comprehensive security posture, and all members must comply before their next Annual Security Review (ASR).
What You Should Do Now:
CONCLUSION
The shift from the ACSC Top 4 to the Essential 8 was always going to occur and frankly is long overdue. The move to ML2 came as a surprise to many but it is a reasonable next step in cyber maturity because it moves toward more formalised standards such as ISO 27001. By this I mean at ML2 there is the early stages of a management system required to ensure controls are regularly reviewed to ensure ongoing effectiveness.
Honestly this is the minimum standard to you should be looking to implement in any business, but is even more important in the defence industrial base.
If you're a current DISP member, act now to avoid delays and ensure your organisation is compliant before your next ASR. Waiting too long could jeopardise your DISP membership, so it's critical to start the process immediately.
If you’re an aspiring DISP member you will also be subject to the higher cyber standard so there’s no time like the present to get your cybersecurity house in order.
Need help with the transition or don't know where to start? Get in touch with us today.