Essential Eight Maturity Level 2 is the standard required by most Australian government procurement contracts, and increasingly by enterprise clients and cyber insurers across the private sector. It sits between the baseline controls of ML1 and the deeply embedded programme of ML3, and it represents a meaningful step up in both the consistency and evidenceability of your security controls.
This guide explains what ML2 actually requires across all eight strategies, how it differs from ML1 and ML3, and what it takes to get there for an Australian SMB.
| Level | What it means | Who it suits | Typical timeline to achieve |
|---|---|---|---|
| ML0 | Controls not implemented or only partially in place | Starting point — significant gaps exist | N/A |
| ML1 | Controls implemented to mitigate commodity-level threats — basic, inconsistently applied | Businesses beginning the Essential Eight journey with low risk profiles | 3–6 months from ML0 |
| ML2 | Controls consistently applied, evidenced, and tested — required for most govt contracts | Government suppliers, regulated sectors, enterprise clients | 6–12 months from ML1 |
| ML3 | Controls deeply embedded, auditable, board-level governance — protects against sophisticated targeted attacks | Critical infrastructure, high-value government contracts, security-mature organisations | 12+ months from ML2 |
The key difference between ML1 and ML2 is not what controls are in place — it is how consistently they are applied and whether you can prove it. ML1 allows for gaps and exceptions. ML2 does not. Every control must be implemented across every system in scope, with evidence that it is working and tested.
Here is what that means in practice across all eight strategies:
ML1: Approved application lists exist. Execution is controlled on workstations.
ML2: Application control enforced on all workstations and internet-facing servers. Allowlists reviewed and validated regularly. Controls applied to software libraries, scripts, and installers — not just executables. Logged and monitored.
ML1: Patches applied when convenient. Critical vulnerabilities patched within 30 days.
ML2: Critical vulnerabilities patched within 48 hours. Non-critical patches applied within two weeks. Automated patching tools deployed. Unsupported or end-of-life applications removed from the environment. Patch compliance reported regularly.
ML1: Macros disabled for most users. Some exceptions exist.
ML2: Macros blocked from the internet on all systems. Only digitally signed macros from trusted publishers permitted. Users cannot enable macros themselves. Macro execution logged and reviewed.
ML1: Flash disabled. Some browser hardening in place.
ML2: Flash, Java browser plugins, and deprecated technologies fully removed. Web browsers configured to block ads and untrusted content. PDF viewers hardened. Internet Explorer disabled or removed. Controls applied consistently across all devices.
ML1: Admin accounts exist but are not always separate from standard accounts.
ML2: Admin accounts used only for administrative tasks — separate from standard user accounts. Admins use a dedicated admin workstation or privileged access workstation. Admin access to the internet is blocked. All privileged account activity logged and reviewed regularly. Requests for new admin accounts are validated and approved.
ML1: Security patches applied when possible. Some end-of-life systems remain.
ML2: Critical OS vulnerabilities patched within 48 hours. Non-critical patches applied within two weeks. Only vendor-supported operating systems permitted. End-of-life systems removed or isolated. OS patch compliance tracked and reported.
ML1: MFA enabled for remote access and some cloud services.
ML2: MFA enforced for all remote access, all cloud services, all privileged accounts, and all third-party services storing sensitive data. Phishing-resistant MFA (e.g. hardware tokens, passkeys) required for privileged accounts and high-risk services. MFA cannot be bypassed by users.
ML1: Backups exist. Recovery is rarely tested.
ML2: Backups performed daily and stored offline or in a separate, protected environment. Backup copies are tested for restoration at least quarterly. Backup access is restricted. Business-critical data, software, and configuration settings are all included in the backup scope.
Based on our Essential Eight assessments across Perth businesses, these are the controls that most frequently prevent organisations from reaching ML2:
For a Perth business starting from ML1 with a managed IT provider, reaching ML2 typically takes six to twelve months. The timeline depends heavily on your current environment — a cloud-first Microsoft 365 business with Intune-managed devices will get there faster than a business with on-premises servers and unmanaged endpoints.
The cost of moving from ML1 to ML2 for a 20–50 person business typically runs $15,000 to $40,000 in implementation work, depending on how many gaps need to close. For businesses on a managed IT agreement with Epic IT, much of this is absorbed into the monthly service.
ML2 is required for most Australian government supplier contracts. If your organisation is on the Australian Government’s supply chain, or if you work with agencies that reference the Protective Security Policy Framework (PSPF), ML2 is the minimum you need. It is also increasingly specified by large enterprise clients and cyber insurers as a condition of engagement.
If your business is not supplying to government and has no formal Essential Eight contractual obligation, SMB1001 Gold is often a more practical and achievable starting point — it builds the same foundations while delivering a formal certification you can use commercially. Read our comparison of Essential Eight vs SMB1001 for guidance on which to prioritise.
We conduct Essential Eight assessments and implementation for businesses across Perth as part of our managed security services. Our assessment gives you a clear ML rating across all eight strategies, identifies the specific gaps preventing ML2 attainment, and produces a prioritised remediation plan.
Contact us on 1300 EPIC IT for a free Essential Eight gap analysis.
Our Perth-based team conducts Essential Eight gap assessments for businesses across Western Australia. We give you a clear maturity rating and a practical path to ML2.
Or call us on 1300 EPIC IT (1300 374 248)