
Essential 8 Protect
Overview
Approved Systems Essential 8 Protect is a managed security service designed to implement the Australian Cyber Security Centre’s Essential Eight controls and align with the Australian Signals Directorate’s Information Security Manual (ISM).
It delivers baseline defences such as application whitelisting, patch management for operating systems and applications, privilege restriction, macro control, user‑application hardening, multi‑factor authentication and backup monitoring, all managed through our RMM platform and ThreatLocker technology.
By adopting these controls, the service helps organisations defend against ransomware, malware and unauthorised access, while supporting compliance with the Privacy Act, Notifiable Data Breach scheme and sector‑specific obligations like the Security of Critical Infrastructure Act and APRA CPS 234.
This makes Essential 8 Protect an ideal entry‑level framework for government agencies, corporates and enterprises seeking to uplift their cyber maturity and meet emerging regulatory requirements.
Industries That Should Adopt Essential 8 Protect
Any business that maintains a customer database – If your organisation stores names, addresses, email addresses or phone numbers, you are handling personal information covered by the Privacy Act. Implementing the Essential Eight helps secure that data, reduces the risk of breaches and demonstrates due diligence to regulators and customers alike.
Healthcare and medical – Healthcare providers, hospitals and clinics handle highly sensitive patient information. They are now brought into the expanded critical‑infrastructure regulations alongside logistics and transport. They also must meet Privacy Act and Notifiable Data Breach obligations.
Financial services (banking, insurance, superannuation) – Banks and insurers are explicitly included in the broadened critical‑infrastructure definition. APRA CPS 234 mandates clear roles, asset classification and timely incident reporting. Implementing the Essential Eight helps these organisations meet both SOCI and APRA requirements.
Education and research institutions – Universities and research organisations were added to the critical‑infrastructure definition in 2021. They host large volumes of personal and intellectual property data and must comply with mandatory incident‑reporting and risk‑management rules.
Communications and telecommunications providers – Communications networks are recognised as critical infrastructure. Providers must implement risk‑management programs and cyber‑security frameworks such as the Essential Eight.
Data storage, managed service and cloud providers – Data‑storage and cloud services are also covered under the critical‑infrastructure definition, bringing mandatory risk‑management programs and annual reporting obligations. Essential 8 Protect’s whitelisting, patching and multi‑factor‑authentication controls reduce attack surfaces and support compliance.
Logistics, transport and supply‑chain operators – New regulations have expanded critical‑infrastructure coverage beyond traditional sectors; logistics and transport operators must conduct risk assessments, establish reporting protocols and demonstrate governance. Using the Essential Eight helps fulfil these obligations and defend against ransomware and supply‑chain attacks.
Energy, water and utilities – As long‑standing critical‑infrastructure sectors, energy and utilities companies must meet risk‑management programs and positive security obligations. Essential 8 Protect provides a baseline for patching, privileged‑access restriction and backup monitoring.
Government agencies – Government departments must align with the Australian Government’s Information Security Manual (ISM) and the Protective Security Policy Framework. The Essential Eight is the recommended baseline mitigation strategy and supports compliance with the Privacy Act and Notifiable Data Breach scheme.
Corporate and enterprise organisations – Private businesses with annual turnover above AU $3 million must comply with the Privacy Act, and directors have a legal duty to exercise care and diligence over cyber‑security matters. Adopting Essential 8 Protect demonstrates proactive risk management, aiding legal compliance and reducing liability.
Professional services (legal, accounting, consulting) – Firms that manage confidential client data face heightened privacy obligations and potential classification as systemically important entities. Essential 8 Protect helps secure client information and meet reporting obligations.
Pricing: $25 per device (ex GST) per month
(Minimum 2 Devices – 12 Month Commitment)

Our Core Offering – Approved Systems Essential 8 Protect
1. Application Whitelisting
- Allow only trusted and approved applications to run on your network.
- Prevents execution of malicious programs by enforcing a pre-approved list of apps.
- Utilises ThreatLocker for robust application control and policy enforcement.
2. Application Patching
- Regular updates for critical applications to protect against known vulnerabilities.
- Integrated through Approved Systems RMM Platform for seamless patch management.
3. Operating System Patching
- Keeps your systems secure by ensuring OS updates are applied promptly.
- Managed via Approved Systems RMM Platform to reduce vulnerabilities.
- Integrated Commercial Grade Antivirus and EDR for real-time threat prevention.
- Detects and blocks malicious activity, ransomware, and sophisticated cyber threats.
- Continuous monitoring and automatic remediation through the Approved Systems RMM Platform.
4. Restrictions of Administrative Privileges
- Limits administrative privileges to reduce potential attack vectors.
- Uses ThreatLocker Elevation Control to grant admin rights only when necessary.
5. Configuration of Office Macros
- Prevents execution of malicious macros in Microsoft Office files.
- Applies security policies that block macros from untrusted sources.
6. User Application Hardening
- Disables unnecessary features and enforces security best practices.
- Utilises ThreatLocker Ringfencing™ to restrict application behaviors.
7. Multi-Factor Authentication (MFA)
- Adds an extra layer of security by requiring multiple forms of verification.
- Integrated across key systems to prevent unauthorised access.
8. Review Backups
- Ensures your backup strategies are reliable and regularly tested.
- Filesystem Backup of up to 250GB included, with options for additional storage (Windows Devices Only – MacOS Coming soon).
- Secured using Remote Monitoring and Management tools and advanced storage control solutions.
Why Choose Approved Systems Essential 8 Protect?
- Built on Australian Government standards – Implements all ACSC Essential Eight strategies and aligns with the ASD Information Security Manual (ISM), giving you an auditable baseline that meets public‑sector and critical‑infrastructure requirements.
- Managed maturity uplift – Delivers maturity levels 1–2 controls out of the box, with a pathway to level 3 for high‑risk assets. You can upgrade to a fully managed solution when you need deeper coverage.
- True zero‑trust enforcement – By default, only pre‑approved applications and actions are allowed, blocking everything else until explicitly authorised. This dramatically reduces the attack surface and stops ransomware and unauthorised access before it starts.
- Continuous monitoring and rapid response – Our Remote Monitoring & Management (RMM) platform provides 24/7 oversight and immediate remediation. Threats are detected, isolated and remediated in real time.
- Simple, transparent pricing – AU$25 per device per month (ex GST, minimum three devices) delivers enterprise‑grade security at a price point that scales from small businesses to large enterprises.
- Built‑in backup and resilience – Includes up to 250 GB of filesystem backup per device, with options for additional storage. Regularly tested backups ensure your critical data is recoverable.
- Compliance support across industries – Whether you are in healthcare, finance, education, government or any business handling personal data, Essential 8 Protect helps meet obligations under the Privacy Act, Notifiable Data Breach scheme, Security of Critical Infrastructure Act and APRA CPS 234.
- Flexible and scalable – Tailors controls to your risk profile and compliance needs, letting you add advanced security add‑ons like Endpoint Detection and Response as needed.
Advanced Security Add-Ons
+ Endpoint Detection & Response (EDR)
- Real-time threat detection and response.
- Alerts for Indicators of Compromise (IoCs) and suspicious activity.
+ Storage Control
- Manages data access at the file level.
- Prevents unauthorised access to backup and sensitive data locations.
+ Managed Detection & Response (MDR)
- 24/7 monitoring by cybersecurity experts.
- Immediate threat response and mitigation.
How It Protects Your Business
- Prevents Ransomware & Malware with proactive application control.
- Secures Network Access and stops unauthorised connections.
- Manages User Privileges and reduces insider threat risks.
- Blocks Dangerous Macros and hardens user applications.
- Protects Backups against tampering and unauthorised access.
Get Started Today
Ready to secure your business with the power of the Essential 8 Protect? Contact Approved Systems today.
