Menu Close

Essential 8 assessment

We help companies become compliant with all the Essential 8 security controls

Discover the efficient ways to comply with all Essential 8 security controls

You know you don’t have application whitelisting and some of your users still use Macros. You don’t need an assessment for that. 

But what you do need is guidance from someone who inspects your business first, on how to implement these security controls in the most effective way possible, without disrupting the business. 

Focus on the Right Remediations

Essential 8’s MFA category includes 8 security controls. Each of them could be easy to bypass. 

Instead of ticking a box “the control is present” – we at Kloudwerk focus on how resilient is the control to a hacking attack. 

And we write our recommendations with the goal of hacker-proofing your organization, beyond just Essential 8 compliance. 

Essential 8 Maturity Levels

Most organizations are at maturity level 0 as per the Essential 8 maturity levels model. 

There is nothing to be ashamed of if you are at this level. 

We can help you get to Maturity Level 3 in less than a year, if your team works hard with ours to achieve this goal. 

Getting to Maturity Level 1

System admins are used to doing their job the same way for the past 15 years. 

But hackers have improved their attacks against AD every day for these 15 years and they continue improving today. 

We assess your system admin practices against modern attacks and suggest improvements. 


Getting to Maturity Level 2

Sometimes we discover a customer’s environment has been breached in the past. 

This is evident in traces left in the form of attack leftovers such as hidden administrative accounts or group memberships. 

The AD Security Assessment also provides you with guidelines on monitoring for signs of an ongoing attack. 

Getting to Maturity Level 3

Maturity Level 3 means that your organization has a well-experienced security team and maintains the right processes and procedures across all cybersecurity categories outlined in Essential 8. 


Let's discuss your Essential 8 Journey

Have questions?



Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner


The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.


You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.