ASD Essential Eight Maturity Model — SP 800-53 Coverage
How well do NIST SP 800-53 Rev 5 controls address each ASD Essential Eight requirement? This analysis maps from framework clauses back to SP 800-53, with expert coverage weightings and gap identification.
Clause-by-Clause Analysis
Sorted by clauseE8-1 Application Control
Rationale
CM-07(4) application allowlisting; CM-07(5) authorized software; CM-11 user-installed software restrictions. CM-14 (new in Rev 5) signed components adds cryptographic verification of application integrity, strengthening application control enforcement.
Gaps
Minimal gap. CM-14 improves integrity verification for allowed applications.
E8-1 ML1 Application control - Maturity Level 1: Prevent execution of unapproved executables on workstations 90%
Rationale
CM-07(4)/(5) application allowlisting directly covers ML1 requirements.
Gaps
Minimal gap.
Mapped Controls
E8-1 ML2 Application control - Maturity Level 2: Extend to all user-facing systems; logging of blocked attempts
E8-1 ML3 Application control - Maturity Level 3: Microsoft's recommended block rules, WDAC, driver control
Rationale
CM-07(4)/(5) application allowlisting covers the concept. CM-14 (new in Rev 5) signed components supports driver integrity verification relevant to ML3 driver control requirements.
Gaps
ASD E8 ML3 specifies Microsoft-specific implementation (WDAC, recommended block lists, driver control). SP 800-53 is technology-neutral. CM-14 strengthens signed component verification but doesn't address Microsoft-specific implementations.
E8-2 Patch Applications
E8-2 ML1 Patch Applications - ML1: Patch internet-facing services within 2 weeks; scanners within 48 hours
E8-2 ML2 Patch Applications - ML2: Patch within 48 hours for exploited vulnerabilities
E8-2 ML3 Patch Applications - ML3: Automated asset discovery and patch coverage
Rationale
SI-02(1) automated patching; CM-08(1) automated discovery; RA-05(2) update vulnerability database. CM-12 (new in Rev 5) information location improves asset-to-patch coverage tracking by identifying where software components reside.
Gaps
Minor: ASD E8 ML3 requires automated patch compliance reporting. CM-12 improves information location for patch coverage assessment.
E8-3 Configure Microsoft Office Macro Settings
Rationale
CM-07 least functionality; CM-06 configuration settings; SI-03 malware protection; SC-18 mobile code restrictions.
Gaps
ASD E8 specifically addresses Microsoft Office macros. SP 800-53 covers application configuration generally but macro-specific controls are technology-specific.
E8-3 ML1 Macros - ML1: Disable macros for users who don't require them
E8-3 ML2 Macros - ML2: Block macros from the internet, antivirus scanning of macros
E8-3 ML3 Macros - ML3: Only signed macros from trusted publishers
Rationale
CM-07 least functionality; CM-06 configuration; SI-07 integrity verification. CM-14 (new in Rev 5) signed components provides cryptographic verification relevant to macro signing enforcement.
Gaps
ASD E8 ML3 specifies trusted publisher macro signing. CM-14 strengthens signed component verification but macro signing policy remains technology-specific.
E8-4 User Application Hardening
E8-4 ML1 App Hardening - ML1: Block Flash, ads, Java in browsers; disable unneeded features
E8-4 ML2 App Hardening - ML2: Disable PowerShell 2.0, constrained language mode
E8-4 ML3 App Hardening - ML3: .NET Framework 3.5 removal, PowerShell constrained mode, WDAC enforcement
E8-5 Restrict Administrative Privileges
E8-5 ML1 Admin Privileges - ML1: Restrict privileged access to admin tasks
E8-5 ML2 Admin Privileges - ML2: Separate admin workstations, no internet/email from privileged accounts
Rationale
AC-06(2) non-privileged access for non-security functions; SC-07 boundary protection; AC-02 account management.
Gaps
ASD E8 ML2 requires privileged access workstations (PAWs) and internet restrictions. SP 800-53 supports through privilege and boundary controls but PAW concept is implementation-specific.
E8-5 ML3 Admin Privileges - ML3: JIT admin, credential guard, block privileged account internet access
Rationale
AC-06 least privilege; AC-02(6) dynamic privilege management; IA-05 credential management.
Gaps
ASD E8 ML3 specifies just-in-time administration and credential guard. SP 800-53 covers dynamic access and credential management but JIT and Credential Guard are implementation-specific.
E8-6 Patch Operating Systems
Rationale
SI-02 flaw remediation; SI-02(1) automated mechanisms; RA-05 vulnerability scanning; SA-22 unsupported system components.
Gaps
Minor: ASD E8 specifies OS patching timeframes (48 hours for critical). SP 800-53 requires timely patching but timeframes are organization-defined.
E8-6 ML1 Patch OS - ML1: Patch internet-facing OS within 2 weeks
E8-6 ML2 Patch OS - ML2: Patch within 48 hours for exploited vulnerabilities 80%
Rationale
SI-02 with automated remediation mechanisms.
Gaps
ASD specifies 48-hour timeframe for exploited vulnerabilities. SP 800-53 timeframes are organization-defined.
Mapped Controls
E8-6 ML3 Patch OS - ML3: Latest OS versions, automated patch compliance
E8-7 Multi-factor Authentication
E8-7 ML1 MFA - ML1: MFA for internet-facing services 85%
Rationale
IA-02(1)/(2) MFA for accounts accessing systems.
Gaps
Minor: ASD E8 ML1 specifically targets internet-facing services. SP 800-53 covers MFA generally.
Mapped Controls
E8-7 ML2 MFA - ML2: MFA for all privileged access and important data repositories
E8-7 ML3 MFA - ML3: Phishing-resistant MFA (FIDO2, smart cards) 80%
Rationale
IA-02(1) MFA; IA-02(12) acceptance of PIV credentials.
Gaps
ASD E8 ML3 specifies phishing-resistant authenticators. SP 800-53 supports through MFA and PIV controls but phishing resistance as a specific requirement is implementation-dependent.
Mapped Controls
E8-8 Regular Backups
E8-8 ML1 Backups - ML1: Backups of important data, software, configuration settings 90%
Rationale
CP-09 directly covers backup of data, software, and configurations.
Gaps
Minimal gap.
Mapped Controls
E8-8 ML2 Backups - ML2: Backups stored disconnected, backup restoration tested
E8-8 ML3 Backups - ML3: Unprivileged accounts cannot modify/delete backups
Methodology and Disclaimer
This coverage analysis maps from ASD Essential Eight clauses/requirements back to NIST SP 800-53 Rev 5 controls, assessing how well the SP 800-53 control set addresses each framework requirement.
Coverage weighting represents an informed estimate based on control-objective alignment, not a definitive compliance determination. Weightings consider whether SP 800-53 controls address the intent of each framework requirement, even where terminology and structure differ.
This analysis should be validated by qualified assessors for use in compliance or audit activities. The authoritative source for any compliance determination is always the framework itself.