System Status: Operational/// DISP DEFENCE TECH NETWORK ///DISP COMPLIANCE PLATFORM
INDUSTRY BRIEFICT VENDORS & MSSPS

DISP CYBER
SECURITY
REQUIREMENTS

All Defence Industry Security Program (DISP) members must achieve and maintain the full Essential Eight at Maturity Level 2 — mandatory from 15 November 2025 under DSPF Principle 16 Control 16.1. ICT vendors, MSSPs, cloud providers, and technology consultants supplying to Australian defence must hold current DISP membership and pass the 107-question Cyber Security Questionnaire.

30 Sep 2024

Date DISP strengthened E8 standard to full ML2 for all members

107

Control questions in the DISP Cyber Security Questionnaire Part B (ML2-aligned)

15 Nov 2025

Date full E8 ML2 (all 8 strategies) became mandatory — top-4-only phase concluded

Annual

Frequency of Annual Security Report submission via DISP Member Portal

THE COMPLIANCE MANDATE

Why DISP Cyber Security Applies to ICT Vendors and MSSPs

The Defence Industry Security Program (DISP) applies to any entity that handles, stores, transmits, or provides services that access Commonwealth defence information — regardless of whether that entity is a manufacturer, a professional services firm, or a technology provider. ICT vendors whose software is deployed in defence environments, MSSPs monitoring defence contractor networks, and cloud providers hosting OFFICIAL: Sensitive or PROTECTED data are all subject to the same DISP obligations as prime contractors.

The cyber security obligations flow from the Defence Security Principles Framework (DSPF) Principle 16 Control 16.1, which requires all DISP members to meet or exceed the Australian Signals Directorate's Essential Eight at Maturity Level 2. This requirement was strengthened on 30 September 2024, when DISP began the Essential Eight Cyber Standards Uplift Program. Cyber Assessments against the top 4 of the Essential Eight concluded on 15 November 2025, after which the full Essential Eight at ML2 became the mandatory baseline for all DISP members.

The scope of systems subject to E8 ML2 is defined as "ICT corporate systems used to correspond with Defence." For ICT vendors, this means the systems your staff use to communicate with Defence — email, collaboration platforms, identity management, endpoints, and document handling. It does not require every system in your organisation to meet E8 ML2, but in practice most technology companies find that their in-scope systems represent the majority of their ICT environment.

The Annual Security Report (ASR) is the primary compliance demonstration mechanism. DISP members must submit a compliant ASR to the Defence Security and Vetting Service (DSVS) annually, on the anniversary of their membership certificate. Since the 2024–2025 ASR cycle, the Essential Eight CSQ forms part of the ASR — meaning every member must now complete the 107-question questionnaire as part of their annual compliance cycle.

THE EIGHT MITIGATION STRATEGIES

Essential Eight ML2 — What Each Strategy Requires

Source: Australian Signals Directorate Essential Eight Maturity Model (ASD/ACSC). ML2 is designed to protect against adversaries who invest more time and effort than commodity attackers — the minimum standard for defence supply chain participation.

01

Application Control

Prevent unauthorised applications from executing on workstations and internet-facing servers. At ML2, application control must be implemented across all workstations and internet-facing servers, with logs reviewed at least monthly.

ML2: All workstations + internet-facing servers
02

Patch Applications

Apply patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services within 48 hours of release when exploits exist. For other applications, within two weeks.

ML2: 48hrs (critical) / 2 weeks (standard)
03

Configure Microsoft Office Macro Settings

Block macros from internet-sourced files and only allow macros in documents from trusted locations or that are digitally signed by a trusted publisher. Macro antivirus scanning must be enabled.

ML2: Blocked by default; signed/trusted only
04

User Application Hardening

Configure web browsers to block Flash, ads, and Java from the internet. Disable unneeded features in Microsoft Office, web browsers, and PDF viewers. Block web-based ads at the proxy or DNS level.

ML2: Flash/Java blocked; ads blocked
05

Restrict Administrative Privileges

Privileged access workstations (PAWs) required for privileged activities. Admin accounts must not be used for email, web browsing, or other standard activities. Just-in-time administration enforced.

ML2: PAWs required; JIT administration
06

Patch Operating Systems

Apply OS patches within 48 hours when exploits exist for internet-facing systems. For workstations and non-internet-facing servers, within two weeks. Unsupported operating systems must not be used.

ML2: 48hrs (internet-facing) / 2 weeks (other)
07

Multi-Factor Authentication

MFA required for all users accessing internet-facing services, remote access, and privileged accounts. Phishing-resistant MFA (hardware tokens or passkeys) required for privileged access at ML2.

ML2: All internet-facing + privileged access
08

Regular Backups

Backups of important data, software, and configuration settings performed at least daily. Backups stored offline or in a separate environment. Restoration tested at least every three months.

ML2: Daily; offline copy; quarterly restore test

WHO NEEDS DISP

Which ICT Organisations Require DISP Membership

Software Vendors

Supplying software to CASG or ADF systems
Hosting Defence data in cloud environments
Providing SaaS platforms to DISP members
Developing capability management systems
DISP Entry Level + E8ML2 + Annual ASR

Managed Security Providers

SOC services monitoring Defence contractor environments
SIEM platform access to Defence-adjacent systems
Endpoint detection and response (EDR) management
Vulnerability scanning and penetration testing
DISP membership + E8ML2 on MSSP systems

Cloud Service Providers

Hosting OFFICIAL: Sensitive or PROTECTED data
Providing IaaS/PaaS to defence prime contractors
Managed cloud environments for DISP members
Backup and disaster recovery for Defence data
DISP + IRAP assessment (for PROTECTED)

Network & Infrastructure

Managing network infrastructure at Defence facilities
Providing SD-WAN or MPLS connectivity to CASG
Maintaining communications systems for ADF
Physical and logical access control systems
DISP membership + physical security controls

MEMBERSHIP LEVELS

DISP Membership Levels and Cyber Requirements

LevelClassificationE8 RequirementAssessmentTypical For
Entry LevelOFFICIAL / OFFICIAL: SensitiveML2 mandatory107-question CSQMost ICT vendors and MSSPs
Level 1PROTECTEDML2 + additional controlsExtended CSQ + site assessmentCloud providers hosting PROTECTED data
Level 2SECRETML2 + ISM controlsFull CSQ + Deep Dive AuditClassified programme ICT suppliers
Level 3TOP SECRETML3 + full ISMFull CSQ + continuous monitoringHighly sensitive capability ICT

Source: defence.gov.au — Defence Industry Security Program eligibility and suitability

DISPULSE FOR ICT VENDORS

107 CSQ Controls. Continuous Monitoring. 1-Click ASR.

The DISP Cyber Security Questionnaire Part B contains 107 ML2-aligned control questions. Completing it manually — gathering evidence, mapping controls to systems, and documenting policies — typically takes 6 to 12 weeks for an ICT organisation without a dedicated compliance team. Repeating this process annually for the ASR compounds the burden.

DISPulse eliminates this cycle. The platform continuously monitors your Essential Eight posture across all in-scope systems, maintaining a live evidence base mapped to each of the 107 CSQ controls. When your ASR is due, DISPulse generates a pre-formatted, DSVS-ready report in one click — with all required attestations, control evidence, and gap documentation included.

For MSSPs managing multiple client environments, DISPulse provides a multi-tenant compliance dashboard with client-level visibility, gap identification, and remediation tracking. This enables MSSPs to offer DISP compliance monitoring as a managed service to their defence contractor clients — creating a new revenue stream while strengthening the entire defence supply chain.

DISPulse also covers PSPF, CMMC 2.0, and ISM controls simultaneously — giving ICT vendors with US DoD contracts or AUKUS Pillar II involvement a single platform for multi-framework compliance without duplicate evidence collection.

FAQ

DISP Cyber Security — Frequently Asked Questions

E8 GAP ASSESSMENT

Book Your Essential Eight ML2 Assessment

We assess your ICT environment against all 107 CSQ controls and deliver a prioritised remediation register within 5 business days.

COMPLIANCE DEADLINE

Full E8 ML2 (all 8 strategies) has been mandatory since 15 November 2025. DISP members who completed only the top-4 uplift are now non-compliant and subject to Ongoing Suitability Assessment action.

COMPLIANCE FRAMEWORKS

E8 ML2ASD Essential Eight Maturity Level 2
DSPFDefence Security Principles Framework
DISPDefence Industry Security Program
PSPFProtective Security Policy Framework
ISMInformation Security Manual (ASD)
CMMC 2.0US DoD Cybersecurity Maturity Model

SERIOUS DEFENCE

Your DISP Cyber Journey.
Our Platform.

Serious Defence has guided ICT vendors, MSSPs, and cloud providers through DISP accreditation and Essential Eight ML2 uplift. DISPulse is the only platform built specifically for the DISP compliance lifecycle — from CSQ preparation through to 1-click Annual Security Report generation.

E8 ML2 gap assessment against all 107 CSQ controls
DISP application preparation and CSQ completion support
Essential Eight uplift implementation and evidence collection
Sovereign cloud (DISPeer) for OFFICIAL: Sensitive and PROTECTED data
Annual Security Report generation in one click via DISPulse
Ongoing compliance monitoring — DISP, PSPF, CMMC 2.0, ISM