Essential Eight Audit: How Thrive House Strengthened Security for NDIS Compliance

By Veronica
April 23, 2026

How Kloudify’s Essential Eight audit gave Thrive House’s internal IT team a clear roadmap to uplift security controls – strengthening resilience and supporting NDIS audit readiness. 

Organisation  Thrive House – NDIS-registered disability support 
Audit & Advisory  Kloudify – Essential Eight assessment & remediation roadmap 
Implementation  Thrive House’s internal IT team – in-house delivery of recommended controls 
Framework  ACSC Essential Eight 
Business Driver  NDIS Mid-Term Quality and Safeguards Audit 
Focus  Security control maturity across identity, devices, applications & data 

The Insight 

A credible security uplift starts with an independent view of where you are. Kloudify’s Essential Eight audit gave Thrive House’s internal IT team something no internal review alone could produce: an evidenced, prioritised roadmap – and the confidence to execute it. 

A Collaborative Uplift 

This is a collaboration between Kloudify and Thrive House’s internal IT team. Kloudify led the independent audit, assessed maturity against the Essential Eight, and produced a prioritised roadmap of controls to implement. Thrive House’s internal IT team took ownership of delivery – translating the recommendations into operational changes across identity, devices, applications, and data, with deep knowledge of the environment and minimal disruption to frontline services. 

The result is a joint body of work neither team could have produced alone – an externally-evidenced audit paired with in-house implementation that sticks. 

About the Essential Eight 

The Essential Eight is a set of baseline mitigation strategies developed by the Australian Signals Directorate (ASD) through the Australian Cyber Security Centre (ACSC). It is widely adopted across Australian government and regulated industries as a practical framework for improving cyber resilience. Maturity is assessed across eight control areas, from application control and patching to multi-factor authentication, administrative privilege restriction, and backups. 

The Challenge 

With the Mid-Term NDIS Audit approaching, Thrive House needed to demonstrate that its information systems were protected to a recognised, measurable standard. Thrive House engaged Kloudify to conduct an independent audit against the ACSC Essential Eight and deliver a prioritised set of recommendations for Thrive House’s internal IT team to implement. 

Kloudify’s audit identified four areas where control maturity needed to improve before the external audit: 

  • Identity controls – multi-factor authentication was not consistently enforced across all accounts, and administrative privileges had accumulated over time. 
  • Device and application controls – endpoint compliance, application control, and patching cadence varied across the environment. 
  • Logging and visibility – event logging was not centralised or consistently retained, limiting the ability to detect or investigate incidents. 
  • Resilience – backup configuration and restoration testing did not yet meet Essential Eight maturity expectations. 

None of these findings were unusual for a growing multi-site provider – but each represented a measurable gap against a recognised baseline, and each needed to be closed before the external audit. 

The Approach 

Kloudify assessed current maturity against each Essential Eight control area and produced a prioritised remediation roadmap – sequenced to uplift the lowest-maturity controls first. Thrive House’s internal IT team then implemented the controls in waves, drawing on deep knowledge of the environment to roll changes out without disrupting frontline services. Kloudify remained available throughout delivery for technical guidance and validation, with each completed control documented in a form suitable for both internal assurance and external audit evidence. 

The Solution – Eight Controls, Measurable Uplift 

Each Essential Eight area was addressed with specific, evidenced security controls identified in Kloudify’s audit and implemented by Thrive House’s internal IT team. 

Essential Eight control area  Security controls implemented 
Multi-factor authentication  MFA enforced for all user and privileged accounts accessing corporate systems 
Restrict administrative privileges  Role-based access model, least-privilege baseline, and quarterly access reviews 
Application control  Allow-listing of approved applications on managed endpoints 
Patch applications & operating systems  Automated patching cadence with reporting against SLA targets 
User application hardening  Hardened baseline configuration for browsers, Office macros, and productivity apps 
Configure Microsoft Office macro settings  Macros disabled by default; exceptions controlled and logged 
Regular backups  Immutable, offsite backups with tested restore procedures 
Logging & monitoring (supporting control)  Centralised logging, retention aligned to audit expectations, and alerting on high-risk events 

Supporting Security Controls 

Alongside the Essential Eight uplift, several reinforcing controls were put in place: 

  • Conditional access policies restricting sign-ins to trusted locations and compliant devices 
  • Endpoint Detection and Response (EDR) deployed consistently across all managed devices 
  • Email security hardened against phishing and impersonation targeting staff 
  • Incident-response runbook and documented escalation pathways 

“Kloudify’s audit gave us something we couldn’t produce from the inside: an independent, prioritised view of where our gaps were. That clarity made the implementation straightforward – our team knew exactly what good looked like.” 

— Jayanth Ienapudi, IT Manager, Thrive House

The Outcomes 

  1. A measurable, defensible security posture 
    • Thrive House can now demonstrate its security posture against a recognised Australian baseline, with documented controls and evidence of operation across each Essential Eight area. 
  2. Audit readiness, both internal and external 
    • The same controls and evidence pack support NDIS audit requirements and internal assurance reviews. One body of work satisfies multiple reporting obligations. 
  3. A sustainable uplift, not a point-in-time fix 
    • Quarterly access reviews, automated patching, centralised logging, and tested backups mean that maturity holds between audits. The controls are designed to be operated, not just implemented. 

Impact at a Glance 

Security control indicator  Shift 
Multi-factor authentication coverage  Partial → 100% of user & privileged accounts 
Administrative privileges  Ad hoc → Role-based, least-privilege, reviewed quarterly 
Application control on managed endpoints  Not enforced → Allow-listing active across fleet 
Patching cadence (applications & OS)  Manual / inconsistent → Automated, SLA-reported 
Device compliance & EDR coverage  Inconsistent → Enforced across all managed devices 
Centralised logging & retention  Limited → Centralised, retained, and alerted 
Backup & restore verification  Untested → Immutable, offsite, regularly tested 
Essential Eight maturity evidence  Not established → Documented & audit-ready 

The Takeaway 

An independent Essential Eight audit turns a broad cybersecurity goal into a measurable program of work. Pairing Kloudify’s external assessment with Thrive House’s internal IT team’s delivery proved that the fastest path to a defensible security posture is clarity from the outside and execution from the inside. 

About Kloudify 

Kloudify helps Australian organisations assess and uplift their security posture against recognised standards – including the ACSC Essential Eight. We conduct independent audits to identify gaps and produce prioritised, practical roadmaps, and we can either hand those findings over to your in-house team (as we did for Thrive House) or implement the controls end-to-end ourselves. Either way, the outcome is the same: a defensible, measurable security posture, delivered without disruption. 

We work with NDIS providers, healthcare organisations, and other regulated sectors where security maturity is both a business need and a compliance obligation. To discuss an Essential Eight assessment – or a full audit-plus-implementation engagement contact us below. 

Veronica

Marketing Manager
Veronica is a Marketing Manager with hands‑on exposure to cloud, cybersecurity, and Microsoft 365 initiatives, contributing industry‑informed perspectives that bridge technology and business outcomes.

Contact Us

Related Posts

No Related Posts Found

Fill out the form below to get details

Fill out the form below to get details

Fill out the form below to get details