09 974 2379 Remote Support Client Portal Australia site

Home / Resources / Cyber Standards Guide

Cybersecurity Standards Guide

A practical guide to choosing the right frameworks and compliance standards for your business.

Navigating cybersecurity standards can be overwhelming. ISO 27001, Essential Eight, SOC 2, PCI DSS-the alphabet soup of frameworks leaves many businesses unsure where to start or what actually applies to them.

This guide cuts through the complexity. We'll help you understand which standards matter for your industry, what compliance actually requires, and how to build a security program that protects your business without unnecessary overhead.

The reality: Most SMBs don't need every framework. What you need depends on your industry, the data you handle, your customers' requirements, and your risk profile. Getting this right saves money and focuses your security investment where it matters.

Standards by Industry

Different industries have different regulatory requirements and risk profiles. Here's what typically applies.

Financial Services

Banks, lenders, insurance, investment firms. Heavy regulatory oversight with strict data protection requirements.

ISO 27001 SOC 2 Essential Eight PCI DSS APRA CPS 234

Healthcare

Medical practices, allied health, aged care, health tech. Patient data requires strong privacy controls.

Privacy Act Health Records Act ISO 27001 Essential Eight

Legal & Professional

Law firms, accountants, consultancies. Client confidentiality and professional obligations drive requirements.

Privacy Act ISO 27001 Essential Eight SOC 2

Retail & E-commerce

Online stores, point-of-sale, retail chains. Payment processing triggers PCI DSS requirements.

PCI DSS Privacy Act Essential Eight

Technology & SaaS

Software companies, cloud services, tech startups. Enterprise customers often require compliance attestations.

SOC 2 ISO 27001 Essential Eight GDPR

Manufacturing

Production, supply chain, industrial operations. IP protection and operational technology security.

ISO 27001 Essential Eight NIST CSF

Government & Public Sector

Government agencies, councils, public services. Mandated frameworks with specific requirements.

Essential Eight NZISM Privacy Act ISO 27001

Education

Schools, universities, training providers. Student data protection and research IP security.

Privacy Act Essential Eight ISO 27001

Understanding the Frameworks

Each framework has a different focus and level of rigour. Here's what you need to know about the major standards.

INTERNATIONAL ISO 27001 - Information Security Management

What it is: The international gold standard for information security management systems (ISMS). ISO 27001 provides a systematic approach to managing sensitive information.

Who needs it:

  • Organisations handling sensitive customer data
  • Businesses working with enterprise clients who require it
  • Companies seeking to demonstrate security maturity to investors or partners
  • Any organisation wanting a structured security framework

What's involved: Certification requires implementing documented policies, risk assessments, and controls across 14 domains. Annual surveillance audits maintain certification. Expect 6-12 months for initial certification.

Cost indication: $15,000-$50,000+ for certification depending on organisation size, plus ongoing audit costs.

ANZ Essential Eight - Australian Cyber Security Centre

What it is: Eight prioritised mitigation strategies developed by the ACSC. Practical, technical controls that address the majority of cyber incidents.

Who needs it:

  • Australian government contractors and suppliers (often mandatory)
  • NZ organisations seeking practical security baseline
  • Any SMB wanting effective, prioritised security controls
  • Organisations preparing for cyber insurance applications

What's involved: Four maturity levels (0-3). Most organisations should target Maturity Level 2 or 3. Self-assessment is possible, or use a third-party assessor.

Cost indication: Implementation costs vary widely. Many controls use existing Microsoft 365 tools. Assessment: $5,000-$15,000.

US/GLOBAL SOC 2 - Service Organisation Controls

What it is: An audit framework for service providers storing customer data in the cloud. Developed by AICPA. Evaluates controls related to security, availability, processing integrity, confidentiality, and privacy.

Who needs it:

  • SaaS companies and cloud service providers
  • Any business handling data for other organisations
  • Companies selling to US enterprise customers
  • Managed service providers

What's involved: Type I (point-in-time) or Type II (period of time, typically 6-12 months). Requires CPA firm audit. Annual attestation.

Cost indication: $30,000-$100,000+ for audit depending on scope and organisation complexity.

PAYMENTS PCI DSS - Payment Card Industry Data Security Standard

What it is: Security standard for organisations that handle credit card data. Maintained by the major card brands (Visa, Mastercard, etc.).

Who needs it:

  • Any business that stores, processes, or transmits cardholder data
  • E-commerce sites taking payments
  • Retail with point-of-sale systems
  • Payment processors and gateways

What's involved: Compliance level depends on transaction volume. Most SMBs can self-assess using SAQ (Self-Assessment Questionnaire). Larger merchants need external assessments.

Cost indication: Using a payment processor that handles card data (like Stripe) significantly reduces scope. Full PCI compliance: $5,000-$200,000+ depending on level.

NZ Privacy Act 2020 - New Zealand Privacy Requirements

What it is: New Zealand's privacy legislation governing how organisations collect, use, store, and disclose personal information.

Who needs it:

  • All NZ organisations handling personal information (which is essentially everyone)
  • Overseas organisations handling NZ personal information

What's involved: 13 Information Privacy Principles. Mandatory breach notification (serious harm threshold). Privacy officer recommended but not mandatory for most.

Cost indication: Compliance is a baseline legal requirement. Cost is implementing appropriate policies and controls-often integrated with broader security program.

EU GDPR - General Data Protection Regulation

What it is: European Union regulation on data protection and privacy. Known for strict requirements and significant penalties.

Who needs it:

  • Any organisation offering goods/services to EU residents
  • Organisations monitoring behaviour of EU residents
  • NZ/AU companies with EU customers or staff

What's involved: Lawful basis for processing, data subject rights, Data Protection Officer (in some cases), data processing agreements, breach notification within 72 hours.

Cost indication: Varies significantly. May require legal counsel for gap analysis. Implementation: $10,000-$100,000+ depending on data handling complexity.

US NIST Cybersecurity Framework

What it is: Voluntary framework developed by the US National Institute of Standards and Technology. Provides a common language for managing cybersecurity risk.

Who needs it:

  • US government contractors
  • Organisations wanting a comprehensive risk management approach
  • Critical infrastructure operators
  • Organisations mapping multiple compliance requirements

What's involved: Five core functions: Identify, Protect, Detect, Respond, Recover. Self-assessment against maturity tiers. No formal certification.

Cost indication: Free to use. Implementation costs depend on current maturity and desired state.

How to Decide What You Need

Ask yourself these questions to determine which standards apply to your organisation.

Who Are Your Customers?

  • Enterprise/corporate clients often require SOC 2 or ISO 27001
  • Government contracts typically mandate Essential Eight
  • US customers frequently ask for SOC 2
  • EU customers require GDPR compliance

What Data Do You Handle?

  • Credit card data → PCI DSS required
  • Health records → Privacy Act + Health Records Act
  • Personal information → Privacy Act baseline
  • Customer data in cloud → Consider SOC 2

What Do Contracts Require?

  • Review customer and supplier contracts for security requirements
  • Check tender/RFP requirements in your industry
  • Cyber insurance policies may specify controls
  • Industry bodies may have membership requirements

What's Your Risk Tolerance?

  • High-value targets need stronger frameworks
  • Reputational sensitivity drives investment
  • Business continuity requirements shape priorities
  • Insurance requirements set minimum bars

Don't overcomplicate it. Start with the Privacy Act (mandatory for everyone), add Essential Eight for practical security controls, then layer on industry-specific requirements. Most SMBs don't need ISO 27001 or SOC 2 unless customers specifically require it.

Our Recommendation for Most SMBs

A pragmatic approach that delivers real security without unnecessary overhead.

1. Start with Essential Eight

The Essential Eight gives you the most security bang for your buck. These eight controls address the most common attack vectors and are practical to implement. Target Maturity Level 2 as your baseline-it covers the fundamentals without requiring enterprise-grade tooling.

2. Ensure Privacy Act Compliance

This isn't optional-it's the law. But many organisations haven't properly documented their privacy practices. Get your privacy policy right, understand what data you hold, and have a breach response plan ready.

3. Meet Cyber Insurance Requirements

Insurers increasingly require specific controls. MFA, endpoint protection, backup verification, and email security are typically baseline requirements. Check your policy and make sure you can actually claim if something goes wrong.

4. Add Frameworks as Needed

Only pursue ISO 27001 or SOC 2 when customer requirements justify the investment. The time and cost are significant, and certification for its own sake doesn't make you more secure-it just proves you've implemented the controls.

Not sure where to start?

We help organisations cut through the complexity. Our security assessment identifies what you actually need based on your industry, customers, and risk profile-not a one-size-fits-all checklist.

Related Resources

Essential Eight Guide

Deep dive into the eight strategies and how to implement them in your organisation.

Cyber Insurance Readiness

What insurers require and how to ensure you can actually claim when you need to.

M365 Security Checklist

Essential security settings for Microsoft 365 that many organisations miss.