Infostealer malware is not just another cyber threat. It is a silent data thief designed to...
SMB1001: A Cybersecurity Framework Guide for Australian Businesses

First Published:
Content Written For:
Small & Medium Businesses
Large Organisations & Infrastructure
Government
Read Similar Articles
A Guide to NIST Cybersecurity Framework Implementation
Getting a NIST Cybersecurity Framework implementation right is a strategic project, not just a...
What Is an Intrusion Test? A Guide for Australian Businesses
An intrusion test is an authorised, simulated attack on your organisation's systems, networks, or...
What is Endpoint Detection and Response?
Think of Endpoint Detection and Response (EDR) as an elite security detail for every single device...
Your Guide to a Resilient Information Security Policy
An information security policy is the foundational document that outlines your organisation’s...
This article provides a guide to the SMB1001 framework. Cyber attacks now hit Australian businesses every six minutes, according to the ASD Cyber Threat Report 2023. Small and medium businesses bear a disproportionate share of that exposure. They hold valuable client data, process financial transactions, and sit inside larger organisations’ supply chains, yet most lack the resources to pursue enterprise-grade compliance frameworks.
SMB1001 was designed specifically to close that gap. It gives Australian small and medium businesses a structured, tiered pathway to cybersecurity maturity, without the cost or complexity of ISO 27001 or the Essential Eight. For businesses that need credible compliance advisory support to navigate the framework, understanding what each tier requires is the right place to start.
What Is SMB1001?
SMB1001 is a cybersecurity certification standard developed by Dynamic Standards International (DSI), an organisation headquartered in Washington D.C. with an office in Canberra, Australia. DSI designed the framework specifically for small and medium businesses, defined in Australia as organisations with fewer than 200 employees.
The standard operates on a tiered model. Businesses progress through five certification levels, each requiring more advanced controls than the last. This structure allows organisations to start where their resources allow and build incrementally toward a stronger security posture.
How SMB1001 differs from other frameworks
Most cybersecurity frameworks were built for enterprise organisations with dedicated security teams, substantial budgets, and mature governance structures. SMB1001 removes those assumptions. It delivers practical, achievable controls across five domains that any business can implement, regardless of technical maturity.
Furthermore, unlike a point-in-time audit standard, SMB1001 is designed to be updated annually. The current edition is SMB1001:2025, released in September 2024. This approach keeps the framework aligned with evolving threats rather than becoming outdated between editions.
How SMB1001 aligns with other Australian standards
SMB1001 aligns directly with several frameworks relevant to Australian businesses:
- Australian Essential Eight: SMB1001 maps to ASD Essential Eight controls, making it an effective entry point for organisations planning to pursue higher Essential Eight maturity levels.
- ISO 27001: The framework shares structural elements with ISO 27001’s information security management approach, making the transition to full ISO certification more manageable for businesses that have completed higher SMB1001 tiers.
- UK Cyber Essentials and US CMMC: International alignment means SMB1001 certification carries credibility beyond Australian borders, which is increasingly relevant for businesses with international clients or supply chain relationships.
Why Australian Businesses Are Adopting SMB1001
The growth in SMB1001 adoption reflects several converging pressures on Australian small and medium businesses.
The supply chain driver
Larger organisations are increasingly scrutinising the cybersecurity posture of their suppliers. Government agencies, enterprise clients, and financial institutions now ask suppliers to demonstrate measurable security maturity before awarding contracts. A structured compliance programme that produces a recognised certification provides a clear, auditable answer to those requests.
For professional services firms, including legal and accounting practices, this pressure is particularly acute. The Queensland Law Society formally endorsed SMB1001 in 2024, recommending members pursue Gold certification as a reasonable standard for demonstrating cybersecurity due diligence to clients and insurers.
Cyber insurance requirements
Australian insurers are tightening their underwriting criteria. Businesses without documented cybersecurity controls face higher premiums, restricted coverage, or outright rejection. SMB1001 certification provides insurers with evidence of measurable security maturity across defined control domains, which directly supports underwriting assessments.
Regulatory alignment
SMB1001 aligns with key Australian privacy obligations, including the Privacy Act 1988, Australian Privacy Principle 11, and the Notifiable Data Breaches scheme. For businesses subject to those obligations, implementing SMB1001 controls supports compliance without requiring a separate programme.
The Five SMB1001 Certification Tiers
SMB1001 uses five progressive certification levels. Each tier builds directly on the controls established at the level below it. Organisations enter at the tier that reflects their current maturity and advance at a pace that suits their resources and risk profile.
Bronze
Bronze is the entry level. It establishes the fundamental technical controls every business should have in place: active antivirus protection, basic firewall configuration, multi-factor authentication on key accounts, regular software patching, and secure email settings. Bronze certification is achievable through self-assessment and represents the minimum credible baseline for any Australian business operating online.
Silver
Silver builds on Bronze by introducing access control disciplines, basic incident response procedures, and more structured backup practices. At this level, businesses define who has access to what, establish a process for responding to security incidents, and validate that their backup and recovery capability actually works. Silver certification also proceeds through self-assessment.
Gold
Gold is the first tier requiring third-party verification. At this level, an accredited assessor reviews your controls against the standard rather than relying on self-reporting. Gold introduces more rigorous governance requirements, including documented cybersecurity policies, staff training programmes, and vulnerability management processes. The Queensland Law Society specifically recommends Gold as the appropriate target for small and medium legal practices. Businesses pursuing managed compliance services typically find Gold is where external advisory support delivers the most value.
Platinum
Platinum represents advanced security maturity. At this tier, businesses demonstrate continuous monitoring capability, mature incident response, and integration of cybersecurity into broader business risk management. Platinum requires a more comprehensive third-party assessment and is appropriate for organisations with significant client data obligations or supply chain security requirements.
Diamond
Diamond is the highest tier. It reflects an organisation operating at a level of cybersecurity governance comparable to larger enterprise programmes. Achieving Diamond requires demonstrating that security is embedded across the organisation, from board-level governance to operational controls. Third-party assessment at this level is rigorous and comprehensive.
The Five Core Control Domains
Regardless of certification tier, SMB1001 evaluates organisations across five core domains. The depth of control required in each domain increases as you progress through the tiers.
Technology management
This domain covers the technical foundations of your security environment: hardware and software inventory, patch management, secure configuration, firewall management, antivirus and endpoint protection, and vulnerability scanning. Many cyber attacks succeed because of outdated or poorly configured systems, and technology management controls close the most common entry points.
Access control
Access control covers who can access what systems, under what conditions, and with what level of privilege. Controls in this domain include multi-factor authentication, user account management, privileged access governance, and remote access security. Poorly managed access is a primary enabler of ransomware and business email compromise attacks.
Backup and recovery
This domain assesses your data protection and recovery capability. Controls cover backup frequency, offsite or cloud storage, encryption of backup data, and tested recovery procedures. Critically, SMB1001 requires organisations to actually test their recovery capability rather than simply assume backups are working.
Policy development
Policy development covers the governance layer: documented cybersecurity policies, incident response plans, acceptable use policies, and vendor management procedures. At lower tiers, this domain requires basic documentation. At higher tiers, it requires policies that are actively maintained, communicated to staff, and tested through exercises.
Education and training
This domain addresses the human element. Controls cover cybersecurity awareness training for all staff, phishing awareness, and procedures for reporting suspicious activity. Human error remains the most common cause of successful cyber incidents, and education and training controls directly reduce that risk.
SMB1001 vs Essential Eight: Which Does Your Business Need?
Both SMB1001 and the Essential Eight are relevant to Australian businesses, but they serve different purposes and suit different organisations.
The Essential Eight is a set of eight technical mitigation strategies developed by the Australian Signals Directorate. It is mandatory for Commonwealth government agencies and increasingly referenced in government procurement requirements. The Essential Eight is technically precise and carries strong credibility in government and defence supply chains, but it does not include governance, policy, or training domains. Consequently, it addresses technical risk comprehensively but does not produce a holistic security programme.
SMB1001, by contrast, covers all five domains including governance and training. It is designed for organisations that need a complete security foundation rather than a narrow set of technical controls. SMB1001 is also certifiable through an accredited body, which produces a tangible credential. Essential Eight maturity levels are assessed but not formally certified in the same way.
For businesses primarily serving government or operating in the defence supply chain, the Essential Eight is the more relevant framework. For businesses focused on private sector clients, professional services, or supply chain credibility, SMB1001 is often the more practical choice. Many organisations benefit from both, starting with SMB1001 and layering Essential Eight maturity on top.
How to Get SMB1001 Certified
Certification follows a clear process that varies depending on the tier you are targeting.
Self-assessment levels: Bronze and Silver
Bronze and Silver certification begins with a self-assessment against the standard’s control requirements. Organisations work through each control domain, document their current state, and identify gaps. Certification is then applied for through CyberCert, the independent certification body established to administer SMB1001 assessments in Australia. For most businesses, the Bronze self-assessment takes a few days and produces a clear picture of where gaps exist.
Third-party audit levels: Gold, Platinum, and Diamond
From Gold upward, an accredited assessor must independently verify your controls. The assessor reviews documentation, interviews relevant staff, and tests key controls to confirm they operate as documented. Engaging a qualified advisory partner to prepare for this assessment significantly reduces the time to certification and the risk of finding critical gaps during the formal audit.
The certification body
CyberCert administers SMB1001 certification in Australia. Organisations register through the CyberCert platform, complete their assessment at the appropriate tier, and receive a time-limited certification that requires periodic renewal. The renewal cycle encourages ongoing improvement rather than one-off compliance.
SMB1001 as a Stepping Stone to ISO 27001 and SOC 2
For many Australian businesses, SMB1001 is not a destination but a starting point. Organisations that complete the higher SMB1001 tiers build a governance foundation, control documentation, and operational security discipline that directly supports progression to ISO 27001 or SOC 2.
ISO 27001 requires a full information security management system, extensive documentation, and third-party certification audit. Businesses that have completed SMB1001 Gold or Platinum arrive at ISO 27001 implementation with policies, procedures, and trained staff already in place. CyberPulse’s ISO 27001 audit services coordinate both implementation and the certification audit in a single managed engagement, which is a natural next step for businesses that have outgrown SMB1001.
Similarly, SOC 2 is increasingly required by technology businesses and professional services firms that handle client data. The governance and policy disciplines developed through SMB1001 Platinum or Diamond provide a strong foundation for a SOC 2 readiness programme.
In short, SMB1001 is not a lesser standard. It is the right-sized entry point into a broader compliance journey.
Who Should Prioritise SMB1001?
SMB1001 is most valuable for Australian businesses in specific situations.
Professional services firms, including legal practices, accounting firms, and financial advisers, face growing client expectations around data security. SMB1001 provides a credible, auditable answer to those expectations. The Queensland Law Society’s endorsement of the standard specifically for law firms reflects this reality.
Businesses in enterprise supply chains face increasing scrutiny from their larger clients. A recognised SMB1001 certification demonstrates security maturity to procurement teams without requiring the full overhead of ISO 27001.
Technology and SaaS businesses increasingly find that enterprise clients require evidence of security controls before entering commercial agreements. SMB1001 Gold or above provides that evidence at a cost and complexity level appropriate for growing businesses.
Organisations planning to pursue cyber insurance or renew existing coverage benefit from SMB1001 certification as documented evidence of measurable security investment.
For each of these audiences, the right cybersecurity compliance advisory partnership makes the difference between a compliance programme that stalls and one that reaches certification efficiently.
What Comes After Certification
Achieving SMB1001 certification is a milestone, not a finish line. The threat landscape changes continuously, and the standard itself updates annually. Maintaining certification requires ongoing attention to control effectiveness, staff training currency, and policy relevance.
At higher tiers, this means periodic reassessment, continuous monitoring of your environment, and documented evidence that controls remain effective over time. Organisations that approach SMB1001 as an ongoing programme rather than a one-off project build security maturity that compounds over time, rather than eroding between certification cycles.
Higher-tier organisations should also consider whether their current penetration testing services adequately validate their technical controls. Regular security testing produces the evidence that assessors and insurers require, and closes gaps that policy and configuration controls alone cannot address.
Related Services
- ISO 27001 Certification Services Australia
- GRC & Advisory Services Australia
- Penetration Testing Services Australia
Useful Links
External Resources
Browse to Read Our Most Recent Articles & Blogs
Subscribe for Early Access to Our Latest Articles & Resources
Connect with us on Social Media
