<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
 <!ENTITY nbsp "&#160;">
 <!ENTITY zwsp "&#8203;">
 <!ENTITY nbhy "&#8209;">
 <!ENTITY wj "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hillier-certisyn-essential-eight-verified-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
 <!-- xml2rfc v2v3 conversion 3.33.0 -->
 <front>
 <title abbrev="Essential Eight Verified">Essential Eight Verified — A Cryptographic Verification Standard for the ACSC Essential Eight Maturity Model</title>
 <seriesInfo name="Internet-Draft" value="draft-hillier-certisyn-essential-eight-verified-00"/>
 <author initials="J. D." surname="Hillier" fullname="Joel David Hillier">
 <organization>Certisyn, Inc.</organization>
 <address>
 <email>jhillier@certisyn.com</email>
 <uri>https://certisyn.com/</uri>
 </address>
 </author>
 <date year="2026" month="May" day="13"/>
 <abstract>
 <?line 45?>

<t>This document specifies a verification standard for the cryptographic attestation of conformance to the Australian Cyber Security Centre (ACSC) Essential Eight Maturity Model. It defines the Verification Reconciliation Object (VRO), the issuing-partner framework, the evidence categories required for each of the eight controls of the Essential Eight, the three maturity-attestation levels, and the cryptographic continuity requirements that together produce deterministic, independently reconstructable, auditor-grade attestations of cybersecurity posture. The standard sits beneath the ACSC Essential Eight Maturity Model and produces the verifiable artefact the model was designed to imply but does not deliver.</t>
 </abstract>
 </front>
 <middle>
 <?line 49?>

<section anchor="introduction">
 <name>Introduction</name>
 <t>The ACSC Essential Eight Maturity Model <xref target="ACSC-E8"/> is the de facto baseline for cybersecurity posture across Australian government suppliers, regulated industries, and critical infrastructure. It is referenced in procurement criteria, regulatory expectations, insurance underwriting questionnaires, and intergovernmental supplier assurance frameworks.</t>
 <t>The Essential Eight Maturity Model is, however, a self-attested instrument. The ACSC publishes the framework but does not maintain a certification regime, an auditor accreditation scheme, or a verification artefact. Suppliers asserting Essential Eight alignment produce policy documents and internal self-assessments. Buyers asserting Essential Eight reliance accept those self-assessments at face value or commission ad-hoc third-party reviews that are not interoperable across engagements.</t>
 <t>This document closes that gap. It defines the verification artefact, the issuing-partner framework, the evidence requirements, the maturity attestation methodology, and the cryptographic continuity requirements that together produce a deterministic, auditor-grade Essential Eight attestation.</t>
 <t>This document does not replace the ACSC Maturity Model. It sits beneath the model and produces the artefact the model was designed to imply but does not deliver. Where this document and the ACSC Maturity Model conflict on operational content, the ACSC Maturity Model prevails.</t>
 </section>
 <section anchor="conventions-and-definitions">
 <name>Conventions and Definitions</name>
 <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
 <?line -18?>

<t>For the purposes of this document, the following definitions apply.</t>
 <dl>
 <dt>Subject Entity:</dt>
 <dd>
 <t>The organisation whose Essential Eight conformance is the subject of verification.</t>
 </dd>
 <dt>Verification Reconciliation Object (VRO):</dt>
 <dd>
 <t>The deterministic, cryptographically anchored output of a conforming Essential Eight attestation under this standard.</t>
 </dd>
 <dt>Issuing Partner:</dt>
 <dd>
 <t>A counterparty designated by the protocol operator to act as a co-issuer of VROs under this standard within a defined market or scope.</t>
 </dd>
 <dt>Attestation Period:</dt>
 <dd>
 <t>The contiguous time interval over which a VRO asserts conformance, bounded by an Anchor Event at each terminus.</t>
 </dd>
 <dt>Anchor Event:</dt>
 <dd>
 <t>The cryptographic operation that binds a VRO to an immutable public settlement layer at issuance and at supersession.</t>
 </dd>
 <dt>Maturity Level:</dt>
 <dd>
 <t>One of three levels (One, Two, Three) defined in the ACSC Essential Eight Maturity Model, against which conformance is asserted.</t>
 </dd>
 <dt>Conformance Claim:</dt>
 <dd>
 <t>An assertion by the Subject Entity, made within a VRO, that operational practice meets the requirements of a stated Maturity Level for a specified set of Essential Eight controls.</t>
 </dd>
 <dt>Evidence Artefact:</dt>
 <dd>
 <t>Any document, telemetry record, configuration snapshot, log extract, or attestation produced in support of a Conformance Claim.</t>
 </dd>
 <dt>Supersession:</dt>
 <dd>
 <t>The lifecycle event by which a new VRO replaces a prior VRO in the chain of attestation for a Subject Entity.</t>
 </dd>
 </dl>
 </section>
 <section anchor="architectural-overview">
 <name>Architectural Overview</name>
 <t>Conforming attestations under this standard are produced by a verification infrastructure organised as five architectural components. Internal design, scoring methodology, and calibration logic are not in scope for this document and are governed by the protocol operator's intellectual property framework.</t>
 <t>The Evidence Ingestion and Normalization Layer accepts Evidence Artefacts from Subject Entity systems and produces canonical inputs for downstream reconciliation.</t>
 <t>The Reconciliation Confidence Engine reconciles Conformance Claims against normalised evidence and produces a deterministic reconciliation output.</t>
 <t>The Verification State Machine maintains the lifecycle state of each VRO through intake, evidence ingestion, reconciliation, anchoring, issuance, supersession, and revocation.</t>
 <t>Entity Graph Propagation propagates verification state across related entities where continuity is in scope.</t>
 <t>The Attestation Protocol produces the final VRO, performs the Anchor Event, registers the artefact in the public attestation registry, and binds the issuing-partner identity to the artefact.</t>
 <t>Conforming attestations are deterministic. Given the same Conformance Claims and the same Evidence Artefacts processed through the same Attestation Protocol version, the same VRO <bcp14>SHALL</bcp14> be produced.</t>
 </section>
 <section anchor="essential-eight-verification-requirements">
 <name>Essential Eight Verification Requirements</name>
 <t>The following subsections specify, for each of the eight controls in the ACSC Essential Eight Maturity Model, the Subject Claim that is the object of verification, the categories of Evidence Artefact that <bcp14>SHALL</bcp14> be ingested and reconciled, the verification expectation applied by the Reconciliation Confidence Engine, and the anchoring requirement that binds the resulting VRO to the public settlement layer.</t>
 <section anchor="control-1-application-control">
 <name>Control 1: Application control</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity restricts execution of unauthorised applications across all in-scope endpoints, consistent with the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Application allow-list policy artefact; endpoint enforcement telemetry; deviation log; periodic review records; exception register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared allow-list against enforcement evidence with continuity across the Attestation Period; exception cases reconciled against the exception register.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Each issued VRO under this control <bcp14>SHALL</bcp14> be anchored at Attestation Period start and end. Mid-period deviations producing a state change require a supersession anchor.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-2-patch-applications">
 <name>Control 2: Patch applications</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity applies vendor-supplied security patches to in-scope applications within timeframes consistent with the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Application inventory; patch availability metadata; patch deployment telemetry; vulnerability scan output; exceptions and compensating-control register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Temporal reconciliation of patch availability date against deployment date across the in-scope application population. Exceptions reconciled against compensating controls evidence.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at Attestation Period start, end, and any material change in patch posture.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-3-configure-microsoft-office-macro-settings">
 <name>Control 3: Configure Microsoft Office macro settings</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity has configured Microsoft Office macro settings consistent with ACSC guidance and the asserted Maturity Level, and operates an audit cadence to detect drift.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Group Policy artefacts or equivalent configuration management evidence; endpoint configuration snapshots; macro source attestation where macros are permitted; exception register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared configuration against endpoint snapshots; reconciliation of permitted macro inventory against signed-source attestations.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at issuance; supersession on any change to macro policy or scope of permitted use.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-4-user-application-hardening">
 <name>Control 4: User application hardening</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity has hardened user-facing applications consistent with ACSC guidance for the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Hardening policy artefact; endpoint configuration baseline; periodic configuration audit output; exception register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared hardening baseline against measured endpoint state. Drift items reconciled against remediation evidence.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at issuance; supersession on baseline change or material drift remediation.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-5-restrict-administrative-privileges">
 <name>Control 5: Restrict administrative privileges</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity restricts the assignment and use of administrative privileges consistent with the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Privilege assignment register; access review records; privileged session monitoring telemetry; account separation evidence; just-in-time elevation telemetry where in scope.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared privilege model against assignment register; reconciliation of access reviews against scheduled cadence; reconciliation of session monitoring evidence against asserted controls.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at issuance and at the conclusion of each scheduled access review cycle within the Attestation Period.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-6-patch-operating-systems">
 <name>Control 6: Patch operating systems</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity applies vendor-supplied security patches to operating systems within timeframes consistent with the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Operating-system inventory; patch availability metadata; patch deployment telemetry; vulnerability scan output; compensating-control register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Temporal reconciliation of patch availability date against deployment date across the in-scope operating-system population.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at Attestation Period start, end, and any material change in patch posture.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-7-multi-factor-authentication">
 <name>Control 7: Multi-factor authentication</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity enforces multi-factor authentication consistent with the population and access-context scope required at the asserted Maturity Level.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>MFA enrolment register; identity-provider telemetry; coverage report by user population and access context; phishing-resistance attestation where applicable; exception register.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared MFA scope against identity-provider telemetry; reconciliation of asserted phishing-resistance properties against enrolment evidence.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at issuance and at each material change in MFA scope, factor type, or enforcement state.</t>
 </dd>
 </dl>
 </section>
 <section anchor="control-8-regular-backups">
 <name>Control 8: Regular backups</name>
 <dl>
 <dt>Subject Claim:</dt>
 <dd>
 <t>The Subject Entity maintains regular backups of important data, software, and configuration consistent with the asserted Maturity Level, and validates recoverability.</t>
 </dd>
 <dt>Evidence Categories:</dt>
 <dd>
 <t>Backup policy artefact; backup execution telemetry; recovery test records; immutability evidence for the asserted retention period; access-control evidence for backup systems.</t>
 </dd>
 <dt>Verification Expectation:</dt>
 <dd>
 <t>Reconciliation of declared backup cadence against execution telemetry; reconciliation of asserted immutability properties against backup-store configuration evidence; reconciliation of recovery test cadence and outcomes against declared schedule.</t>
 </dd>
 <dt>Anchor Requirement:</dt>
 <dd>
 <t>Anchored at issuance and at each completed recovery validation cycle within the Attestation Period.</t>
 </dd>
 </dl>
 </section>
 </section>
 <section anchor="maturity-level-attestation">
 <name>Maturity Level Attestation</name>
 <t>The ACSC Essential Eight Maturity Model defines three Maturity Levels — One, Two, and Three — each progressively more rigorous in operational expectation, scope, and adversarial threat model. A conforming VRO under this standard <bcp14>SHALL</bcp14> attest a Maturity Level for each of the eight controls. Different controls <bcp14>MAY</bcp14> attest at different Maturity Levels within a single VRO; the overall VRO attestation is the minimum Maturity Level attested across the eight controls unless otherwise asserted.</t>
 <t>Maturity Level One verification requirements reflect the operational expectations defined by the ACSC for Level One: protection against adversaries opportunistically leveraging publicly available exploit tradecraft. Evidence requirements emphasise the existence of declared controls and basic enforcement evidence over an Attestation Period of at least three (3) consecutive months.</t>
 <t>Maturity Level Two verification requirements reflect the ACSC's Level Two expectation of protection against adversaries operating with a moderate level of capability and investment. Evidence requirements add depth of telemetry, periodic review evidence, and exception-handling discipline over an Attestation Period of at least six (6) consecutive months.</t>
 <t>Maturity Level Three verification requirements reflect the ACSC's Level Three expectation of protection against adversaries with significant capability, investment, and willingness to invest in tailored tradecraft. Evidence requirements add continuity, defence-in-depth evidence, and adversarial-resistance attestations over an Attestation Period of at least twelve (12) consecutive months.</t>
 <t>A Subject Entity that progresses from one Maturity Level to a higher level for any control <bcp14>SHALL</bcp14> be issued a superseding VRO that records the progression, the date of progression, and the Anchor Event binding the new attestation. The prior VRO is not deleted; it is preserved in the chain and marked as superseded.</t>
 </section>
 <section anchor="verification-reconciliation-object-vro">
 <name>Verification Reconciliation Object (VRO)</name>
 <t>A conforming VRO under this standard <bcp14>SHALL</bcp14> contain, at minimum, the following content elements:</t>
 <ul spacing="normal">
 <li>
 <t>Subject Entity identifier and metadata sufficient to establish identity under the relevant jurisdiction.</t>
 </li>
 <li>
 <t>Attestation Period start and end timestamps.</t>
 </li>
 <li>
 <t>Maturity Level attested for each of the eight Essential Eight controls.</t>
 </li>
 <li>
 <t>Conformance Claims as asserted by the Subject Entity.</t>
 </li>
 <li>
 <t>Evidence categories ingested and the reconciliation outcome for each.</t>
 </li>
 <li>
 <t>Issuing Partner identity and seat designation.</t>
 </li>
 <li>
 <t>Anchor Event identifiers binding the VRO to the public settlement layer.</t>
 </li>
 <li>
 <t>Verification State Machine state at issuance.</t>
 </li>
 <li>
 <t>Supersession chain reference, where this VRO supersedes a prior VRO.</t>
 </li>
 <li>
 <t>Conformance statement of this standard, version 1.0.</t>
 </li>
 </ul>
 <t>A VRO <bcp14>MAY</bcp14> be issued only by a designated Issuing Partner. Issuing Partner identity is bound to the VRO at the Anchor Event and is independently verifiable through the public attestation registry.</t>
 <t>A VRO <bcp14>MAY</bcp14> be revoked by the Issuing Partner upon determination of material non-conformance, evidence falsification, or other circumstances rendering the original attestation unreliable. Revocation does not delete the VRO; it records a revocation state, the revocation reason class, and the Anchor Event binding the revocation to the public settlement layer. Supersession is the ordinary lifecycle event by which a current VRO is replaced; revocation is reserved for circumstances of attestation failure.</t>
 <t>Each issued VRO <bcp14>SHALL</bcp14> be registered in the public attestation registry. Registry entries <bcp14>SHALL</bcp14> be queryable by Subject Entity identifier, Issuing Partner, Anchor Event, and supersession chain.</t>
 </section>
 <section anchor="issuing-partner-requirements">
 <name>Issuing Partner Requirements</name>
 <t>An organisation seeking designation as an Issuing Partner under this standard <bcp14>SHALL</bcp14> demonstrate, at minimum:</t>
 <ul spacing="normal">
 <li>
 <t>Operational capacity to assess Essential Eight conformance across the eight controls at the Maturity Level for which issuance is sought.</t>
 </li>
 <li>
 <t>Demonstrable competence in the relevant subject matter.</t>
 </li>
 <li>
 <t>Independence from the Subject Entity at the engagement level, with declared conflicts of interest disclosed and managed.</t>
 </li>
 <li>
 <t>Adherence to the protocol operator's Partner Code of Conduct.</t>
 </li>
 <li>
 <t>Acceptance of the Designation Schedule terms applicable to the relevant market and seat.</t>
 </li>
 </ul>
 <t>An Issuing Partner <bcp14>SHALL NOT</bcp14>, for a given Subject Entity engagement, simultaneously act as the implementing vendor, system integrator, or operator of the controls being verified. Where an Issuing Partner has performed implementing work for a Subject Entity, a defined cooling-off interval and an independence declaration <bcp14>SHALL</bcp14> be observed before that Issuing Partner may issue a VRO for the same Subject Entity.</t>
 </section>
 <section anchor="cryptographic-continuity-requirements">
 <name>Cryptographic Continuity Requirements</name>
 <t>Each VRO <bcp14>SHALL</bcp14> be cryptographically anchored to an immutable public settlement layer at the Anchor Event. The hash committed at the Anchor Event <bcp14>SHALL</bcp14> be a one-way function of the VRO content, Issuing Partner identity, and timestamp, computed under a digest algorithm of at least 256-bit strength.</t>
 <t>A VRO issued under this standard <bcp14>SHALL</bcp14> remain a conforming artefact across regulatory regime changes occurring within or after the Attestation Period. Conformance to this standard is bound to the standard version at issuance; subsequent standard versions do not retroactively alter the conformance state of previously issued VROs.</t>
 <t>The Anchor Event binding <bcp14>SHALL</bcp14> remain independently verifiable in the event of the protocol operator ceasing to operate the verification infrastructure. The public settlement layer is selected on the criterion that no single private operator can extinguish the binding.</t>
 </section>
 <section anchor="standards-alignment">
 <name>Standards Alignment</name>
 <t>This standard is interoperable with adjacent international and national standards. Conforming VROs <bcp14>MAY</bcp14> be referenced within the audit and certification artefacts produced under the following frameworks.</t>
 <t>ISO/IEC 27001:2022 <xref target="ISO27001"/>: Essential Eight controls map to specific Annex A controls. Conforming VROs <bcp14>MAY</bcp14> be cited as evidence of operational implementation of those Annex A controls.</t>
 <t>ISO/IEC 27002:2022 <xref target="ISO27002"/>: Implementation guidance for the Annex A controls cited above is consistent with the evidence categories specified herein.</t>
 <t>SOC 2 Trust Services Criteria: Conforming VROs <bcp14>MAY</bcp14> be cited within SOC 2 reports as evidence of controls operating effectively over the relevant Attestation Period.</t>
 <t>ACSC Essential Eight Maturity Model <xref target="ACSC-E8"/> remains authoritative for the operational definition of each control. This standard adds a verification layer without redefining operational content.</t>
 </section>
 <section anchor="conformance">
 <name>Conformance</name>
 <t>An attestation artefact <bcp14>MAY</bcp14> claim conformance to this standard if and only if it satisfies every requirement specified in this document. Partial conformance is not recognised. Variant conformance to a subset of controls without the full Essential Eight scope is not recognised.</t>
 <t>The public attestation registry constitutes the authoritative record of issued VROs. Inclusion in the registry is necessary for conformance recognition; exclusion from the registry, regardless of any other instrument, precludes recognition under this standard.</t>
 </section>
 <section anchor="iana-considerations">
 <name>IANA Considerations</name>
 <t>This document has no IANA actions.</t>
 </section>
 <section anchor="security-considerations">
 <name>Security Considerations</name>
 <t>The integrity of an attestation under this standard depends on the independence of the issuing rail, the determinism of the reconciliation engine, and the survivability of the cryptographic anchor.</t>
 <t>Issuing Partners are required to be independent from the Subject Entity at the engagement level. Operators of this standard <bcp14>SHOULD</bcp14> audit independence declarations periodically.</t>
 <t>The Anchor Event is the binding mechanism. Implementations <bcp14>SHOULD</bcp14> use a digest algorithm of at least 256-bit strength and <bcp14>SHOULD</bcp14> select a public settlement layer with no single private operator capable of extinguishing the binding.</t>
 <t>Revocation procedures defined herein prevent silent acceptance of attestations whose underlying evidence has been later determined to be falsified or materially incomplete.</t>
 <t>This standard does not address physical security of the Subject Entity, regulatory compliance beyond Essential Eight scope, or the correctness of the ACSC Maturity Model itself.</t>
 </section>
 </middle>
 <back>
 <references anchor="sec-combined-references">
 <name>References</name>
 <references anchor="sec-normative-references">
 <name>Normative References</name>
 <reference anchor="RFC2119">
 <front>
 <title>Key words for use in RFCs to Indicate Requirement Levels</title>
 <author fullname="S. Bradner" initials="S." surname="Bradner"/>
 <date month="March" year="1997"/>
 <abstract>
 <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
 </abstract>
 </front>
 <seriesInfo name="BCP" value="14"/>
 <seriesInfo name="RFC" value="2119"/>
 <seriesInfo name="DOI" value="10.17487/RFC2119"/>
 </reference>
 <reference anchor="RFC8174">
 <front>
 <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
 <author fullname="B. Leiba" initials="B." surname="Leiba"/>
 <date month="May" year="2017"/>
 <abstract>
 <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
 </abstract>
 </front>
 <seriesInfo name="BCP" value="14"/>
 <seriesInfo name="RFC" value="8174"/>
 <seriesInfo name="DOI" value="10.17487/RFC8174"/>
 </reference>
 </references>
 <references anchor="sec-informative-references">
 <name>Informative References</name>
 <reference anchor="ACSC-E8" target="https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/essential-eight/essential-eight-maturity-model">
 <front>
 <title>Essential Eight Maturity Model</title>
 <author initials="A. C. S." surname="Centre" fullname="Australian Cyber Security Centre">
 <organization/>
 </author>
 <date year="2024"/>
 </front>
 </reference>
 <reference anchor="ISO27001">
 <front>
 <title>Information security, cybersecurity and privacy protection — Information security management systems — Requirements</title>
 <author initials="I. O. for" surname="Standardization" fullname="International Organization for Standardization">
 <organization/>
 </author>
 <date year="2022"/>
 </front>
 <seriesInfo name="ISO/IEC" value="27001:2022"/>
 </reference>
 <reference anchor="ISO27002">
 <front>
 <title>Information security, cybersecurity and privacy protection — Information security controls</title>
 <author initials="I. O. for" surname="Standardization" fullname="International Organization for Standardization">
 <organization/>
 </author>
 <date year="2022"/>
 </front>
 <seriesInfo name="ISO/IEC" value="27002:2022"/>
 </reference>
 </references>
 </references>
 <?line 331?>

<section numbered="false" anchor="acknowledgments">
 <name>Acknowledgments</name>
 <t>The author thanks the ANZ Founding Partner cohort for early review of this draft.</t>
 </section>
 </back>
 </rfc>
