Basic Report
$500 ex GST
- Initial gap analysis
- Core control coverage snapshot
- High-level risk indicators
- Priority uplift suggestions
DISP LEVEL 2 • DEFENCE INDUSTRY SECURITY PROGRAM
WebSoul Digital helps suppliers assess, evidence, uplift, and maintain DISP Level 2 posture across Governance, Personnel, Physical, and ICT/Cyber security.
Need guidance? Our team can walk you through each stage.
Assessment, evidence mapping, uplift, validation, and ongoing assurance support.
Specialised staffing support for security-sensitive federal government and critical delivery programs.
Risk-based control uplift, executive assurance reporting, and audit readiness operations.
Embedded support to deliver secure program outcomes, not just compliance artefacts.
Built for organisations at different stages of their DISP journey.
$500 ex GST
Recommended
$1,000 ex GST
$1,500 ex GST
Representative organisations we support across government-aligned and security-sensitive delivery environments.
| Capability | Basic | Full | Express |
|---|---|---|---|
| Four-pillar DISP mapping | Partial | Complete | Complete |
| Risk-weighted scoring | Summary | Detailed | Detailed |
| Evidence sufficiency analysis | Limited | Comprehensive | Comprehensive |
| Prioritised action roadmap | Top items | Full roadmap | Full roadmap |
| Priority turnaround | No | Standard | Yes |
Policy, registers, ASR/audit readiness, reporting obligations.
Screening, clearance mapping, training, insider-risk controls.
Access zones, site controls, PED handling, asset/container controls.
Essential Eight ML2 evidence stream, incident and control validation.
AI-assisted evidence mapping, Essential Eight ML2 validation, and ongoing assurance across all four DISP pillars.
| Stage | What happens | Output |
|---|---|---|
| Ingest | Policies, registers, procedures, technical exports, prior assessments are collected. | Normalised evidence intake |
| Map | Artefacts mapped to controls, sub-controls and expected evidence points. | Source-to-control matrix |
| Validate | Evidence quality grading and Essential Eight ML2 technical validation. | Confidence-rated control results |
| Remediate | Risk-based findings assigned with owners, due dates, exceptions, and retest path. | Managed uplift workflow |
| Operate | Dashboards + ASR, audit, client, and executive reporting cadence. | Ongoing assurance capability |
Tool-derived, tested, or directly observed evidence.
System records with clear ownership and date lineage.
Partial/indirect evidence; remediation still required.
Narrative-only, stale, inconsistent, or unverified evidence.
| Phase | Purpose | Primary outputs |
|---|---|---|
| 1. Mobilise | Confirm target level, scope, facilities, workforce and ICT boundaries. | Scope statement and assessment plan |
| 2. Ingest & Map | Classify evidence and map artefacts to controls. | Evidence inventory and preliminary gaps |
| 3. Assess & Validate | Run pillar workshops and E8 ML2 technical validation. | Readiness score and technical findings |
| 4. Design Uplift | Prioritise remediation with owners and deadlines. | Risk-based uplift roadmap |
| 5. Remediate & Verify | Implement, retest, and close actions (or accept exceptions). | Verified closures and exception register |
| 6. Operate & Assure | Sustain posture with ASR and audit readiness cadence. | ASR pack, audit pack, executive reporting |
Important: assessments distinguish documentary readiness from independently verified operational effectiveness. Final accreditation decisions remain with the relevant authorities.
WebSoul Digital is an Australian security and digital delivery team focused on practical compliance outcomes for Defence suppliers.
Our methodology is designed as an operating model, not a one-off gap review. We combine policy alignment, evidence governance, technical validation, and ongoing assurance into a repeatable DISP delivery framework.
Cross-functional practitioners across governance, personnel, physical security, cyber assurance, and technical implementation.
Add your verified memberships, accreditations, and industry associations here (e.g., relevant security/industry bodies).
Tell us your current stage and we’ll recommend the right package.
Moving forward, please attach your current policies, procedures, and supporting artefacts so we can run a structured readiness review.