🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Step-by-Step Security Awareness Training Program to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.3

Practical, step-by-step guidance for building a security awareness training program that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AT.L2-3.2.3) requirements for handling Controlled Unclassified Information (CUI).

•
March 27, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control AT.L2-3.2.3 requires a documented and repeatable security awareness training program that ensures personnel understand cybersecurity risks, safe behavior, and how to report incidents—this post gives a practical, step-by-step approach you can implement today, with real-world examples and the artifacts auditors will expect.

Understanding the requirement and key objectives

AT.L2-3.2.3 maps to the NIST 800-171 "Awareness and Training" family: personnel must be guided to recognize threats (phishing, social engineering, malicious code), handle Controlled Unclassified Information (CUI) appropriately, and report suspected incidents. Key compliance objectives are: 1) documented training policy and schedule, 2) role-based training content, 3) proof of completion and metrics, and 4) evidence you used results to improve controls (e.g., reducing click rates). For small organizations this translates to a low-friction program that integrates onboarding, annual refreshers, and targeted campaigns for high-risk roles.

Step-by-step implementation

1) Create a concise training policy and assign roles

Start with a short "Security Awareness Training Policy" that states who must be trained (all employees, contractors, temporary staff), frequency (onboarding + annual minimum; high-risk roles quarterly), acceptable training delivery formats (LMS, classroom, live demo), and reporting/discipline for noncompliance. Assign an owner—often HR or IT—who will run enrollment, reporting, and retention of artifacts. For compliance, include approval dates and versioning on the policy.

2) Build a role-based curriculum and choose delivery mechanisms

Define mandatory modules and role-specific modules. Core modules for everyone: phishing/social engineering, password hygiene & MFA, device and physical security, safe handling of CUI, remote work security, and incident reporting procedures. Role-specific examples: developers get secure coding and code repo hygiene; finance gets wire-redirect fraud detection; system admins get privileged access and least-privilege principles. Use an LMS that supports SCORM/xAPI or an SSO integration so completion records are auditable. Technical notes: host SCORM packages or use SaaS providers (KnowBe4, Proofpoint, or lower-cost options). Integrate training enrollment with HR/AD/Okta so onboarding automatically assigns required modules and termination revokes access and training enrollments.

3) Measure effectiveness: simulations, metrics, and tuning

Put measurable KPIs in place: phishing click rate, time-to-report, training completion rate, and number of reported suspicious emails. Run controlled phishing simulations quarterly (or monthly if you can) and track results by department and user risk profile. Tie simulation data to corrective actions—require targeted retraining for users who click. Integrate phishing reports into your SIEM or ticketing system (e.g., a mailbox that forwards to SOAR) so analysts can correlate reported indicators with delivered payloads and take remediation steps. Keep logs (timestamps, emails, user IDs) and anonymized trend dashboards for audits.

4) Document artifacts and maintain evidence for auditors

Auditors will want: the training policy, curriculum outlines, evidence of delivery (LMS completion records or signed attendance sheets), phishing simulation reports, remediation records, and metrics dashboards. Maintain these artifacts for the required retention period (typically at least the life of the contract and per any DFARS/NARA clauses). Use immutable storage for evidentiary records when possible—export LMS reports to PDF with timestamped filenames and store checksums in your evidence repository to prove non-repudiation.

Small-business real-world scenario and compliance tips

Example: A 25-person small defense subcontractor wins a DoD contract requiring CUI protection. Implementation path: 1) Draft a one-page training policy and get CEO signoff. 2) Use Microsoft 365 Defender combined with Microsoft Learn security modules and a low-cost phishing simulator (or free trials) to run initial campaigns. 3) Automate training assignment using Azure AD group membership so new hires get onboarding courses automatically. 4) Keep a compliance spreadsheet or use SharePoint to store completion records; export quarterly reports to PDF for the contract file. Technical hardening to pair with training: enable MFA for all accounts, enforce password length/rotation rules in AD/Okta, apply Exchange Online Protection + SPF/DKIM/DMARC to reduce phishing delivery, and restrict Office macro execution via GPO or Intune. Compliance tips: start small, document every decision, and demonstrate continuous improvement by showing reduced click rates and targeted retraining actions.

Risks of not implementing AT.L2-3.2.3

Failing to implement a structured awareness program increases the probability of successful phishing, credential theft, and CUI exfiltration. For a small business this can mean immediate loss of contract eligibility, regulatory penalties, breach remediation costs, and reputational damage. From a technical perspective, lack of user training leads to higher incidence of unsafe behaviors (enabling macros, responding to spear-phish, poor password reuse), which defeats preventive controls and burdens detection/response teams.

Summary: Build a simple, auditable security awareness program by writing a policy, developing role-based training, automating assignment with HR/SSO integrations, measuring effectiveness with phishing simulations and KPIs, and keeping clear artifacts for assessment. Combining these programmatic steps with practical technical controls (MFA, email authentication, GPO/Intune policy, EDR) ensures you meet AT.L2-3.2.3 and materially reduce risk to CUI—while keeping the process achievable for small businesses competing for DoD work.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes