🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build and Implement a Cybersecurity Awareness Program to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-2: Step-by-Step Checklist

Step-by-step checklist to build and implement a cybersecurity awareness program that satisfies ECC 2:2024 Control 1-10-2 requirements for small businesses seeking Compliance Framework alignment.

March 26, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step checklist to design, implement, and evidence a cybersecurity awareness program that satisfies Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-10-2 under the Compliance Framework, with specific implementation notes, risk considerations, and small-business examples to make compliance achievable and defensible.

Understanding Control 1-10-2 and key objectives

Control 1-10-2 requires organizations to implement an ongoing cybersecurity awareness and training program that ensures staff understand their responsibilities, recognize common threats (phishing, social engineering, credential theft), and can follow reporting and escalation procedures. Key objectives under the Compliance Framework are: maintain documented training materials and schedules; provide role-based training (e.g., finance, IT, execs); run simulated exercises and measure effectiveness; and retain artifacts that demonstrate continual improvement and management oversight.

Practical implementation notes specific to the Compliance Framework

For Compliance Framework alignment, treat the awareness program as a process with defined inputs/outputs. Assign an awareness owner (job title and responsibilities documented in the control library), map training to the organization's risk register and job roles, and include evidence types an auditor expects: training rosters, completion certificates, simulated phishing campaign reports, policy updates, minutes from management reviews, and a continuous improvement log. Technical evidence should include configuration screenshots (LMS enrollment settings, phishing tool campaigns), timestamps, and hashed copies of distributed training material to prove immutability if needed.

Step-by-step checklist (practical actions)

Use the following ordered checklist as an operational playbook to meet Control 1-10-2. Adapt frequency and depth to your organization size and risk profile—small businesses can follow a scaled version with low-cost tools and clear documentation.

  1. Appoint an awareness owner and steering sponsor: record responsibility in governance docs and assign a budget line.
  2. Conduct a baseline risk and audience analysis: map business roles (finance, HR, IT, exec) and identify 10–15 priority threats from the risk register.
  3. Create a role-based training matrix: define required modules per role, minimum completion times (e.g., 30–60 mins annually + quarterly microlearning), and onboarding requirements.
  4. Select delivery and simulation tools: for low cost use open-source GoPhish or low-tier SaaS like KnowBe4; ensure the tool can export CSV reports and has scheduling APIs for automation.
  5. Draft policies and reporting channels: Acceptable Use, Incident Reporting (security@company.local or a ticket queue), and a whistleblower route; publish on intranet and include links in training.
  6. Run baseline simulated phishing and social-engineering tests: safely seed campaigns to measure click/report rates; exclude HR-sensitive groups; capture raw email headers and campaign metadata for audit evidence.
  7. Deliver mandatory training and record completions in an LMS or spreadsheet with unique user IDs, timestamps, module versions, and trainer/version hashes.
  8. Measure and set KPIs: target phish click rate reduction (example: from 25% baseline to <5% in 12 months), reporting rate >60%, training completion >95%, and quarterly review of KPIs with leadership.
  9. Remediate and re-train based on results: automate re-training for users who fail simulations; keep a log of remediation actions and timelines.
  10. Maintain continuous improvement: update content after incidents, threat intelligence updates, or once a year; keep version history of all materials.

Technical details and tooling tips

Integrate your awareness tooling with other security systems for better visibility: forward phishing reports to your SIEM or ticketing system, tag simulated emails in mail flow rules (use an internal subdomain with proper SPF/DKIM setup to avoid delivery issues), and store campaign logs in a secure S3 bucket with server-side encryption and object versioning for auditor access. For a small business without an LMS, a documented Google Workspace or Microsoft 365 group plus signed completion emails and PDF certificates are acceptable evidence if consistently retained and indexed.

Small-business scenarios and examples

Example A (3–20 staff): Use a free LMS like Moodle or a simple shared spreadsheet to track training, run quarterly microlearning 10–15 minute videos, and use GoPhish for simulated clicks; set targets like training completion 100% for onboarding and annual refresh. Example B (20–100 staff): Purchase a low-cost SaaS to automate phishing and reporting, configure role-based content (finance sees BEC-focused modules), integrate with the ticketing system for incident capture, and maintain a monthly KPI dashboard reviewed by the owner and sponsor. In both examples keep evidence packets: training roster, phishing CSV exports, policy PDFs, and email notifications to leadership showing KPI reviews.

Risk of non-implementation

Failing to implement Control 1-10-2 increases the likelihood of successful phishing and social-engineering attacks, leading to credential compromise, fraud (especially BEC), ransomware entry points, regulatory penalties for inadequate controls, and reputational damage. From a compliance perspective, absence of documented training, missing campaign evidence, or no remediation logs will typically lead to findings during audits and may force more intrusive compensating controls.

Compliance tips and best practices

Keep these pragmatic tips in mind: (1) Document everything—auditors look for process and evidence more than tool choice. (2) Use version-controlled artifacts—store training material and policy versions in a repo or secure file store. (3) Make training bite-sized and frequent—microlearning increases retention. (4) Protect privacy—exclude HR-sensitive groups from simulations or get clear legal approval. (5) Tie KPIs to business outcomes—report how awareness reduces incidents and potentially insurance premiums. (6) Budget for continuous refresh—threats change and content should too.

In summary, meeting ECC 2:2024 Control 1-10-2 under the Compliance Framework is an achievable objective for small businesses when approached as a documented, measurable process: appoint ownership, map risks to role-based training, deploy affordable tooling, capture and retain evidence, measure outcomes, and iterate. Follow the checklist above, tailor frequencies and tools to your size and risk, and ensure management oversight to demonstrate continual improvement to auditors and stakeholders.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes