Control 1-1-2 in ECC – 2 : 2024 requires organizations to implement a risk-based plan that translates strategy into prioritized, measurable controls — this post shows you how to build that plan for the Compliance Framework, with hands-on steps, technical specifics, a small-business lens, and a ready-to-use checklist.
What Control 1-1-2 means for your Compliance Framework program
At its core, Control 1-1-2 asks that you: identify assets and risks, score and prioritize risks, map prioritized risks to controls in the Compliance Framework, and implement controls according to a documented, auditable plan. For Compliance Framework programs that follow ECC – 2 : 2024, that means your implementation plan must be risk-driven (not checkbox-driven), have owners, timelines, measurable success criteria, and traceability from risk to control to remediation activity.
Step-by-step: build a risk-based implementation plan
1) Define scope and create an authoritative asset inventory
Start by scoping the systems, data, and processes that fall under Compliance Framework. For small businesses, scope typically includes: customer databases, web storefronts, employee devices, core servers, and cloud services (e.g., AWS S3, Azure SQL). Create an authoritative inventory (CMDB) using agent-based discovery (e.g., Wazuh agents, Microsoft Endpoint Manager), passive network discovery (Nmap or network flow collectors), and cloud APIs. Tag assets by owner, environment (prod/test), data sensitivity, and business criticality — these tags feed risk scoring and prioritization.
2) Perform a practical risk assessment and numeric scoring
Use a simple, repeatable scoring formula: Risk = Likelihood × Impact. Use 1–5 scales for both. Example thresholds: critical (score ≥ 16), high (9–15), medium (4–8), low (≤3). Populate likelihood from vulnerability scan frequency + threat intelligence (e.g., presence of exploitable CVEs), and impact from data classification and business dependency. For technical inputs, run authenticated vulnerability scans (Nessus/OpenVAS) monthly for critical systems, and capture CVSS scores. Record compensating controls (e.g., WAF, MFA) to adjust residual risk.
3) Prioritize controls and map to the Compliance Framework
Create a controls map that ties each identified high/critical risk to specific Compliance Framework control requirements and control activities. For Control 1-1-2, document which technical controls (patch management, MFA, network segmentation, EDR, encrypted backups) satisfy the requirement, who owns each control, and the acceptance criteria (for example: all public-facing servers patched within 7 days of critical CVE publication; admin accounts protected with MFA and hardware tokens; EDR alerts at >90% detection coverage). This mapping provides traceability for auditors and reduces scope confusion.
4) Build the implementation roadmap and checklist (use Sprints/Milestones)
Translate prioritized controls into timeboxed work packages: Sprints (2–4 weeks) for tactical fixes, and Projects (1–3 months) for architecture changes. Define SLAs: Critical vulnerabilities — remediate or mitigate within 7 days; High — 30 days; Medium — 90 days. Assign control owners, resources, change-control steps, and testing/verification methods (e.g., re-scan, pentest). Include a compact checklist to use at each sprint kickoff and audit gate:
- Inventory updated and owners confirmed
- Risk scores and criticality validated with business owner
- Control mapping documented to Compliance Framework control IDs
- Implementation task created in project tracker with owner and SLA
- Verification method defined (scan, log proof, configuration snapshot)
- Residual risk acceptance recorded if remediation deferred
5) Execute, measure, and iterate
Execution must be instrumented with measurable KPIs: % of critical assets remediated within SLA, mean time to remediate (MTTR) by severity, % coverage of inventory, and number of residual risks with executive acceptance. Use a lightweight dashboard (e.g., Elastic Stack + Kibana, or a simple Power BI sheet fed by vulnerability scanner exports) to report weekly to leadership. Iterate every quarter: update the asset inventory, re-score risks, and reassign priorities based on new threat intel or business changes.
Small-business scenarios and concrete technical actions
Example 1 — 25-person e-commerce retailer: scope includes web app, POS tablets, and customer DB. Practical actions: enable MFA for admin portals, enforce TLS 1.2+ with HSTS on public web servers, schedule automated nightly backups of customer DB encrypted with AES-256 and stored offsite, run weekly authenticated scans with Nessus, and implement a WAF (Cloudflare) to block common OWASP attacks. Example 2 — 10-person legal firm: scope includes client files and email. Practical actions: deploy disk encryption (BitLocker/FileVault), require MFA for cloud email, limit access to client folders using ACLs and document retention policies, and configure centralized logging with 90-day retention for e-discovery. Both examples map these technical steps back to Compliance Framework control IDs and show proof (configs, screenshots, logs) for audit evidence.
Failing to implement Control 1-1-2 in a risk-based way creates tangible risks: unpatched critical systems, uncontrolled privileged access, and missed dependencies that lead to data breaches, service outages, regulatory penalties, and loss of customer trust. For a small business, a single ransomware incident can be existential — risk-based planning reduces that likelihood by focusing limited resources where they cut the highest risk.
Summary: To meet ECC – 2 : 2024 Control 1-1-2 under the Compliance Framework, establish an authoritative asset inventory, perform repeatable risk scoring, map risks to controls, and execute a prioritized implementation roadmap with owners, SLAs, and verification steps. Use the checklist above at each sprint and maintain measurable KPIs so you can demonstrate continuous improvement and audit readiness. With these practical steps and small-business examples you’ll turn compliance obligations into a pragmatic, risk-driven cybersecurity program.