🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create Role-Based Security Awareness for Managers, Admins, and Users That Meets NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1

A practical guide to designing, implementing, and evidencing role-based security awareness training for managers, administrators, and users to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AT.L2-3.2.1).

•
April 14, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Role-based security awareness is not a one-size-fits-all checkbox — AT.L2-3.2.1 under CMMC 2.0 / NIST-aligned programs requires targeted training for managers, administrators (privileged users), and general users so each role can recognize and report threats relevant to their access and responsibilities. This post provides a practical, implementable plan for small businesses to design, deliver, and document role-based awareness that satisfies compliance assessors and reduces real operational risk.

Understand the Requirement and Define Objectives

Start by translating AT.L2-3.2.1 into measurable objectives: (1) managers must understand oversight duties, incident escalation paths, and personnel risk indicators; (2) administrators must be trained on privileged account protection, secure configuration, logging and forensics preservation; (3) general users must recognize phishing, social engineering, safe handling of CUI (Controlled Unclassified Information), and how to report incidents. Map each objective to the organization’s System Security Plan (SSP) and identify evidence artifacts that will be included in an assessment package (training materials, attendance records, quizzes, phishing simulation results, SSP references, and POA&M items).

Designing Role-Based Curricula (Practical Implementation)

Create a training matrix that lists roles (e.g., Executive/Manager, IT Admin, Contractor User, HR) along the rows and learning objectives along the columns. For each cell, define the delivery method (microlearning video, instructor-led tabletop, SCORM module), frequency (onboarding + annual + role change), and success criteria (quizzes, simulated phishing click rates <= target). Technical implementation details: use an LMS that supports SCORM/xAPI for tracking, integrate with corporate SSO (Azure AD/Okta) to roll users in/out automatically, and export completion reports in CSV/PDF for 3rd-party assessors. For small businesses, low-cost LMS options (TalentLMS, Moodle, or cloud SCORM providers) are sufficient; ensure you can produce completion timestamps, module IDs, and user identifiers for evidence.

Administrators: Technical and Forensic Focus

Admin training must be technical and scenario-based. Cover secure privileged access management (PAM) best practices, least privilege, just-in-time access, MFA enforcement, logging configuration (what events to log: privileged elevation, configuration changes, authentication failures), and how to preserve evidence for an incident response. Practical steps: include lab exercises where admins rotate disabling a local account, enable MFA on a test directory, or review syslog/SIEM entries. Document these exercises with screenshots and execution logs so an assessor can verify competency and that procedures exist in the SSP and incident response plan.

Managers: Oversight, Personnel Risk, and Reporting

Manager-focused content emphasizes responsibilities: ensuring direct reports complete required training on time, recognizing behavioral indicators of insider risk (unexplained late hours, copying large volumes of files, unusual access patterns), and following escalation processes. Provide managers with quick-reference checklists and playbooks: who to contact (CISO/IT lead), how to preserve evidence (suspending account access without deleting), and how to complete a POA&M entry. Include tabletop exercises involving HR + Legal + IT to practice handling suspected insider incidents and document the outcomes as evidence of active training.

Users: Phishing, CUI Handling, and Reporting

General user modules should be concise, practical, and job-specific. Teach users how to classify and label CUI, use approved encrypted channels (S/MIME, TLS-restricted file shares, enterprise DLP), and report suspicious emails via a one-click report button in the mail client. Implement routine phishing simulations (e.g., monthly or quarterly) and use metrics like click rate and time-to-report. For small firms, a recurring low-cost phishing campaign tool (GoPhish, KnowBe4) plus an automated remediation workflow (forced re-training for users who click) provides both behavioral improvement and audit evidence.

Evidence Collection, Measurement, and Continuous Improvement

Compliance assessors expect tangible evidence. Maintain an evidence repository that contains: training curricula, module timestamps, completion reports mapped to user role and unique IDs, phishing simulation logs, manager tabletop notes, admin lab results, and policy documents referenced in the SSP. Define KPIs: % completion within 30 days of onboarding, phishing click rate target (e.g., <5% within 6 months), number of escalated incidents handled per quarter, and reduction in risky behaviors. Use those KPIs in monthly security meetings and capture corrective actions as POA&M items if targets aren't met.

Small Business Scenario (Real-World Example)

Example: a 40-person defense subcontractor handling CUI. Implementation steps: map 40 employees into three buckets: 6 admins, 8 managers, 26 users. Deploy Moodle tied to Azure AD for SSO; import role attributes automatically. Create three SCORM packages: Admin (2 hours, labs), Manager (1 hour, tabletop), User (30 minutes, micro-modules). Schedule onboarding completion within 14 days, annual refreshers, and quarterly phishing tests. Keep evidence in a secure SharePoint library with access restricted and link documents in the SSP. After three months, phishing click rate drops from 18% to 6% — document this KPI trend for an assessor.

Risks of Not Implementing and Compliance Tips

Failing to implement role-based awareness increases the risk of CUI exposure, successful insider threats, and weak privileged controls that lead to lateral movement and data exfiltration. On the compliance side, a lack of role-based evidence will lead to finding(s) during an assessment, possible decertification, contract loss, and remediation costs. Practical tips: (1) assign a training owner and back-up; (2) automate user-role mapping via HR and IAM integrations to avoid stale assignments; (3) keep training modular and re-usable to reduce maintenance; (4) keep dated versions of all materials and a change log; (5) include non-technical staff (reception, finance) in role mappings; (6) simulate incidents and preserve artifacts from drills as evidence.

Summary: Implementing AT.L2-3.2.1 means more than a yearly all-hands slide deck — it requires a documented, role-mapped training program with technical depth for admins, supervisory training for managers, and practical phishing/CUI handling for users, all tied into your SSP and evidence repository. For small businesses this is achievable with an LMS, automated user-role provisioning, periodic simulations, and a disciplined evidence-retention process that will satisfy assessors and materially reduce real-world risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes