1-1-1 – A cybersecurity strategy must be defined, documented and approved. It must be supported by the head of the organization or his/her delegate (referred to in this document as Authorizing Official). The strategy goals must be in-line with related laws and regulations.
This control comes from Essential Cybersecurity Controls (ECC – 2 : 2024).
This control requires your business to create a formal cybersecurity strategy that is written down, clearly aligned to your organization’s goals and legal obligations, and formally approved by your top executive (the Authorizing Official) or their delegate. In practice, it means deciding where you need to go with cybersecurity, documenting how you will get there, and ensuring leadership takes ownership of the plan.
SMBs should establish a Cybersecurity Strategy and Governance Policy that defines ownership, approval authority, and review cadence; a documented Authority Matrix identifying who can approve the strategy; a Regulatory and Legal Mapping Procedure to align goals with applicable laws; a Strategic Planning Procedure to run stakeholder workshops and set objectives; and a Document Control Procedure for versioning, communication, and periodic review. Together, these policies ensure the strategy is created, approved, compliant, and actively maintained.
Acme Components, a 180-employee manufacturer, appoints the CEO as the Authorizing Official and publishes a simple authority matrix naming the IT Manager as the strategy drafter and the CFO as compliance reviewer. The IT Manager convenes a two-hour workshop with operations, HR, finance, and sales to align business goals (on-time delivery, new B2B portal, export growth) with cyber objectives. The team drafts a strategy with a short vision and mission, four objectives (protect production systems, secure the B2B portal, meet customer compliance obligations, and improve incident readiness), and an 18-month implementation plan. Each objective has KPIs (e.g., patch SLA > 95%, MFA adoption > 98%), owners, and budgets. They map objectives to applicable laws and contract clauses from key customers, noting evidence such as policies, system configs, and audit logs. After internal review, the CEO formally approves the strategy via e-signature; the PDF and approval record are stored in SharePoint with a one-year review date. The roadmap is entered into a simple tracker, and a quarterly steering meeting reviews progress, risks, and funding needs.
Meeting 1-1-1 means building a leadership-backed, documented cybersecurity strategy that aligns with your business goals and legal requirements, and then turning it into an actionable plan. With the right policies (governance, authority, legal mapping, document control) and concrete steps (stakeholder alignment, clear objectives, measurable KPIs, mapped obligations, formal approval, and routine review), an SMB can demonstrate intent, direction, and accountability. Regular reporting and updates ensure the strategy remains relevant as the business and threat landscape evolve.
Quick & Simple
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you
We typically reply within minutes