🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-2 – The personnel cybersecurity requirements must be implemented.

Understanding the Requirement

This control requires an organization to implement the personnel-related cybersecurity requirements that have been identified, documented and approved for HR and workforce processes. In practice this means turning the human-resources cyber rules in your Human Resources Cybersecurity Policy into concrete actions: an implementation plan, operational HR procedures (onboarding, offboarding, training, contractors, disciplinary measures) and ongoing compliance controls. This guidance is aligned with the Essential Cybersecurity Controls (ECC – 2 : 2024) framework and focuses on making those personnel requirements active and auditable within an SMB.

Technical Implementation

  • Inventory and map personnel requirements into actionable controls — Start by extracting every personnel-related requirement from your approved Human Resources Cybersecurity Policy and map each to specific HR processes (recruiting, onboarding, role changes, offboarding, contractors). For each requirement assign an owner, a target completion date and measurable acceptance criteria (for example: "all new hires complete MFA setup and security awareness training before receiving domain access").

  • Create an implementation action plan with milestones — Develop a short project plan for rolling out personnel controls that includes prioritized tasks (high-risk roles first), responsible teams (HR, IT, security lead), resources required and a timeline. Include quick wins (mandatory security training for all staff this quarter) and medium-term items (integrating HR system with identity management for automated deprovisioning within 24 hours of termination).

  • Embed requirements in HR procedures and job artifacts — Update job descriptions, employment offers, contractor statements of work and NDAs to include security obligations (acceptable use, data handling, MFA use, reporting incidents). Document how HR will verify security prerequisites (background checks where appropriate, verification of certifications) and make those checks part of the hiring checklist used by recruiters and hiring managers.

  • Operationalize onboarding and offboarding controls — Ensure onboarding tasks include mandatory security setup (corporate device configuration, account provisioning, access approvals, initial security training). On offboarding, ensure procedures require immediate access revocation, device collection or remote wipe, exit interviews that remind of post-employment obligations, and transfer of business-owned data. Automate where possible using your identity provider and ticketing system to reduce human error.

  • Training, monitoring and enforcement — Implement role-based security training with tracked completion and periodic refreshers; maintain evidence of completion in HR records. Monitor compliance through periodic audits (sample user checks, verification of last login, MFA status) and enforce through defined disciplinary measures for non-compliance. For contractors and external stakeholders, require proof of compliance or include contractual clauses that bind them to your personnel cybersecurity requirements.

  • Review and continuous improvement — Schedule periodic reviews of the HR Cybersecurity Policy and personnel procedures (at least annually or after major incidents) and use metrics from the action plan (time-to-provision, percent of staff trained, percent of accounts deprovisioned within SLA) to drive improvements and report to leadership.

Example in a Small or Medium Business

AcmeCo, a 75-person software services firm, started by extracting all people-related security requirements from their HR Cybersecurity Policy and assigning a single project owner in HR. They created a three‑month action plan that prioritized automating account deprovisioning and rolling out baseline security training. Recruiters began including security obligations in offers and contractors had to sign a security addendum before access was granted. Onboarding checklists were updated so IT receives a ticket when an offer is accepted, triggering device imaging, MFA enrollment and access requests tied to the employee's role. Offboarding became a one-step process in their ticketing system that revoked access, archived the employee mailbox and triggered device return instructions; HR kept documented evidence of completion. Managers received monthly reports showing training completion rates and any outstanding access issues, and the executive sponsor reviewed these metrics quarterly. When gaps were found in remediation times, AcmeCo adjusted staffing and updated the SLA to meet the requirement that deprovisioning occurs within 24 hours of termination.

Summary

By converting the Human Resources Cybersecurity Policy into an explicit action plan, embedding requirements into HR procedures and operational workflows, and adding monitoring and enforcement, SMBs can make personnel cybersecurity requirements real, repeatable and auditable. Practical actions — mapping policy to processes, automating provisioning/deprovisioning, tracking training and contractual obligations for external workers — close the gap between documented requirements and day-to-day practice, satisfying Control 1-9-2 and reducing human-related security risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes