🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-3

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-3

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-3 – The personnel cybersecurity requirements prior to employment must include at least the following:

Understanding the Requirement

This control requires that organizations define and apply minimum cybersecurity-related checks and conditions before hiring staff. In the context of the Essential Cybersecurity Controls (ECC – 2 : 2024), the control breaks into sub-objectives identified as 1-9-3-1 and 1-9-3-2, which together indicate a need for pre-employment vetting and role-aligned screening or verification. For an SMB that means documenting what checks are required, applying those checks consistently (for example identity, employment history, qualifications, and any higher-risk checks for privileged roles), and ensuring new hires agree to baseline security obligations before they are given access to systems and data.

Technical Implementation

  • Write a short pre-employment security policy: Create a simple one-page policy that lists required checks (ID verification, proof of qualifications, reference checks, and where appropriate criminal record checks), the roles that require elevated screening, and the legal/consent steps. Make this part of HR’s standard hiring checklist so it is applied consistently.
  • Automate identity and document verification: Use an inexpensive identity verification service or HR platform to validate IDs and certifications quickly. For SMBs, tools that scan government IDs, cross-check professional licenses, or verify education can reduce manual errors and speed onboarding.
  • Role-based screening and least privilege: Classify roles by risk (e.g., standard user, admin, finance access) and require more extensive vetting for higher-risk positions — e.g., background checks or technical skills verification for system administrators and finance employees. Tie role classification to access provisioning so elevated access is only granted after checks complete.
  • Signed security agreements before system access: Require new hires to sign an acceptable use policy, confidentiality/NDA, and any role-specific security rules as a condition of account creation. Store signed documents in HR records and block account provisioning until signed.
  • Enforce technical gating during onboarding: Use an onboarding workflow that prevents account creation or network access until identity verification, signed agreements, and initial security awareness training are completed. Implement simple automation (scripts, MDM enrollment checks, or IAM workflows) to enforce these gates.
  • Keep auditable records and review periodically: Maintain a log of completed pre-employment checks tied to employee records and review the process annually. For compliance and incident response, retain evidence that each hire passed the required checks, and periodically audit that the policy is followed.

Example in a Small or Medium Business

A twelve-person software consultancy formalizes a short pre-employment security checklist after a near-miss where a contractor had excessive access. The company creates a one-page policy stating that all hires must have ID verification, two professional references checked, and must sign the confidentiality and acceptable-use agreements prior to receiving credentials. For developer and admin roles (classified as high risk), they add technical skills verification and a basic background check subject to local law. HR integrates these steps into their applicant tracking system: once a candidate accepts an offer, the system triggers ID verification and sends the required agreements for e-signature. IT is notified only after all checks are complete; only then does IT provision accounts, enroll devices in the company MDM, and enable MFA. New hires must also complete a 30-minute security orientation before any access to customer environments is granted. The company retains scanned evidence of checks in a secure HR folder and reviews the onboarding flow quarterly to ensure the controls remain practical and lawful.

Summary

By combining a clear pre-employment policy with practical technical gates and role-based screening, SMBs can meet Control 1-9-3’s requirement that personnel cybersecurity checks occur before employment. Documenting required checks, automating identity verification, gating access until signed agreements and training are complete, and keeping auditable records ensure hires are appropriately vetted and access is limited by risk — all achievable with low-cost tools and integrated HR/IT workflows.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes