🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 3-1-4

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 3-1-4

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 3-1-4 – The cybersecurity requirements for business continuity management must be reviewed periodically.

Understanding the Requirement

This control requires organisations to establish a repeatable, documented process to review and update the cybersecurity elements of their business continuity management (BCM). As part of the Essential Cybersecurity Controls (ECC – 2 : 2024), the focus is on conducting these reviews at planned intervals and whenever there are significant changes (for example regulatory updates or business changes), recording what changed, and obtaining formal approval from the head of the organisation or their deputy. The outcome is a current, approved set of cybersecurity requirements that align BCM plans with the organisation’s risk, legal, and operational environment.

Technical Implementation

  • Define a documented review policy and schedule. Create a short policy that states who is responsible for reviews (BCM owner/IT lead), the frequency (commonly annual, or every 6–12 months for higher-risk firms), and triggers for ad-hoc reviews (e.g., new regulations, major incidents, new systems or suppliers). Keep the policy brief and approved by senior management.
  • Maintain a single source of truth for BCM cybersecurity requirements. Store the requirements and associated artefacts (DR plan, recovery time objectives, control lists) in a central repository with version control (document name, version, author, date, change summary). For SMBs this can be a secured shared drive or a simple document management tool.
  • Implement a change and evidence log. For every review, record what changed, why, who proposed it, and who approved it. Include evidence such as meeting minutes, test results, audit findings, regulatory notices, or vendor notifications. This log is your proof of compliance and supports continuous improvement.
  • Use practical review procedures and lightweight tests. Run a focused set of activities during reviews: checklist-based gap assessments, tabletop exercises for the most critical scenarios, and verification of recovery procedures for critical systems. Document findings and remedial actions with owners and deadlines.
  • Monitor external triggers and integrate them into the process. Assign someone to watch for legal/regulatory updates, industry advisories, or significant supplier changes that would trigger an out-of-cycle review. Subscribe to a small number of trusted alert sources or designate a compliance contact to summarize impacts.
  • Formal approval and retention. After a review and any updates, obtain formal sign-off from the head of the organisation or their deputy (email approval or signed document). Retain approved versions and approvals for a defined retention period to satisfy audits and demonstrate governance.

Example in a Small or Medium Business

Acme Manufacturing (50 employees) assigns its IT manager as the BCM cybersecurity owner and documents a simple review plan: annual reviews and immediate re-reviews triggered by any new regulation or after a cybersecurity incident. Each year the IT manager runs a 2-hour tabletop exercise focused on production systems, uses a checklist to verify backup and failover processes, and captures recommended changes in a change log. When a new national data protection guidance arrives mid-year, the manager triggers an out-of-cycle review, updates the recovery priorities to reflect the new compliance items, and records the rationale for each update. The IT manager prepares a short change summary and emails it to the operations director and CEO for approval; the CEO replies with a signed email approval that is stored with the updated documents. The company keeps the approved versions in a secured shared folder with version numbers and retains the approvals for three years. After approval, the operations team runs the updated recovery steps in a controlled test and updates staff responsibilities in the incident response checklist so everyone knows the revised expectations.

Summary

By combining a documented review policy, a centralised repository for BCM cybersecurity requirements, an evidence-based change log, practical testing, and formal sign-off by the head of the organisation (or deputy), SMBs can meet the control’s requirement for periodic review. These policy and technical measures ensure continuity requirements remain current, auditable, and aligned with regulatory or business changes — reducing recovery time and regulatory risk while providing clear proof of governance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes