🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prepare for an Audit: Evidence, Training Records, and Policies for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1

Practical, step-by-step guidance for small businesses to create policies, collect evidence, and maintain training records to demonstrate compliance with NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AT.L2-3.2.1.

•
March 26, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

AT.L2-3.2.1 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires that managers, system administrators, and users be trained to perform their assigned information security-related duties; preparing for an audit of this control means having documented policy, role-based training content, verifiable evidence of completion, and a repeatable tracking process that a small organization can operate without a full security operations group.

What auditors look for (practical checklist)

Auditors expect a clear policy that defines training objectives and roles, a training matrix mapping required courses to roles, artifacts proving delivery (LMS logs, meeting minutes, slide decks), completion evidence (certificates, signed attestations, test scores), and evidence of ongoing maintenance (refresher schedules, metrics, corrective actions). For AT.L2-3.2.1, emphasize CUI handling, privileged account use, incident reporting, and user responsibilities. Make these elements visible, indexed, and auditable.

Step-by-step implementation for a small business

Start by drafting a short Training Policy (policy filename example: training_policy_v1.0.pdf) that states scope (all staff and contractors handling Federal Contract Information / CUI), minimum training requirements, frequency (onboarding, role changes, annual refresher), responsibilities (HR, IT, managers), and record retention (e.g., 3 years or per contract requirement). Keep the policy concise—1–2 pages is acceptable for small shops—but include an exhibit or appendix that maps policy statements to AT.L2-3.2.1.

Build a training matrix and curriculum

Create a role-based training matrix (training_matrix.csv or training_matrix.xlsx) that lists roles (employee, contractor, system admin, manager), required modules (e.g., CUI basics, acceptable use, privileged access, incident response), minimum pass scores, and frequency. For small teams, use low-cost solutions such as Google Workspace Forms + Sheets, Microsoft 365 Learning Pathways, Moodle, or a lightweight LMS that exports completion reports. Map each module to specific control language from NIST SP 800-171 so an auditor can see exactly how each training topic satisfies AT.L2-3.2.1.

Collecting and protecting evidence

Acceptable evidence includes: LMS export (names, email, completion timestamp, course ID), signed training attestations (PDFs or DocuSign records), quiz/test results, meeting attendance logs with signer names, slide decks with version history, and phishing simulation reports for awareness. Store artifacts in a secure repository (SharePoint with versioning and audit logs, an encrypted S3 bucket with access logging, or a GRC tool). Ensure integrity—retain hashes or signed PDFs and enable immutable retention or WORM where possible to prevent accidental or malicious modification.

Real-world small business scenarios

Scenario A: A 25-person engineering shop wins a DoD subcontract and must demonstrate CMMC 2.0 Level 2 readiness. They create a single training policy, use Microsoft Forms to assign modules, and export completion CSVs stored in a SharePoint folder with restricted access. Managers confirm completion via a monthly attestation email saved as evidence. Scenario B: A 10-person managed services company uses open-source Moodle installed on a hardened VM; they map Moodle course IDs to the training matrix and produce reports during readiness reviews. Both approaches are low-cost and create clear evidence paths.

Compliance tips and best practices

Use a naming convention and evidence index to simplify audits: e.g., evidence/AT_L2-3.2.1/training_matrix_2026-03-01.csv, evidence/AT_L2-3.2.1/lms_export_2026-02-28.csv, evidence/AT_L2-3.2.1/attestations_Q1_2026.pdf. Require manager attestations for staff who cannot complete online training due to operational constraints—attestation forms should state the reason and remediation plan. Automate reminders (calendar invites, email sequences) and configure SSO so that course completions are tied to corporate identities rather than generic accounts.

Technical considerations and integrations

Integrate training tracking with HR and IAM systems so onboarding/offboarding triggers training assignments and revokes access for those who do not complete required courses. Exportable audit logs are critical: enable and retain LMS logs, SharePoint access logs, and identity provider (IdP) logs for user activity. For privileged roles, keep separate higher-assurance artifacts (signed policy acknowledgment for admins, evidence of specialized admin training and lab/exam results). If using phishing simulations, retain raw click and remediation statistics as evidence of program effectiveness.

Risks of not implementing AT.L2-3.2.1

Failing to implement role-based training and retain evidence risks failed audits, loss of contract eligibility, and increased likelihood of human-caused incidents such as CUI exposure or misconfigured privileged accounts. From a practical standpoint, an organization without training records cannot prove that users understood incident reporting, which can exacerbate breaches and lead to regulatory fines, remediation costs, and reputational damage—risks small businesses can ill afford.

In summary, meeting AT.L2-3.2.1 is as much about process and evidence as it is about content: draft a concise policy, build a role-based training matrix, choose tooling that can produce verifiable exports, protect and index artifacts, and tie training into HR/IAM workflows. For small businesses, low-cost LMS options, manager attestations, and disciplined naming/retention practices will create a defensible audit posture while keeping overhead manageable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes