🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run Practical Tabletop Exercises That Teach Security Risks to Managers, Admins, and Users — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1

Step‑by‑step guidance for designing and running tabletop exercises that teach security risks to managers, administrators, and users to meet NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2 AT.L2‑3.2.1 requirements.

April 22, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Tabletop exercises are one of the most practical ways to demonstrate that managers, system administrators, and users understand the security risks tied to their responsibilities — exactly what AT.L2‑3.2.1 in NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2 requires. This post gives a step‑by‑step playbook for small businesses to design, run, document, and measure tabletop scenarios that teach risk awareness while producing audit‑ready evidence for compliance.

Why tabletop exercises map to AT.L2‑3.2.1

AT.L2‑3.2.1 calls for awareness that specifically links security risks with assigned duties. A well‑crafted tabletop exercise moves beyond slide decks by forcing role‑based decision making under realistic conditions: managers decide on business continuity vs. disclosure, admins triage alerts and change access controls, and users practice safe handling of CUI (Controlled Unclassified Information). The exercise itself becomes demonstrable evidence — attendance rosters, scenario scripts, facilitator notes, and an after‑action report — that personnel were exposed to risk scenarios and trained on expected behaviors.

Designing effective tabletop exercises

Start by defining clear objectives tied to the Compliance Framework: e.g., "Managers will recognize when to notify the Authorizing Official and legal counsel within 24 hours of a potential CUI breach," or "Admins will demonstrate disabling a compromised account and isolating a host within 60 minutes." Map each objective back to AT.L2‑3.2.1 and to related controls in NIST SP 800‑171 (e.g., IR, AC, AC). Pick 2–3 realistic scenarios per session so participants can deeply engage rather than superficially touch many topics.

Scenario types and scope

Choose scenarios that are relevant to your environment: phishing leading to credentials theft and lateral movement, lost/unencrypted laptop containing CUI, cloud misconfiguration exposing an S3‑like bucket, an insider exfiltration attempt via removable media, or ransomware that encrypts shared drives. For small businesses, keep scope narrow: focus on the systems you actually use (Office 365 logs, a single file server, or the SaaS CRM database) and the cloud resources you own, not hypothetical enterprise stacks.

Running the exercise — roles, injects, and tools

Assemble a mixed audience: at minimum one manager with decision authority, the primary sysadmin/IT lead, and a handful of typical users. Appoint a neutral facilitator (internal security lead or external consultant) and a scribe to capture timestamps and decisions. Use "injects" (time‑sequenced prompts) to evolve the scenario: an alarm pops up, an employee reports an odd email, or a helpdesk ticket escalates. Keep the pace brisk — 60–90 minutes per scenario — and use real telemetry when possible (redacted logs, simulated SIEM alerts, or output from Atomic Red Team/Caldera in an isolated lab) to train on tools and evidence review.

Technical implementation details

For administrators, include hands‑on mini‑tasks you can safely run: review M365 audit logs to trace a compromised account, simulate an S3 permission check (using a sandbox account) to show public ACLs, or demonstrate isolating a host via VLAN or EDR console. Collect artifacts: screenshots of log searches, EDR alert IDs, time to containment metrics, and change tickets. If you use phishing simulations (GoPhish or commercial platforms), ensure you have policy permission, consent where required, and a clearly pre‑configured safe list to avoid cross‑tenant risks.

Real‑world small business scenarios (examples)

Example 1 — 30‑person defense supplier: A user receives a spear‑phish with a CUI‑looking attachment. The user forwards it to a manager; the manager opens it for context. The exercise forces decisions — should they disconnect the device, notify the DIB portal, or preserve evidence? The admin team practices disabling the account, preserving logs, and restoring from backup. Example 2 — cloud misconfiguration: An intern accidentally sets a client folder to "public" in cloud storage; the scenario exercises discovery (audit logs), scope of exposure (file hashes), and notification obligations under contract. These small‑business examples focus on existing tools and simple playbooks so fixes are implementable quickly.

Compliance evidence, metrics, and follow‑up

Auditors will want to see that the exercise was planned, executed, and remediations tracked. Produce an exercise package: objectives mapped to AT.L2‑3.2.1, the agenda and participant list, scenario scripts and timeline of injects, captured artifacts (logs, screenshots), the after‑action report with prioritized findings, and a remediation tracker with owners and deadlines. Measure outcomes quantitatively — percent of participants who correctly escalate, mean time to detect (simulated), and percent of remediation tasks closed within SLA — and qualitatively through a short post‑exercise survey to capture learning gaps.

Risks of not implementing and best practices

Failing to run realistic tabletop exercises risks unprepared decision makers, slow incident response, and missed contractual or legal reporting obligations — which can lead to lost DoD contracts, regulatory penalties, and reputational damage. Best practices: make exercises regular (quarterly for high‑risk teams), keep scenarios realistic and role‑specific, link findings to policy updates and training curricula, use measurable acceptance criteria, and involve legal/HIPAA/DIB reps when the scenario touches regulated data. Document everything so your compliance package is audit‑ready.

Summary: Tabletop exercises are a low‑cost, high‑impact way for small businesses to satisfy AT.L2‑3.2.1 by teaching managers, admins, and users about security risks tied to their roles. Design scenarios that map to your environment, run focused ninety‑minute sessions with real telemetry where safe, produce a complete evidence package, and track remediations to closure — and you will not only meet the compliance requirement but significantly reduce the practical risk of a real incident.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes