🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use a Compliance Checklist to Conduct Periodic Cybersecurity Strategy Reviews — Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-3

A practical guide to building and using a compliance checklist to run periodic cybersecurity strategy reviews that satisfy ECC – 2 : 2024 Control 1-1-3 for small businesses.

April 19, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design and use a compliance checklist to conduct periodic cybersecurity strategy reviews in accordance with Essential Cybersecurity Controls (ECC – 2 : 2024), Control 1-1-3, with practical steps, technical checklist items, and examples tailored for small businesses operating under the Compliance Framework.

Why periodic cybersecurity strategy reviews matter (Compliance Framework context)

Periodic reviews are a formal mechanism to ensure the organization's cybersecurity strategy remains aligned with threat evolution, business changes, legal/regulatory requirements, and control objectives defined in the Compliance Framework — specifically Control 1-1-3 which requires scheduled assessment and evidence of ongoing strategic oversight. Without regular review you risk control drift, stale architecture decisions, undetected configuration changes, missed patch windows, and ultimately increased probability of a breach or regulatory non-compliance.

Building a practical Compliance Framework checklist

Start by mapping the Compliance Framework control language (ECC – 2 : 2024, Control 1-1-3) to tangible evidence items and measurable indicators. The checklist should include: control description, required evidence, frequency (monthly/quarterly/annual), owner, acceptable threshold, and remediation SLA. Technical items must be explicit (e.g., "All internet-facing hosts scanned for vulnerabilities within last 30 days" rather than vague wording). Use a RACI to assign responsibilities and make the checklist a living artifact stored in your GRC tool or a versioned repository (for small teams, an encrypted shared drive or a simple spreadsheet locked by change control can work).

Sample checklist items and evidence (template)

  • Asset inventory: evidence = exported asset inventory with timestamp; threshold = 95% of production assets reconciled to CMDB within 30 days.
  • Patch management: evidence = patching report; threshold = 90% of critical patches applied within 7 days, high within 30 days.
  • MFA enforcement: evidence = IAM configuration screenshot / logs; threshold = 100% admin accounts and 95% user accounts enrolled.
  • Vulnerability scanning: evidence = latest scan report with remediation tickets; frequency = weekly automated boot scans, full authenticated scans monthly.
  • Logging & retention: evidence = SIEM retention policy + export showing last 90 days of logs; threshold = security logs retained per policy and ingested into SIEM at >99% rate.
  • Backups & recovery: evidence = backup reports and recent restore test results; frequency = quarterly restore tests with a documented RTO/RPO.
  • Incident response readiness: evidence = tabletop exercise minutes and updated IR plan; frequency = semi-annual exercises.

Conducting the review — process, tools, and technical details

Run a two-tier review cadence: operational checks monthly (automated evidence collection and exception reporting) and strategic reviews quarterly (control owners, CISO/manager, business leaders). Use automation where possible: scripts to pull patch reports from your endpoint management (e.g., Microsoft SCCM/Intune, Jamf), API queries to cloud services (AWS Config, Azure Policy, CloudTrail) to export config drift reports, and scheduled vulnerability scans via Nessus/Qualys or open-source alternatives. For evidence collection, standardize JSON/CSV exports with a naming convention including timestamp and reviewer initials; keep checksums to prove file integrity during an audit.

Small business scenario — realistic implementation

Example: a 25-employee online retail company using AWS, a SaaS ERP, and an on-premises POS system. Implementation steps: (1) create a prioritized checklist focused on public-facing apps, POS segmentation, and payment card controls; (2) schedule monthly automated AWS Config compliance checks and CloudTrail verification to monitor admin activity; (3) run authenticated vulnerability scans on webservers monthly and mitigate critical findings within 7 days; (4) verify backups for the POS database weekly and perform a restore test quarterly; (5) document results in a central spreadsheet or lightweight GRC tool and review quarterly with management. For a small team, practical tooling includes AWS Free Tier features, an open-source scanner (OpenVAS), and a simple ticketing system (e.g., Jira/ServiceNow/Zoho) to track remediation.

Compliance tips and best practices

Keep the checklist concise (20–50 high-value checks) and risk-based — focus first on controls that reduce attacker dwell time and privilege escalation. Require explicit evidence types and timestamps. Automate evidence collection for high-frequency items, use dashboards for KPIs (e.g., patching compliance %, MFA coverage, mean time to remediate vulnerabilities), and enforce SLAs for remediation (critical: 7–15 days; high: 30 days). Maintain an audit trail: meeting minutes, reviewer sign-off, and remediation tickets; these are often what auditors request to satisfy Control 1-1-3. Use tabletop exercises to validate the strategy and update the checklist when business processes or technologies change.

Not implementing this requirement increases risk across several vectors: regulatory penalties from failing to demonstrate oversight, greater exposure to ransomware and data breaches due to unpatched vulnerabilities or misconfigurations, loss of customer trust, and higher recovery costs. A lack of periodic strategy review can also allow ineffective controls to remain in place, wasting budget on low-value activities while high-risk gaps persist.

Summary: To meet ECC – 2 : 2024 Control 1-1-3 under the Compliance Framework, create a mapped, measurable compliance checklist; assign owners and frequencies; automate evidence collection where feasible; run monthly operational checks and quarterly strategic reviews; track findings with remediation SLAs and retain evidence for audits. For small businesses, prioritize high-impact controls (patching, MFA, backups, logging) and use lightweight tooling to make the periodic review sustainable and auditable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes