🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step: Implement AT.L2-3.2.1 Awareness Training with Templates, Schedules, and Evidence — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1

Practical, step-by-step guidance for implementing AT.L2-3.2.1 awareness training — templates, schedules, and evidence strategies to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements.

April 15, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

The AT.L2-3.2.1 control requires organizations to provide awareness and training so personnel understand their responsibilities for protecting Controlled Unclassified Information (CUI) and following security policies; this post walks you through practical implementation for small businesses with ready-to-use templates, schedules, and concrete evidence collection techniques to demonstrate compliance under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

Quick overview and objectives

AT.L2-3.2.1 maps to the NIST SP 800-171 family "Awareness and Training" and focuses on ensuring users, privileged users, and managers are aware of security risks and trained to perform their roles safely. Your objectives are: (1) define role-based learning outcomes, (2) run recurring awareness sessions and role-specific training, (3) measure comprehension, (4) retain and present evidence for audits. For small businesses, the emphasis should be on repeatable processes, minimal administrative overhead, and defensible artifacts.

Step-by-step implementation (practical)

Step 1 — Define the scope and roles: catalog who handles CUI or who could affect CUI confidentiality (e.g., engineers, program managers, IT admins). Create a Role Training Matrix with columns: Role, Responsibilities, Required Training, Frequency, Owner. Save as "role_training_matrix_v1.xlsx".

Step 2 — Choose delivery and tooling: for SMBs pick an LMS or simple tracking method. Options: cloud LMS (TalentLMS, Docebo), Google Classroom, or a manual CSV export from SharePoint training pages. Ensure the solution supports exportable completion records (CSV/JSON/SCORM/xAPI). If using an LMS, enable unique user IDs (email + employee ID), timestamped completion, and course versioning metadata.

Step 3 — Build content and templates: produce a 20–60 minute core awareness course (phishing, CUI handling, removable media, reporting incidents), and role-specific modules for privileged access, developer secure coding, and contract administrators. Use a template for each course header: Course_ID, Title, Description, Version, Learning Objectives, Estimated Duration, Assessment_Type, Passing_Score (recommend 80%). Store as "course_specifications_v1.csv". For awareness, include a short 10-question quiz (randomized) and a mandatory policy acknowledgment at the end.

Example: small defense subcontractor scenario

Acme Components (25 employees) used Google Workspace + TalentLMS. They created a 30-minute "CUI Awareness" SCORM package and a 45-minute "Privileged Access" module for IT. TalentLMS exports included username, user_email, completion_date, score, and SCORM_package_version. Acme set quarterly awareness refreshers plus targeted training when an employee changed roles. They retained quarterly CSV exports and one signed acknowledgment PDF per employee per year.

Schedules, cadence, and remediation

Recommended cadence: baseline (onboarding) within 7 days, role-based training within 30 days of assignment, awareness refreshers quarterly (or semi-annually if resource-constrained) and full reassessment annually. Use a Schedule Template with columns: Course, Audience, Frequency, Next_Run_Date, Owner, Evidence_Location — save as "training_schedule_calendar.ics" and "training_schedule_master.csv". For employees who fail the assessment (score < 80%), require remediation: immediate retrain + re-test within 7 days; log remediation actions in "training_remediation_log.csv" with dates and outcomes.

Types of evidence to retain and how to present it

Primary evidence types: LMS export CSVs, timestamped screenshots of completion certificates, signed policy acknowledgment PDF, quiz results (with item-level stats), attendance rosters for live sessions (with meeting recording links), and change control entries for course versions. Technical evidence: SCORM/xAPI statements, SAML authentication logs linking user identity to LMS activity, and SIEM entries showing suspicious access attempts followed by user awareness retraining. File naming convention examples: training_attendance_2026_Q1.csv, course_spec_v2_scorm_2026-03-10.zip, signed_ack_jdoe_2026-03-15.pdf. Retention: follow contract/organizational policy; if unspecified, keep 3 years to align with typical DFARS/contract expectations and to cover most audit windows.

Technical implementation details and controls integration

Technical tips: configure your LMS to use SAML/OAuth SSO so user identities map to HR records; enable audit logging (send LMS logs to your log collector or SIEM). Export fields you must capture: user_id, email, role, course_id, version, completion_timestamp, score, IP address (where possible), and issuing instructor. For in-house or hybrid training, store evidence in an immutable repository (WORM/Write Once storage or object storage with versioning and lifecycle rules) and record SHA256 hashes of certificates to demonstrate integrity in an audit.

Risk of non-implementation

If you fail to implement AT.L2-3.2.1 you increase the risk of inadvertent CUI exposure through phishing, misconfiguration, or privileged user error. Noncompliance risks include losing DoD contracts, failing a CMMC assessment, regulatory fines, and reputational damage. From a security standpoint, users unaware of reporting procedures delay incident response and increase breach dwell time.

Practical compliance tips and best practices

Keep training concise and role-specific to increase completion rates. Automate enrollments from HR changes (onboarding/offboarding) to prevent people gaps. Version-control your courses and include a change log; during an audit present the change log alongside evidence to show continuous improvement. Acceptable passing thresholds and remediation steps should be in your Training Policy. Maintain a central index (index.json or index.csv) that links each evidence file to the corresponding employee and audit period for quick retrieval.

Summary: Implementing AT.L2-3.2.1 is a mix of process, people, and tooling. Build a Role Training Matrix, select an LMS or trackable method, produce concise role-based content with quizzes and acknowledgments, schedule onboarding and recurring refreshers, and retain clear, timestamped evidence (LMS exports, signed PDFs, logs). For small businesses, focus on automation (SSO + HR sync), defensible naming/retention conventions, and a remediation workflow — together these elements will meet the control, reduce risk, and make audits straightforward.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes