🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1 Compliant Security Awareness Program for Managers, SysAdmins, and Users

Step-by-step guidance to design and operate a role-based security awareness program that meets AT.L2-3.2.1 requirements under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, including practical actions, evidence, and small-business examples.

•
April 03, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

AT.L2-3.2.1 (Awareness & Training) requires that managers, system administrators, and users be made aware of information security risks and their expected behaviors; building a defensible program that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 means creating role-based curricula, repeatable delivery methods, and tamper-resistant evidence artifacts mapped to your SSP and POA&M.

Designing a role-based security awareness program

Start by scoping which personnel need what training: managers need risk governance, policy enforcement, and incident escalation training; system administrators need secure configuration, privileged access management, and logging/audit practices; general users need phishing awareness, data handling for Controlled Unclassified Information (CUI), removable media and device security. For a small business (10–50 staff) group roles into Manager / Admin / User buckets and create 30–60 minute modules per role, plus short monthly microlearning emails. Map each module to the specific control objective AT.L2-3.2.1 and to the sections in your System Security Plan (SSP) so auditors can easily trace evidence back to claims in the SSP.

Manager-focused content and delivery

Managers must understand organizational risk, accountability, and how to enforce policy. Practical manager topics include reviewing access requests, approving exceptions, reading security dashboards (e.g., MFA failures, simulated-phish click rates), and leading incident response tabletop exercises. Implementation example: in a 25-person AWS + Office 365 shop, give managers a 45-minute workshop that walks through the SSP excerpts, how to read your IAM reports in AWS IAM Access Analyzer or Azure AD sign-in reports, and a 1-page runbook showing steps to escalate a suspected CUI exposure. Require a signed attestation after training and store it in HR records.

System administrator technical training

Sysadmins need hands-on, technical modules—secure baseline configuration (CIS Benchmarks), patch management (use AWS Systems Manager Patch Manager or WSUS for Windows), privileged access workflows (use Jump/Bastion hosts, enforce MFA and short-lived credentials via Azure/OKTA/AWS STS), SSH key management (use HashiCorp Vault or AWS Secrets Manager), and audit/logging setup (auditd, rsyslog forwarding to SIEM). For evidence, keep screenshots of hardened baseline checks, patch compliance reports, sudo/SSH audit logs (/var/log/auth.log or /var/log/secure), and records of privileged access approvals. For a small business, implement a monthly sysadmin deep-dive (1–2 hours) and quarterly tabletop incident runs focused on privilege misuse.

User training and practical exercises

For end users, focus on phishing recognition, password hygiene, multi-factor authentication usage, safe data handling for CUI, and reporting incidents. Keep modules short (10–20 minutes) and include interactive quizzing. Run simulated phishing campaigns (GoPhish or a commercial service) quarterly and track click-report rates, remediation steps, and repeat offender coaching. Example: a 30-employee company can automate onboarding training via an LMS (Google Classroom, TalentLMS, or a simple Google Form + Drive) to deliver mandatory modules within 7 days of hire and an annual refresh; capture completion CSVs as audit artifacts.

Implementation steps, tooling, and technical controls

Create a documented training plan with schedules and role mappings in your SSP and implement these technical enablers: an LMS or tracked distribution method, MFA enforced via IdP (Azure AD, Okta) using TOTP or hardware FIDO2 keys for admins, centralized logging and alerting (CloudWatch/Elastic/Splunk), phishing simulation tooling, and a simple workflow for incident reporting (ticketing system + email alias). For sysadmins, add configuration management (Ansible/Chef) to ensure baseline drift is detectable, enable auditd rules for command logging, and forward logs to a SIEM with retention aligned to your recordkeeping policy. Small-business cost-saving tip: leverage built-in IdP features (Azure AD/Microsoft 365 Secure Score) and free tiers of phishing tools for realistic exercises.

Evidence, metrics, and compliance best practices

Auditors will want to see policy artifacts, training materials, attendance/completion logs, quiz scores, phishing simulation results, signed acknowledgments, and minutes from tabletop exercises. Track metrics that prove effectiveness: training completion %, phishing click rates (target <5% for mature programs), average time-to-patch for critical vulnerabilities, and number of security incidents escalated per quarter. Tie these metrics back to your POA&M for any gaps and schedule remediation milestones. Maintain versioned copies of training content and a chain-of-custody log for evidence files to avoid disputes during assessment.

Risks of not implementing AT.L2-3.2.1

Failure to educate managers, sysadmins, and users increases the likelihood of successful phishing, improper handling of CUI, privilege abuse, and delayed detection of breaches. For small businesses this can mean loss of DoD contracts, mandatory remediation under POA&M, reputational damage, and direct financial loss from incidents. Technically, untrained sysadmins are more likely to miss misconfigurations—like public S3 buckets, weak IAM policies, or unlogged sudo activity—that lead to data exfiltration. From a compliance perspective, lack of role-based training and missing evidence is a common reason organizations fail CMMC assessments.

In summary, an AT.L2-3.2.1 compliant program is practical and achievable for small businesses: scope roles, build brief role-based modules, automate delivery and tracking, run simulated phishing and tabletop exercises, collect tamper-resistant evidence mapped to your SSP, and measure effectiveness with clear metrics. By combining policy, role-specific technical training, and simple tooling (MFA, centralized logging, LMS, phishing simulators), you both reduce real risk and satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes