{
  "title": "How to build a step-by-step checklist to meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-6 for personnel cybersecurity reviews",
  "date": "2026-04-05",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-build-a-step-by-step-checklist-to-meet-essential-cybersecurity-controls-ecc-2-2024-control-1-9-6-for-personnel-cybersecurity-reviews.jpg",
  "content": {
    "full_html": "<p>This post gives a practical, step-by-step checklist to implement Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-9-6 for personnel cybersecurity reviews, mapped to a Compliance Framework practice so small and mid-sized organizations can build defendable evidence and operationalize recurring personnel security checks.</p>\n\n<h2>Understanding Control 1-9-6 and its objectives</h2>\n<p>Control 1-9-6 requires organizations to conduct formal personnel cybersecurity reviews that validate appropriate access, attest to role fit, confirm completion of mandatory training, and surface insider-risk indicators on a defined cadence. The key objectives are: (1) ensure least privilege and remove stale or inappropriate access, (2) confirm personnel have required security awareness and role-based training, (3) record manager attestations and HR changes, and (4) create auditable evidence for Compliance Framework assessments.</p>\n\n<h2>Implementation notes for Compliance Framework</h2>\n<p>Map Control 1-9-6 to your Compliance Framework by creating a policy (Personnel Cybersecurity Review Policy), a procedures document (review cadence, responsibilities, evidence types), and a RACI (HR, IT/IAM, Line Managers, Security, Audit). Define frequency (e.g., quarterly for privileged roles, semi-annual for business users), evidence retention (retain attestations and logs for at least 24 months or as required by your framework), and KPI targets (percentage of completed attestation within SLA). Capture evidence as screenshots, signed attestation forms (digital), ticket IDs showing remediations, and automated reports from IAM/HRIS systems.</p>\n\n<h3>Step 1 — Prepare and scope the review</h3>\n<p>Begin by scoping: extract authoritative lists from HRIS (employee status, manager, role, department) and IAM (active accounts, group memberships, privileged roles). For small businesses the authoritative sources might be Google Workspace Directory, Microsoft Entra ID (Azure AD), or an HR spreadsheet. Create a mapping table: username → role → manager → privileges → lastAuthDate → trainingStatus. Example technical extraction: run Azure AD PowerShell to export users and group memberships: \"Get-AzureADUser | Select DisplayName,UserPrincipalName,AccountEnabled | Export-Csv users.csv\" and \"Get-AzureADGroupMember -ObjectId <groupId> | Export-Csv group_members.csv\". Establish scope rules: include contractors, privileged accounts, shared service accounts, and service principals; exclude archived/inactive employees only after HR confirms termination dates.</p>\n\n<h3>Step 2 — Execute the review and collect evidence</h3>\n<p>Issue manager attestation requests with a clear checklist (verify role, confirm access required, confirm training complete, escalate exceptions). Automate where possible: send emails or use ticketing (Jira/Trello) with pre-filled evidence links. For technical verification, query system logs and configuration: check MFA status, last sign-in times, group memberships, conditional access policies, and privileged activity in SIEM (e.g., Splunk or Elastic). A practical small-business approach: export a CSV that joins HRIS and IAM columns, highlight accounts with \"last sign-in > 90 days\" or \"privileged membership\", and send managers a checklist with direct links to screenshots or CSV lines to attest. Require managers to record attestation in the ticketing system and to provide remediation tickets for any changes requested.</p>\n\n<h3>Step 3 — Remediate findings and record outcomes</h3>\n<p>Create a remediation workflow with SLAs (e.g., remove stale accounts within 5 business days, apply role changes within 3 days). For account removals use documented steps: disable account, revoke sessions/tokens (e.g., PowerShell command to revoke refresh tokens in Azure AD: \"Revoke-AzureADUserAllRefreshToken -ObjectId <userId>\"), remove from privileged groups, change shared credentials, and update PAM entries if you use a vault (1Password, LastPass, HashiCorp Vault). Record remediation evidence: ticket ID, screenshots of group membership deletion, PAM checkout logs, and time-stamped console outputs. Real-world small-business scenario: an accounting firm using Google Workspace and Okta finds a contractor still in \"Finance-Admins\" group—remediation steps include remove from group in Okta, rotate any shared service account passwords in the password manager, and close the manager attestation ticket with linked screenshots and a signed confirmation.</p>\n\n<h2>Compliance tips, best practices, and technical specifics</h2>\n<p>Operationalize these best practices: enforce MFA and conditional access to reduce risk from stale credentials; implement Role-Based Access Control (RBAC) and avoid granting permissions directly to user accounts; use PAM for any privileged user; automate periodic queries (PowerShell, Google Admin SDK, or REST API calls) and produce machine-readable reports (CSV/JSON) for auditors. Track metrics such as percentage of attestations completed within SLA, number of stale privileged accounts removed, and mean time to remediate. For evidence, keep immutable logs or an append-only audit trail (SIEM or a cloud audit log) and store attestations in a secure, versioned document store (encrypted S3 + access logs) or in your GRC tool.</p>\n\n<h2>Risks of not implementing Control 1-9-6</h2>\n<p>Failing to perform personnel cybersecurity reviews increases the risk of unauthorized access, data exfiltration, insider threats, and compliance violations. Stale privileged accounts and forgotten service accounts are frequent vectors for attackers; without regular attestations and remediation you could face fraud, customer data loss, regulatory fines, and reputational harm. During an audit you will struggle to provide evidence of regular reviews, which can lead to non-conformance findings and corrective action plans with tight deadlines and higher remediation costs.</p>\n\n<p>Summary: implement Control 1-9-6 by creating a documented policy, automating authoritative data extracts from HRIS and IAM, executing manager attestations on a defined cadence, remediating with clear SLAs, and retaining auditable evidence. For small businesses this can be achieved with a combination of spreadsheets or low-cost tools plus scripted exports, clear manager workflows, and a small set of automated checks—delivering strong security outcomes and a defensible Compliance Framework posture.</p>",
    "plain_text": "This post gives a practical, step-by-step checklist to implement Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-9-6 for personnel cybersecurity reviews, mapped to a Compliance Framework practice so small and mid-sized organizations can build defendable evidence and operationalize recurring personnel security checks.\n\nUnderstanding Control 1-9-6 and its objectives\nControl 1-9-6 requires organizations to conduct formal personnel cybersecurity reviews that validate appropriate access, attest to role fit, confirm completion of mandatory training, and surface insider-risk indicators on a defined cadence. The key objectives are: (1) ensure least privilege and remove stale or inappropriate access, (2) confirm personnel have required security awareness and role-based training, (3) record manager attestations and HR changes, and (4) create auditable evidence for Compliance Framework assessments.\n\nImplementation notes for Compliance Framework\nMap Control 1-9-6 to your Compliance Framework by creating a policy (Personnel Cybersecurity Review Policy), a procedures document (review cadence, responsibilities, evidence types), and a RACI (HR, IT/IAM, Line Managers, Security, Audit). Define frequency (e.g., quarterly for privileged roles, semi-annual for business users), evidence retention (retain attestations and logs for at least 24 months or as required by your framework), and KPI targets (percentage of completed attestation within SLA). Capture evidence as screenshots, signed attestation forms (digital), ticket IDs showing remediations, and automated reports from IAM/HRIS systems.\n\nStep 1 — Prepare and scope the review\nBegin by scoping: extract authoritative lists from HRIS (employee status, manager, role, department) and IAM (active accounts, group memberships, privileged roles). For small businesses the authoritative sources might be Google Workspace Directory, Microsoft Entra ID (Azure AD), or an HR spreadsheet. Create a mapping table: username → role → manager → privileges → lastAuthDate → trainingStatus. Example technical extraction: run Azure AD PowerShell to export users and group memberships: \"Get-AzureADUser | Select DisplayName,UserPrincipalName,AccountEnabled | Export-Csv users.csv\" and \"Get-AzureADGroupMember -ObjectId  | Export-Csv group_members.csv\". Establish scope rules: include contractors, privileged accounts, shared service accounts, and service principals; exclude archived/inactive employees only after HR confirms termination dates.\n\nStep 2 — Execute the review and collect evidence\nIssue manager attestation requests with a clear checklist (verify role, confirm access required, confirm training complete, escalate exceptions). Automate where possible: send emails or use ticketing (Jira/Trello) with pre-filled evidence links. For technical verification, query system logs and configuration: check MFA status, last sign-in times, group memberships, conditional access policies, and privileged activity in SIEM (e.g., Splunk or Elastic). A practical small-business approach: export a CSV that joins HRIS and IAM columns, highlight accounts with \"last sign-in > 90 days\" or \"privileged membership\", and send managers a checklist with direct links to screenshots or CSV lines to attest. Require managers to record attestation in the ticketing system and to provide remediation tickets for any changes requested.\n\nStep 3 — Remediate findings and record outcomes\nCreate a remediation workflow with SLAs (e.g., remove stale accounts within 5 business days, apply role changes within 3 days). For account removals use documented steps: disable account, revoke sessions/tokens (e.g., PowerShell command to revoke refresh tokens in Azure AD: \"Revoke-AzureADUserAllRefreshToken -ObjectId \"), remove from privileged groups, change shared credentials, and update PAM entries if you use a vault (1Password, LastPass, HashiCorp Vault). Record remediation evidence: ticket ID, screenshots of group membership deletion, PAM checkout logs, and time-stamped console outputs. Real-world small-business scenario: an accounting firm using Google Workspace and Okta finds a contractor still in \"Finance-Admins\" group—remediation steps include remove from group in Okta, rotate any shared service account passwords in the password manager, and close the manager attestation ticket with linked screenshots and a signed confirmation.\n\nCompliance tips, best practices, and technical specifics\nOperationalize these best practices: enforce MFA and conditional access to reduce risk from stale credentials; implement Role-Based Access Control (RBAC) and avoid granting permissions directly to user accounts; use PAM for any privileged user; automate periodic queries (PowerShell, Google Admin SDK, or REST API calls) and produce machine-readable reports (CSV/JSON) for auditors. Track metrics such as percentage of attestations completed within SLA, number of stale privileged accounts removed, and mean time to remediate. For evidence, keep immutable logs or an append-only audit trail (SIEM or a cloud audit log) and store attestations in a secure, versioned document store (encrypted S3 + access logs) or in your GRC tool.\n\nRisks of not implementing Control 1-9-6\nFailing to perform personnel cybersecurity reviews increases the risk of unauthorized access, data exfiltration, insider threats, and compliance violations. Stale privileged accounts and forgotten service accounts are frequent vectors for attackers; without regular attestations and remediation you could face fraud, customer data loss, regulatory fines, and reputational harm. During an audit you will struggle to provide evidence of regular reviews, which can lead to non-conformance findings and corrective action plans with tight deadlines and higher remediation costs.\n\nSummary: implement Control 1-9-6 by creating a documented policy, automating authoritative data extracts from HRIS and IAM, executing manager attestations on a defined cadence, remediating with clear SLAs, and retaining auditable evidence. For small businesses this can be achieved with a combination of spreadsheets or low-cost tools plus scripted exports, clear manager workflows, and a small set of automated checks—delivering strong security outcomes and a defensible Compliance Framework posture."
  },
  "metadata": {
    "description": "Practical step-by-step checklist and implementation guidance to meet ECC–2:2024 Control 1-9-6 for personnel cybersecurity reviews in your Compliance Framework.",
    "permalink": "/how-to-build-a-step-by-step-checklist-to-meet-essential-cybersecurity-controls-ecc-2-2024-control-1-9-6-for-personnel-cybersecurity-reviews.json",
    "categories": [],
    "tags": []
  }
}