🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Step-by-Step Security Awareness Program for Managers, System Administrators, and Users — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1

Step-by-step guidance to build a role-based security awareness program that meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AT.L2-3.2.1) requirements, with practical examples for small businesses.

April 06, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows how to design, implement, and evidence a role-based security awareness program targeted at managers, system administrators, and general users in order to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control AT.L2-3.2.1: ensuring personnel understand security risks and applicable policies—delivered with practical, step-by-step actions, real-world small-business examples, and technical details you can apply tomorrow.

Implementation overview — map the control to action

AT.L2-3.2.1 requires that managers, system administrators, and users are made aware of security risks and relevant policies. Translate that into a compliance program by (1) defining role-based learning objectives, (2) creating or selecting training content mapped to the control language, (3) delivering and enforcing completion, and (4) retaining evidence for audits. For a compliance framework implementation, document a Training Plan artifact that lists who gets what, when, and how you measure success. That Training Plan becomes a primary evidence item for assessors.

Step-by-step build: planning, content, delivery, and evidence

1) Plan and scope (1–2 weeks)

Identify roles (managers, sysadmins, users), systems handling CUI, and access levels. Produce a simple RACI: who designs content, who delivers it, who enforces completion. Define frequency: onboarding within 7 days, annual refreshers, and ad-hoc briefings after incidents. In the Training Plan include mapping table rows: Control (AT.L2-3.2.1) → Learning objective → Module name → Evidence artifact (LMS transcript, sign-off, attendance log).

2) Develop role-based content (2–4 weeks)

Create concise modules targeted to each role: users get phishing recognition, device hygiene, password/MFA usage, acceptable use and reporting procedures; managers get policy enforcement, how to review training metrics, and incident escalation steps; sysadmins get privileged account handling, secure configuration, logging/monitoring expectations, patching cadence, and how to document changes. Technical examples: for sysadmins include step-by-step guides to enable Windows Audit Policy (logon events, object access), Linux auditd rules for /etc, and instructions to enforce MFA via SAML/Conditional Access for cloud apps.

3) Deliver, measure, and remediate (ongoing)

Choose delivery mechanisms: lightweight LMS (TalentLMS, Moodle), microlearning emails, live workshops, and simulated phishing campaigns. Tie training completion to system access—use an identity provider (Okta/Azure AD) group that restricts permissions until training-completion attribute is set. Measure completion rates, time-to-complete, and phishing click rates; set KPIs (e.g., <10% initial phish click rate, 90% annual completion). Maintain logs from LMS, phishing tool reports, and meeting minutes as audit evidence.

Technical integrations and examples for small businesses

Small-business example: a 25-person defense subcontractor using Office 365 and a Linux web server. Practical steps: enable Azure AD Conditional Access requiring MFA and a training-completion custom claim; set Group Policy Objects to enforce screensaver lock, BitLocker, and password minimums on Windows devices; deploy a simple MDM (Microsoft Intune) for mobile device control; run monthly phishing simulations using an affordable service (or open-source tools) and track results in a spreadsheet if no LMS exists. For sysadmins, require elevated access via a jump host, enforce sudo with logging to /var/log/auth.log and centralize logs to a small ELK or Splunk Light instance for review—document these configurations in Operational Procedures as evidence linked to the training module.

Real-world scenario and remediation workflow

Scenario: an employee clicks a spear-phish link and exposes credentials. A complete program has (a) phishing simulation and remediation training already delivered, (b) an incident playbook that managers follow, and (c) evidence that the user completed a targeted remediation module. The workflow: detect (email gateway alert / phish simulation), contain (reset credentials, revoke sessions via Azure AD), remediate (complete a 20–30 minute targeted microlearning), and document (incident ticket with timestamps, completed remediation transcript). This demonstrates to assessors that training is actionable and integrated into operations.

Compliance tips and best practices

Map every training module to the exact control text; store artifacts centrally with timestamps and unique user identifiers. Automate assignment and reminders through an LMS or ticket system; require managers to certify completion quarterly (email/attestation). Run at least one phishing campaign per quarter and track remediation rates. Use tabletop exercises annually for managers and sysadmins to validate escalation and technical procedures. Keep a change log for all curriculum updates to show continuous improvement during an assessment.

Risks of not implementing AT.L2-3.2.1

Failing to meet this requirement increases risk of CUI exposure, credential theft, privileged account misuse, and slow incident response. For small businesses this can mean lost contracts, corrective action plans from prime contractors or the DoD, direct breach costs, and reputational damage. Technically, lack of awareness increases the likelihood of misconfiguration (e.g., weak remote access), delayed patching, and failure to report suspicious activity—amplifying the impact of threats that training could mitigate.

In summary, build a pragmatic, documented security awareness program by mapping AT.L2-3.2.1 to role-based learning objectives, creating concise technical and behavioral modules, enforcing completion through identity controls and measurement, and retaining clear evidence (LMS transcripts, phishing reports, incident tickets, manager attestations). For small businesses, start small: a focused Training Plan, an affordable LMS or spreadsheet evidence workflow, quarterly phishing tests, and repeatable remediation processes will get you compliant and materially more secure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes