🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Step-by-step Security Awareness Training Program to Recognize and Report Insider Threats — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.3

Step-by-step guidance for implementing NIST SP 800-171 / CMMC 2.0 AT.L2-3.2.3 security awareness training so employees recognize and report insider threats, with practical small-business examples and evidence artifacts.

April 19, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 control AT.L2-3.2.3 requires organizations to provide security awareness training so personnel can recognize and report insider threats; building a compliant, practical program means turning policy into regular, measurable activities that fit your business size, culture, and technical stack.

Why AT.L2-3.2.3 matters and the risk of non‑compliance

AT.L2-3.2.3 is focused on human detection and reporting: employees must be able to spot risky behaviors (data hoarding, unusual file transfers, social engineering that leads to privileged access) and know how to report them. Failing to implement this control increases the risk of data exfiltration, compromise of Controlled Unclassified Information (CUI), contract termination or penalties under DFARS clauses, and reputational damage. For small businesses supporting DoD supply chains, a single insider incident combined with weak awareness can cost contracts and future opportunities.

Step-by-step implementation (practical compliance-focused plan)

1) Plan: scope, roles, and success criteria

Start by scoping who handles CUI, privileged accounts, and contractors. Create a written training plan that maps AT.L2-3.2.3 to artifacts you will produce: a training curriculum, attendance records, test results, phishing simulation reports, and an insider-threat reporting SOP. Define success metrics (e.g., 90% completion within 30 days of onboarding, phishing click rate <5% after remediation) and retention periods for evidence (align to contract requirements; commonly 3–6 years for auditability).

2) Design role-based curriculum and learning objectives

Create core modules for all personnel (insider-threat awareness, how to report, social engineering red flags) and role-specific modules for privileged users, system administrators, and contractors (privilege misuse, shadow accounts, logging expectations). Include learning objectives tied to behaviors: “Identify three indicators of data staging,” “Report suspicious requests via the secure reporting channel.” Use SCORM/xAPI packages if leveraging an LMS to capture completion and quiz scores for evidence.

3) Deliver: onboarding, cadence, and technical integration

Integrate training into HR onboarding and your access provisioning workflow: automate enrollment via your LMS using SCIM or CSV imports and set completion deadlines enforced by access gating (e.g., deny CUI access until training complete). Use SSO/SAML to correlate training status to Active Directory or the identity provider; add training-completed attributes to user profiles for audit queries. For delivery use a blended approach—30–60 minute baseline e-learning, monthly 10–15 minute microlearning refreshers, and quarterly role-specific deep dives.

4) Test and simulate — phishing, data-handling scenarios, and tabletop exercises

Run regular simulated phishing campaigns (open-source GoPhish or commercial platforms) tied to training outcomes. Expand to insider-scenario exercises: simulated attempts to copy bulk files to USB, excessive downloads from SharePoint/OneDrive, or attempts to bypass approval chains. Integrate tests with technical controls — DLP alerts, endpoint EDR telemetry, and SIEM correlation rules — so suspicious activity produces an incident ticket and triggers a follow-up training or disciplinary workflow.

5) Reporting channels, SOPs, and incident integration

Publish a clear, low-friction reporting process: secure email alias, ticketing system with a confidential flag, or anonymous hotline. Document an SOP that routes reports to the Insider Threat Liaison (could be a combined Security/HR role in small businesses), outlines triage steps, and describes evidence preservation (log exports, endpoint snapshots). Ensure reporters receive acknowledgement and a no-retaliation statement; track reports in your ticketing system for metrics and audit evidence.

Small-business examples and low-cost implementations

Example 1 — 40-employee subcontractor: use a cloud LMS with a free tier, create three SCORM modules from templates (onboarding, privileged access, reporting), automate enrollment via HR exports, and run quarterly phishing via a low-cost provider. Evidence: LMS completion CSV, phishing campaign report, SOP document. Example 2 — 12-employee engineering shop: use weekly 10-minute team meetings for microlearning, store slide decks in a shared drive, use the helpdesk ticket system as the reporting channel, and perform an annual tabletop. Technical tie-ins: enable DLP for cloud storage and configure Azure/Google Workspace alerts for large downloads to produce incident tickets.

Compliance tips and best practices

Map every training element to evidence items and keep a compliance binder (digital) with the training plan, lesson plans, attendance logs, phishing reports, SOPs, and incident tickets. Use role-based metrics and continuous improvement—if a group repeatedly fails phishing tests, require focused remediation and track improvements. Document all changes to the program, including content revisions and training dates, so you can present a clear timeline during audits. Finally, include subcontractors in the scope or capture contractual assurances showing they meet equivalent training and reporting standards.

Summary: Build a program that is auditable, automated where possible, role-based, and measurable. Implement onboarding + periodic refreshers, simulate threats, integrate with HR and technical controls (LMS/IDP/AD, DLP, SIEM, EDR), and capture evidence (completion records, phishing results, SOPs, incident tickets). Doing so not only satisfies AT.L2-3.2.3 but materially reduces the likelihood and impact of insider incidents while demonstrating compliance to assessors and contracting officers.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes