🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Audit-Ready Cybersecurity Awareness Program: Step-by-Step for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-3

Step-by-step guidance to build an audit-ready cybersecurity awareness program that satisfies ECC – 2 : 2024 Control 1-10-3 with practical artifacts, metrics, and small-business examples.

March 31, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Creating an audit-ready cybersecurity awareness program for Compliance Framework — specifically ECC – 2 : 2024 Control 1-10-3 — requires combining repeatable processes, measurable training activities, and retained evidence; this post walks you through a step-by-step, practical implementation plan for small businesses to meet the control, prepare for audits, and reduce human risk.

Overview and objectives (what Control 1-10-3 expects)

Control 1-10-3 under the Compliance Framework is focused on ensuring that personnel receive role-appropriate cybersecurity awareness and that the organization maintains verifiable evidence of training, testing, and improvement. Your program must demonstrate periodic delivery, measurement (e.g., completion rates and test outcomes), role-based content (e.g., finance vs. IT), and retention of artifacts for audit review. In practice this means policy + curriculum + delivery + testing + evidence retention.

Step-by-step implementation for an audit-ready program

1) Define scope, roles, and frequency

Start by mapping job functions to training needs (all staff, privileged users, contractors). For a small business (10–100 employees) create a simple matrix: Basic (all users) quarterly, Role-based (finance, HR) semi-annually, Technical (admins, developers) quarterly plus annual secure-coding or admin refreshers. Document this matrix in a formal "Awareness and Training Policy" stored in your policy repository (PDF with version number, approval signatures, and effective date) — auditors expect a signed policy and version history.

2) Build curricula and technical delivery

Choose an LMS or cloud-based training platform that produces exportable completion records (CSV/SCORM) and supports role groups — examples: TalentLMS, Moodle, or SaaS providers like KnowBe4. Create short microlearning modules (5–15 minutes) for basic topics: phishing, MFA, password hygiene, device security, and incident reporting. For role-based modules include finance: invoice fraud; HR: data handling; IT admins: privileged access and secure configuration. Technical detail: ensure the LMS supports SSO (SAML/OAuth) to match HR records, and schedule automated completion reports that include userID, moduleID, completion timestamp, and score (exportable as CSV for audit evidence).

3) Implement testing and simulated phishing

Measure effectiveness with quizzes (pass threshold 80%) and simulated phishing at a cadence (e.g., monthly or bimonthly). Use a phishing simulation tool that produces per-user click/open rates and timestamps; configure templates that mimic realistic business scenarios (invoice, HR request, vendor payment). Technical tip: avoid sending more than 10% of users to a bait URL at once; stagger campaigns to avoid disrupting operations. Set improvement targets (reduce click rate to <5% within 6 months for small orgs) and document remediation steps for users who fail — email coaching, mandatory retraining, or manager notification — and record these actions in your ticketing system (create a ticket per failed user with links to evidence).

4) Evidence collection, storage, and retention for audit

Auditors will request proof. Keep a structured Evidence Workbook (spreadsheet plus exported artifacts) that includes: training policy PDF (with version and signature), curriculum list with module IDs and learning objectives, LMS export files (userID, module, completion timestamp, score), phishing campaign reports (templates, dates, results), remediation tickets, and meeting minutes for program reviews. Store exports in a secure, access-controlled repository (e.g., a versioned folder in your secure file store or an encrypted S3 bucket) and maintain an index file (CSV) that references each artifact's filename, checksum (SHA256), storage path, and retention period (recommendation: retain evidence for 36 months or as required by Compliance Framework guidance). This level of detail shows auditors traceability from policy to activity to outcome.

Real-world small-business scenarios

Scenario A: A 25-person professional services firm uses Google Workspace and Slack. Implementation: enable MFA via Google Admin, use a lightweight LMS (e.g., TalentLMS) integrated via SSO, run monthly short phishing simulations, and maintain a Google Drive folder with exports and a policy doc signed by the owner. Scenario B: A 60-employee ecommerce startup uses Azure AD and Jira. Implementation: automate user group membership from HR system into LMS via SCIM, run role-based modules for finance and support, log simulated-phish results into Jira tickets for failed users, and schedule quarterly executive reviews with board briefings. Both scenarios show low-cost, practical approaches for small businesses to generate audit evidence.

Compliance tips and best practices

Map each training module and test to the relevant clause in the Compliance Framework and Control 1-10-3 so auditors see direct coverage. Maintain change control for training content (version numbers, author, and date). Use measurable KPIs: completion rate, average quiz score, phishing click rate, and remediation closure time. Automate report generation where possible (LMS scheduled exports, phishing tool APIs) to avoid manual errors. Establish a security champion in each department to improve participation and collect qualitative feedback for continuous improvement.

Risk of not implementing the requirement

Failing to implement an audit-ready awareness program increases phishing susceptibility, credential theft, and insider mistakes leading to data breaches. From a compliance perspective, lack of verifiable training evidence can cause audit findings, fines, or contractual penalties; operationally, it increases incident frequency and mean time to detect. Small businesses are common targets because attackers exploit human weaknesses; without documented training and testing, the organization cannot demonstrate due care or remediation efforts to regulators or customers.

Summary: An audit-ready cybersecurity awareness program for Compliance Framework ECC – 2 : 2024 Control 1-10-3 is practical to implement for small businesses by defining a role-based curriculum, using an LMS with exportable evidence, running measured phishing tests, and maintaining a structured evidence repository with versioned policies and remediation tickets; follow the step-by-step approach above, set measurable targets, and keep artifacts for audits to demonstrate compliance and reduce human-driven risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes