🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Document and Report Strategy Reviews to Satisfy Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-3: Templates and Examples

Step-by-step guidance and ready-to-use templates to document and report strategy reviews that meet ECC – 2 : 2024 Control 1-1-3 requirements for Compliance Framework.

March 27, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to document and report strategy reviews to satisfy Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-1-3 under the Compliance Framework, with practical templates, implementation steps, and small-business examples you can adopt immediately.

What Control 1-1-3 requires and why documentation matters

Control 1-1-3 expects organizations to regularly review cybersecurity strategy and risk decisions, capture the outcomes formally, and retain evidence that decisions and action items are tracked to closure; the Compliance Framework uses these artefacts to verify governance, traceability, and management accountability. In practice, this means keeping a versioned record of each strategy review meeting (agenda, attendees, minutes, decisions, assigned actions, and linked evidence) mapped back to the relevant ECC controls and risk register entries.

Practical, step‑by‑step implementation specific to the Compliance Framework

Start by defining the cadence and scope in your Compliance Framework documentation: quarterly strategic reviews and monthly tactical checkpoints are typical. For each scheduled review, produce these items as minimum evidence: an approved agenda linked to framework objectives; an attendee list with roles; minutes that record decisions and rationale; a prioritized action register that includes owners, SLAs, and linkage to risk IDs; and a signed attestation (digital signature or emailed approval) from the accountable executive. For small teams, use lightweight tools (SharePoint/OneDrive, Google Drive, or a ticketing system like Jira) but ensure versioning and access controls meet the Framework's integrity and retention expectations.

Template: essential fields to include in each strategy review record

Use a standard template for consistency. At a minimum include: Review title; Review date and period covered; Scope and objectives (mapped to Compliance Framework clauses/ECC references); Participants and approvers (name, title, role); Executive summary (1–3 bullets of strategic impact); Key findings and risk changes (reference risk register IDs); Decisions made and rationale; Action items (ID, description, owner, priority, due date, status); Evidence links (tickets, reports, screenshots, signed approvals); Distribution list; Version, reviewer, and retention period. Store the template as a controlled document and export a PDF snapshot after each review for immutable evidence.

Real‑world small business scenario

Example: a 25-employee retail business ("CornerMart") running Microsoft 365, a cloud POS, one perimeter firewall, and outsourced backups. During a quarterly strategy review they identify a rising risk from delayed Windows updates and the vendor's unsupported POS version. Using the template, they record the decision to enforce upgrade timelines (action: upgrade POS by 60 days, owner: IT manager), accelerate patching (action: set monthly Windows Update enforcement via Intune, owner: sysadmin), and open an incident insurance query. Evidence saved: Intune compliance report (CSV), ticket in ServiceNow, signed board note approving budget. Mapping these to ECC control IDs shows traceability that auditors will require.

Technical details and automation you can implement today

Automate evidence collection where possible: export vulnerability scanner snapshots (Nessus/OpenVAS), EDR health reports (CrowdStrike/Defender ATP), and patch compliance lists via API calls. Example quick wins: a PowerShell scheduled task that runs Get-CimInstance -ClassName Win32_QuickFixEngineering or Get-WindowsUpdateLog (or Intune Graph queries) to produce a patch compliance CSV; a Python script that queries your vulnerability scanner API for current high/critical counts and uploads results to a shared evidence folder. Hash each exported file (sha256sum) and store the hash in your meeting minutes to prove integrity. Retain these exports for the retention period specified in your Compliance Framework policy (commonly 2–7 years depending on local regulation and organizational policy).

Reporting formats and audience-tailored outputs

Create at least two output layers: an executive summary (1 page) for leadership/board that highlights strategic risks, decisions, budgetary impacts and a technical appendix for auditors/SecOps with metric tables, logs, and evidence links. Use dashboards (Power BI, Grafana) to visualize trends (vulnerability backlog, MTTD, MTTR, patch success rate). For the Compliance Framework, include a mapping table that links each decision and action item back to the specific ECC clause (e.g., ECC 1-1-3 -> evidence file name) to accelerate audit review.

Compliance tips, best practices, and the risk of not implementing

Best practices: enforce a single canonical template, mandate sign-off by the accountable executive, use access-controlled document repositories, automate metric collection, and version-control minutes. Keep an action-tracking ticket per item so auditors can see lifecycle and closure evidence. Risk of nonimplementation: without documented reviews and traceable actions you risk failed audits, contract penalties, invalidated cyber insurance claims, and most importantly unchecked technical debt that attackers can exploit. A common real-world failure is a small business skipping documented decisions about remote access hardening; months later an RDP misconfiguration is exploited because no owner was assigned and no evidence shows mitigation efforts.

In summary, meeting ECC – 2 : 2024 Control 1-1-3 under the Compliance Framework is practical and achievable: standardize a concise template, automate metric and evidence collection, map outcomes back to ECC clauses, and retain signed review artifacts. For small businesses, lightweight tools plus disciplined processes (owner assignment, SLAs, and immutable snapshots) will satisfy auditors and materially reduce security risk—start by drafting your first standardized review template and automating one evidence export (patch or vulnerability report) to demonstrate immediate compliance progress.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes