🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Establish an Approved, Periodic Cybersecurity Awareness Program: Template and Checklist for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-1

Step-by-step guide and ready-to-use template to implement an approved, periodic cybersecurity awareness program that meets ECC – 2 : 2024 Control 1-10-1 requirements for the Compliance Framework.

April 08, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Establishing an approved, periodic cybersecurity awareness program is a foundational requirement in the Compliance Framework under ECC – 2 : 2024 Control 1-10-1; this post provides a practical, auditable template and checklist you can implement today to meet the control, reduce human risk, and demonstrate compliance during assessments.

What Control 1-10-1 Requires

Control 1-10-1 mandates an organization-wide, documented cybersecurity awareness program that is formally approved, delivered on a defined cadence (periodic), and has evidence of effectiveness. The program must cover relevant topics (phishing, password hygiene, data handling, remote work security, social engineering), include role-based components for high-risk personnel, and retain artifacts for audit review. In the Compliance Framework context, “approved” implies sign-off by the designated risk owner (CISO or equivalent) and documented review cycles.

Implementation Steps — Practical Template

Follow these practical steps to build an approved program that aligns with the Compliance Framework: define scope and roles; draft policy and training curriculum; choose delivery and tracking mechanisms; execute, measure, remediate, and document. Below is a compact, auditable template you can adapt.

Sample Program Template (minimum required fields)

  • Program Name: "Approved Periodic Cybersecurity Awareness Program"
  • Owner: Chief Information Security Officer (CISO) / Risk Owner
  • Approval: Signature/approval date from CISO and CEO/Board (or delegated authority)
  • Scope: All employees, contractors, high-risk roles (finance, sysadmins, executives)
  • Cadence: New hire onboarding within 7 days; quarterly micro-modules; annual comprehensive training; monthly phishing simulations for high-risk roles
  • Curriculum Topics: Phishing, credential safety & MFA, data classification & handling, secure remote access, incident reporting, acceptable use
  • Delivery Mechanisms: LMS (SCORM), live sessions, recorded webinars, email micro-learning, gamified modules
  • Measurement & KPIs: Completion rate >= 95% within 30 days, Phish click rate < 5% (org-wide), mean time to report suspicious email (MTTR) & remediation
  • Evidence & Retention: Completion certificates, LMS reports, phishing simulation results, policy approvals retained for 3 years
  • Review Cycle: Annual policy review; quarterly KPI review; ad hoc updates after incidents

Checklist for Compliance and Auditability

Use this checklist to prepare artifacts auditors will expect under the Compliance Framework:

  • Documented policy for the awareness program with explicit approval (signed PDF or governance tool entry)
  • Training curriculum mapped to risk areas and role-based requirements
  • Training schedule calendar and delivery records (LMS reports, attendance sheets)
  • Phishing simulation plan and results, including remediation steps for failures
  • Evidence of corrective actions for non-completion or repeat offenders
  • Retention policy for training records and metrics (dates and locations of storage)
  • Metrics dashboard screenshots or exports showing KPIs over time
  • Incident escalation examples where employee reporting led to prevention or containment
  • Approval and review log showing sign-off history

Technical Implementation Details

Small businesses can implement this program without significant budget by using a combination of cloud LMS platforms (many offer free tiers) and open-source phishing tools (GoPhish) integrated with your email gateway for safe simulations. Configure your LMS to export SCORM-compliant completion records and integrate with HR systems or a simple CSV import to mark new hires automatically. For tracking, capture: user ID, module completed, timestamp, assessment score, and certificate ID. Store artifacts in immutable (write-once) storage or version-controlled document repository to preserve audit trails. Consider sending training completion events into a SIEM or GRC tool for consolidated compliance reporting.

Real-World Small Business Scenario

Example: A 45-employee marketing firm with remote staff implemented a quarterly awareness program: onboarding training (week 1), monthly 10-minute micro-modules delivered via email with completion links, and quarterly phishing simulations targeted at high-risk roles (finance and HR). They set KPIs: 98% onboarding completion within 7 days, quarterly phish click rate under 7%. After three simulated phishes showed a 12% click rate, the firm mandated a 1-hour remediation workshop for clickers and logged completed remedial training in the LMS; records were kept in the company’s shared compliance folder for 3 years to satisfy auditors.

Compliance Tips and Best Practices

Best practices to ensure acceptance and effectiveness: secure formal executive sponsorship to get buy-in; keep training concise and role-specific; use real-world, localized examples (company-specific phishing templates); ensure accessibility (translations, captions); enforce completion by tying to HR processes (payroll holds only as a last resort and with HR/legal consultation); run regular simulated attacks and adjust training based on failure patterns. Track trends—if a specific department repeatedly fails, investigate procedures or access that may be enabling risky behavior.

Risk of Non-Implementation

Failing to implement an approved, periodic awareness program increases exposure to phishing, credential compromise, data breaches, fraud, and social engineering attacks; it also jeopardizes your Compliance Framework posture and may result in audit findings, fines, contractual penalties, and reputational damage. For small businesses, a single successful phish that compromises finance credentials can lead to fraudulent transfers or theft of customer data, which often has outsized financial and operational consequences.

Summary: Implementing ECC – 2 : 2024 Control 1-10-1 involves documenting an approved program, delivering periodic and role-based training, measuring outcomes, and retaining evidence for audits; use the provided template, checklist, and practical steps to stand up an effective program quickly and with minimal overhead. Start with the policy and approval, automate tracking through an LMS, run regular phishing simulations, and maintain a continuous improvement loop to reduce human risk and demonstrate Compliance Framework conformance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes