🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Cybersecurity Awareness Program to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-2: A Step-by-Step Guide

Step-by-step guidance to design, run, measure, and document a cybersecurity awareness program that satisfies ECC‑2:2024 Control 1-10-2 requirements for Compliance Framework audits.

April 09, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows how to design and operate a practical cybersecurity awareness program that meets Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-10-2 under the Compliance Framework — with concrete steps, technical configurations, small‑business examples, evidence requirements for audit, and measurable targets you can implement this quarter.

Control 1-10-2: Intent and Key Objectives

Control 1-10-2 in ECC‑2:2024 requires organizations to implement an ongoing cybersecurity awareness program that educates personnel about threats, role‑specific responsibilities, and secure behavior, and that produces verifiable records of training, testing, and corrective actions. Key objectives are to: (1) reduce human‑caused incidents (phish clicks, credential leaks), (2) ensure role‑based awareness (developers, finance, executive), (3) document participation and remediation for compliance evidence, and (4) integrate technical controls that reinforce training (MFA, email security, DLP).

Practical Implementation Steps

Below is a step‑by‑step approach tailored to the Compliance Framework, including what to document for audits, technical settings to apply, and small‑business optimizations to keep costs and complexity manageable.

Step 1 — Establish governance, scope, and resources

Assign an owner (IT lead, HR security coordinator, or an external consultant) and form a small steering group including IT, HR, legal, and a business leader. Define scope (all employees, contractors, privileged accounts) and set targets such as 95% training completion within 90 days of hire and baseline phish‑click rate <5% within 12 months. Document the policy (Awareness Program Policy), roles and responsibilities, budget, and a schedule. For audit evidence, record the appointment memo, program policy version, and an approved annual plan.

Step 2 — Build a role‑based curriculum and delivery model

Create modular content mapped to job roles and risks: general cyber hygiene (everyone), secure coding (developers), phishing & invoice fraud (finance), and executive privacy/resilience (senior leaders). Mix short micro‑learning (5–15 minute videos), interactive modules, and policy attestations. For small businesses, use low‑cost LMS options such as Google Classroom/Microsoft Learn for Business, open‑source Moodle, or affordable vendors like TalentLMS/KnowBe4. Record completion certificates, quiz scores, and signed acknowledgements as artifacts for compliance reviews.

Step 3 — Run phishing simulations and harden technical controls

Implement monthly or quarterly phishing simulations and use outcomes to drive targeted retraining. Integrate email authentication and security: ensure SPF, DKIM, and a DMARC policy (example DMARC TXT record: "v=DMARC1; p=quarantine; rua=mailto:dmarc@yourdomain.com; pct=100; fo=1;") to reduce spoofing. Enforce MFA (prefer app push or FIDO2 keys) and disable legacy auth. Configure Conditional Access (Azure AD) policies to block high‑risk sign‑ins and require compliant devices. Use Microsoft 365 Defender or Google Workspace security center to tag suspected phishing and generate telemetry used as program metrics. Document simulation scripts, results, and remedial training actions for each event to demonstrate compliance.

Step 4 — Measure, report, and prepare audit evidence

Define metrics and cadence: training completion %, average quiz score, phish‑click rate, time‑to‑remediate flagged users, and incidents attributed to human error. Use LMS reports, SIEM logs, and phishing‑simulation dashboards as source evidence. Keep artifacts: training rosters, timestamps of completion, screenshots of phish simulation results, policy documents, meeting minutes, and corrective action records. Maintain retention (e.g., 3 years) and versioned evidence in a secure repository (access‑controlled) so auditors can trace program changes and outcomes.

Real‑world small business example and scenarios

Example: a 25‑employee MSP with one IT manager. Quarter 1: appoint the IT manager as program owner, adopt a lightweight LMS (TalentLMS pay‑as‑you‑go), deploy a 30‑minute baseline "Security Essentials" module to all staff, enable MFA for all accounts, and publish the Awareness Policy. Quarter 2: run the first phishing simulation targeted at finance and sales, achieving a 20% click rate; remediate by scheduling a mandatory 20‑minute targeted micro‑training for clicked users and logging completion. Quarter 3: reduce click rate to 6% and document evidence (LMS completion CSV, phishing report PDF, meeting minutes). This sequence provides an audit trail aligned with Compliance Framework expectations while keeping costs low (estimated <$2k/year with modest vendor use).

Risks of non‑implementation, compliance tips, and best practices

Failing to implement Control 1-10-2 increases risk of successful phishing, credential theft, ransomware, wire‑transfer fraud, regulatory fines, and reputational harm. Compliance tips: (1) automate evidence collection—export LMS and simulation reports monthly; (2) tie awareness to onboarding and offboarding to avoid gaps; (3) use measurable remediation (repeat simulation after remedial training); (4) align content with real incidents you’ve observed; (5) keep executive summaries for senior leadership and technical evidence for auditors. Best practices include setting quantifiable goals (e.g., phish click <5%), segmentation of training cadence by role, and integrating human risk scoring into your overall risk register so training results influence controls and budgets.

Summary: To meet ECC‑2:2024 Control 1‑10‑2 under the Compliance Framework, establish governance, deliver role‑based training, run measured phishing simulations, harden technical controls (MFA, SPF/DKIM/DMARC, Conditional Access), and retain verifiable evidence for audits. Even small businesses can meet requirements with low‑cost tools, a clear plan, and disciplined measurement — reducing human risk and providing the documented proof auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes