🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Role-Based Security Training Program to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.2 (Step-by-Step Guide)

Step-by-step guidance to design, deploy, and document a role-based security training program that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AT.L2-3.2.2 while protecting Controlled Unclassified Information (CUI).

April 07, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Role-based security training is a mandatory and practical control for organizations handling Controlled Unclassified Information (CUI) under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AT.L2-3.2.2). This post gives a step-by-step implementation guide tailored for small businesses operating under a Compliance Framework, with actionable technical details, real-world examples, compliance tips, and the artifacts you need to demonstrate effectiveness to an assessor.

What AT.L2-3.2.2 Requires and key objectives

AT.L2-3.2.2 (mapped to NIST 3.2.2) requires organizations to provide role-based security training so personnel understand the security risks associated with their roles and applicable policies, standards, and procedures. Key objectives are: (1) identify roles that handle CUI or privileged access, (2) deliver training tailored to each role, (3) assess comprehension and behavior change, and (4) retain documented evidence to satisfy the Compliance Framework and auditors.

Implementation roadmap (high level)

Follow these four practical phases: (A) Role inventory and risk mapping, (B) Curriculum development and selection, (C) Deployment and technical integration, (D) Assessment, monitoring, and evidence collection. The sections below break each phase into concrete steps that a small business can complete with modest resources.

Phase A — Define roles, map responsibilities, and prioritize

Step 1: Create a Role Inventory—list job titles and map them to access to CUI and privileged systems (e.g., contract manager, developer, system administrator, remote user). Step 2: Assign a risk level to each role (High/Medium/Low) based on the potential impact of compromised behavior. Example: a 25-person DIB subcontractor might tag "DevOps engineer" and "IT admin" as High, "Project manager" as Medium, and "Office staff" as Low. Produce a simple spreadsheet that captures role, systems accessed, CUI touchpoints, and priority—this spreadsheet is an evidence artifact for compliance.

Phase B — Build or select role-based curriculum

Design training modules aligned to role risks. Baseline content should include CUI handling, acceptable use, phishing recognition, MFA use, remote work security, and incident reporting. Role-specific modules add privileged account hygiene for admins, secure coding for developers, and supply-chain security awareness for program managers. Technical recommendations: target 20–45 minute modules, make them SCORM/xAPI compliant if using an LMS, require an 80% passing score on quizzes, and include a signed acknowledgment form in HR records. Small-business tip: use a hybrid approach—combine free NIST/DoD content and low-cost commercial modules (TalentLMS, Moodle plus SCORM packs) to keep costs down.

Phase C — Deploy: LMS, identity integration, delivery cadence

Select an LMS that supports role assignment and reporting (SCORM/xAPI + CSV export). Integrate the LMS with your identity provider (Azure AD, Okta) via SAML/OIDC to automatically assign training based on group membership. Automate reminders and enforcement rules (e.g., block access to non-essential systems until mandatory onboarding modules are complete for new hires). Technical logging: enable LMS audit logs, export completion reports weekly, and retain raw logs for the retention period you define (commonly 3 years for CUI-related evidence). For small shops using Microsoft 365, Microsoft Viva Learning plus Azure AD groups, or a low-cost TalentLMS linked to Azure AD, provides an efficient deployment path.

Phase D — Assess, simulate, and measure effectiveness

Don’t rely solely on completion checkboxes. Run quarterly phishing simulations targeted to role-risk levels and measure click rates, report rates (using “Report Phish” buttons or mailbox rules), and remediation completion. Use pre/post module quizzes to measure knowledge acquisition and sample real-world task-based assessments (e.g., have admins demonstrate secure configuration steps in a sandbox). Feed results into KPIs: training completion %, phishing click rate, average remediation time, and number of incidents attributable to human error. Retain reports as evidence and update training based on performance trends.

Practical small-business scenario and risks of not implementing

Example: A 25-person subcontractor wins a DoD contract to process CUI. They implement the steps above in 60 days: role inventory (1 week), select LMS & integrate with Azure AD (2 weeks), create baseline & role modules using DoD/NIST assets plus one purchased SCORM pack (3 weeks), then run initial onboarding and a phishing simulation (remaining time). If they do not implement role-based training, the business faces increased risk of CUI exfiltration via phishing or misconfigured privileged accounts, contractual noncompliance (lost contracts, termination), regulatory penalties, and reputational harm that can permanently damage their ability to participate in the Defense Industrial Base (DIB).

Documentation, artifacts, compliance tips and best practices

Maintain a compliance binder (digital) with: training policy, role inventory spreadsheet, curriculum materials (slides, videos, SCORM packages), LMS completion exports, quiz results, phishing simulation reports, signed acknowledgments, onboarding checklists, and corrective action logs. Best practices: tie training to HR onboarding/offboarding, require annual refresher plus role-triggered training (e.g., admin re-certify every 6 months), use automation to reduce human error (SSO group sync), set clear KPIs and review them quarterly, and keep retention of training evidence for at least three years. When audited, provide the binder and a short narrative explaining how role mapping drove curriculum and metrics.

In summary, meeting NIST SP 800-171 Rev.2 / CMMC 2.0 AT.L2-3.2.2 requires a repeatable, documented process: inventory roles, build role-specific content, deploy via an auditable LMS integrated with your identity platform, measure outcomes with simulations and assessments, and keep organized evidence. For small businesses, practical reuse of NIST/DoD content, low-cost LMS options, and automation reduce cost and shorten time-to-compliance while meaningfully reducing organizational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes