🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Security Awareness Program for Managers, System Administrators, and Users — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1 (Step-by-Step Guide)

Step-by-step practical guidance to design, deploy, measure, and document a NIST SP 800-171/CMMC 2.0 Level 2 security awareness program for managers, system administrators, and users.

March 29, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide walks you through implementing a security awareness program that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AT.L2-3.2.1 — a program tailored for managers, system administrators, and general users with practical, technical, and audit-ready actions for small to medium-sized businesses.

What AT.L2-3.2.1 requires and key objectives

AT.L2-3.2.1 requires organizations to provide role-based security awareness training that informs personnel of cyber risks, their security responsibilities, and the behavior expected to protect Controlled Unclassified Information (CUI) and organizational systems; key objectives are (1) ensure managers understand escalation and policy enforcement, (2) ensure system administrators know secure configuration and privileged access handling, and (3) ensure users understand phishing, credential hygiene, and acceptable use. For compliance, your program must be repeatable, measurable, documented, and demonstrably role-tailored.

Step-by-step implementation plan

1) Define scope, roles, and measurable objectives

Start by inventorying personnel and mapping them to roles: managers (contract leads, HR, department heads), system administrators (AD admins, cloud admins, network admins), and users (office staff, contractors). Create a matrix that lists required learning outcomes per role (e.g., managers: incident reporting & policy enforcement; sysadmins: configuration management, least privilege, logging; users: phishing recognition, MFA use). Define measurable objectives such as “90% of users complete training within 30 days of hire” and “monthly phishing click rate below 5%.” Capture scope in a short policy/statement of applicability that cites AT.L2-3.2.1 as the drivers for the program.

2) Build role-based curriculum and select tools

Design concise modules: 20–30 minute core module for users (phishing, password hygiene, device security), a 45–60 minute advanced module for sysadmins (secure baseline configurations, patching cadence, privilege escalation detection), and an executive/manager module (incident escalation, insider risk indicators, vendor oversight). Choose delivery and enforcement tools based on environment: for cloud-first orgs use Microsoft Intune + Azure AD Conditional Access for device compliance and forced enrollment; use an LMS (open-source like Moodle or SaaS like KnowBe4) for course delivery and completion tracking; use a phishing simulator that integrates with your LMS. Technical implementation notes: deploy enrollment via Group Policy (GPO) or Intune scripts to push required training bookmarks and password manager browser extensions, and use SSO (SAML/OIDC) to centralize user records and completion evidence for audits.

3) Operationalize onboarding, ongoing cadence, and privileged-user controls

Integrate training into HR onboarding and offboarding workflows so completion is mandatory before network access is granted — automate using your identity provider (IdP) to gate conditional access until training status is “complete.” For system administrators, require hands-on labs or checklists (e.g., zero-trust configuration baseline, MFA for all privileged sessions, JIT/Bastion access) and enforce via technical controls like Azure AD Privileged Identity Management, bastion hosts, or JumpBoxes. Establish schedules: initial training at hire, role-specific refreshers quarterly for admins, annual refresher for users, and immediate retraining after a high-risk incident or failed phishing exercise. Log enforcement events and training completion to your SIEM or log store for audit evidence and trend analysis.

4) Test, measure, and improve with realistic exercises

Execute continuous measurement: run quarterly phishing simulations with increasing sophistication and track click rates, report rates, and time-to-report. Track metrics like completion rate, average phishing click rate, repeat offenders, privileged account policy violations, and remediation time for reported incidents. Use tabletop exercises for managers that simulate CUI exposure or contractual audits, and run a “red-team-lite” for sysadmins to validate incident detection and privileged access controls. Create a remediation plan for users who fail exercises (mandatory coaching, 1:1 session, or temporary access restrictions) and keep evidence of remediation steps and timestamps for compliance audits.

Real-world small business scenarios and technical examples

Example: a 25-person DoD contractor with hybrid work can meet AT.L2-3.2.1 by mapping two roles (admins and users), using Microsoft Business Premium (Azure AD, Intune) to enforce MFA and device compliance, deploying KnowBe4 for phishing and LMS, and documenting enrollment via automated HR hooks in the IdP. For technical controls, scripts pushed by Intune can install a corporate password manager and configure Chrome policies to restrict extension installation to approved sources. For a small Linux-based sysadmin team, require SSH key rotation every 90 days, enforce sudo logging to a centralized syslog host, and capture screenshots/exports of sudo audit logs as evidence of training application during audits.

Risks of not implementing AT.L2-3.2.1

Without a documented, role-based awareness program you face increased risk of credential theft, phishing-driven ransomware, CUI exfiltration, loss of DoD contracts, and audit failure under CMMC/NIST. Technically, untrained sysadmins may leave insecure services enabled, fail to enforce MFA, or miss critical patches — creating lateral-movement paths. A small contractor’s real-world example: a phishing email led to credential reuse and access to CUI, triggering a contract suspension and remediation costs that far exceeded the cost of a basic awareness program.

Compliance tips and best practices

Keep evidence organized: export LMS completion reports, phishing campaign metrics, meeting minutes for tabletop exercises, and policy versions into a compliance folder with retention policy. Automate as much as possible: use SSO to tie training completion to access, use conditional access to block non-compliant devices, and forward training and incident logs to your SIEM. For limited budgets prioritize: MFA and phishing simulations first, then role-based admin training, then technical enforcement. Maintain executive sponsorship and a one-page “why” explaining risk reduction and contract protection to secure funding. Finally, schedule periodic reviews of curriculum tied to threat intelligence so content remains current.

Summary: Implementing AT.L2-3.2.1 is a practical program of role-mapped curriculum, technical enforcement, measurable testing, and retained evidence — start by scoping roles and objectives, automate onboarding and enforcement with your IdP and MDM, run realistic phishing and tabletop exercises, and retain records for audit; doing so significantly reduces the risk of CUI exposure, failed audits, and operational disruption while meeting NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes