🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Security Awareness Program for Managers, System Administrators, and Users — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.1 (Step-by-Step Plan for Compliance)

Step-by-step guide to implement a NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 security awareness program for managers, system administrators, and users to achieve compliance with control AT.L2-3.2.1.

April 21, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step plan to implement a security awareness program that satisfies NIST SP 800-171 Revision 2 / CMMC 2.0 Level 2 control AT.L2-3.2.1 for managers, system administrators, and users — including technical integration tips, evidence collection for assessors, and small-business scenarios you can implement in weeks rather than months.

Why AT.L2-3.2.1 matters and the risk of not implementing it

Control AT.L2-3.2.1 requires role-appropriate security awareness and training for personnel who have access to Controlled Unclassified Information (CUI) or who perform security-relevant duties. Without targeted training for managers, sysadmins, and end users you increase the risk of credential compromise, improper handling of CUI, misconfiguration of privileged systems, failed incident detection and reporting, and ultimately contract loss or failed CMMC assessment. For a small business, a single successful phishing attack against a manager or a misconfigured privileged account can expose CUI and ripple into regulatory penalties and damaged vendor relationships.

Overview of the step-by-step implementation plan

This plan is split into discrete, auditable steps: role profiling, curriculum design, technical delivery and integration, verification and measurement, and continuous improvement. Each step includes what artifacts to produce (policies, rosters, LMS reports), suggested technical integrations (AD/Okta, SCORM/ xAPI), and small-business examples so you can produce assessor-ready evidence for compliance audits or CMMC assessments.

Step 1 — Profile roles and define learning objectives

Inventory personnel with access to CUI and those with elevated privileges: create simple CSV exports from HR, Active Directory/Azure AD, or your IDaaS (Okta) showing role, manager, and admin flags. Define at least three role classes: managers (decision/approval authority), system administrators (privileged accounts, change control), and standard users (CUI access and day-to-day operations). For each class define 4–6 measurable learning objectives mapped to AT.L2-3.2.1 and related controls (e.g., incident reporting timeframe, use of MFA, least privilege practices). Artifact: Role-to-objective mapping spreadsheet (use this in your SSP/POA&M).

Step 2 — Build or select curriculum and technical delivery

Choose a delivery method that creates verifiable records: a lightweight LMS (Moodle, TalentLMS) or a commercial platform (KnowBe4, Proofpoint) that supports SCORM/xAPI for completion records and reporting. Develop modules: onboarding basics (password hygiene, phishing), manager modules (escalation, CUI marking & handling), sysadmin modules (secure configurations, patch cadence, privileged access workstations, logging/SIEM usage). Include short quizzes (pass threshold 80%) and/or signed acknowledgements. Technical tips: integrate LMS with SSO (SAML/OAuth) so account creation and completion map to a single identity; export completion reports as CSV/JSON for archival; enable automated assignment via AD groups for role-based enrollments.

Step 3 — Operationalize delivery: schedule, frequency, and phishing

Run a baseline training for all current personnel within 30–60 days of policy approval, then require annual full courses plus quarterly micro-modules (15–20 minute refreshers) and monthly or quarterly phishing simulations for users and targeted scenarios for managers/admins. For sysadmins run dedicated workshops covering secure baselines, change-control processes, and incident triage (include hands-on checklist: hardening scripts, CIS benchmarks applied). Small-business example: a 35-person firm can combine group classroom sessions for managers with self-paced LMS modules for users and a quarterly simulated phishing campaign — budget-friendly and auditor-visible via consolidated LMS and phishing reports.

Step 4 — Measure, collect evidence, and remediate gaps

Define KPIs: training completion rate (target 100% for CUI holders), phishing click rate (target <5%), remedial re-training completion within 7 days of failure, and privileged account audit coverage. Maintain artifact bundles: signed training policy, role mapping spreadsheet, LMS completion reports, phishing campaign summary (click and report rates), quiz/pass records, meeting minutes for manager briefings, and documented corrective actions (POA&M entries). Technical evidence: export of SSO group assignment, LMS audit logs (timestamped completions), and screenshots of training enrollment tied to user IDs. These artifacts are evidence for your SSP and for CMMC assessors.

Compliance tips, best practices, and small-business scenarios

Map each training module to the exact language in NIST SP 800-171 / CMMC control AT.L2-3.2.1 in your System Security Plan (SSP). Make training records immutable: store completion CSVs in a read-only archive (S3 with Object Lock or an on-prem immutable backup) and retain them per contract requirements (commonly 3 years). Use role-based automation: AD/Azure AD group membership triggers enrollment, and HR offboarding triggers access removal and training deprovisioning. For small businesses with limited budget, use open-source LMS (Moodle) plus a low-cost phishing tool, and run targeted in-person manager workshops to cover risk escalation and contract-specific CUI handling that off-the-shelf modules may miss.

Consequences and residual risk if not implemented properly

Insufficient role-based awareness increases likelihood of successful social engineering against managers, misconfiguration or abuse of privileged accounts by administrators, and mishandling of CUI by users — all of which can lead to data exfiltration, lost DoD contracts, or failed CMMC assessments. Additionally, poor evidence collection (missing logs, no timestamped completion reports) can cause an otherwise compliant program to fail during assessment due to lack of demonstrable artifacts. Treat training as both risk mitigation and as documentary proof of your security posture.

In summary, meeting AT.L2-3.2.1 starts with role profiling, moves through mapped curriculum and technical integration (LMS + SSO + phishing sims), and finishes with measurable KPIs and robust evidence retention. For small businesses this can be implemented in phases: immediate baseline training and phishing, followed by sysadmin workshops and automated role-based enrollments — delivering both security value and the audit artifacts assessors expect for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes