🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Measure and Report Effectiveness of Your Cybersecurity Awareness Program for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-1

Practical, audit-ready guidance for measuring and reporting the effectiveness of cybersecurity awareness programs to meet Compliance Framework ECC‑2:2024 Control 1-10-1 requirements.

April 15, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design measurable objectives, select evidence-based metrics, implement lightweight technical measurement, and produce audit-ready reporting so your cybersecurity awareness program satisfies Compliance Framework ECC‑2:2024 Control 1-10-1 (effectiveness measurement and reporting) — focused on practical steps a small business can implement this quarter.

Why measuring awareness matters for Compliance Framework

Compliance Framework requires demonstrable evidence that awareness activities reduce risk, not just that training occurred. Measuring behavior (e.g., phishing click rates, suspicious email reports) and outcomes (incident reduction, faster detection) ties training to risk reduction. For auditors, logs, aggregated metrics, and documented improvement plans are the proof points that differentiate checkbox training from an effective control.

Define measurable objectives and KPIs

Start by mapping the program goals to specific, measurable KPIs. Typical objectives for Control 1-10-1 include: reduce phishing click-rate, increase incident reporting, improve knowledge-test scores, and shorten mean time to remediate (MTTR) user-initiated incidents. Recommended KPIs: (1) Phishing simulation click-through rate (CTR), (2) Completion rate for required courses, (3) Average score on post-training quizzes, (4) Report-to-IT rate (ratio of reported suspicious messages to simulated/phish volumes), (5) Number of user-caused security incidents per 1,000 employees, and (6) Time from user report to containment. Define baseline (e.g., last 12 months) and set realistic targets (for many small orgs: phishing CTR < 7% within 6 months, report-to-IT ratio > 0.5 for simulated campaigns).

Practical implementation steps for Compliance Framework

Implement a repeatable measurement pipeline: 1) Instrument — ensure your LMS, email platform, and ticketing system produce timestamped logs; 2) Simulate — run controlled phishing campaigns monthly or quarterly; 3) Measure — extract metrics and compute KPIs automatically; 4) Analyze — segment by department/role and identify high-risk cohorts; 5) Report — produce a monthly operations report and a quarterly compliance report for leadership; 6) Improve — create remediation actions and track progress. Technical examples: compute course completion from an LMS database with SQL, e.g. SELECT user_id, MAX(completed_at) FROM lms_course_completions WHERE course_id='sec_awareness_2024' GROUP BY user_id; calculate phishing click rate = (clicks / delivered) * 100. If you use a SIEM or Splunk, an example search to count simulated clicks: index=phish_events tag=simulation action=clicked | stats count AS clicks by campaign_id. Small teams can export event CSVs from their phishing tool (Gophish/KnowBe4) and use Google Sheets + Apps Script to automate KPI calculations and generate charts.

Technical integration notes

Ensure event timestamps are in a common timezone and that user identifiers map across systems (HRID or email). Store raw evidence (CSV exports, LMS reports, ticket IDs) in a read-only audit folder (S3/OneDrive) with access controls. For automated dashboards, use a BI tool (Power BI, Looker Studio) and refresh monthly. Maintain a change log for campaign content and baseline dates — auditors will ask whether a drop in click-rate followed a content change or a different audience.

Real-world small-business scenario

Example: a 75-employee services firm with one IT generalist and outsourced MSP. They lacked a security team but used Google Workspace, a simple LMS, and Gophish for simulations. Implementation: schedule quarterly simulations targeted by role, require 30-minute micro-modules after failing a simulation, track remediation completion in the LMS, and log incident reports in a shared ticket queue. Monthly KPIs were generated from three CSVs (Gophish, LMS, ticketing) merged in a Google Sheet. Result: within two quarters phishing CTR dropped from 18% to 6% and report-to-IT ratio rose from 0.2 to 0.8, producing a concise PDF quarterly report used in an executive review and stored as compliance evidence.

Reporting, evidence and audit-readiness

Create two report layers: operations (monthly) and compliance (quarterly). Operations should include raw counts, recent campaign details, failing users flagged for remediation, and outstanding action items. The compliance report should include trends (6–12 month), target attainment, corrective action plans, and links to raw evidence (exported CSVs, LMS course completion lists, ticket IDs with anonymization where needed). For ECC‑2:2024 auditors expect: documented measurement methodology, baselines, KPI formulas, data exports, and evidence of follow-up (e.g., remediation training completion timestamps). Keep at least 12 months of evidence and preserve a tamper-evident log or versioned storage for exports.

Risk of not implementing this control

Failing to measure and report effectiveness leaves you blind to persistent behavioral risk and undermines the control’s value. Consequences include higher probability of phishing-driven breaches, increased downtime, regulatory fines (if demonstrable due diligence is required), loss of client trust, and failed audits. For small businesses this often manifests as a successful credential theft or ransomware attack that could have been prevented through targeted reinforcement and timely remediation.

Compliance tips and best practices

Best practices: tie training to real roles (role-based curricula), use short micro-modules with immediate assessments, follow every failed simulation with mandatory remediation, segment metrics by high-risk groups (finance, HR), and include contractor coverage in reporting. Automate as much as feasible: scheduled exports, automated KPI calculations, and templated PDF reports reduce workload and human error. Document all policies (training frequency, handling of failures, disciplinary steps) and align them with HR processes. Finally, use statistical significance when comparing campaign results — small sample sizes can mislead; combine cohorts or increase campaign volume to validate improvements.

Summary: To satisfy Compliance Framework ECC‑2:2024 Control 1-10-1, operationalize a measurement program that maps objectives to clear KPIs, automates data collection from LMS/phishing/ticketing systems, produces recurring reports for leadership and auditors, and documents remediation actions. For small businesses this can be achieved with inexpensive tools (Gophish, Google Workspace, a simple LMS, and BI or spreadsheets) and disciplined process — the outcome is demonstrable risk reduction, better audit readiness, and a stronger security posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes