🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-1

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-1

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-1 – A cybersecurity strategy must be defined, documented and approved. It must be supported by the head of the organization or his/her delegate (referred to in this document as Authorizing Official). The strategy goals must be in-line with related laws and regulations.

Understanding the Requirement

This control, from Essential Cybersecurity Controls (ECC – 2 : 2024), requires an organization to create a formal cybersecurity strategy that is documented and approved by the organization's leader or an authorized delegate. The strategy must align with the organization’s strategic objectives and with applicable laws and regulations. The aim is to convert high-level business priorities into a clear cybersecurity vision, mission, strategic objectives and an implementation plan that is owned and accepted by senior management.

Technical Implementation

  • Assign an Authorizing Official and form a small steering group: Identify the head of the organization or a delegated executive as the Authorizing Official, then create a cross-functional steering group (IT, operations, HR, legal/compliance, and a business owner). This group will run workshops, approve scope and sign off the final strategy.

  • Run a focused strategy workshop and map to business objectives: Hold a half- to full-day workshop with the steering group to map business objectives, critical assets, regulatory obligations and risk appetite. Produce a short, prioritized list of strategic cybersecurity objectives (for example: protect customer data, ensure operational continuity, meet regulatory reporting timelines).

  • Draft the strategy document with practical components: Create a concise document that includes Vision, Mission, Strategic Objectives, an Implementation Plan (milestones, owners, timelines), and a prioritized list of Projects/Initiatives. Keep it actionable — each objective should have measurable success criteria and a designated owner.

  • Ensure legal and regulatory alignment: Perform a compliance mapping exercise against applicable laws and standards (privacy, sector-specific regulations) and embed required controls and reporting obligations into the strategy. Document any gaps and include remediation projects in the implementation plan.

  • Use the authority matrix to obtain formal approval and budget sign-off: Follow your organization’s authority matrix when seeking approval — present the strategy to the Authorizing Official with a one-page executive summary, risk/benefit analysis and the requested budget. Record formal approval (signed document or approved meeting minutes).

  • Publish, communicate and schedule reviews: Publish the approved strategy to key stakeholders, integrate it into annual planning, and schedule periodic reviews (quarterly or biannual). Track progress via simple KPI dashboards (project status, risk reduction metrics) and update the strategy when business or regulatory requirements change.

Example in a Small or Medium Business

GreenField Manufacturing is a 75-employee SME that produces specialty components. The CEO appoints the IT manager as the Authorizing Official and convenes a steering group including operations, HR and the compliance officer. They run a half-day workshop to identify that their top priorities are protecting customer designs, minimizing production downtime, and meeting national data-protection rules. The IT manager drafts a short cybersecurity strategy including a vision statement, three strategic objectives, an implementation plan with six-month milestones, and three priority projects (backup & recovery, endpoint protection, and staff awareness training). The steering group maps each objective to applicable regulations and documents a small budget request. Using the authority matrix, the CEO formally approves the strategy in writing and allocates funding. Over the next quarter the company launches the prioritized projects, tracks progress in a one-page dashboard, and schedules a formal review at six months to adjust the plan based on results and any regulatory updates.

Summary

Defining, documenting and approving a cybersecurity strategy ensures accountability and alignment between business goals and legal requirements. For SMBs, using a short, practical strategy document (vision, mission, objectives, implementation plan and prioritized projects), a designated Authorizing Official, and a clear approval path based on the authority matrix makes the control achievable. Combined with compliance mapping, measurable milestones and scheduled reviews, these policy and technical measures provide a repeatable way to manage cybersecurity risk and demonstrate senior-management support.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes