🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-5

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-5

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-5 – The implementation of the cybersecurity awareness program must be reviewed periodically.

Understanding the Requirement

This control requires that your cybersecurity awareness and training program is not a one-time activity but is subject to regular, documented reviews. The organization should establish a plan that sets review intervals (for example, quarterly), identifies who is responsible (the Cybersecurity function in cooperation with relevant departments such as Awareness and Training), and defines how reviews are performed—either through manual channels like email or automated channels such as a compliance management system. The goal is to confirm that training content, delivery, participation rates, and outcomes remain effective and aligned with current risks and business needs. This guidance is drawn from the Essential Cybersecurity Controls (ECC – 2 : 2024).

Technical Implementation

  • Create a documented review plan: Define cadence (quarterly, semi‑annual), scope (mandatory training, phishing simulations, role-based modules), acceptance criteria, and reporting lines. Store the plan where the cybersecurity team and HR/training teams can access it.
  • Assign roles and responsibilities: Designate an owner (e.g., IT security lead or compliance officer) and coordinators in HR and department heads. Make responsibilities explicit: who runs simulations, who collects completion data, who signs off on corrective actions.
  • Collect measurable evidence: Track completion rates, assessment scores, phishing simulation click rates, incident reports tied to user behavior, and feedback surveys. Use a standard evidence package each review: roster of attendees, logs of automated reminders, and simulation results.
  • Use simple automation where possible: If a full compliance management system is not available, use a combination of your LMS, email automation, and a shared spreadsheet or lightweight ticketing tool to schedule reviews, send reminders, and collect results. For SMBs, low-cost GRC or training platforms can automate reporting and send alerts when metrics fall below thresholds.
  • Perform the review and document findings: At each interval, compare evidence against the acceptance criteria, identify gaps (low completion, outdated content, repeat phishing mistakes), and record findings in a review report that includes prioritized remediation actions and owners.
  • Close the loop with remediation and revalidation: Implement changes (update content, add role-based modules, increase enforcement), then re-assess affected controls or run follow-up simulations to validate improvement before the next scheduled review.

Example in a Small or Medium Business

A 45-person consulting firm assigns the IT manager as the cybersecurity awareness owner and works with HR to produce a quarterly review plan. Every quarter, the IT manager runs a phishing simulation and pushes mandatory refresher modules through the company's LMS. Completion rates, quiz scores, and simulation click rates are exported and stored in a shared compliance spreadsheet. The IT manager reviews results against agreed thresholds (90% completion, less than 5% click rate on simulated phishing) and documents any shortfalls in a standard review report. If a department falls below thresholds, the department head is assigned remediation tasks—extra training sessions and one-on-one coaching. The review report is emailed to the COO and saved to the internal compliance folder; corrective actions are tracked in the ticketing system until closed. Over two quarters, the firm sees phishing click rates fall and documents the improvements in subsequent reviews, demonstrating the effectiveness of the process and providing audit-ready evidence if required.

Summary

Periodic review of the cybersecurity awareness program combines clear policy (a documented review plan and assigned owners) with technical measures (measurable training delivery, automated tracking, and evidence collection). For SMBs, a lightweight combination of an LMS, simple automation, and a standard review checklist delivers strong results: regular assessment identifies gaps, remediation closes them, and documented evidence demonstrates ongoing effectiveness and management oversight required by the control.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes