🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-2 – The cybersecurity risk management methodology and procedures must be implemented by the cybersecurity function.

Understanding the Requirement

This control requires that the organisation's chosen cybersecurity risk management methodology and its associated procedures are actively put into practice by the cybersecurity function — not just documented. Concretely, that means the cybersecurity team must implement all elements of the adopted methodology, maintain a risk register to record and monitor findings, and produce and execute risk treatment or mitigation plans. This control is part of the Essential Cybersecurity Controls (ECC – 2 : 2024) framework and focuses on turning policy into repeatable operational activity so risks are discovered, tracked, and reduced on an ongoing basis.

Technical Implementation

  • Assign clear ownership: Designate a named cybersecurity owner (even if part-time) responsible for operating the methodology—define roles for risk identification, assessment, acceptance, and escalation. Document responsibilities in a one-page RACI to remove ambiguity.
  • Operationalise the methodology end-to-end: Convert each step of your chosen methodology into procedures: asset inventory and classification, threat/impact analysis, likelihood scoring, risk scoring, and approval thresholds. Provide short checklists for assessors to ensure consistent application.
  • Create and maintain a risk register: Use a simple spreadsheet, lightweight database, or an affordable SaaS tool to record risk ID, asset, owner, date, score, current controls, residual risk, and treatment plan. Require the cybersecurity owner to review and update the register at least quarterly and after major changes.
  • Develop and action treatment plans: For each medium/high risk, define a specific treatment: mitigation (technical change), transfer (insurance/contract), accept, or avoid. Include measurable tasks, deadlines, owners, required budget, and success criteria (e.g., "reduce risk score from 16 to 6 within 90 days").
  • Integrate with operational processes: Tie the risk methodology into change management, vendor onboarding, and incident response so risk findings trigger actions (for example, risk scoring above threshold blocks cloud workload deployment until controls are applied). Automate notifications from the risk register to owners and executive reporting where possible.
  • Monitor, report, and improve: Establish KPIs (e.g., number of open high risks, time to closure, % of assets assessed) and a quarterly review with executive leadership. Use lessons from incidents and assessments to refine scoring criteria and procedures.

Example in a Small or Medium Business

The IT manager at a 60-person marketing agency is also the de facto cybersecurity function. She adopts the organisation’s risk methodology, documents concise procedures for inventorying systems and scoring risks, and creates a risk register in a shared spreadsheet. She schedules a kickoff assessment week, surveys each team to identify critical assets (CMS, client DB, finance files), then scores threats and impacts using the agreed matrix. For three identified high risks—an exposed CMS admin panel, single-factor MFA on finance accounts, and an unsupported server—she creates treatment plans with owners, dates, and estimated costs. She implements basic technical controls: enable MFA, restrict admin panel IPs, and migrate data off the unsupported server to a supported host. The risk register is updated weekly and presented to the business owner each month; remaining medium risks are tracked with deadlines and small budgets. Over the next quarter, two high risks are reduced to low or accepted status and the organisation documents the changes to show auditors and insurers active risk management.

Summary

Implementing this control means turning a written risk methodology into active, repeatable operations: assign ownership, translate methodology steps into procedures, maintain a live risk register, execute measurable treatment plans, and integrate risk activities with everyday IT processes. For SMBs this can be achieved with pragmatic, low-cost tools (spreadsheets or light SaaS), clear owners, and a cadence of reviews and reporting that ensures risks are monitored and remediated rather than left on paper. Together these policy and technical measures ensure the cybersecurity function consistently identifies, tracks, and reduces organisational cyber risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes