🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-3

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-3

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-5-3 – The cybersecurity risk assessment procedures must be implemented at least in the following cases:

Understanding the Requirement

This control from Essential Cybersecurity Controls (ECC – 2 : 2024) requires that organizations run defined cybersecurity risk assessment procedures whenever specific events or changes occur. The control’s objectives are captured by the reference items 1-5-3-1, 1-5-3-2, 1-5-3-3 and 1-5-3-4, which together indicate that assessments must be applied when systems or services are introduced or changed, when third-party relationships are established or altered, after security incidents, and on a defined periodic schedule. In practice this means having documented triggers, a consistent assessment method, assigned responsibility, and repeatable follow-up actions so that risks are identified and mitigated promptly.

Technical Implementation

  • Define explicit triggers tied to the objectives (1-5-3-1 → 1-5-3-4):

    Create a short list of events that automatically trigger an assessment: new systems or cloud services, significant configuration changes, onboarding or renewing third-party vendors, post-incident reviews, and scheduled annual or biannual reviews. Put these triggers in change request templates and vendor onboarding checklists so assessments occur reliably.

  • Use a lightweight, repeatable assessment template:

    Develop a one- to two-page risk assessment template SMB staff can complete quickly. Include asset description, data sensitivity, threat scenarios, likelihood and impact (simple 3x3 matrix), existing controls, residual risk, and recommended mitigations with owners and deadlines. Keep language practical so non-experts can deliver assessments.

  • Assign clear roles and SLAs:

    Designate an assessment owner (IT lead or security champion) and approver (business owner). Set SLAs: e.g., initial assessment within 5 business days for new services, post-incident assessment within 48–72 hours, and remediation actions tracked with 30/90-day targets depending on risk level.

  • Integrate assessments into existing processes and tools:

    Embed the assessment step into procurement, change management and incident response workflows. Use existing ticketing systems, shared drives, or a simple GRC spreadsheet to record results, risk scores, and remediation status so actions are visible to leadership.

  • Apply pragmatic testing and verification:

    Where feasible, perform small technical checks as part of the assessment — e.g., validate secure configuration, check patch level, verify MFA, and run a quick vulnerability scan. For third-party services, require vendor security questionnaires and evidence of SOC/penetration test reports where appropriate.

  • Review and update the program periodically:

    Schedule a program review every 6–12 months to refine triggers, adjust the template, and confirm the risk appetite. Capture lessons learned from incidents and vendor issues to improve future assessments.

Example in a Small or Medium Business

BrightStreet Marketing is a 45-person SMB that manages client data and uses several SaaS tools. When the company decided to adopt a new CRM, the IT lead completed the risk assessment template, noting data classification, integration points, and whether the CRM supports encryption and role-based access. The procurement process required the vendor to complete a vendor security questionnaire and provide recent penetration test evidence; the assessment flagged two gaps (no enforced MFA for API access and unclear data export controls). The business owner approved the CRM only after the vendor agreed to enable MFA and provide a written data handling addendum. Two months later a third-party integration introduced an unexpected data flow; the integration triggered a post-change assessment that identified a misconfigured API key — the team rotated credentials immediately and tightened access controls. BrightStreet logs all assessments in their ticketing tool, assigns remediation owners, and runs a full review of vendor assessments every 12 months. After a minor phishing incident, they ran a post-incident assessment, updated email filtering rules, and moved some high-risk data into a more restricted repository to reduce exposure.

Summary

Implementing Control 1-5-3 means having practical, repeatable risk assessment procedures that trigger on new or changed systems, third-party relationships, incidents, and periodic reviews. For SMBs this looks like short assessment templates, clear roles and SLAs, integration with procurement and change workflows, quick technical checks, and a tracking mechanism for remediation. Together these policy and technical measures ensure risks are identified, owned, and reduced in a timely way without imposing heavy overhead on a small IT team.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes