🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-1

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-1

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-1 – Cybersecurity requirements for technical vulnerabilities management must be defined, documented and approved.

Understanding the Requirement

This control from the Essential Cybersecurity Controls (ECC – 2 : 2024) requires your organization to have a formal, documented vulnerabilities management policy that is approved by executive management. The policy should set clear requirements for vulnerability assessment and testing across all technology assets, define how often scans and tests occur, establish a vulnerability classification (severity) scheme, and mandate the tools and methods the organization will use to identify and remediate issues. Executive sponsorship and documented approval are required to demonstrate organizational commitment and enable resourcing and enforcement.

Technical Implementation

  • Draft a concise Vulnerability Management Policy that covers scope, objectives, roles and responsibilities, and approval. Include: which asset types are in scope (servers, endpoints, network devices, cloud workloads, web apps), who owns remediation tasks, and how exceptions are handled.

  • Define scanning and testing requirements: schedule authenticated network and host scans at least monthly for production systems, weekly or continuous scanning for internet-facing assets, and on-demand scans after major changes or incidents. Require annual penetration tests for business-critical apps or after major releases.

  • Adopt a severity classification and SLAs: map scan results to severity levels (e.g., Critical/High/Medium/Low) and set remediation targets—critical within 72 hours, high within 7 days, medium within 30 days, low as part of regular maintenance—with documented risk acceptance for any delayed remediation.

  • Specify approved tools and methods: list approved scanners (e.g., authenticated vulnerability scanners), configuration hardening checks, patch management processes, and procedures for web-application testing. Standardize reporting formats and minimum evidence required to close findings (patch IDs, configuration change tickets).

  • Integrate with asset inventory and ticketing: require all assets to be listed in the CMDB/asset register and ensure scan results create tickets in your ITSM or issue tracker with assigned owners, due dates, and workflow for verification and closure.

  • Obtain executive approval and enforce governance: have the head of the organization or deputy formally approve the policy, and schedule quarterly reviews with executive owners to report metrics (scan coverage, open vulnerabilities by severity, SLA attainment) and obtain resource commitments.

Example in a Small or Medium Business

A 75-person managed services firm creates a Vulnerability Management Policy that names the CTO as the executive sponsor and lists all servers, workstations, network devices, and customer-facing web applications in scope. The policy mandates monthly authenticated scans for internal systems and continuous scanning for all public IPs, with critical findings required to be mitigated within 72 hours and high risks within one week. The IT team configures its vulnerability scanner to integrate with their ticketing system so that each finding generates a remediation ticket assigned to the asset owner. Patch deployment is automated for endpoints using the existing endpoint management tool; network device fixes follow documented change windows and rollback plans. For findings that cannot be immediately remediated (legacy devices or vendor-dependent fixes), the CTO signs a documented risk acceptance that includes compensating controls such as network segmentation and increased logging. Each quarter the IT manager presents a dashboard to executive management showing scan coverage, outstanding high/critical vulnerabilities, and time-to-remediate metrics; the executives sign off on any resource requests required to reduce risk further.

Summary

By documenting a vulnerabilities management policy that defines scope, scan frequency, severity classification, remediation SLAs, approved tools, and executive approval, SMBs create a clear, enforceable program. Combining this policy with technical measures—regular scans, integration with asset inventory and ticketing, automated patching, and governance reviews—ensures vulnerabilities are identified, prioritized, and remediated in a timely, auditable way that meets Control 2-10-1.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes