🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-4

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-4

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-4 – The cybersecurity requirements for technical vulnerabilities management must be reviewed periodically.

Understanding the Requirement

This control requires organizations to perform periodic, documented reviews of the cybersecurity requirements that govern vulnerability management. Reviews should follow an approved plan with a defined interval (for example, quarterly), involve the cybersecurity function working with relevant departments such as IT, and use established channels (manual or automated) to assess whether existing requirements remain appropriate. Any updates must be documented and formally approved by the organization head or their deputy, and reviews should also be triggered by changes in law, regulation, or business context.

Technical Implementation

  • Create a documented review plan: Draft a simple plan that defines scope (policies, SLAs, scanning cadence, patch timelines), owners (Cybersecurity lead + IT lead), review interval (e.g., quarterly), inputs (scan results, patch metrics, threat intel), and outputs (approved changes, evidence retained). Keep the plan lightweight and versioned.
  • Automate evidence collection where possible: Integrate vulnerability scanners, patch management, and ticketing tools with a compliance tracking or reporting tool (even a shared spreadsheet if necessary) so that each review has up-to-date metrics: open vs. closed vulnerabilities, time-to-remediate, and exceptions. Automation reduces manual effort for SMB teams.
  • Run periodic assessments and tabletop validation: At each interval, the Cybersecurity and IT leads review metrics, recent incidents, and threat intelligence. Include at least one tabletop or sign-off session per review to validate that remediation SLAs and technical controls still meet business needs.
  • Trigger reviews on change: Define triggers that force an out-of-cycle review—examples include new regulatory requirements, a major vulnerability (e.g., widespread CVE), changes to the technology stack (cloud migration), or a security incident. Document the trigger response steps and timeline.
  • Approve and document changes: Record review outcomes, decisions and policy updates in a controlled document repository. Require approval by the head of the organization or their deputy (or a delegated authority), and keep signed/recorded evidence with timestamps for auditability.
  • Close the loop operationally: Convert approved requirement changes into actionable tasks—update runbooks, adjust scanner configurations, change SLA values in ticketing systems, and assign remediation owners. Track completion in the same system used for evidence collection.

Example in a Small or Medium Business

Imagine a 75-person managed services company that runs quarterly vulnerability reviews. The Cybersecurity lead creates a "Vuln Review Plan" that lists scope (servers, workstations, SaaS connectors), quarterly cadence, required reports, and owners. Vulnerability scans run weekly; results feed into the ticketing system where remediation tasks are created. Each quarter the Cybersecurity lead and IT manager meet to review open counts, average time-to-remediate, and any recent high-risk CVEs; they run a 30‑minute tabletop to validate escalation paths. When the Ministry issues a new compliance notice affecting encryption or patch timelines, the plan’s "trigger" clause prompts an immediate review; the team revises the requirement to shorten SLA for critical patches and documents the change. The revised requirement is approved by the CEO’s deputy, updated in the policy repository, and configuration changes are applied to the ticketing system so future scans enforce the new SLA. Records of the review, approvals, and evidence of operational changes are retained for internal audit and regulatory inquiries.

Summary

Periodic, documented reviews combine policy governance and technical practice to keep vulnerability management effective. A simple, approved review plan, automated evidence collection from scanning and ticketing tools, clearly defined triggers for out-of-cycle reviews, and formal approval and documentation create an auditable loop. For SMBs this approach is practical and scalable: it ensures requirements remain aligned with threats, operations and regulations while keeping the administrative burden manageable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes