🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run a Compliance‑Ready Insider Threat Awareness Campaign in 90 Days (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.3)

Step-by-step 90-day plan to design, run, and document an insider threat awareness campaign that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AT.L2-3.2.3) requirements for small businesses.

April 06, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Addressing insider threat awareness is a compliance and operational priority — and you can build a compliance‑ready campaign in 90 days that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AT.L2-3.2.3 by combining targeted training, technical telemetry, reporting channels, and evidence collection designed for auditors and assessors.

Key objectives and mapping to the Compliance Framework

The campaign’s primary objectives are to (1) raise employee awareness of insider threat indicators and reporting procedures, (2) integrate technical monitoring and detection tuned for insider risk, and (3) produce auditable artifacts that map to the Compliance Framework control AT.L2-3.2.3. For evidence, prepare lesson plans, LMS completion records (user, timestamp, module ID), signed acknowledgements, meeting minutes for leadership briefings, phishing simulation results, incident reports, and change logs for monitoring rules (SIEM/EDR/DLP). Track these artifacts in a single compliance folder and reference them in your System Security Plan (SSP) and Plan of Actions and Milestones (POA&M) where applicable.

90-day roadmap — practical, day-by-day focus

Days 1–14: Plan, scope, and stakeholder buy-in

Assemble a small project team (security lead, HR/training rep, IT ops, and a business owner). Define scope (which user groups, what data types, which systems). Create a project plan with milestones and assign owner for evidence collection. Draft the training learning objectives mapped to AT.L2-3.2.3 (recognize malicious intent vs. mistaken behavior, reporting channels, and data handling expectations). Configure an LMS or use a cloud LMS (e.g., TalentLMS, Moodle) and set up tracking fields that export CSV for auditor review. Notify leadership and set expectations for mandatory completion rates and enforcement.

Days 15–30: Create content and deploy technical baselines

Build short, role‑based training modules (10–20 minutes each) covering social engineering, data handling, privileged access misuse, USB and removable media policies, and reporting procedures. Include one manager‑specific module on supervisory indicators (performance shifts, sudden financial stress, policy violations). Simultaneously, deploy or tune telemetry: enable Windows Sysmon on endpoints, configure EDR (CrowdStrike/Defender for Endpoint) with behavior-based rules, and set up Windows Event Forwarding or a lightweight collector to the SIEM (Splunk/ELK/Cloud SIEM). Add logging for privileged account actions (Azure/AWS CloudTrail, Okta logs) and implement DLP rules on email/exfiltration paths (Office 365 DLP, Google Workspace rules). Save configuration snapshots as evidence.

Days 31–60: Pilot with a representative group and iterate

Run a pilot with a cross-section of users (engineering, finance, HR) for 2–3 weeks: deliver training, run a safe phishing simulation, and test reporting workflows (anonymous tip line, helpdesk ticket path, or secured email alias). Measure baseline telemetry: endpoint alerts, unusual data transfers, privilege escalations, and time-to-report on suspicious activity. Use pilot results to refine content and tune detection rules to reduce false positives. Document pilot metrics and changes made — these items are key artifacts for Compliance Framework evidence.

Days 61–90: Full rollout, measurement, and documentation

Launch the full campaign: require training completion within 2 weeks of rollout, deploy recurring phishing and behavioral tests quarterly, and operationalize the incident intake path (SOP with roles, escalation matrix, and artifacts retention policy). Collect LMS exports, signed acknowledgements, SIEM alerts tied to test scenarios, and incident tickets. Produce a short compliance binder (digital) containing the training syllabus, attendance exports, pilot reports, an explanation of detection rules (with screenshots), and the internal memo tying the campaign to AT.L2-3.2.3. Prepare management metrics for assessors: completion rate, phishing click rate, number of insider reports, and average time-to-triage.

Technical implementation details (practical snippets)

For small organizations with limited budgets, practical technical steps include: enable Windows Audit Policy (Audit Object Access, Audit Logon Events) and forward logs to a central syslog/SIEM; deploy Sysmon with a baseline config (process creation, image loads, network connections) and ship logs via NXLog or Winlogbeat to Elasticsearch or a managed SIEM; configure EDR to alert on suspicious parent/child process chains and data staging behaviors; implement DLP policies in Microsoft Purview to detect CUI patterns (SSNs, controlled technical data) and block external forwarding; require MFA for all remote access and log all MFA events. Keep retention of logs aligned with contract requirements (commonly 1 year for auditability) and capture hash/snapshots of changes to detection rules in version control (Git) with commit messages describing rationale.

Small business scenarios and real‑world examples

Example 1: A small engineering firm discovers a departing engineer copying repositories to a personal cloud folder. Detection: DLP flagged upload to an external cloud storage from a non‑sanctioned domain; rapid response: revoke access, collect artifacts, and interview. Evidence: DLP alert export, access revocation ticket, interview notes. Example 2: A finance employee repeatedly sends payroll spreadsheets to personal email (accidental). Detection: Email DLP policy flagged sensitive keywords and external recipient; remediation: user coaching and mandatory retraining. These scenarios highlight both malicious and inadvertent insider risk — the training should cover both and show how reporting leads to remediation, not just punishment.

Compliance tips, best practices, and risk of non‑implementation

Best practices: make training role-based and short; schedule quarterly refreshers and automated reminders through your LMS; integrate HR offboarding with access revocation checklists; maintain a single evidence repository and document chain-of-custody for investigations. For auditors, show linkage between training content, telemetry tuning, and incident follow-ups. Risks of not implementing include unauthorized exfiltration of Controlled Unclassified Information (CUI), contract penalties or loss of DoD/prime contracts, costly incident response, reputational damage, and failure during CMMC assessment. From a technical angle, lack of telemetry or documented training makes it nearly impossible to demonstrate compliance to assessors.

Summary: In 90 days you can satisfy AT.L2-3.2.3 by combining a focused project plan, concise role-based training, pilot-driven tuning of detection tools (SIEM/EDR/DLP), clear reporting channels, and a tidy evidence package mapped to your Compliance Framework; the keys are leadership buy-in, measurable metrics, and preserving artifacts that prove both delivery and operational effectiveness.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes