🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run Effective Phishing Simulations and Awareness Campaigns for ECC Compliance — Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-1

Step-by-step guide to run phishing simulations and awareness campaigns to satisfy ECC (2:2024) Control 1-10-1 compliance, including tooling, metrics, evidence and small-business implementation tips.

April 07, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Phishing simulations combined with structured awareness campaigns are a required, evidence-able control under the Compliance Framework's Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-10-1; this post gives a practical, small-business-focused playbook for designing, running, measuring and documenting those programs so you meet the control and reduce real-world risk.

Why this control matters and the risk of non‑implementation

Control 1-10-1 seeks proof that an organization actively tests its human layer through simulated phishing and follows up with education. Without a consistent simulation-and-awareness program you increase the likelihood of credential compromise, business email compromise (BEC), ransomware initiation and regulatory exposure; for a small business a single successful phishing attack can cause months of downtime, lost client trust and significant financial loss. From a compliance perspective, lack of documented campaigns, results and remediation actions can lead to audit findings, contract penalties or insurance claim denials.

Designing a compliant simulation and awareness program (practical steps)

Start by documenting the program in a formal policy or control procedure that maps to the Compliance Framework. Required elements: goals (reduce phish-prone rate by X%), scope (which users/groups), cadence (monthly/quarterly), acceptable scenarios, data handling, escalation paths and retention period for evidence. Assign roles — owner (usually security lead or CISO), campaign operator (IT/security analyst), HR/legal reviewer, and data custodian. Record approvals in change control or configuration management so auditors can see governance.

Scoping and segmentation

Segment users into buckets: executives, finance, IT, sales, contractors and general staff. Small businesses can start with three segments (executive, high-risk functions, general) to keep campaigns manageable. Create a baseline campaign to measure initial phish-prone percentage per segment (use a simple credential-less template or a “click + awareness page” flow). Document segmentation rationale and any exclusions (e.g., third-party vendors on separate domains) to satisfy Compliance Framework requirements on scope and justification.

Technical implementation details and tooling

Pick a tool that supports evidence export and integrates with your email environment: commercial options (KnowBe4, Proofpoint, Cofense, Mimecast) and open-source (GoPhish) are acceptable if you can produce logs and attachments. Technical setup: provision a dedicated sending domain/subdomain (phish.example.com), publish SPF/DKIM records for that domain, and allowlist the sending IP in your outbound filter to avoid being blocked by your own gateway. Configure landing pages to never capture plain-text credentials; instead show an awareness page and log only metadata (user, timestamp, campaign id, IP). For Microsoft 365 customers, consider using Attack Simulator (part of E5) for integrated telemetry into Defender and Audit logs.

Integration with other controls

Ensure your simulation platform's events feed into your SIEM/Log management (or ticketing system) so clicks and reports are traceable. Automate just-in-time training: when a user clicks, create a ticket assigned to the user with a 15–30 minute micro-lesson and require completion within a set window; retain training completion evidence (certificate or LMS record). For repeated offenders, trigger escalation to manager review or HR per the documented policy. Keep all evidence (campaign definitions, emails sent, click logs, remediation actions) for the retention period defined in the Compliance Framework.

Campaign planning, example scenarios and small-business use cases

Start simple: 1) credential-themed email claiming suspicious login; 2) invoice/finance request to finance group; 3) HR update to all staff. For a small business of 25–100 employees, run a baseline campaign, then two targeted campaigns and one company-wide awareness month per quarter. Example: baseline shows 27% phish-prone for general staff; run focused finance scenario for finance group, reduce finance phish-prone from 40% to 12% after 90 days with follow-up microtraining. Document each campaign’s objective, template, recipient list, time window, and results in a compliance evidence binder (spreadsheet + exported logs + screenshots).

Metrics, KPIs and compliance evidence

Key metrics to collect and store: click-through rate (CTR), report rate (users who used “Report Phish”), time-to-report median, training completion rate within SLA, phish-prone percentage by cohort, and repeat-offender list. Set realistic targets (example roadmap: reduce overall phish-prone rate to <15% in 3 months, <7% in 12 months). For auditors, export raw campaign logs, email content, landing page snapshot, and training completion records; include an executive summary and risk acceptance statements for any residual high-risk user groups.

Compliance tips and best practices

Tips: 1) Obtain legal and HR sign-off upfront and document their approval; 2) Avoid collecting sensitive personal data in simulation logs and protect logs with encryption and limited access; 3) Notify employees generally (policy statement) that simulations occur without revealing timing or specifics; 4) Use ethical templates that test behavior without embarrassing individuals; 5) Retain anonymized executive-level reporting for leadership and detailed logs only for auditors and program owners; 6) If you must reset credentials when a user enters a real password, define that procedure in incident response workflow and record the action.

In summary, meeting ECC Control 1-10-1 requires a documented, repeatable program that combines realistic phishing simulations with measurable awareness and remediation workflows; small businesses can implement this with pragmatic segmentation, low-cost tooling, clear governance, and consistent evidence collection to both reduce phishing risk and pass compliance audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes