🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run Effective Tabletop Exercises to Satisfy NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IR.L2-3.6.3

Step-by-step guidance to design, run, and document tabletop exercises that meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IR.L2-3.6.3 requirements for testing incident response capability.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Tabletop exercises are a practical, low-cost way to validate that your incident response plan, roles, communications, and technical playbooks work in real-world conditions—and they directly support the NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IR.L2-3.6.3 requirement to test incident response capability. For small businesses that handle Controlled Unclassified Information (CUI), an effective tabletop finds gaps before an attacker does, produces audit-ready documentation, and feeds prioritized corrective actions into a Plan of Action and Milestones (POA&M).

Plan the exercise with compliance in mind

Start by defining scope, objectives, and success criteria aligned to the Compliance Framework: map the exercise to IR.L2-3.6.3 and NIST 3.6.x controls (e.g., detection, containment, recovery). Typical objectives: verify notification chains, validate technical containment actions (isolate host, block IPs, remove credentials), confirm CUI protection and breach notification triggers, and produce an After-Action Report (AAR) with POA&M items. For frequency, plan at least annual exercises and after major changes (new systems, supplier changes, significant incidents). Capture required artifacts auditors want to see: exercise plan, attendance roster, scenario injects, AAR, findings mapped to the control, and POA&M entries with owners and target dates.

Select realistic, high-value scenarios

Choose 2–4 scenarios that reflect the threats most likely to expose CUI in your environment. Small-business examples: (1) phishing that leads to ransomware encryption of a file server containing CUI; (2) misconfigured cloud storage bucket exposing design documents; (3) compromised VPN credentials used to exfiltrate CUI; (4) insider exfiltration using removable media. Build scenario artifacts (fake phishing emails, sample logs, simulated alerts) so participants can practice real decisions—e.g., determine whether to shut down a domain controller, which systems to isolate, and how to preserve forensic evidence.

Design logistics, roles, and scripts

Designate roles: incident commander, technical lead (IT/EDR), legal/compliance, communications (external and customer), HR (if insider), and an observer/evaluator. For small teams, combine roles but document who is accountable. Prepare a concise timeline and inject schedule, and assemble technical artifacts: network diagram, asset inventory of CUI repositories, EDR and SIEM dashboards, sample logs (Windows Event, syslog), backup inventories and restore runbooks. Provide observers with a rubric to score decisions against compliance objectives (e.g., evidence preservation, timely notification, successful containment). If you use an external facilitator or MSSP, ensure they understand your threat profile and have signed non-disclosure/BAA as required.

Run the exercise and test technical actions

Execute the exercise under controlled conditions—ideally with a facilitator reading injects and keeping time. When injects require technical validation, simulate rapid technical checks: query EDR for process trees, confirm alert timestamps, run a backup restore to verify RTO and data integrity (verify checksums, e.g., sha256sum on restored files), and test firewall rules or ACL changes in a staging environment if possible. For containment steps, practice isolating an endpoint from the network via EDR remote isolation or NAC controls and confirm that the isolation actually blocks lateral movement (test by attempting an outbound connection from the isolated host to a controlled sinkhole address). Record timestamps for key actions: time to detect, time to escalate, time to contain, time to recover.

Evaluate performance with measurable metrics

Collect quantitative and qualitative metrics: detection-to-notification time, containment time, RTO for critical systems, number of process steps executed from playbooks, decision-latency at management level, and communication effectiveness (internal and customer notifications). Produce an After-Action Report that: summarizes the scenario and timeline, lists findings and root causes, maps each finding to the specific NIST/CMMC control language (IR.L2-3.6.3 and related controls), and creates POA&M items with priority, owner, mitigations, and due dates. Include acceptance criteria for each POA&M (e.g., "EDR remote isolation verified in test lab within 5 minutes").

Real-world small business example

Example: a 40-person defense subcontractor discovered a simulated phishing incident in a tabletop. The exercise revealed that backups were taken but not tested—restores failed due to missing encryption keys in the restore process. The team updated the backup runbook, added key escrow procedures, and created a prioritized POA&M to rotate encryption keys and test restores quarterly. They documented the exercise end-to-end (scenarios, logs, AAR, POA&M) and provided the package to their prime contractor and assessor to demonstrate compliance with IR.L2-3.6.3. This small investment saved them from a real disaster and satisfied auditor expectations for evidence of testing and remediation tracking.

Compliance tips, best practices, and risks of not testing

Best practices: keep exercises realistic but safe (no production destructive actions), rotate scenarios, include cross-functional stakeholders, document everything, and tie findings directly to POA&M entries. Use inexpensive tools: virtual tabletop platforms, recorded Zoom sessions, red-team-lite simulated phishing, or an incident response retainer for facilitation. Maintain chain-of-custody templates and evidence collection checklists so forensic steps are repeatable. Risks of failure to implement IR.L2-3.6.3 include prolonged data exposure, loss of CUI, contract termination, regulatory penalties, higher breach remediation costs, and loss of trust with primes and customers. Auditors will expect not just that you have a plan but that you test it and remediate issues promptly.

In summary, running effective tabletop exercises to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IR.L2-3.6.3 is about deliberate planning, realistic scenarios, measurable technical validation, and documented remediation. For small businesses, tailor scope, combine roles where necessary, use external help when needed, and ensure every exercise produces an AAR with POA&M items mapped to the control—this earns both improved security and the compliance evidence auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes