🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run Tabletop Exercises That Satisfy NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IR.L2-3.6.3: Test the organizational incident response capability

Practical, step-by-step guidance for designing and running tabletop exercises that meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (IR.L2-3.6.3) requirements while producing auditor-ready evidence.

•
April 14, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design and run tabletop exercises that meet the NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IR.L2-3.6.3 ("Test the organizational incident response capability"), with practical implementation steps, small-business examples, audit-focused artifacts, and technical details you can apply immediately to satisfy Compliance Framework expectations.

Why IR.L2-3.6.3 Requires Regular Tabletop Exercises

IR.L2-3.6.3 expects organizations protecting Controlled Unclassified Information (CUI) to test their incident response (IR) capability — not just document procedures. Exercises validate people, processes, and technology: they confirm role clarity, ensure playbooks work with live systems and logs, and demonstrate timely escalation (including DFARS/DoD reporting obligations where applicable). For Compliance Framework audits, a successful exercise produces observable artifacts (plans, attendance, inject logs, After-Action Reports) that show the organization ran realistic tests and improved their IR posture.

Designing an Exercise that Satisfies Compliance Framework Requirements

Start by scoping the exercise to CUI-bearing systems and the business processes that touch them. Define objective statements tied to the control: for example, "Validate detection and containment of a suspected ransomware event on a CUI-hosting Windows server and verify notification to senior management within 2 hours." Identify minimum participants (IR lead, IT/Sysadmin, data owner, legal/regulatory, communications, and an executive sponsor). For small businesses, a single person can wear multiple hats — document role assignments clearly so auditors see accountability.

Step-by-step: Running a Practical, Audit-Ready Tabletop

1) Create a written exercise plan with scope, objectives, and timeline. 2) Prepare a realistic scenario (sample: employee opens a phishing link, credential theft leads to lateral movement and suspected exfil of a SharePoint folder holding CUI). 3) Produce an inject schedule: initial detection (T+0), SOC alert with ambiguous telemetry (T+30 minutes), confirmation of anomalous outbound connections (T+90), and simulated customer inquiry (T+180). 4) Run the tabletop with an external facilitator or impartial observer who timestamps actions and records decisions. 5) Execute technical verification steps: demonstrate EDR isolation (document the API call or console action taken), run SIEM queries (example: Windows Security EventID 4624/4625 search across the past 24 hours), and attempt a restore from backup to validate recovery. Small businesses can use inexpensive tools (open-source SIEMs, built-in EDR quarantine) or scripted steps documented and ticked off during the exercise.

Technical Details & Example Injects for Small Businesses

Keep injects actionable and technical enough to exercise tooling. Example injects: (A) "SOC flags multiple failed RDP logons to SERVER-ENG-01; suspected compromised account." Require the team to run a focused forensic checklist: collect volatile memory (if possible), pull Windows Security logs (EventIDs 4624/4625/4648/4672), check file integrity hashes on CUI directories, and query outbound web connections (netstat, proxy logs). For containment, have the team demonstrate use of EDR to quarantine the host (document the API/console action and resulting network state) and update firewall/NAC rules to block exfil destinations. For recovery, require restoration from a verified backup and checksum validation. Capture command outputs or screenshots as evidence for auditors.

Small-Business Scenario

Example: A 25-person engineering firm stores CUI in a centrally managed SharePoint and private SFTP. Run a 90-minute tabletop: IT, project manager (data owner), CEO, vendor (cloud backup), and an external facilitator. Inject: "Third-party reports corrupted project folder; suspected ransomware encryption." Tasks: validate backup availability and restoration time, test communications to contract stakeholders, verify whether segmentation prevented lateral spread, and prove the ability to restore CUI within contracted SLAs. Produce minutes, a timeline, and screenshots showing restored files and checksums to show compliance evidence.

Metrics, Evidence, and Reporting That Auditors Expect

Track objective metrics: time-to-detect (MTTD), time-to-contain (MTTC), time-to-notify executive/authorities, and percentage of playbook steps completed. Produce artifacts: the exercise plan, list of participants and roles (signed or emailed confirmations), inject timeline with timestamps, copies of SIEM/EDR queries and outputs, screenshots of containment actions, and a formal After-Action Report (AAR) with findings, root cause analysis, corrective actions, and a POA&M entry for gaps. If you have DFARS/DoD reporting obligations, the exercise should include a mock "72-hour" notification workflow to verify legal/regulatory roles and contact information are current.

Compliance Tips & Best Practices

Run exercises annually at minimum and whenever major changes occur (new CUI handling systems, staff turnover, cloud migrations). Use realistic data access in a controlled way — where possible, exercise recovery using sanitized copies of CUI to validate processes without risking exposure. Keep playbooks living and mapped to exercise scenarios; after every tabletop, update the playbooks and the evidence repository. Use a simple scoring rubric (0–5) to evaluate detection, containment, communications, documentation, and lessons-learned follow-through. For small teams, combine tabletop exercises with shorter "war-room" drills to keep skills fresh without large resource overhead.

Risk of Not Implementing IR.L2-3.6.3-Compliant Exercises

Failing to test incident response risks slow detection and containment, incomplete communications (missed DFARS notifications), failed recoveries, and unaddressed playbook gaps — all of which can lead to CUI exfiltration, contract loss, regulatory penalties, and reputational damage. From an audit perspective, lack of exercises or absence of artifacts (AAR, timelines, participant lists) will result in findings, POA&M requirements, and could jeopardize CMMC Level 2 certification or contract eligibility.

In summary, design tabletop exercises to be objective-driven, scoped to systems handling CUI, and rich in technical and organizational injects. Document everything: exercise plans, timestamps, tool outputs (SIEM/EDR queries/screenshots), attendance, and a thorough AAR with remediation actions. For small businesses, focus on cost-effective realism — scripted injects, an impartial facilitator, and a concise evidence package will satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IR.L2-3.6.3 while materially improving your incident response readiness.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes