🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Run Tabletop Exercises to Test Organizational Incident Response Capability: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IR.L2-3.6.3 β€” Template and Checklist

Step-by-step guidance, a reusable exercise template, and an audit-ready checklist to run tabletop exercises that satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IR.L2-3.6.3.

β€’
March 28, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Tabletop exercises are a low-cost, high-value method to validate your incident response (IR) processes, roles, and communications and to produce the objective evidence required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IR.L2-3.6.3 β€” "Test the organization's incident response capability." This post gives small-business focused, practical steps, a ready-to-use exercise template, and a compliance-oriented checklist so you can run repeatable tabletop exercises and capture audit evidence.

Why tabletop exercises matter for Compliance Framework

IR.L2-3.6.3 expects organizations to test incident response capability β€” not just write a plan. Tabletop exercises let you validate procedures without disrupting production systems. For Compliance Framework purposes, the exercise must demonstrate that people, processes, and technologies behave as expected when CUI or sensitive systems are impacted. Failure to test regularly increases the risk of slow containment, greater data loss or exfiltration, contract penalties, and may lead to failing an assessment or losing DoD/prime contracts.

Designing the tabletop exercise β€” key objectives and implementation notes

Start by defining measurable objectives mapped to the control: (1) confirm roles and responsibilities in the IR plan, (2) validate communication and escalation paths, (3) test evidence collection and forensic handoff, and (4) exercise containment and recovery decisions. Implementation notes for small businesses: keep scope focused (one β€œCUI-containing” system or process), involve cross-functional stakeholders (IT/sysadmin, security, legal, HR, executive sponsor, vendor/third-party rep), and schedule quarterly walk-throughs with at least one full annual facilitated tabletop. Key objective examples: reduce Time-to-Detect (TTD) and Time-to-Contain (TTC) metrics, verify ability to isolate an infected host, and demonstrate restoration from recent backups. Keep the scenario realistic and aligned with threats you face (e.g., phishing -> credential compromise, ransomware targeting a file server that stores CUI, or a compromised vendor portal).

Detailed exercise plan and technical injects

Build a short itemized plan: exercise name, date, duration (2–4 hours), scope, participants and alternates, facilitator, observer(s)/scribe, and success criteria. Prepare scripted injects β€” timed events or new facts that force decision points. Technical injects should reflect real telemetry: SIEM alert of anomalous logins, EDR alert for process spawning suspicious command-line, high-volume outbound traffic from a workstation, or backup restoration failure. Example SIEM query you can use to simulate detection validation (Splunk-style): index=wineventlog EventCode=4624 LogonType=3 | stats count by Account_Name, src_ip | where count>50 to reveal suspicious bulk logons. During the exercise, require the team to show the actual queries or dashboards they'd use; if you don't have a SIEM, substitute host-based logs and explain manual search steps.

Template: tabletop exercise plan (fields to capture)

Use this minimal, audit-ready template as your session starter; capture each field as evidence:

  • Exercise Title / ID
  • Date, Location (virtual/in-person), Duration
  • Objective(s) mapped to IR.L2-3.6.3 and your SSP sections
  • Scope (systems, data types including any CUI, exclusions)
  • Participants and roles (with alternates), and a signed attendance roster
  • Facilitator and scribe names (scribe records timeline and decisions)
  • Scenario narrative and timeline
  • Inject list with timestamps and expected responses
  • Success criteria / acceptance conditions (e.g., isolate host within X minutes, confirm chain-of-custody documented)
  • Required artifacts to collect (screenshots of dashboards, log excerpts, tickets, communications)
  • Post-exercise AAR template fields (findings, root cause hypotheses, POA&M items, owners, due dates)

Checklist: pre-exercise, during exercise, and post-exercise

Use this checklist to ensure exercises are repeatable and audit-ready:

  • Pre-exercise: update your SSP/IR plan references, prepare scenario and injects, confirm attendance, and preserve baseline logs for the window of the exercise.
  • During exercise: record start/end times, capture the timeline of decisions, require participants to reference artifacts (alerts, tickets, network diagrams), and collect any screenshots or saved query results.
  • Technical artifacts to collect: SIEM/EDR alert IDs, hostnames/IPs, sample log snippets (with timestamps), ticket numbers, isolation actions taken (EDR console records), backup/restoration logs, and any forensic collection manifests.
  • Post-exercise: produce an After-Action Report (AAR) with summary, timeline, findings, prioritized remediation (POA&M), owners, and target remediation dates; update the IR plan and SSP; retain artifacts for at least the assessment period.
  • Audit mapping: label each artifact against IR.L2-3.6.3 and other applicable controls (e.g., IR.L2-3.6.1, AU.L2-3.3.x) so assessors can quickly verify compliance.

Real-world small business scenarios and expected responses

Scenario 1 β€” Phishing + Business Email Compromise: CFO reports an unusual vendor invoice. Inject: simulated email headers showing a mismatched Reply-To. Expected actions: validate email headers, check AD for suspicious accounts, revoke compromised credentials, open incident ticket, notify legal and finance, and freeze payments. Evidence to collect: email headers, ticket record, account disablement log, and notes from finance. Scenario 2 β€” Ransomware on File Server with CUI: inject a high-severity EDR alert for mass file renames and unknown process. Expected actions: isolate host via EDR, verify backup integrity, start containment call, create forensic image if needed, and begin restore on a clean host. Evidence: EDR isolation log, backup restore logs, forensic manifest, and updated incident timeline. Small businesses can simulate these with staged alerts and a facilitator-controlled "fake" SIEM alert if they lack enterprise tooling.

Compliance tips, metrics and measuring success

Make the exercise count for compliance: store the exercise plan, attendance roster, AAR, POA&M entries, and collected artifacts in your compliance evidence repository mapped to your SSP control references. Track metrics over time: TTD, TTC, accuracy of initial triage, percentage of playbook steps executed, and time to update IR plan after exercise. Aim for at least annual full tabletop exercises and quarterly mini-exercises. Use POA&M items to close gaps and include remediation evidence (configuration changes, new playbooks, training records). For CMMC 2.0 Level 2, demonstrate continuous improvement β€” not a single successful run β€” to show capability maturity.

Running structured tabletop exercises aligned to NIST SP 800-171 Rev.2 / CMMC 2.0 control IR.L2-3.6.3 is achievable for small businesses: focus scope, prepare realistic injects, collect concrete artifacts (logs, tickets, AAR, POA&M), and map each artifact to the control in your SSP. Regular exercises reduce response times, limit CUI exposure, and provide the demonstrable evidence assessors expect β€” making them one of the most cost-effective compliance activities you can run.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes