🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Run Tabletop Exercises to Test the Organizational Incident Response Capability — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IR.L2-3.6.3

Practical, step-by-step guidance for designing and running tabletop exercises to validate incident response capability for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance (IR.L2-3.6.3).

April 20, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Tabletop exercises are controlled, discussion-based simulations that let organizations validate their incident response (IR) processes without needing to execute live technical activities; for organizations subject to NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (IR.L2-3.6.3), a well-run tabletop proves the IR program works, identifies gaps in people/process/technology, and produces audit evidence required for compliance.

Plan and design the exercise with compliance goals in mind

Start by defining clear objectives mapped to the Compliance Framework and IR.L2-3.6.3: demonstrate detection and escalation of an incident involving Controlled Unclassified Information (CUI), validate communications with external stakeholders, and confirm roles in the Incident Response Plan (IRP) and System Security Plan (SSP). Create a short scope document: system(s) involved, data types (CUI, internal, public), exercise type (discussion-based tabletop), desired evidence (attendance roster, agenda, injects, After Action Report (AAR), POA&M entries). Schedule exercises at least annually and after major environmental changes; for a small business, start with quarterly light table exercises for high-risk processes and an annual full-scope scenario that includes leadership, legal and HR.

Build realistic scenarios and technical injects

Design scenarios aligned to real threats and mapped to MITRE ATT&CK tactics so auditors and assessors see traceability. Example small-business scenarios: a phishing email leads to credential theft and access to a cloud file-share containing CUI; a contractor laptop with no disk encryption is stolen; a vendor supply-chain compromise pushes malicious updates. For each scenario, prepare injects (e.g., simulated SIEM alerts, suspicious VPN logs, outbound data transfer spike, anomalous PowerShell command lines) and timestamped artifacts. Include technical details such as sample Windows event IDs (e.g., 4625 failed logon, 4624 successful logon, 4688 process creation), sysmon IDs (1=process creation, 3=network connection), DNS logs showing exfiltration domains, and cloud access logs demonstrating unusual file downloads. Provide participants with realistic telemetry snippets rather than full raw logs to keep exercises efficient yet technical.

Tools, telemetry and evidence collection

Even for tabletop exercises, confirm that the organization can collect and analyze the necessary telemetry: SIEM (Splunk, Elastic, Azure Sentinel), EDR (CrowdStrike, SentinelOne), cloud provider audit logs (AWS CloudTrail, Azure Activity Logs), firewall/IDS logs, and backup snapshots. Before the exercise, verify log retention settings (recommendation: 90–365 days for CUI-related events depending on contract requirements), location of forensic images, and access procedures for chain-of-custody. Capture artifacts during the tabletop—screenshots of simulated SIEM searches, copies of injects, and written decisions about when to isolate hosts or notify external parties. These artifacts form the evidence package required to demonstrate IR.L2-3.6.3 compliance.

Run the exercise with clear roles, facilitation, and escalation criteria

Assign roles and a facilitator: Incident Commander, Lead Responder (technical), Legal, HR, Communications/PR, Business Unit Owner, and an Observer/Note-taker. Use a RACI matrix so each action (containment, eradication steps, external notifications) has an owner. During the exercise, introduce injects progressively and force decision points—should the Incident Commander isolate the segment, change MFA settings, or initiate legal notification? Simulate communication channels (email templates, press release drafts, customer notification flows) and have leadership practice sign-off. Small businesses can run tabletop over a single half-day session using video conferencing, a shared Google Drive or SharePoint folder for artifacts, and a simple Miro or whiteboard to visualize timelines and decisions.

Measure effectiveness and produce actionable findings

Define evaluation criteria up front: adherence to IRP steps, detection-to-notification time, accuracy of triage, correct evidence collection (forensics readiness), and communication timeliness. Capture metrics such as MTTD (mean time to detect – simulated), MTTR (simulated mean time to recover/contain), number of decision points executed, and gaps found in logging or access to forensic tools. After the exercise, write an After Action Report that lists findings, root causes, risk level for each gap, recommended remediation, and owners with target dates. Convert high-priority findings into POA&M entries and update the SSP and IRP. For auditors, include the exercise agenda, attendance, injects used, AAR, POA&M, and screenshots of SIEM queries or EDR alerts used during the exercise.

Small-business example: phishing to cloud exfiltration

Example: a 25-employee defense subcontractor runs a tabletop where a user clicks a sophisticated phishing link giving an attacker access to Microsoft 365. The injects include an Azure AD sign-in anomaly, SharePoint download spikes, and an EDR alert for a new PowerShell script. During the exercise the team practices: isolating affected accounts (disable MFA bypass), revoking sessions, capturing logs (AzureAD sign-in logs, SharePoint access logs), initiating a preservation hold on mailboxes, contacting affected primes per contractual requirements, and engaging legal. Results show the team could identify the incident but lacked a documented process for preserving cloud logs for forensics—this becomes a POA&M item to implement automated S3/Blob archival of logs and update the IRP.

Failing to run tabletop exercises increases the risk of a chaotic and slow response if a real incident occurs: longer data exposure, missed contractual notification requirements, loss of CUI, regulatory penalties, business disruption, and damage to future contracting opportunities. From a compliance perspective, lack of documented exercises and AARs can lead to findings during a NIST/CMMC assessment and an inability to demonstrate the organization’s IR capability for IR.L2-3.6.3. To mitigate these risks, implement recurring exercises, keep a central evidence repository, map scenarios to SSP controls, and prioritize fixes in POA&M so senior leadership can fund necessary improvements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes