🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Track KPIs and Report Effectiveness of Periodic Multi-Channel Awareness Programs for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-1

Learn how to define KPIs, collect measurable evidence, and report the effectiveness of periodic multi-channel cybersecurity awareness programs to meet Compliance Framework ECC–2:2024 Control 1-10-1.

April 12, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Periodic, multi-channel awareness programs are a compliance requirement under ECC – 2 : 2024 Control 1-10-1 because they change employee behavior and reduce organizational risk; tracking the right KPIs and producing auditable reports converts awareness activity into demonstrable control effectiveness for auditors, executives, and risk owners.

Why KPI tracking matters for Compliance Framework

Compliance Framework expects not just the existence of awareness programs but measurable evidence showing they work. KPIs provide objective proof that content is reaching the workforce, that learning sticks, and that risky behaviors decline. Auditors will look for documented targets, baseline measurements, and trend reports over time—so your KPI approach must include definitions, data sources, retention policies, and the method used to calculate each metric.

Define clear KPIs and targets (what to measure)

Start by mapping the Control 1-10-1 objectives to measurable outcomes: reach (channel coverage), participation (completion rates), retention (post-training assessment scores), behavior change (phishing click-to-report rates), and operational outcomes (time-to-report incidents, number of repeat offenders). Example KPIs: 1) Training completion rate within the required window — target >= 95% quarterly; 2) Phishing click rate — target < 5% after two program cycles; 3) Report-to-phish ratio — target > 2 (more reports than successful simulated phishes); 4) Average remediation time for flagged accounts — target <= 24 hours. Document the calculation method and baseline for each KPI so results are reproducible during an audit.

Data sources and technical implementation (how to measure)

Identify systems that will feed your KPIs: LMS/Training platforms (course completions, quiz scores), phishing-simulation tools (clicks, reports, IPs), email/marketing platforms (open and click rates for newsletters), SSO/MFA reports (enrollment and authentication failures), and SIEM/EDR for incident counts and remediation timelines. For small businesses without enterprise tooling, practical options include Google Workspace or Microsoft 365 reports, simple phishing tools like GoPhish, and using investments in native logs (GCP/Azure/AWS console, Azure AD sign-in logs). Export CSVs on a regular schedule and automate ingestion into a central spreadsheet or lightweight BI tool (Power BI / Google Data Studio / Grafana) to reduce manual errors and maintain historical trends.

Implementation notes and small-business scenario

Example: A 45-person consultancy using Google Workspace and Slack can implement ECC 1-10-1 with minimal spend. Use Google Forms for short pre/post quizzes, a quarterly GoPhish campaign to track click-to-report, Slack for weekly security tips and a microlearning video link tracked with UTM parameters, and a shared Google Sheet that collects completion timestamps exported from Forms and GoPhish. Set concrete targets: 90% quarterly completion, phishing click rate under 7% after one year, and managers required to follow up with any team member who fails two consecutive simulations. Keep screenshots and CSV exports in a compliance folder with access logging to produce evidence for auditors.

Reporting cadence, dashboards, and evidence retention

Produce operational dashboards monthly and executive summaries quarterly. Your monthly dashboard should show raw counts and short-term trends (last 90 days) so operations can act on spikes; quarterly executive reports should show baseline vs target, trending, and remediation actions taken for non-compliance. Store evidence (exported LMS reports, phishing simulation CSVs, signed acknowledgements) for the retention period required by Compliance Framework—typically 2–3 years depending on your policy—and ensure all artifacts have timestamps and the identity of who exported them. Use immutable storage (e.g., write-once S3 buckets with versioning) for critical audit artifacts if possible.

Compliance tips and best practices

Align KPIs with risk: focus on behaviors that lead to incidents (phishing, credential compromise, poor patching hygiene). Use multi-channel reinforcement—email, intranet banners, Slack/Teams messages, manager-led huddles—and track channel-specific engagement to learn what works. Set thresholds for automated remediation: e.g., an employee who fails two phish simulations is auto-enrolled in an individual coaching session and flagged in the next report. Maintain a documented KPI register that includes owner, data source, calculation method, target, and acceptable variance. Finally, anonymize and protect Personally Identifiable Information in reports; auditors want evidence but privacy rules may limit the level of identifiable detail you can circulate.

Risks of not implementing this requirement

Failing to implement KPI tracking and reporting increases the likelihood of an undetected degradation in security behavior, making successful phishing campaigns and credential theft more likely. From a compliance perspective, absence of measurable evidence will trigger audit findings, possible remediation orders, and reputational damage. Operationally, you lose the ability to identify low-performing groups, measure ROI of your awareness spend, or prove to executives and insurers that controls are effective—potentially increasing insurance premiums or losing certifications.

Summary: To meet ECC – 2 : 2024 Control 1-10-1, build a repeatable KPI program: define measurable KPIs tied to control objectives, collect data from LMS/phishing/SSO/EDR sources, automate ingestion and dashboards, set remediation workflows for poor performers, retain auditable evidence, and produce monthly operational and quarterly executive reports. For small businesses, pragmatic low-cost tooling plus disciplined export and retention practices will satisfy auditors while materially reducing risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes