🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Template: Define, Document, and Obtain Approval for Your Cybersecurity Strategy to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-1-1

A practical, step-by-step template to define, document, and obtain formal approval of your cybersecurity strategy to satisfy ECC – 2 : 2024 Control 1-1-1 for small and mid-size organizations.

March 27, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, actionable template to define, document, and secure executive approval for your cybersecurity strategy to meet the Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1-1-1 requirement within the Compliance Framework, with step-by-step tasks, technical specifics, and small-business examples you can implement this week.

Why Control 1-1-1 matters (risk overview)

Control 1-1-1 requires the organization to have a defined and approved cybersecurity strategy aligned with business objectives and risk appetite; failing to implement this creates gaps that lead to uncoordinated security activities, unmanaged risk exposure (data breaches, ransomware, regulatory penalties), and weak audit evidence—particularly risky for small businesses that lack redundant teams and rely on cloud services and third-party vendors.

Compliance Framework — practical implementation notes

For Compliance Framework alignment, treat the strategy as the top-level control artifact that maps down to ECC technical and administrative controls. Start by producing a one-page executive summary tied to the Framework's risk principles, then expand into a formal Strategy Document that references: scope (business units, geographic boundaries, data types), risk assessment outcomes, prioritized controls, implementation roadmap, monitoring KPIs, and governance/approval records. Include explicit mapping lines such as "Strategy Section X → ECC – 2 : 2024 Control 1-1-1" so auditors can trace requirements to strategy statements.

Step-by-step template (what to draft and when)

1) Scope & stakeholders

Define scope: assets (cloud resources, endpoints, OT if present), data classifications (PII, PHI, financial), and stakeholders (CEO/owner, IT lead, compliance officer, external MSP). Small business example: a 12-person marketing agency should scope employee laptops, G Suite/Office365, internal file shares, client data in CRM, and contractor access.

2) Strategy components — what to document

Use this structure inside the Strategy Document: Purpose & Objectives; Scope & Exclusions; Business Risk Appetite; Current State Summary; Target State (controls to achieve); Roadmap with milestones and owners; Monitoring & Metrics; Resource & Budget Estimates; Approval & Version History. Technical specifics to include: required encryption standards (TLS 1.2+ for in transit, AES-256 for at rest where feasible), MFA for all admin and remote access, network segmentation boundaries, EDR/antivirus coverage, centralized logging (syslog/SIEM) with 90 days retention, backup frequency and offline encrypted copies, and patch cadence (critical/important within 7–30 days depending on severity).

Approval workflow and governance

Design a lightweight but auditable approval workflow: draft → internal review (IT, legal, finance) → risk owner sign-off → executive approval (CEO/CFO/Board as required). For a small business, the owner or COO with an external security advisor can formally approve in writing (email or signed memo) and record the date/version in the document header. Maintain an approval log that includes approver name, title, scope of approval, and effective date—this is primary evidence for Compliance Framework auditors.

Implementation, monitoring, and evidence for auditors

Turn the strategy into an actionable plan with prioritized projects, owners, timelines, and measurable KPIs (e.g., patch rate, mean time to detect/contain, percent devices with EDR, MFA enforcement coverage). Technical monitoring details: schedule weekly authenticated vulnerability scans with OpenVAS/Nessus, daily ingest of critical logs into a SIEM or cloud logging platform, weekly backup verification scripts, and quarterly tabletop incident response exercises. Store artifacts (project plans, change tickets, config snapshots, screenshots of policy settings, approvals) in a secure evidence repository to show continuous compliance.

Practical tips, best practices, and small-business scenarios

Best practices: keep the first strategy version concise (6–8 pages) to speed approval; use a risk-based prioritization to allocate limited budget; codify "minimum required" technical controls (MFA, secure backups, endpoint protection, timely patching). Small-business scenario: "Bistro LLC" uses cloud POS and a 3-person IT contractor—their strategy prioritized MFA on POS admin, encrypted backups to separate account, and monthly vulnerability scans; owner approval and an external MSP SLA were sufficient for ECC auditors. Compliance tips: map each strategy item to an ECC control ID, retain signed approval records, and schedule annual strategy reviews or when major business changes occur.

In summary, treat Control 1-1-1 as the foundational governance artifact: produce a concise, evidence-backed cybersecurity strategy that maps to the Compliance Framework and ECC – 2 : 2024 requirements, include technical specifics and measurable milestones, obtain formal sign-off through an auditable workflow, and maintain monitoring and artifacts to demonstrate ongoing compliance—doing so reduces operational risk and simplifies future audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes