Skip to main content
NetStable
Level 2 AT.L2-3.2.1

Ensure that managers, systems administrators, and users are aware of security risks and their responsibilities

📖 What This Means

This practice requires that everyone in your organization—from managers to system administrators to regular users—understands the security risks they face and knows their responsibilities in protecting sensitive information. Think of it like a fire drill: everyone needs to know what to do to prevent a fire and how to respond if one starts. For example, managers should ensure their teams follow security protocols, system administrators should secure the systems they manage, and users should avoid clicking on suspicious links. This awareness helps prevent breaches, such as when an employee accidentally clicks on a phishing email, which could lead to unauthorized access to sensitive data.

🎯 Why It Matters

Uninformed employees are one of the biggest security risks. For instance, in 2023, 82% of breaches involved human error, including phishing attacks. If your team isn’t aware of security risks, they could inadvertently expose sensitive data, leading to financial losses, legal penalties, and damage to your reputation. From the DoD/CMMC perspective, this control ensures that defense contractors—who handle Controlled Unclassified Information (CUI)—are equipped to protect it. Ignoring this practice could result in failing a CMMC audit and losing DoD contracts.

How to Implement

  1. 1. Use cloud-native training tools like AWS Security Awareness Training or Microsoft Security Awareness Training.
  2. 2. Automate phishing simulations using tools like KnowBe4 or Proofpoint.
  3. 3. Assign role-based training modules in your cloud platform (e.g., Azure Security Center).
  4. 4. Enable logging and reporting to track training completion in cloud dashboards.
  5. 5. Regularly update training content to address emerging cloud-specific threats.
⏱️
Estimated Effort
Initial setup: 8-10 hours (intermediate skill level). Ongoing: 2-4 hours/month for updates and tracking.

📋 Evidence Examples

Training Completion Certificates

Format: PDF
Frequency: After each training session
Contents: Employee name, training title, completion date
Collection: Export from training platform

Phishing Simulation Results

Format: Excel/CSV
Frequency: Quarterly
Contents: Employee name, simulation date, pass/fail status
Collection: Export from phishing tool

Training Policy Document

Format: Word/PDF
Frequency: Annually
Contents: Training requirements, frequency, roles
Collection: Create/update manually

Training Attendance Logs

Format: Excel
Frequency: After each session
Contents: Employee name, session date, attendance status
Collection: Manual entry or export from training platform

Training Content Version History

Format: Excel
Frequency: After each update
Contents: Training title, version number, update date
Collection: Manual tracking or export from LMS

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AT.L2-3.2.1 ("Ensure that managers, systems administrators, and users are aware of security risks and their responsibilities"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your security awareness and training program, including the platform used, training content, frequency, tracking mechanism, and how completion is enforced. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AT.L2-3.2.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to ensure that managers, systems administrators, and users are aware of security ri.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AT.L2-3.2.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to ensure that managers, systems administrators, and users are aware of security ri.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AT.L2-3.2.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify which personnel categories receive training (employees, contractors, vendors)
  • Document training delivery mechanism (online platform, in-person)
  • Specify how training records are maintained
  • Ensure this control covers all systems within your defined CUI boundary where ensure that managers, systems administrators, and users are aware of security risks and their responsibilities applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 Security Awareness Training Policy
  • 📄 Training completion records
  • 📄 Training materials and curriculum
  • 📄 Evidence artifacts specific to AT.L2-3.2.1
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review training completion rates, examine training content for adequacy, and verify that training records are maintained with dates and scores.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented security awareness training policy?

✅ YES → Proceed to Q2
❌ NO → GAP: Create a training policy document within 2 weeks.
Remediation:
Use CMMC templates to draft a policy.

Question 2: Are all employees required to complete security awareness training annually?

✅ YES → Proceed to Q3
❌ NO → GAP: Implement annual training requirements within 1 month.
Remediation:
Schedule training sessions using a tool like KnowBe4.

Question 3: Are phishing simulations conducted at least quarterly?

✅ YES → Proceed to Q4
❌ NO → GAP: Set up phishing simulations within 3 weeks.
Remediation:
Use GoPhish or Proofpoint to automate simulations.

Question 4: Are training records maintained for at least 3 years?

✅ YES → Proceed to Q5
❌ NO → GAP: Centralize and archive training records within 4 weeks.
Remediation:
Use a secure LMS or document management system.

Question 5: Is role-specific training provided to system administrators and managers?

✅ YES → FULL COMPLIANCE
❌ NO → GAP: Develop role-specific training content within 1 month.
Remediation:
Customize training modules for each role.

⚠️ Common Mistakes (What Auditors Flag)

1. Training records are incomplete or missing.

Why this happens: Failure to track or archive records.
How to avoid: Use a centralized training management system (LMS).

2. Phishing simulations are not conducted regularly.

Why this happens: Lack of resources or awareness.
How to avoid: Schedule simulations quarterly using automation tools.

3. Role-specific training is not provided.

Why this happens: Training content is too generic.
How to avoid: Customize training for managers, admins, and users.

4. Training content is outdated.

Why this happens: Failure to update materials.
How to avoid: Review and update training content annually.

5. Training completion is not enforced.

Why this happens: No accountability measures.
How to avoid: Set deadlines and follow up with non-compliant employees.

📚 Parent Policy

This practice is governed by the Awareness and Training Policy

View AT Policy →

📚 Related Controls