Skip to main content
← All controls
A.6.3 / NIST AT-2 / CIS-14.1 ISO/IEC 27001:2022 Annex A NIS2

Is cybersecurity training delivered to all staff annually with role-based content (Art 21.2.g)?

Demonstrate that the organization delivers annual cybersecurity training to 100% of staff with role-appropriate content aligned to NIS2 Article 21.2.g requirements, and maintains verifiable records of completion and content.

Description

What this control does

This control requires that all personnel within the organization receive cybersecurity training at least annually, with content tailored to their specific roles and responsibilities. Training must be documented, delivered consistently, cover NIS2-relevant topics including incident response and secure practices, and differentiate between general staff awareness and specialized training for technical, privileged, or high-risk roles. The control ensures the human element of cybersecurity is continuously reinforced, reducing organizational vulnerability through education.

Control objective

What auditing this proves

Demonstrate that the organization delivers annual cybersecurity training to 100% of staff with role-appropriate content aligned to NIS2 Article 21.2.g requirements, and maintains verifiable records of completion and content.

Associated risks

Risks this control addresses

  • Phishing attacks succeed due to staff inability to recognize social engineering tactics and malicious emails
  • Privileged users mishandle administrative credentials or bypass security controls due to lack of role-specific secure administration training
  • Insider threats materialize when employees lack awareness of acceptable use policies, data handling requirements, and reporting obligations
  • Incident response delays occur because staff do not recognize security events or understand escalation procedures
  • Regulatory non-compliance penalties arise from failure to meet NIS2 mandatory training requirements under Article 21.2.g
  • Third-party or supply chain compromises succeed when staff grant inappropriate access or share sensitive information without verification
  • Configuration errors and mishandling of security tools occur when technical staff lack role-specific training on secure development, infrastructure hardening, or security operations

Testing procedure

How an auditor verifies this control

  1. Obtain the complete roster of current employees, contractors, and privileged users as of the audit date, segmented by role category (general staff, technical, administrative, management, third-party).
  2. Request the organization's annual cybersecurity training policy, training curriculum documentation, and role-based training matrix showing content differentiation by role type.
  3. Review training completion records for the current audit period (past 12 months), including learning management system (LMS) reports, attendance logs, and completion certificates.
  4. Select a stratified sample of at least 25 personnel across different role categories and verify individual training completion dates, content accessed, and assessment scores if applicable.
  5. Examine training content modules to confirm coverage of NIS2-relevant topics including phishing awareness, password hygiene, incident reporting, data protection, and role-specific topics such as secure coding, privileged access management, or supply chain security.
  6. Interview a sample of 5-10 personnel from different roles to validate they received training, can recall key concepts, and confirm the content was relevant to their duties.
  7. Verify the organization's process for delivering training to new hires within a defined onboarding period and confirm records exist for personnel hired during the audit period.
  8. Review tracking mechanisms for non-completion, escalation procedures for overdue training, and evidence of remedial actions taken for non-compliant personnel.
Evidence required The auditor collects the current employee roster, training policy documentation, LMS exports showing completion status by individual and date, curriculum materials demonstrating role-based differentiation, completion certificates or assessment results for the sampled personnel, email reminders or escalation records for overdue training, and interview notes confirming staff understanding. Configuration exports from the LMS system showing role mappings, training assignment rules, and automated tracking workflows are also collected.
Pass criteria The control passes if 100% of active personnel have completed annual cybersecurity training within the past 12 months, training content is demonstrably differentiated by role with NIS2-relevant topics covered, completion records are accurate and verifiable, and the organization maintains a documented process for tracking and enforcing compliance.