Skip to main content
← All controls
AT-2 / A.6.3 / CIS-14.2 NIST SP 800-53 Rev 5

How often do users receive phishing-specific awareness training?

Demonstrate that the organization delivers phishing-specific security awareness training to all users at a defined, documented frequency and maintains records proving consistent adherence to that schedule.

Description

What this control does

This control establishes the frequency at which users receive targeted training on recognizing and responding to phishing attacks. Organizations define a recurring schedule (e.g., quarterly, annually) for delivering phishing-specific education that covers tactics such as email spoofing, malicious links, credential harvesting, and social engineering techniques. Regular cadence ensures users maintain currency with evolving phishing methods and reinforces secure behaviors throughout the user lifecycle.

Control objective

What auditing this proves

Demonstrate that the organization delivers phishing-specific security awareness training to all users at a defined, documented frequency and maintains records proving consistent adherence to that schedule.

Associated risks

Risks this control addresses

  • Users lacking recent phishing training click malicious links or attachments, leading to malware infection or credential compromise
  • Stale training fails to address emerging phishing techniques such as QR code phishing, adversary-in-the-middle, or deepfake social engineering
  • Inconsistent training schedules create knowledge gaps where high-risk user populations remain vulnerable for extended periods
  • Absence of documented training frequency prevents measurement of program effectiveness and identification of at-risk cohorts
  • Users who receive infrequent training develop false confidence or forget proper incident reporting procedures, delaying threat response
  • Organizations fail regulatory or contractual obligations requiring periodic security awareness education, resulting in audit findings or penalties
  • New employees or contractors onboarded between training cycles operate without phishing awareness, creating exploitable attack surface

Testing procedure

How an auditor verifies this control

  1. Obtain the organization's security awareness training policy or procedure document that specifies the defined frequency for phishing-specific training.
  2. Review training curriculum materials to verify phishing-specific content is distinct and substantive, covering email indicators, link validation, attachment handling, and reporting procedures.
  3. Request the training platform's system-generated report or learning management system (LMS) export showing all users, training completion dates, and phishing module identifiers for the past 18 months.
  4. Select a representative sample of at least 25 users across different departments, roles, and hire dates to validate individual training histories.
  5. For each sampled user, verify completion timestamps align with the documented frequency requirement and identify any gaps exceeding the defined interval.
  6. Cross-reference the sampled users against HR or identity management system records to confirm active employment status during the review period and validate no excluded populations exist without justification.
  7. Interview the security awareness program owner to confirm processes for tracking overdue training, escalating non-compliance, and handling exceptions such as leave of absence or role changes.
  8. Review remediation records or follow-up training logs for users who failed simulated phishing exercises to verify the organization adjusts training frequency or content based on risk indicators.
Evidence required Auditor collects the security awareness policy document defining phishing training frequency, LMS-generated completion reports with user identifiers and timestamps, curriculum outlines or training module screenshots demonstrating phishing-specific content, and exception or remediation logs showing handling of non-compliant users. Additional evidence includes interview notes with the program owner and correlation records linking training data to active directory or HRIS exports.
Pass criteria The organization maintains a documented phishing training frequency, delivers training to all sampled users within the defined interval with no unexplained gaps exceeding 30 days beyond the policy requirement, and demonstrates operational processes for tracking and remediating non-compliance.