Security Awareness Training Requirements by Framework
Security awareness training requirements vary across compliance frameworks. HIPAA mandates training for all workforce members with access to protected health information. PCI DSS requires training upon hire and annually. SOC 2 expects training as part of the control environment. ISO 27001 demands competence assurance and awareness programs.
For startups and SMBs that must comply with multiple frameworks, understanding each framework's security awareness training requirements prevents duplicate effort and compliance gaps. According to the Verizon 2025 DBIR, 68% of breaches involved a human element, making security awareness training requirements a critical compliance priority.
Why Security Awareness Training Requirements Matter
Compliance frameworks mandate training because human error drives the majority of security incidents. The data is clear: 68% of breaches involve a human element, including social engineering, errors, and misuse. Regulatory bodies recognize that technical controls alone cannot prevent breaches if employees do not understand their responsibilities.
Beyond preventing incidents, training creates a documented defense. When a breach occurs, regulators and auditors examine whether the organization took reasonable steps to educate its workforce. Documented, regular training demonstrates due diligence and can significantly reduce penalties.
Security Awareness Training Requirements by Framework
SOC 2
SOC 2 addresses security awareness training requirements through Common Criteria 1.4 (CC1.4). This criterion requires the organization to attract, develop, and retain competent individuals.
Specific requirements:
- Security awareness training for all employees
- Role-specific training for employees with security responsibilities
- Training on the organization's information security policies
- Annual refresher training at minimum
- New hire training during onboarding (typically within 30 days)
Evidence auditors expect:
- Training completion reports with names, dates, and topics
- Training content outlines demonstrating relevance to the organization's controls
- Records showing new hire training completion within the onboarding window
- Documentation of role-specific training for privileged users and developers
HIPAA
The HIPAA Security Rule (45 CFR 164.308(a)(5)) requires a security awareness and training program for all members of the workforce, including management.
Specific requirements:
- Training for all workforce members, not just employees (includes contractors, volunteers, and trainees)
- Training must cover security reminders, malicious software protection, login monitoring, and password management
- The Privacy Rule (45 CFR 164.530(b)) adds PHI handling training
- New workforce members must receive training within a reasonable period
- Repeat training when policies or procedures change
Key distinction: HIPAA does not specify a training frequency. However, OCR enforcement actions reference annual training as the expected minimum. Less frequent training draws higher scrutiny.
Evidence for HIPAA audits:
- Signed training acknowledgment forms
- Training content covering all four Security Rule awareness topics
- Records of additional training after policy changes
- Proof that training covered both Security Rule and Privacy Rule requirements
ISO 27001
ISO 27001:2022 addresses training through Clause 7.2 (Competence) and Clause 7.3 (Awareness). Annex A control A.6.3 further requires information security awareness, education, and training.
Specific requirements:
- Define required competence for roles that affect security
- Verify competence through education, training, or experience
- Take action to close gaps and evaluate results
- Everyone must know the security policy, their role in ISMS, and the consequences of not complying
ISO 27001 is unique in requiring effectiveness evaluation, not just completion. You must show that training improved knowledge or behavior. Use tests, quizzes, phishing simulations, or behavioral metrics as proof.
Evidence for ISO 27001 audits:
- Competence matrix mapping roles to required security knowledge
- Training records with completion dates
- Evidence of effectiveness evaluation (test scores, simulation results)
- Records of actions taken when competence gaps were identified
- Awareness program documentation
NIST 800-171 / CMMC
NIST SP 800-171 Rev 2 includes three controls in the Awareness and Training family (AT) that define security awareness training requirements for defense contractors:
- AT.2.056: Make all users aware of security risks and applicable policies
- AT.2.057: Train personnel to carry out their security duties
- AT.3.058: Train staff to recognize and report insider threat indicators
Specific requirements:
- Role-based training for users, managers, and system administrators
- Training on organizational security policies and procedures
- Insider threat awareness training
- Training before granting access to the system (for new users)
- Refresher training when required by system changes or at least annually
For CMMC Level 2, the C3PAO assessor checks three things: training records exist for all staff, content covers required topics, and training is current (within 12 months).
PCI DSS 4.0
PCI DSS 4.0 (Requirement 12.6) significantly expanded training requirements compared to version 3.2.1.
Specific requirements:
- Formal security awareness program implemented
- Training upon hire and at least annually thereafter
- Cover threats and vulnerabilities that could impact CDE security
- Staff must acknowledge the security policy at least annually
- Address phishing and social engineering (new in 4.0)
- Review and update training content at least annually
- Match training to each person's job function
New in PCI DSS 4.0 (mandatory March 31, 2025):
- Requirement 12.6.3.1: Training must include awareness of threats, including phishing and social engineering
- Requirement 12.6.3.2: Training must include awareness of acceptable use of end-user technologies
Evidence for PCI DSS assessments:
- Written security awareness program documentation
- Training completion records showing all personnel completed training
- Annual acknowledgment records (signed or electronic)
- Training content and date of last content review
- Records demonstrating training upon hire for new personnel
NIST Cybersecurity Framework 2.0
NIST CSF 2.0 addresses training in the Protect function under PR.AT (Awareness and Training):
- PR.AT-01: All staff get training to handle tasks with security risks in mind
- PR.AT-02: Specialized roles get targeted training for their specific risk areas
CSF 2.0 is voluntary and does not prescribe frequencies. However, organizations using CSF should still document their security awareness training requirements for both general and role-specific education.
Building a Program That Meets All Security Awareness Training Requirements

If you need to satisfy multiple frameworks, build a layered program:
Layer 1: General Security Awareness (All Frameworks)
This foundational layer satisfies the baseline requirement across all frameworks:
- Phishing and social engineering recognition
- Password hygiene and authentication practices
- Data handling and classification
- Incident reporting procedures
- Physical security awareness
- Acceptable use policies
- Mobile device and remote work security
Frequency: Annual, with monthly or quarterly microlearning reinforcements
Layer 2: Framework-Specific Modules
Add targeted modules for each applicable framework:
| Module | Frameworks Satisfied | |--------|---------------------| | PHI handling and Privacy Rule basics | HIPAA | | CUI identification and safeguarding | NIST 800-171, CMMC | | Cardholder data protection | PCI DSS | | Insider threat recognition | NIST 800-171, CMMC | | ISMS policy and objectives | ISO 27001 | | Social engineering deep dive | PCI DSS 4.0, SOC 2 |
Layer 3: Role-Based Technical Training
For personnel with elevated responsibilities:
- Developers: Secure coding practices, OWASP Top 10, code review security
- System administrators: Hardening procedures, patch management, log monitoring
- Incident responders: Forensic procedures, evidence preservation, escalation protocols
- Managers: Risk assessment, policy approval, compliance oversight
Measuring Training Effectiveness
ISO 27001 explicitly requires effectiveness measurement, but demonstrating that training works strengthens your compliance posture across all frameworks.
Quantitative metrics:
- Phishing simulation click rates (target: under 5% across the organization)
- Training completion rates (target: 100% within 30 days of due date)
- Time to report simulated phishing emails (target: under 10 minutes)
- Quiz or assessment pass rates (target: 80%+ on first attempt)
Qualitative indicators:
- Number of employee-reported suspicious emails increasing over time
- Reduction in security incidents attributable to human error
- Employee feedback on training relevance and clarity
Frequently Asked Questions
How often is security awareness training required?
Most frameworks require annual training at minimum. HIPAA does not specify a frequency but annual is the practical standard. PCI DSS requires training upon hire and annually. ISO 27001 requires ongoing competence assurance. Best practice is annual formal training supplemented with quarterly micro-learning.
What topics must security awareness training cover?
At minimum: phishing and social engineering, password and authentication security, data handling procedures, incident reporting, and acceptable use policies. HIPAA adds malicious software protection and login monitoring. PCI DSS 4.0 adds specific phishing and end-user technology modules. NIST 800-171 adds insider threat awareness.
Can online training satisfy compliance requirements?
Yes. All major frameworks accept online, self-paced training as long as it covers required topics, includes knowledge verification (quiz or assessment), and generates completion records. In-person training is not required by any framework, though some organizations use it for specialized role-based sessions.
Do contractors and temporary workers need training?
Under HIPAA, all workforce members need training, which includes contractors with PHI access. PCI DSS requires training for all personnel with access to the cardholder data environment. SOC 2 and ISO 27001 extend training requirements to anyone performing work under the organization's control. In practice, include all individuals with access to sensitive systems or data.
What evidence of training do auditors want to see?
Completion reports with names, dates, and topics covered. Training content outlines or syllabi. New hire training records. For ISO 27001, evidence of effectiveness measurement (quiz scores, phishing simulation results). For HIPAA, signed acknowledgment forms. For PCI DSS, annual policy acknowledgments.
How do I handle employees who do not complete training?
Document your escalation process. Typical steps: automated reminders, manager notification, escalation to HR, and ultimately access restriction or suspension for persistent non-compliance. Auditors expect a documented process for handling non-completion, not a 100% completion rate on day one.
