NIST 800-53 REV 5 • AWARENESS AND TRAINING
AT-2(6) — Cyber Threat Environment
Provide literacy training on the cyber threat environment; and Reflect current cyber threat information in system operations.
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
Supplemental Guidance
Since threats continue to change over time, threat literacy training by the organization is dynamic. Moreover, threat literacy training is not performed in isolation from the system operations that support organizational mission and business functions.
Practitioner Notes
Keep people informed about the current cyber threat environment. Threats evolve, and training should evolve with them.
Example 1: Subscribe to CISA alerts, US-CERT advisories, and the FBI InfraGard program. When a relevant advisory is released (like a new phishing campaign targeting defense contractors), send a brief all-hands email summarizing the threat and what to watch for.
Example 2: Create a monthly security newsletter using a simple email template. Include a "Threat of the Month" section, a recent incident lesson, a security tip, and recognition for employees who reported suspicious activity. Keep it short — under 500 words — so people actually read it.