Schulung

Training Records in the ISMS: What Must Be Documented

TL;DR
  • ISO 27001 and NIS2 require demonstrable training — without documentation, a training session is considered not conducted in an audit.
  • Every training record must contain at minimum: participant, date, topic, trainer/source, and result.
  • Three types of evidence form the basis: attendance confirmations, quiz/test results, and policy attestations.
  • Training must be repeated at least annually, and deadline monitoring must be automated and escalatable.
  • Policy acknowledgment is a separate documentation process that must not be confused with the awareness training.

Why training records are decisive in an audit

There is a simple rule in the world of information security audits: what is not documented did not happen. You may have conducted the best awareness training in the industry — with a brilliant trainer, enthusiastic employees, and genuine learning outcomes. If you cannot present evidence to the auditor, none of it counts.

ISO 27001 formulates the requirement in Chapter 7.2 (Competence) and Annex A.6.3 (Awareness, Education, and Training). Employees performing activities that influence information security performance must be competent, and the organization must retain appropriate documented information as evidence of competence. NIS2 supplements this requirement with an explicit obligation for cyber hygiene training and management training.

Auditors review training records regularly and systematically. They do not just ask "Do you conduct training?" but rather "Show me the evidence for the last training. Who participated? Who did not? What was the content? How was understanding tested?" If you do not have a structured answer to these questions, it becomes a finding in the audit report.

Training documentation is therefore not a bureaucratic obligation. It is the proof that your ISMS is alive — that the measures you have defined are actually implemented and that your employees have the necessary knowledge to work securely.

What must be documented in every training record

Regardless of the training format — whether in-person workshop, e-learning, or phishing simulation — there is a set of mandatory information that must be included in every record. These constitute the minimum an auditor expects.

The six mandatory fields

1. Participant (name and department)

Who was trained? Not as an anonymous group, but by name. For in-person training, this is classically via an attendance list; for e-learning, through the platform's login data. The assignment to a department or role is important because certain training sessions are target-group-specific, and you must demonstrate that the right target group was trained.

2. Date and timeframe

When did the training take place? For in-person training, the specific date with time; for e-learning modules, the period during which the module was completed (start and end time). The date is essential for deadline monitoring: if the training must be repeated annually, the deadline begins on the date of the last completion.

3. Topic and content

What was trained? A broad topic label like "IT security" is not sufficient. The record must show which specific content was covered — either through a description of the training content, a reference to a defined curriculum, or by attaching the training materials.

Example of an appropriate description: "Security Awareness foundational training: phishing detection, password security and password managers, social engineering via phone and in person, clean desk rules, reporting procedures for suspected incidents."

4. Trainer or training source

Who conducted the training? For in-person training, the trainer's name (internal or external); for e-learning modules, the platform and the specific module. For external trainers, it is advisable to document their qualifications so it is traceable that the training was conducted by a competent person.

5. Result or completion

Did the participant successfully complete the training? For training with a knowledge test: the test result and whether the minimum score was achieved. For training without a test: confirmation of participation (fully completed vs. abandoned). For phishing simulations: whether the link was clicked or not.

6. Signature or digital confirmation

For in-person training: the participant's signature on the attendance list. For e-learning: the automatically generated completion certificate from the platform. For policy attestations: the digital confirmation (checkbox, electronic signature). The confirmation documents that the participant was actually present or actively completed the module.

Optional but recommended information

Beyond the mandatory fields, there is information that enhances the documentation:

  • Training material: Attachment or reference to the materials used (slides, handouts, e-learning module ID)
  • Participant feedback: Anonymous evaluation of the training (helps with continuous improvement)
  • Link to measures: Which ISMS measure or risk does the training address? This facilitates mapping in the audit
  • Validity period: Until when is the record valid before a repeat is required?

The three types of training evidence

Not every record looks the same. Depending on the training format and objective, different types of evidence are used. Most ISMS programs work with a combination of all three.

Attendance confirmation

The simplest and most common form of evidence. It confirms that an employee participated in a training session. For in-person training, this is the signed attendance list; for e-learning, the automatically generated completion certificate.

An attendance confirmation documents presence but not understanding. The employee was there — whether they learned anything cannot be determined from it. Therefore, an attendance confirmation alone is not sufficient for a mature ISMS. It should be supplemented by a knowledge test or an attestation.

Typical format of an attendance confirmation for in-person training:

Field Content
Training title Security Awareness Foundational Training 2026
Date March 14, 2026, 9:00–10:30 AM
Location Conference Room 2, Headquarters
Trainer Max Mustermann, ISO
Content Phishing, passwords, social engineering, clean desk, reporting procedures
Participants Name, department, signature (tabular)

Quiz and test results

Knowledge tests at the end of a training document not only participation but also understanding of the content delivered. They are the strongest evidence you can present to an auditor because they show that the employee not only heard the content but also understood it.

Define a minimum score required for passing. 70 to 80% correct answers is a common threshold. Employees who fall below the minimum score must repeat the training or attend remedial training.

Document for quiz results:

  • Participant name and test date
  • Test designation and link to the training
  • Overall result (e.g., 18 of 20 questions correct, 90%)
  • Pass/fail based on the defined minimum score
  • Detailed results per question (optional, but helpful for analyzing knowledge gaps)

For e-learning platforms, quiz results are typically documented and stored automatically. For in-person training with written tests, you must manually capture and file the results.

A note on retention: quiz results contain personal performance data. Clarify with your data protection officer how long this data may be retained and whether the works council needs to be involved.

Policy attestation

The third type of evidence differs from the other two because it does not refer to training in the classical sense but to the acknowledgment and acceptance of policies. More on this in the dedicated section below.

Deadline monitoring: when training must be repeated

Trained once does not mean trained forever. ISO 27001 requires that competencies be maintained, implying regular repetition. NIS2 also demands ongoing training measures, not just one-time actions.

Typical repetition intervals

Training type Interval Rationale
Security awareness foundational training Annually Audit minimum requirement, incorporate current threats
Phishing simulation Quarterly Behavior change requires repetition
Policy attestation With every policy change, at least annually Ensure awareness of current rules
Management training (NIS2) Annually NIS2 obligation, liability relevance
Specialized training (IT admins, developers) Annually to semi-annually Rapidly changing threat landscape
Onboarding training Once upon joining Before access to production systems
Data protection training Annually GDPR requirement

Deadline monitoring in practice

The biggest challenge is not setting deadlines but actually monitoring them. In a company with 100 employees, each having three to five different training requirements, a matrix of hundreds of due dates quickly emerges. Managing this manually — say, via an Excel spreadsheet — works up to a certain size but becomes error-prone and labor-intensive.

A dedicated tool like ISMS Lite takes this administrative burden 500 Euro pro Jahr off your hands and automatically escalates overdue training, without user limits. Automated deadline monitoring should offer the following features:

  • Due date calculation: Automatic calculation of the next due date based on the date of the last training and the defined repetition interval
  • Advance reminder: Notification to the employee (and optionally to the supervisor) 30 days before the due date
  • Overdue warning: Escalation when the deadline has passed without the training being completed
  • Dashboard overview: Overall view of the training status of all employees, filterable by department, training type, and status

Handling special cases

Not every employee fits into the standard scheme. There are special cases that must be addressed in deadline monitoring:

Extended absence (parental leave, illness): Employees who are absent for an extended period cannot complete training on schedule. Define how returning employees are handled: must they complete the missed training within 30 days of return?

Part-time and temporary staff: Part-time employees must also be trained. The training obligation applies regardless of employment scope. For temporary staff with very short employment periods, a simplified short training may be sensible.

External employees and service providers: If external employees access your systems, they must also be trained or at least informed about the applicable security rules. Document these records as well.

Escalation for non-participation

What happens when an employee does not complete their mandatory training? Without a defined escalation process, typically nothing happens — the deadline passes, nobody reacts, and in the next audit, a finding appears in the report.

An effective escalation process has multiple levels:

Level 1: Reminder (deadline reached)

The employee receives an automatic reminder that the training is due. Simultaneously, the direct supervisor is informed. The reminder contains a link to the training (for e-learning) or reference to the next training date (for in-person sessions).

Level 2: Warning (2 weeks overdue)

If the training has not been completed two weeks after the due date, a warning is sent to the employee with a copy to the supervisor. The warning points to the obligation to participate and sets an additional two-week deadline.

Level 3: Escalation to management (4 weeks overdue)

If the additional deadline has also passed, the case is escalated to the next higher management level or the ISO. At this point, it must be clarified whether there are organizational reasons for non-participation (lack of release time, technical problems) or whether it is a deliberate refusal.

Level 4: Consequences (6+ weeks overdue)

For continued non-participation without valid reason, labor law measures must be considered. This may be a formal admonishment, or in repeat cases, a written warning. At the same time, it must be evaluated whether the employee should continue to have access to systems for which the training is a prerequisite.

Document every escalation level. The auditor wants to see not only that you conduct training but also that you have a process for dealing with non-participation.

Escalation as a process, not arbitrariness

It is important that the escalation process is defined in advance, communicated, and applied uniformly. If one employee is escalated and another is not, it creates an impression of arbitrariness. The process must be transparent and apply to everyone — from the apprentice to the department head. Involve the works council in defining the escalation process, especially when labor law consequences are envisioned.

Policy acknowledgment as a separate process

Policy attestation is often conflated with awareness training but is a separate process with its own logic and evidence requirements.

What is a policy attestation?

In a policy attestation, the employee confirms that they have read and understood a specific policy and commit to complying with it. This typically concerns:

Difference from training

Training conveys knowledge and trains behavior. A policy attestation ensures that the employee knows the applicable rules and assures compliance. Both are necessary, but they are different things.

You can integrate a policy attestation into the awareness training (at the end of the training, the relevant policies are presented and attested), but the evidence must be maintained separately. The auditor wants to see which employees attested to which policies — independently of whether they participated in the last training.

Triggers for re-attestation

A policy attestation is not only repeated annually but also triggered on specific occasions:

  • Policy was updated: When the content of a policy changes, all affected employees must attest the new version. It is not sufficient to only communicate the changes — the employee must confirm the entire updated policy.
  • New employee: All relevant policies are attested during onboarding.
  • Role change: When an employee moves to a new role requiring additional or different policies (e.g., transfer to IT administration), the corresponding policies must be attested.

Documenting the attestation

Every attestation must contain the following information:

Field Content
Policy Name and version number
Employee Name, department, role
Date of attestation When the confirmation was given
Type of confirmation Signature, digital checkbox, e-signature
Valid until Due date for next attestation

Retain both the attested version of the policy and the attestation itself. When a policy changes and an employee has still attested to the old version, it must be traceable which version they confirmed.

Digital vs. paper-based documentation

The question of whether training records are maintained digitally or on paper is not philosophical but practical. Both approaches are acceptable from an audit perspective, as long as the records are complete, findable, and intact. In practice, however, there are clear differences in effort and reliability.

Paper-based documentation

Paper records work. Signed attendance lists, printed quiz results, handwritten policy confirmations. For a small company with 20 employees and two training sessions per year, this can be sufficient.

The disadvantages become apparent with growing size:

  • Search and access: Searching through folders for a specific employee's training record takes time. In an audit, when the reviewer says "show me the record for employee X," this can become embarrassingly slow.
  • Deadline monitoring: Paper cannot support automatic deadline monitoring. You need a separate spreadsheet or calendar entries.
  • Analysis: Aggregated analyses (what is the training coverage, which department is behind) are labor-intensive to impossible.
  • Security: Paper can be lost, damaged, or fall into the wrong hands. Without backup, the records are irrecoverably gone.
  • Distributed locations: When employees work at different locations, centralized filing of paper records becomes logistically challenging.

Digital documentation

Digital training records solve most problems of paper documentation but bring their own requirements:

  • Integrity: Records must be protected against manipulation. Digital confirmations should not be retroactively alterable (audit trail, timestamps).
  • Availability: Records must be accessible at all times, even after a system change. Proprietary formats readable only with a specific tool are a risk.
  • Data protection: Digital training records contain personal data (name, test results, department). Access rights must be configured so that only authorized persons (ISO, HR, direct supervisor) have access.
  • Backup: Like all digital data, training records must be regularly backed up.

Which approach fits?

For most organizations with 30 to 50 or more employees, digital documentation is clearly the better path. The time savings in searching, analysis, and deadline monitoring justify the effort of setting up a digital system. For very small organizations, a clean paper-based process can be sufficient as long as it is consistently maintained.

A hybrid variant commonly found in practice: in-person training is documented with paper attendance lists that are subsequently scanned and digitally archived. E-learning records are automatically generated digitally. Policy attestations are handled through a digital tool. This works but requires discipline in consolidating the various sources.

What the auditor really wants to see

After many sections about mandatory fields, types of evidence, and deadlines, it is worth looking at the audit reality. What does the auditor actually ask, and how do you prepare?

Typical audit questions about training records

"Show me your training plan." The auditor wants to see that training is planned and not conducted ad hoc. An annual plan with defined training topics, target groups, formats, and dates answers this question.

"Which training sessions were conducted in the past year?" Here you need an overview of all conducted training with date, topic, and number of participants. Ideally at a glance, not after ten minutes of searching through various folders.

"Show me the records for employee X." The auditor randomly selects employees and wants to see their training records. You must be able to quickly find the relevant records: when was the last awareness training completed? Which policies has the employee attested? What was the quiz result?

"How do you handle employees who do not participate in training?" This is about the escalation process. The auditor wants to see that there is a defined approach to non-participation and that it is actually applied.

"Has executive management participated in training?" Specifically relevant under NIS2. Executive management must have demonstrably participated in cybersecurity training. Keep the evidence for executive management separate and readily accessible.

"How do you ensure new employees are trained?" The auditor wants to see the onboarding process and evidence that it is actually followed. Pull records for the last three to five new hires as proof.

The golden rule for the audit

Prepare a training file per employee — physical or digital — containing all records: attendance confirmations, quiz results, policy attestations, onboarding record. If you can show the auditor the complete training history of any employee within two minutes, you have passed this checkpoint.

Retention periods and archiving

Training records must be retained for a defined period. The exact duration depends on various factors:

Regulatory requirements: ISO 27001 does not define a specific retention period but requires documented information to be retained as long as it is relevant. In practice, this means: at least through the entire certification cycle (three years) plus a buffer.

Labor law requirements: When training records serve as the basis for labor law measures (escalation for non-participation), labor law retention periods apply.

Data protection limitations: Training records contain personal data and may not be retained indefinitely. After an employee's departure, records should be deleted after a defined period (typically two to three years), unless another legal basis requires further retention.

Recommendation: Retain training records for at least five years, at most until three years after the employee's departure. Define the periods in a retention policy and implement them consistently.

Building a training record structure

To close, a concrete suggestion for how to structure training documentation in your ISMS. This structure can be implemented both digitally and (with limitations) on paper.

Level 1: Training plan

One document providing the annual overview:

Training Target group Format Frequency Responsible Q1 Q2 Q3 Q4
Awareness foundational training All employees E-learning + workshop Annually ISO X
Phishing simulation All employees Simulation Quarterly ISO X X X X
NIS2 management training Executive management Workshop Annually ISO X
IT admin deep dive IT department Workshop Semi-annually IT management X X
Data protection training All employees E-learning Annually DPO X

Level 2: Training records per session

For each conducted training, an evidence document with the six mandatory fields (participant, date, topic, trainer, result, confirmation).

Level 3: Employee training file

Per employee, an overview of all completed training, attestations, and open due dates. This is the file you must be able to present within two minutes in an audit.

Level 4: Reporting and KPIs

Aggregated analyses of training status: training coverage by department, overdue training, quiz score trends, phishing click rates. This level feeds into the management review.

Training records are not an end in themselves

Documenting training can feel like bureaucratic overhead. Filling out forms, maintaining lists, monitoring deadlines. But these records serve a dual purpose: they prove to the auditor that your ISMS works, and they give you the transparency you need to manage your training program.

Without records, you do not know whether all employees are trained. You do not know which department has deficits. You do not know whether the quiz results of the last training were better or worse than the previous one. You are flying blind.

With clean records, on the other hand, you have the foundation to continuously improve your program: where are the knowledge gaps? Which formats are well received? Which target groups need more attention? This makes the difference between a training program that fulfills compliance and one that actually works.

Further reading

Start with the basics: create a training plan, define mandatory fields for every record, set deadlines, establish an escalation process. Build the rest iteratively — quarter by quarter, training by training. Perfect documentation does not exist on day one. But a consistent, traceable process that runs from the beginning is worth more in an audit than a theoretically perfect system with gaps in practice.

Manage training records automatically

ISMS Lite documents training sessions, tracks deadlines, and automatically escalates non-participation. Complete audit trails included.

Install now