Documenting security awareness training for your GLBA/FTC Safeguards Rule audit

Documenting security awareness training for your GLBA/FTC Safeguards Rule audit

GLBA/FTC Safeguards Rule requires documented security awareness training. Here's what auditors look for, and what most SAT platforms don't give you by default.

The email arrives with an attachment. Your organization, or your client if you're an MSP, is facing a formal GLBA/FTC Safeguards Rule compliance review in 45 days. The examiner has provided their standard document request list. Item six demands comprehensive proof of the organization's security awareness training program.

You know the staff completed their training modules. Finding the evidence is another story. You are staring at hours of manual data extraction just to build a cohesive report. The stakes are real. Missing documentation during an examination leads to failed assessments, remediation timelines, regulatory fines, and reputational risk.

This post covers what GLBA/FTC Safeguards Rule requires for security awareness training documentation, what auditors look for when they ask for it, and what most SAT platforms don't give you by default.

What GLBA/FTC Safeguards Rule requires for security awareness training

The Gramm-Leach-Bliley Act (GLBA), as updated by the FTC Safeguards Rule, is explicit about the requirement to educate employees. The mandate is anchored in 16 CFR Part 314, specifically under the elements of an information security program.

A key requirement: under 16 CFR §314.4(a), covered entities must designate a Qualified Individual (QI) to oversee the information security program. The QI is typically the one who certifies or signs off on training documentation.

The 2023 amendments to the Safeguards Rule further expanded the scope. Many organizations, tax preparers, auto dealerships, mortgage brokers, accounting firms, CPA firms, became subject to GLBA for the first time. For these groups, this is the first year a formal GLBA training program and documentation are being scrutinized by auditors and regulators.

Under 16 CFR § 314.4(e), financial institutions must implement policies and procedures to ensure personnel are able to enact the information security program. Specifically, 16 CFR § 314.4(e)(1) requires organizations to: "Provide your personnel with security awareness training that is updated as necessary to reflect risks identified by the risk assessment."

The regulation defines the scope of "personnel" broadly. It includes all employees, affiliates, and relevant service providers who have access to customer information. If an individual interacts with the financial and personal data protected under GLBA, they must be trained.

Frequency expectations are dynamic. The rule explicitly ties training to the organization's formal risk assessment. This means an annual, static video is insufficient. The training program must evolve. Personnel must receive updated training whenever new risks are identified, meaning ongoing, periodic education is a regulatory requirement.

Content requirements focus on specific threats to customer information. The training must address how personnel should identify and respond to these threats, encompassing data handling, phishing, and access control.

GLBA does not prescribe a specific retention window for training documentation. Align retention to your organization's broader records retention policy and any requirements in your cyber insurance policy. Financial records retention commonly runs 5+ years.

What auditors actually look for

When an examiner or compliance auditor evaluates your GLBA/FTC Safeguards Rule posture, they are testing the alignment between your risk assessment and your actual operational controls. They do not want verbal assurances. They execute a formal review protocol. They want hard evidence.

First, they look for program evidence. This means reviewing the written information security program (WISP). They cross-reference the required risk assessment against the training curriculum. If your risk assessment identifies business email compromise as a high risk, the auditor expects to see training modules explicitly addressing that threat.

Next, they demand per-person records. The auditor will request an HR or directory roster of everyone with access to customer information. They will sample this list and demand corresponding training logs. They are looking for strict scope coverage. If a loan officer was hired six months ago, the auditor wants the exact date their initial training was completed to verify it aligns with your written onboarding policy.

They also demand cadence evidence. Assessors want to see a timeline of continuous engagement. They look for ongoing phishing simulations and periodic security updates distributed consistently across the audit period, proving the training adapts to new threats as required by the rule.

Finally, auditors look at the response to identified issues. If an employee consistently falls for simulated phishing attacks, the examiner wants to see the documented follow-up. Recording the failure is not enough. They want evidence of the specific remedial training triggered by that failure, proving the program actively mitigates human risk.

What most SAT platforms give you by default

The security awareness training category has a standard output model. It just happens to be the wrong model for an FTC examiner.

Most SAT platforms function as campaign machines. They produce raw completion reports. They output per-campaign phishing results showing exactly who clicked a simulated threat on a specific Wednesday. They generate aggregate percentages showing high-level organizational risk.

For a team trying to satisfy an auditor, this is raw data. It is not evidence.

They struggle with date-range-scoped exports that perfectly match the strict compliance review window.

Instead, the admin is forced into manual reconciliation. You export a CSV from the directory service. You export another CSV from the training platform. You run VLOOKUPs to identify missing users. You manually filter out activity that occurred outside the audit period. You reconcile the workforce roster against the completion logs by hand just to prove no one slipped through the cracks.

The final output is a fragile spreadsheet. It lacks the integrity-hashed PDF artifacts auditors prefer to verify the data hasn't been modified post-export. The platform logs the clicks, but it leaves the actual work of proving compliance to you.

Your GLBA/FTC Safeguards Rule training documentation checklist

To get through a GLBA/FTC Safeguards Rule examination without wasting days on manual data formatting, your evidence must be precise and organized. Build your documentation bundle using this scannable checklist.

Per-person records:

  • Full legal name and employee ID

  • Organizational role or title

  • Official hire date (to verify onboarding compliance)

  • Training completions with exact dates and timestamps

  • Content mapping (explicitly tying modules to risks identified in the risk assessment)

  • Information security program acknowledgements with signature dates

  • Refresher evidence (timestamps for ongoing phishing and awareness updates)

  • Response to identified needs (remedial training dates triggered by simulation failures)

Program-level artifacts:

  • Written information security program (WISP)

  • Scope statement defining the personnel with access to customer information

  • Formal risk assessment document

  • Complete curriculum overview mapping back to the identified risks and 16 CFR § 314.4(e)

  • Audit protocol compliance evidence showing training occurred within the required intervals

Retention:

  • GLBA does not prescribe a specific retention window for training documentation. Align retention to your organization's broader records retention policy and any cyber insurance requirements. Financial records retention commonly runs 5+ years. Records must be securely stored and readily accessible for formal review.

Modern managed SAT platforms can generate this documentation automatically. Kinds, for example, produces GLBA/FTC Safeguards Rule-mapped PDF reports scoped by date range and workforce selection, with SHA-256 integrity hashes embedded in the footer so auditors can verify the report hasn't been modified. But whatever platform you use, the checklist above is what your documentation should include. If your current platform can't produce this without manual reconciliation, you have a documentation problem, not a training problem.

Related frameworks

Organizations subject to GLBA/FTC Safeguards Rule often also deal with HIPAA and PCI DSS. For related guidance, see our posts on those frameworks.

This post describes general patterns in GLBA/FTC Safeguards Rule training documentation. It is not legal or compliance advice. Confirm specific obligations with your compliance advisor, assessor, or relevant regulator.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

Always automated.
Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.