Skip to main content
NetStable
Level 2 AU.L2-3.3.1

Create and retain system audit logs and records

πŸ“– What This Means

This control requires organizations to create and keep detailed records of system activities, known as audit logs. These logs capture events like who accessed the system, what changes were made, and when these actions occurred. The purpose is to provide a trail of evidence that can be reviewed to detect unauthorized access, troubleshoot issues, or investigate security incidents. For example, if an employee accidentally deletes a critical file, the audit log can help identify when and how it happened. Similarly, if a hacker gains access to your system, the logs can help trace their activities and understand the extent of the breach. These logs must be securely stored and retained for a specific period, usually at least 90 days, to meet compliance requirements.

🎯 Why It Matters

Without audit logs, organizations have no visibility into what’s happening on their systems, making it nearly impossible to detect or respond to security incidents. For example, in the 2017 Equifax breach, the lack of proper logging delayed the discovery of the breach, exposing sensitive data of 147 million people. The financial and reputational damage was immense, costing Equifax over $1.4 billion. From a DoD/CMMC perspective, this control is critical for protecting Controlled Unclassified Information (CUI). Audit logs provide accountability and are essential for forensic investigations, compliance audits, and ensuring that systems are not misused or compromised.

βœ… How to Implement

  1. Enable logging services: In AWS, activate AWS CloudTrail; in Azure, enable Azure Monitor Logs; in GCP, use Cloud Logging.
  2. Configure log retention: Set retention policies to store logs for at least 90 days (e.g., AWS S3 lifecycle rules, Azure Log Analytics retention settings).
  3. Centralize logs: Use a SIEM tool like Splunk or Datadog to aggregate logs from multiple cloud services.
  4. Secure log storage: Encrypt log data using cloud provider encryption services (e.g., AWS KMS, Azure Key Vault).
  5. Monitor log integrity: Enable alerts for log tampering or deletion (e.g., AWS CloudTrail alerts, Azure Sentinel).
⏱️
Estimated Effort
Implementation typically takes 2-3 days for cloud environments and 3-5 days for on-premise setups, depending on system complexity. Skill level required: Intermediate (knowledge of logging tools and SIEM configurations).

πŸ“‹ Evidence Examples

Audit Log Retention Policy

Format: PDF/DOC
Frequency: Annually or when updated.
Contents: Policy detailing log retention period (e.g., 90 days), storage location, and encryption methods.
Collection: Download from document management system.

Log Configuration Screenshots

Format: PNG/JPG
Frequency: During initial setup and after changes.
Contents: Screenshots of logging settings (e.g., AWS CloudTrail, Windows Event Log).
Collection: Take screenshots manually or use automated tools.

SIEM Log Reports

Format: CSV/PDF
Frequency: Monthly or on-demand for audits.
Contents: Exported logs showing user activities, system changes, and security events.
Collection: Export from SIEM tool.

Log Integrity Monitoring Alerts

Format: PDF/CSV
Frequency: As alerts occur.
Contents: Alerts generated for log tampering or unauthorized access.
Collection: Export from monitoring tool.

Training Records

Format: PDF/DOC
Frequency: Annually.
Contents: Records of staff trained on log management and review procedures.
Collection: Download from HR system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AU.L2-3.3.1 ("Create and retain system audit logs and records"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your audit logging infrastructure, including which events are logged, the SIEM/log management platform, retention periods, log protection mechanisms, and review processes. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AU.L2-3.3.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to create and retain system audit logs and records. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AU.L2-3.3.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to create and retain system audit logs and records. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AU.L2-3.3.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all systems generating audit logs within the CUI boundary
  • β€’ Document log flow from sources to centralized SIEM
  • β€’ Specify log storage locations and retention tiers
  • β€’ Ensure this control covers all systems within your defined CUI boundary where create and retain system audit logs and records applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Audit and Accountability Policy
  • πŸ“„ SIEM architecture documentation
  • πŸ“„ Log retention configuration
  • πŸ“„ Evidence artifacts specific to AU.L2-3.3.1
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that required events are logged, check log completeness (all required fields present), test log protection mechanisms, and review evidence of regular log reviews.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Are audit logs enabled on all systems handling CUI?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Enable logging on missing systems within 1 week.
Remediation:
Use tools like AWS CloudTrail or Windows Event Log to activate logging.

Question 2: Are logs retained for at least 90 days?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Adjust retention policies within 2 days.
Remediation:
Set retention rules in AWS S3, Azure Log Analytics, or logrotate.

Question 3: Are logs centralized in a SIEM tool?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Deploy a SIEM solution within 1 week.
Remediation:
Consider Splunk, ELK Stack, or Datadog.

Question 4: Are logs encrypted and protected from tampering?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Enable encryption and integrity monitoring within 3 days.
Remediation:
Use AWS KMS, Azure Key Vault, or Tripwire.

Question 5: Are logs reviewed regularly for anomalies?

βœ… YES β†’ Compliant.
❌ NO β†’ GAP: Establish a log review process within 1 week.
Remediation:
Schedule weekly reviews using SIEM dashboards.

⚠️ Common Mistakes (What Auditors Flag)

1. Not enabling logging on all systems.

Why this happens: Overlooking systems not directly handling CUI.
How to avoid: Conduct a full system inventory and enable logging everywhere.

2. Insufficient log retention period.

Why this happens: Misunderstanding CMMC requirements.
How to avoid: Set retention policies for at least 90 days.

3. Failing to centralize logs.

Why this happens: Lack of resources or expertise to deploy a SIEM.
How to avoid: Use affordable or open-source SIEM tools like ELK Stack.

4. Not encrypting logs.

Why this happens: Assuming logs are safe by default.
How to avoid: Enable encryption for log storage using cloud or on-premise tools.

5. Not reviewing logs regularly.

Why this happens: Lack of staff or time.
How to avoid: Schedule automated alerts and weekly reviews.

πŸ“š Parent Policy

This practice is governed by the Audit and Accountability Policy

View AU Policy β†’

πŸ“š Related Controls