Skip to main content
NetStable
Level 2 AU.L2-3.3.2

Ensure that actions of users can be uniquely traced to those users

๐Ÿ“– What This Means

This practice means that every action taken by a user on your systems must be linked back to their unique identity. Think of it like a security camera in a bankโ€”every transaction or access event should have a digital 'name tag' showing who did it. For example, if an employee accesses a sensitive file, the logs must clearly show their username (not just 'admin'). Another example: if someone modifies a system configuration, the change must be tied to their individual account, not a shared login. This is critical for investigations, accountability, and detecting insider threats.

๐ŸŽฏ Why It Matters

Without unique user attribution, you can't detect malicious activity, investigate incidents, or hold users accountable. A 2022 Verizon DBIR report found that 82% of breaches involved human elements (misuse or stolen credentials). If all actions log as 'admin,' you can't tell if it's a compromised account or an insider threat. The DoD requires this to protect CUIโ€”imagine a data leak where you can't identify who accessed the files. Average breach cost for SMBs is $165K (IBM 2023). CMMC enforces this to meet DFARS 252.204-7012 requirements for traceability.

โœ… How to Implement

  1. 1. **AWS**: Enable AWS CloudTrail with 'management events' and 'data events' for S3. Set 'logAllUsers' to capture IAM user actions.
  2. 2. **Azure**: Configure Azure Activity Logs + Diagnostic Settings to stream to Log Analytics. Enable 'Sign-in logs' for AAD.
  3. 3. **GCP**: Turn on Audit Logs for all services (Admin Activity + Data Access). Use 'cloudaudit.googleapis.com' in logging sinks.
  4. 4. Enforce multi-factor authentication (MFA) to prevent shared account use (e.g., AWS IAM MFA, Azure Conditional Access).
  5. 5. Tag resources with owner metadata (e.g., AWS Resource Groups, Azure Tags).
  6. 6. Disable shared credentials (e.g., AWS root account, Azure shared mailboxes).
  7. 7. Use SIEM integration (e.g., Splunk, Azure Sentinel) to correlate logs with user identities.
โฑ๏ธ
Estimated Effort
2-5 days (Skill: Intermediate sysadmin). Cloud setups are faster (1-2 days with pre-built templates). On-prem may require more tuning.

๐Ÿ“‹ Evidence Examples

Audit Policy Document

Format: PDF/Word
Frequency: Annual review
Contents: Written policy requiring unique user IDs, no shared accounts, and logging standards.
Collection: Export from document management system

Screenshot of AWS CloudTrail settings

Format: PNG/PDF
Frequency: Quarterly
Contents: Showing 'LogAllUsers' enabled and S3 data events logged.
Collection: Printscreen with timestamp

Windows Security Event Log sample

Format: EVTX/CSV
Frequency: Monthly spot checks
Contents: Event ID 4624 showing user '[email protected]' (not 'admin') accessing a file.
Collection: Export from Event Viewer

SIEM Alert Report

Format: PDF
Frequency: Weekly
Contents: Report showing user attribution for a privileged action (e.g., 'j.doe created admin account').
Collection: Auto-generated from SIEM

MFA Enforcement Screenshot

Format: PNG
Frequency: After changes
Contents: Azure Conditional Access policy requiring MFA for all users.
Collection: Printscreen

๐Ÿ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AU.L2-3.3.2 ("Ensure that actions of users can be uniquely traced to those users"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your audit logging infrastructure, including which events are logged, the SIEM/log management platform, retention periods, log protection mechanisms, and review processes. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AU.L2-3.3.2 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to ensure that actions of users can be uniquely traced to those users. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AU.L2-3.3.2 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to ensure that actions of users can be uniquely traced to those users. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AU.L2-3.3.2 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • โ€ข Identify all systems generating audit logs within the CUI boundary
  • โ€ข Document log flow from sources to centralized SIEM
  • โ€ข Specify log storage locations and retention tiers
  • โ€ข Ensure this control covers all systems within your defined CUI boundary where ensure that actions of users can be uniquely traced to those users applies
  • โ€ข Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • ๐Ÿ“„ Audit and Accountability Policy
  • ๐Ÿ“„ SIEM architecture documentation
  • ๐Ÿ“„ Log retention configuration
  • ๐Ÿ“„ Evidence artifacts specific to AU.L2-3.3.2
  • ๐Ÿ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that required events are logged, check log completeness (all required fields present), test log protection mechanisms, and review evidence of regular log reviews.

๐Ÿ’ฌ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do all systems log user actions with unique identifiers (not shared accounts)?

โœ… YES โ†’ Proceed to Q2
โŒ NO โ†’ GAP: Disable shared accounts. Enforce individual logins via AD/LDAP. Timeline: 1 week.
Remediation:
Create user onboarding/offboarding procedures.

Question 2: Can you produce a log showing a specific user's actions from the past 30 days?

โœ… YES โ†’ Proceed to Q3
โŒ NO โ†’ GAP: Configure centralized logging (e.g., SIEM). Timeline: 2 weeks.
Remediation:
Start with free tools like Wazuh or Elastic Stack.

Question 3: Are privileged actions (e.g., admin logins) logged with command details?

โœ… YES โ†’ Proceed to Q4
โŒ NO โ†’ GAP: Enable detailed auditing (e.g., Windows 'Process Tracking', Linux 'auditd'). Timeline: 3 days.
Remediation:
Use templates from NIST SP 800-171 Appendix F.

Question 4: Is there a process to review attribution logs weekly?

โœ… YES โ†’ Proceed to Q5
โŒ NO โ†’ GAP: Implement log review SOP. Timeline: 1 week.
Remediation:
Assign a team member and document review steps.

Question 5: Have you tested by tracing a sample action to a user this quarter?

โœ… YES โ†’ COMPLIANT
โŒ NO โ†’ GAP: Conduct test (e.g., have a user access a file, verify logs). Timeline: 1 day.
Remediation:
Document test results as evidence.

โš ๏ธ Common Mistakes (What Auditors Flag)

1. Shared service accounts with no individual attribution

Why this happens: Legacy systems or convenience for IT teams
How to avoid: Replace with individual accounts + privileged access management (PAM) tools

2. Logs show generic 'SYSTEM' or 'root' instead of actual user

Why this happens: Missing process-level auditing
How to avoid: Enable 'Process Tracking' in Windows or 'execve' auditing in Linux

3. No MFA allows credential sharing

Why this happens: Cost or complexity concerns
How to avoid: Use free MFA like Microsoft Authenticator or Duo Mobile

4. Time sync issues make logs unreliable

Why this happens: Missing NTP configuration
How to avoid: Sync all systems to a central NTP server (e.g., time.nist.gov)

5. Logs exist but aren't reviewed

Why this happens: No assigned responsibility
How to avoid: Assign log review to a role in your security policy

๐Ÿ“š Parent Policy

This practice is governed by the Audit and Accountability Policy

View AU Policy โ†’

๐Ÿ“š Related Controls