Back to Control Explorer

AU.3.051

Content

Control Acronym

AU

Family

Audit And Accountability

CMMC Level

3

800-171 Control #

3.3.5

CMMC Description

Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

CMMC Clarification

Organizations must review, analyze, and report audit records to help detect and respond to security incidents in a timely manner for the purpose of investigation and corrective actions. Collection of audit logs into one or more central repositories (per AM.3.048) facilitates correlated review. Small organizations may be able to accomplish this manually. Larger organizations will use an automated system for analysis that does correlation of log information across the entire enterprise and supports the use of centralized intel feeds. By centralizing intel feeds, subscription costs should be reduced and the effectiveness of the analysis should be increased. Some organizations may want to orchestrate the entire analysis process which includes the use of APIs for collection, correlation, and the automation of responses based on programed rulesets. Example 1 You are in charge of IT operations in your organization. You are responsible for assisting in the investigation of a possible incident. You review the event log for suspicious activity, e.g., a user logged on at an unusual time of day. In order to analyze the data, you use an automated tool to collect and analyze the audit log data, and perform queries to generate a detailed report. Once the connection is made between the individual and the incident, corrective actions are taken. Example 2 You are a member of an adversary hunt team responsible for audit log analysis. You run an automated tool that analyzes all the audit logs across a LAN segment simultaneously looking for similar anomalies on separate systems at separate locations. After extracting anomalous information and performing a correlation analysis, you determine that four different systems have had their event log information cleared between 2:00 AM to 3:00 AM, although the associated dates are different. The hunt team monitors all systems on the same LAN segment between 2:00 AM to 3:00 AM for the next 30 days.

800-171 Description

Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

800-171 Discussion

Correlating audit record review, analysis, and reporting processes helps to ensure that they do not operate independently, but rather collectively. Regarding the assessment of a given organizational system, the requirement is agnostic as to whether this correlation is applied at the system level or at the organization level across all systems.

Other Source Discussion

N/A

CIS Control References

CIS Controls v7.1 6.6, 6.7

NIST 800-53 Control Ref.

NIST SP 800-53 Rev 4 AU-6(3)

CMMC Derived

NIST CSF Control References

NIST 800-171 References

NIST SP 800-171 Rev 1 3.3.5

Applicable FAR Clause

NIST CSF Control Reference

NIST CSF v1.1 DE.AE-3

CERT RMM Reference

CERT RMM v1.2 COMP: SG3.SP1

Modification of NIST 800-171B Reference

NIST 800-171B Reference

UK NCSCCyber Reference

AS ACSC Reference

Sub-Criterias

Assessment Sub-Criteria 1

AU.3.051.[a] audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity are defined; and

Assessment Sub-Criteria 2

AU.3.051.[b] defined audit record review, analysis, and reporting processes are correlated.

Assessment Sub-Criteria 3

Assessment Sub-Criteria 4

Assessment Sub-Criteria 5

Assessment Sub-Criteria 6

Assessment Sub-Criteria 7

Assessment Sub-Criteria 8

Assessment Sub-Criteria 9

Assessment Sub-Criteria 10

Assessment Sub-Criteria 11

Assessment Sub-Criteria 12

Assessment Sub-Criteria 13

Assessment Sub-Criteria 14

Assessment Sub-Criteria 15