CMMC 1.0 Practice AU.3.051 Requirement:
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
CMMC 1.0 AU.3.051 Requirement Explanation:
You can technically meet this control by manually reviewing audit logs generated by your systems however using a SIEM is much more practical. A SIEM can help you quickly review, analyze, and create reports on events occuring throughout your system. This allows you to identify unlawful, unauthorized, or suspicious activity.
Example CMMC 1.0 AU.3.051 Implementation:
Use your security information and event management (SIEM) system to analyze logs collected across your systems to help identify unauthorized activity.
CMMC 1.0 AU.3.051 Scenario(s):
- Scenario 1:
One of your employee's accounts was taken over by an attacker. You disable the account to prevent the attacker from causing further damage. Using your SIEM, you review audit logs from various systems and are able to determine other systems the attacker was able to access with the compromised account.
Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.