CMMC 1.0 Practice AU.3.051 Requirement:

Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

CMMC 1.0 AU.3.051 Requirement Explanation:

You can technically meet this control by manually reviewing audit logs generated by your systems however using a SIEM is much more practical. A SIEM can help you quickly review, analyze, and create reports on events occuring throughout your system. This allows you to identify unlawful, unauthorized, or suspicious activity.

Example CMMC 1.0 AU.3.051 Implementation:

Use your security information and event management (SIEM) system to analyze logs collected across your systems to help identify unauthorized activity.

CMMC 1.0 AU.3.051 Scenario(s):

- Scenario 1:

One of your employee's accounts was taken over by an attacker. You disable the account to prevent the attacker from causing further damage. Using your SIEM, you review audit logs from various systems and are able to determine other systems the attacker was able to access with the compromised account.
 

Discover Our Cybersecurity Complaince Solutions:

 /assets/images/app/complaince_accelerator.gif

NIST SP 800-171 & CMMC Compliance

Whether you need to meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements, help your clients meet them, or verify sub-contractor compliance we have the expertise and solution for you.
 /assets/images/app/quantum_accelerator.gif

HIPAA Compliance

Whether you need to meet and maintain your HIPAA compliance requirements or help your clients meet them we have the expertise and solution for you.