Welcome to our Audit and Accountability (AU) Guide for CMMC Level 2 Compliance. This guide is tailored to support small and medium-sized enterprises (SMEs) in navigating the complexities of CMMC Level 2 audits.
In this Audit and Accountability (AU) Guide, we provide actionable insights on each control, along with practical advice and evidence requirements to streamline your compliance process. From mastering audit logging compliance to ensuring user accountability in information systems, we help you address every aspect of the audit and accountability requirements with confidence.
For personalized support and expert advice, Reach out and schedule a consultation. We're here to support your path to CMMC Level 2.0 compliance.
“Create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.”
Level Of Effort: High
Businesses must create and maintain records of system audit logs. These logs track any unauthorized or sketchy stuff going on in your system. They've got to be detailed enough to meet security standards, stored for specific amounts of time, and easy to look at when needed.
Many businesses choose to have an outside company manage these logs, to meet all of the Audit and Accountability requirements. You might think about using SEIM (Security Event and Incident Monitoring) tools alone, but they can get overwhelming. They create a lot of alerts and need someone who knows what they're doing to handle them. This can be a big task for most small and mid-sized businesses.
We recommend hiring a Managed Security Service Provider (MSSP) or a Security Operations Center (SOC) vendor. The cost is usually about $15-30 for each computer per month. They generally have a minimum number of seats they will consider.
To find a good one, you could talk to your I.T. team or a cybersecurity expert. They often have good options to suggest.
If you like to do your research, check out this list of MSSP/SOC vendors: Gartner's Managed Security Services list.
By choosing the right help, you ensure your business is keeping an eye on security correctly.
When you're picking an MSSP or a SOC for your business, here's a checklist to help you make sure you're getting everything you need:
“Ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions.”
Level Of Effort: Medium
Making sure you can track what each person does on your systems is key. This lets you hold everyone accountable for their actions, especially if there's any unauthorized or strange behavior.
“Review and update audited events.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under AU.L2-3.3.1 – SYSTEM AUDITING.
What our clients say
“Alert in the event of an audit process failure.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under AU.L2-3.3.1 – SYSTEM AUDITING.
“Correlate audit review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under AU.L2-3.3.1 – SYSTEM AUDITING.
“Provide audit reduction and report generation to support on-demand analysis and reporting.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under AU.L2-3.3.1 – SYSTEM AUDITING.
“Provide an information system capability that compares and synchronizes internal system clocks with an authoritative source to generate timestamps for audit records.”
Level Of Effort: Low
Making sure your system clocks match a trusted, outside time source is a must. This helps keep your audit logs' timestamps accurate and in sync across all your systems. Accurate timekeeping is key for keeping track of events and spotting security issues.
“Protect audit information and audit tools from unauthorized access, modification, and deletion.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under CM.L2-3.4.9 – USER-INSTALLED SOFTWARE and AU.L2-3.3.1 – SYSTEM AUDITING.
“Limit management of audit logging functionality to a subset of privileged users.”
Level Of Effort: None
This should be addressed if you implement all of the recommendations under CM.L2-3.4.9 – USER-INSTALLED SOFTWARE and AU.L2-3.3.1 – SYSTEM AUDITING.
What our clients say