CMMC 1.0 Practice AU.3.051 Requirement:
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
CMMC 1.0 AU.3.051 Requirement Explanation:
You can technically meet this control by manually reviewing audit logs generated by your systems however using a SIEM is much more practical. A SIEM can help you quickly review, analyze, and create reports on events occuring throughout your system. This allows you to identify unlawful, unauthorized, or suspicious activity.
Example CMMC 1.0 AU.3.051 Implementation:
Use your security information and event management (SIEM) system to analyze logs collected across your systems to help identify unauthorized activity.
CMMC 1.0 AU.3.051 Scenario(s):
- Scenario 1:
One of your employee's accounts was taken over by an attacker. You disable the account to prevent the attacker from causing further damage. Using your SIEM, you review audit logs from various systems and are able to determine other systems the attacker was able to access with the compromised account.
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you