🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure SIEM for AU.L2-3.3.5 Log Correlation and Automated Alerts: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.5

[Write a compelling 1-sentence SEO description about this compliance requirement]

•
April 13, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure a Security Information and Event Management (SIEM) system to meet AU.L2-3.3.5 requirements from NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 by building log correlation, automated alerts, and audit evidence that small businesses can implement pragmatically and defensibly.

Understanding AU.L2-3.3.5 in Practical Terms

AU.L2-3.3.5 requires organizations to correlate audit records and generate automated alerts when suspicious activities are detected so reviewers can respond quickly and produce evidence for auditors. For a small business, that means centralizing logs, aligning event taxonomy to required controls, and implementing deterministic correlation rules that map to threats to Controlled Unclassified Information (CUI) handling—for example, detecting credential abuse, lateral movement, or unauthorized privilege changes.

Practical SIEM Implementation Steps

Start with scope and log source inventory: enumerate endpoints (Windows, Linux, macOS), identity services (Active Directory, Azure AD), perimeter devices (firewall, VPN, proxy), cloud platforms (AWS CloudTrail, AzureActivity), and critical applications (mail servers, file shares, SaaS with audit APIs). For each source record: confirm you can forward logs to the SIEM via supported protocols (syslog/CEF/LEEF, API ingestion, collector/agent). Small-business tip: begin with the top 8–12 sources that carry the most risk (domain controllers, VPN, EDR, firewall, file server) and expand iteratively.

Log collection, normalization, and enrichment

Configure agents or collectors to send structured logs (CEF/JSON) where possible. Normalize fields to a consistent schema: timestamp (UTC), event_id, username, src_ip, dst_ip, source_host, process_name, outcome (success/failure), and log_severity. Enrich logs with geo-IP, AD user attributes (role, privileged group membership), and asset classification (CUI-handling host). Ensure Windows Event IDs such as 4625 (failed logon), 4624 (logon), 4688 (process creation), 4672 (special privileges) are parsed into normalized fields. For Linux, parse auth logs (sshd failures, sudo) and systemd journal entries. Use parsing rules and test them against real events to avoid gaps.

Time synchronization, integrity, and secure transport

Make NTP time sync mandatory for all log sources and the SIEM (UTC). Ingested logs must retain original timestamps; if the SIEM adds ingestion timestamps, preserve the original in a dedicated field. Use TLS for log transport (syslog over TLS, API HTTPS) and mutual authentication where supported. Protect logs at rest with AES-256 and restrict SIEM console access with RBAC and MFA. For audit evidence, enable immutable storage or write-once media for archived logs if budget allows.

Correlation rules and real-world detection examples

Create correlation rules that combine events across sources and time windows. Example detection rules for a small business: (1) Horizontal brute force: alert if a single username has >= 5 failed logons across >= 3 hosts within 10 minutes. (2) Lateral movement: alert if a user authenticates to a server then a second host within 2 minutes and a new RDP connection is established. (3) Privilege escalation: alert on AD group membership changes to Domain Admins (AD event + admin console API change). (4) Data exfil candidate: alert on large file transfer from CUI-labeled file server to an external IP through proxy or VPN. Express these as SIEM correlation queries, e.g., JOIN auth logs on username and time window, then COUNT() and DISTINCT(host) thresholds. Use MITRE ATT&CK mappings in rule metadata to show auditors why the rule maps to a threat.

Alerting, automation, and playbooks

Configure alert channels tuned by severity: low-priority email for informational correlations, high-priority SMS/push and a ticket in ServiceNow or Jira for critical incidents. Implement suppression and noise reduction (e.g., suppress repeated identical alerts for 30 minutes per host). Integrate with EDR and SOAR: automatic containment playbook might quarantine a host (EDR API), block IP at firewall, and create a ticket with attached log excerpts. For small teams, create a lightweight runbook: triage checklist, containment actions, evidence collection steps (copy relevant logs, snapshot EDR telemetry), and escalation contacts. Document SLA expectations (e.g., acknowledge within 15 minutes for high alerts).

Compliance evidence, retention, and audit readiness

To satisfy auditors, store the following evidence: log source inventory and onboarding receipts, parsing/normalization rules and test cases, correlation rule definitions with thresholds and rationale, alert history with timestamps and ticket IDs, and SOAR playbook runs showing automated responses. Define retention policy in the SIEM: keep high-fidelity logs (auth, admin changes, file access) online for 90 days, archived for 1 year (or per contract), and provide searchable indices for investigator access. Exportability matters: auditors should be able to reproduce alerts and view raw logs that triggered them.

Risk of not implementing AU.L2-3.3.5 is high: without correlation and automated alerts you risk delayed detection of credential compromise, lateral movement, and data exfiltration—leading to larger breaches, loss of CUI, regulatory penalties, and lost DoD contracts. For a small business, even isolated incidents can escalate quickly without cross-source correlation because attackers exploit gaps between endpoint and network telemetry.

Summary: implement AU.L2-3.3.5 by inventorying key log sources, enforcing time sync and secure transport, normalizing and enriching events, writing pragmatic correlation rules (with thresholds tuned to your environment), and wiring alerts into ticketing and SOAR for rapid response; maintain documented evidence and retention to prove compliance. Start small, iterate with real incidents and red-team tests, and continuously tune rules to reduce noise while preserving high-fidelity detection.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes