{
  "title": "How to Configure Your SIEM for Continuous Review and Update of Logged Events — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.3",
  "date": "2026-04-13",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-configure-your-siem-for-continuous-review-and-update-of-logged-events-nist-sp-800-171-rev2-cmmc-20-level-2-control-aul2-333.jpg",
  "content": {
    "full_html": "<p>This post shows how to configure a Security Information and Event Management (SIEM) system so logged events are continuously reviewed and updated in a way that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AU.L2-3.3.3, with step‑by‑step implementation tips, small-business examples, and specific technical settings you can apply right away.</p>\n\n<h2>Understanding AU.L2-3.3.3 and what \"continuous review and update\" means</h2>\n<p>AU.L2-3.3.3 requires organizations to review and update logged events so that audit data remains relevant for detection, response, and compliance. Practically this means your SIEM must not be a static collector; it must have processes and configurations for continual log-source onboarding, rule tuning, enrichment, scheduled and on-demand reviews, and documented change control so the set of collected and analyzed events evolves with the environment and threat landscape.</p>\n\n<h3>Requirement, key objectives, and implementation notes (Compliance Framework context)</h3>\n<p>Requirement: Continuously review and update logged events so they are fit for detecting suspicious activity and supporting investigations. Key objectives: (1) ensure log sources and event types reflect your infrastructure and business applications, (2) tune detection rules to reduce false positives while preserving true positives, (3) maintain integrity, retention and availability of logs, and (4) document changes for auditability. Implementation notes: tie SIEM configuration changes to your change control, use automated onboarding where possible, and schedule regular reviews (weekly for critical rules, monthly for coverage reviews, quarterly for threat-model updates).</p>\n\n<h2>How to configure collection, integrity, and time synchronization</h2>\n<p>Start with reliable collection and integrity: enable secure log transport (TCP + TLS, e.g., syslog TCP/6514 or agent TLS), enable signing or HMAC where supported, and write logs to append-only or WORM-capable storage if your SIEM or archive supports it. Ensure all log sources — endpoints, domain controllers, firewalls, IDS/IPS, cloud consoles (AWS CloudTrail, Azure Activity Logs), identity providers (Okta, Azure AD), and SaaS applications (Office365) — are onboarded and sending the events you enumerated during a coverage assessment.</p>\n\n<h2>Implement continuous review with automated detection, tuning, and baselining</h2>\n<p>Configure correlation rules and baselines, and automate the first line of review: build detection rules (examples below) and enable automated enrichment (whois, geoip, threat intel). Use behavior baselining/UEBA for anomalous patterns. Example detection rules for a small business: (a) failed interactive logons: trigger when Account X has >5 failed logons in 5 minutes, (b) new domain admin creation: alert when a group membership change creates a user in a privileged group, (c) large outbound transfers: alert when >100 MB is transferred to an external IP in 10 minutes. Implement queries with your SIEM’s query language (e.g., KQL, SPL, Elastic DSL) and set adaptive thresholds based on observed baselines.</p>\n\n<h2>Tuning, false positive reduction, and update workflows</h2>\n<p>Make review a continuous feedback loop: have a triage queue where analysts tag alerts as true/false positive and capture remediation steps. Use that feedback to adjust rules: add contextual exclusions (service accounts, backup windows), increase threshold windows, or create suppressions tied to known maintenance windows. Maintain a formal \"rule change\" log with dates, authors, justification, and test results so auditors can see the evolution of your detection set and why events were added/removed.</p>\n\n<h3>Small business scenario — practical configuration</h3>\n<p>Example: a 50-person company running hybrid Azure AD + on-prem AD, Office365, AWS, and a perimeter UTM. Onboarding checklist: enable Azure AD sign-in logs and route to SIEM via Azure Monitor; enable AWS CloudTrail with S3 delivery and CloudTrail Lake ingestion into SIEM; deploy Windows Event Forwarding or Sysmon agents sending Security and Sysmon channels to the SIEM; forward UTM logs via TLS syslog. Baseline normal business hours and set alerts for off-hours admin console access, anomalous data exfiltration from the corporate file share, and sudden increases in privilege elevation events. Set retention policy to keep indexable logs for at least 1 year and long-term encrypted archives for 3–5 years per organizational policy for CUI (align with your legal and contract requirements).</p>\n\n<h2>Compliance tips and best practices</h2>\n<p>Keep these practical tips in your operation: (1) centralize and document log mappings — what event IDs map to which use cases (e.g., Windows 4624=successful logon, 4625=failed logon, 4720=user created); (2) maintain an asset-to-log-source matrix and update it when assets are decommissioned or added; (3) schedule weekly rule health reports showing alert volume and triage outcomes; (4) integrate SIEM alerts with your ticketing system and incident response playbooks so every alert can be tracked to closure; (5) keep clocks synchronized (NTP) across all sources — misaligned timestamps break correlation and timelines.</p>\n\n<h2>Risk of not implementing continuous review and update</h2>\n<p>Without continuous review and update you risk missing indicators of compromise because stale rules generate noise while newer, high-value events go uncollected or unmonitored. Consequences include undetected data exfiltration, inability to produce forensic timelines for incidents (hurting breach response and potentially violating contract or contractual CUI protection obligations), contract loss with DoD or federal partners, and fines or remediation costs following an incident. For small businesses, a single missed detection can mean a total loss of customer trust or business continuity.</p>\n\n<p>In summary, meeting AU.L2-3.3.3 requires converting your SIEM from a passive log repository into a living system: secure and comprehensive collection, continuous detection and enrichment, a closed-loop tuning and review process (with documented changes), and retention and integrity controls aligned to your compliance policy. Implement the checklists and examples above, schedule regular reviews, and tie SIEM change records into your change control so auditors and incident responders can prove the environment is being actively managed to NIST SP 800-171 / CMMC 2.0 Level 2 expectations.</p>",
    "plain_text": "This post shows how to configure a Security Information and Event Management (SIEM) system so logged events are continuously reviewed and updated in a way that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AU.L2-3.3.3, with step‑by‑step implementation tips, small-business examples, and specific technical settings you can apply right away.\n\nUnderstanding AU.L2-3.3.3 and what \"continuous review and update\" means\nAU.L2-3.3.3 requires organizations to review and update logged events so that audit data remains relevant for detection, response, and compliance. Practically this means your SIEM must not be a static collector; it must have processes and configurations for continual log-source onboarding, rule tuning, enrichment, scheduled and on-demand reviews, and documented change control so the set of collected and analyzed events evolves with the environment and threat landscape.\n\nRequirement, key objectives, and implementation notes (Compliance Framework context)\nRequirement: Continuously review and update logged events so they are fit for detecting suspicious activity and supporting investigations. Key objectives: (1) ensure log sources and event types reflect your infrastructure and business applications, (2) tune detection rules to reduce false positives while preserving true positives, (3) maintain integrity, retention and availability of logs, and (4) document changes for auditability. Implementation notes: tie SIEM configuration changes to your change control, use automated onboarding where possible, and schedule regular reviews (weekly for critical rules, monthly for coverage reviews, quarterly for threat-model updates).\n\nHow to configure collection, integrity, and time synchronization\nStart with reliable collection and integrity: enable secure log transport (TCP + TLS, e.g., syslog TCP/6514 or agent TLS), enable signing or HMAC where supported, and write logs to append-only or WORM-capable storage if your SIEM or archive supports it. Ensure all log sources — endpoints, domain controllers, firewalls, IDS/IPS, cloud consoles (AWS CloudTrail, Azure Activity Logs), identity providers (Okta, Azure AD), and SaaS applications (Office365) — are onboarded and sending the events you enumerated during a coverage assessment.\n\nImplement continuous review with automated detection, tuning, and baselining\nConfigure correlation rules and baselines, and automate the first line of review: build detection rules (examples below) and enable automated enrichment (whois, geoip, threat intel). Use behavior baselining/UEBA for anomalous patterns. Example detection rules for a small business: (a) failed interactive logons: trigger when Account X has >5 failed logons in 5 minutes, (b) new domain admin creation: alert when a group membership change creates a user in a privileged group, (c) large outbound transfers: alert when >100 MB is transferred to an external IP in 10 minutes. Implement queries with your SIEM’s query language (e.g., KQL, SPL, Elastic DSL) and set adaptive thresholds based on observed baselines.\n\nTuning, false positive reduction, and update workflows\nMake review a continuous feedback loop: have a triage queue where analysts tag alerts as true/false positive and capture remediation steps. Use that feedback to adjust rules: add contextual exclusions (service accounts, backup windows), increase threshold windows, or create suppressions tied to known maintenance windows. Maintain a formal \"rule change\" log with dates, authors, justification, and test results so auditors can see the evolution of your detection set and why events were added/removed.\n\nSmall business scenario — practical configuration\nExample: a 50-person company running hybrid Azure AD + on-prem AD, Office365, AWS, and a perimeter UTM. Onboarding checklist: enable Azure AD sign-in logs and route to SIEM via Azure Monitor; enable AWS CloudTrail with S3 delivery and CloudTrail Lake ingestion into SIEM; deploy Windows Event Forwarding or Sysmon agents sending Security and Sysmon channels to the SIEM; forward UTM logs via TLS syslog. Baseline normal business hours and set alerts for off-hours admin console access, anomalous data exfiltration from the corporate file share, and sudden increases in privilege elevation events. Set retention policy to keep indexable logs for at least 1 year and long-term encrypted archives for 3–5 years per organizational policy for CUI (align with your legal and contract requirements).\n\nCompliance tips and best practices\nKeep these practical tips in your operation: (1) centralize and document log mappings — what event IDs map to which use cases (e.g., Windows 4624=successful logon, 4625=failed logon, 4720=user created); (2) maintain an asset-to-log-source matrix and update it when assets are decommissioned or added; (3) schedule weekly rule health reports showing alert volume and triage outcomes; (4) integrate SIEM alerts with your ticketing system and incident response playbooks so every alert can be tracked to closure; (5) keep clocks synchronized (NTP) across all sources — misaligned timestamps break correlation and timelines.\n\nRisk of not implementing continuous review and update\nWithout continuous review and update you risk missing indicators of compromise because stale rules generate noise while newer, high-value events go uncollected or unmonitored. Consequences include undetected data exfiltration, inability to produce forensic timelines for incidents (hurting breach response and potentially violating contract or contractual CUI protection obligations), contract loss with DoD or federal partners, and fines or remediation costs following an incident. For small businesses, a single missed detection can mean a total loss of customer trust or business continuity.\n\nIn summary, meeting AU.L2-3.3.3 requires converting your SIEM from a passive log repository into a living system: secure and comprehensive collection, continuous detection and enrichment, a closed-loop tuning and review process (with documented changes), and retention and integrity controls aligned to your compliance policy. Implement the checklists and examples above, schedule regular reviews, and tie SIEM change records into your change control so auditors and incident responders can prove the environment is being actively managed to NIST SP 800-171 / CMMC 2.0 Level 2 expectations."
  },
  "metadata": {
    "description": "Practical guidance to configure and tune your SIEM for continuous review and updating of logged events to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AU.L2-3.3.3 requirements.",
    "permalink": "/how-to-configure-your-siem-for-continuous-review-and-update-of-logged-events-nist-sp-800-171-rev2-cmmc-20-level-2-control-aul2-333.json",
    "categories": [],
    "tags": []
  }
}