🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Weekly Audit Checklist to Review and Update Logged Events (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.3)

Learn how to build a practical weekly audit checklist to review, validate, and update logged events to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AU.L2-3.3.3 requirements.

•
April 05, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a step-by-step approach to creating a weekly audit checklist that helps you review, validate, and update logged events to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AU.L2-3.3.3, with actionable scripts, tool examples, and small-business scenarios so you can implement immediately.

Why a weekly review is required for AU.L2-3.3.3 and what it should achieve

NIST/CMMC expect organizations to regularly review audit records so that logs remain complete, accurate, and useful for detecting anomalous behavior. A weekly cadence balances timeliness with operational workload: it catches configuration drift, log source failures, clock skew, and changes in application behavior before they turn into weeks-long blind spots. Your checklist's objectives should be to verify log collection health, validate event content (timestamps, user IDs, process IDs, success/failure flags), tune noisy events, and document any updates to logging configuration or parse rules.

Core components of the weekly audit checklist

At minimum the checklist should include the following verifiable items (each item should map to a ticket or doc entry when an exception is found):

  • Inventory check: confirm all expected log sources (workstations, servers, firewalls, VPN, cloud services, endpoints) are reporting.
  • Time sync validation: ensure servers and devices show NTP sync and timestamps align across sources.
  • Log completeness and integrity: check for gaps, truncation, rotation issues, and validate log integrity where hashing/append-only storage is used.
  • Event quality review: confirm events include required fields (user ID, timestamp, source IP, event ID, success/failure, process/accountable service).
  • Noise reduction and tuning: identify high volume benign events and adjust filters or thresholds to reduce alert fatigue.
  • Parsing and enrichment checks: ensure SIEM/ELK/Kibana/Splunk field extractions still map correctly after updates.
  • Actionable alerts verification: review top alerts of the week, determine false positives, and update detection logic.
  • Retention and archival: verify that retention policy is being followed and archived logs are accessible.

Technical steps and example commands

Include concrete checks in the checklist so a technician can execute and record results. Examples:

  • Linux host checks:
    • Audit daemon status: systemctl status auditd
    • Verify audit rules: auditctl -l (or cat /etc/audit/audit.rules)
    • Search recent events: ausearch -ts week-ago -m USER_LOGIN,SYSCALL | aureport -ts week-ago
    • Journal logs: journalctl --since "7 days ago" --no-pager --output short-iso | head -n 200
  • Windows checks:
    • Confirm event forwarding: Get-WinEvent -MaxEvents 10 -FilterHashtable @{LogName='Security'}
    • Check audit policy: auditpol /get /category:*
    • Sample query in Splunk/Search: index=wineventlog OR index=security sourcetype=WinEventLog* earliest=-7d | stats count by EventCode, Account_Name
  • Cloud examples:
    • AWS CloudTrail: verify trails are multi-region and recent events exist: aws cloudtrail lookup-events --start-time "$(date -I -d '7 days ago')"
    • Azure Monitor: run a KQL query for the last 7 days to confirm resource logs are present.
  • Network devices: check syslog ingestion counts and last received timestamp from routers/firewalls; verify that VPN and firewall device clocks match NTP.

Small-business scenario: a 50-user cloud + on-prem hybrid

Example: a 50-user contractor runs Active Directory on one VM, 6 Linux application servers, cloud-hosted email (Office365), an AWS account for dev, and a Palo Alto firewall. Their weekly checklist would include: verify AD domain controllers are sending Security logs via Winlogbeat to ELK; confirm CloudTrail events exist for AWS management operations; ensure Palo Alto log forwarding has no backlog on the firewall; check Office365 audit log retention via the Security & Compliance Center; validate that your ELK ingest pipeline parsed authentication events and user principal names correctly; and review top 10 authentication failures to identify potential brute-force attempts. For each failing item, open a ticket (e.g., in Jira) with remediation steps and expected resolution timeframe.

Roles, scheduling, and documentation

Assign specific responsibilities: SOC analyst or IT admin runs the checklist, an IT manager approves changes, and a compliance owner signs off weekly. Automate as much as possible: scheduled SIEM health dashboards, NTP alerts, and ingestion rate checks can generate a pre-populated report so the analyst focuses on anomalies. Record results in a weekly audit log (timestamped checklist with pass/fail and remediation tickets). Retain these weekly records to demonstrate ongoing compliance during assessments—mapping each checklist item to AU.L2-3.3.3 evidence makes assessments faster and auditable.

Risks of not implementing a weekly event review

Without a regular review and update process you risk extended blind spots: misconfigured or failed collection points, clock drift that wrecks event correlation, stale parsers that miss new event formats, and alert fatigue from noisy baseline events. For organizations handling Controlled Unclassified Information (CUI), these blind spots can lead to undetected exfiltration, insider misuse, and failed compliance audits that jeopardize contracts. Operational consequences include longer mean-time-to-detection (MTTD) and higher incident response cost.

Compliance tips and best practices

Practical tips: start with a short, repeatable checklist and automate status collection; tag every checklist line to a NIST control and evidence location; keep sample queries and remediation playbooks in a runbook; use immutable storage or WORM for critical logs where possible; keep at least 90 days of searchable logs online and longer-term archived copies offline or in cold storage if contractually required; and review your checklist whenever you deploy new services or major patches. Use thresholds to flag sudden drops in event volume and maintain a weekly "tune and update" item where the team refines rules and false positives.

Summary: Implementing a concise weekly audit checklist mapped to AU.L2-3.3.3 ensures your logged events remain complete, accurate, and actionable—reducing risk, improving detection, and producing auditable evidence for NIST SP 800-171 / CMMC 2.0 Level 2 assessments; start small, automate data collection, document every exception, and iterate the checklist as your environment changes.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes