🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.2

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.2

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.2 – Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.

Understanding the Requirement

This control requires that your systems generate and retain audit records with enough detail to map each action back to a specific user account. Practically, that means defining what audit content you need (objectives: define required audit record content and ensure created records contain that content) and configuring systems to capture those fields. Typical audit fields include user IDs, timestamps, source and destination IP addresses, and the resource or command accessed. Collect logs from endpoints, servers, network devices, VPNs, and cloud services so investigations can reliably trace an event to the individual who performed it.

Technical Implementation

  • Define a standard audit record schema — document the minimum fields every log must include (e.g., unique user ID, timestamp in UTC, source IP, destination/resource, action type, and process or session identifier). Make this a central policy so all teams configure devices consistently.

  • Centralize log collection — forward logs from VPNs, firewalls, servers, workstations, cloud services, and critical applications to a central log collector or SIEM so you can correlate events across systems and perform user-centric queries.

  • Ensure user identity is authoritative — integrate authentication (AD, Azure AD, or a central IdP) with systems wherever possible so logs contain the canonical username rather than local or shared accounts. Where shared service accounts are necessary, require justification and additional controls (e.g., break-glass logging and separate accountability tagging).

  • Synchronize time and protect log integrity — implement NTP across systems so timestamps align, and secure logs in transit and at rest (TLS for forwarding, role-based access to log stores, write-once or append-only storage where feasible) to prevent tampering.

  • Set retention and review processes — keep logs long enough to support investigations (follow contract or regulatory requirements), and schedule regular reviews and automated alerts for suspicious behaviors that require follow-up. Maintain an audit trail of who reviewed or exported logs.

  • Assign responsibilities and training — involve system/network admins, security personnel, and those with audit/accountability duties to implement and test logging. Document procedures for log collection, user-mapping, and incident investigation so staff can act quickly when tracing is required.

Example in a Small or Medium Business

AcmeTech, a 120-person engineering firm, needs to ensure they can trace actions to individual users after adopting several cloud services and a remote workforce. The IT lead defines a log schema requiring username, timestamp (UTC), source IP, destination resource, and action type. They integrate the office network, VPN, cloud admin console, and critical servers with their SIEM, forwarding logs with TLS and using a central service account that tags events with the authenticated username from their Azure AD. Time is synchronized via a company NTP server so timestamps from cloud and on-prem systems align. They configure the VPN to log username, endpoint hostname, timestamp, and source IP so admins can map connections to employees. Retention is set to 90 days for high-value logs and 365 days for authentication records, with role-based access to the log store limited to security and audit staff. Monthly spot checks and a quarterly table-top exercise validate that a simulated incident can be traced from a firewall event through the SIEM to an individual user, and the procedures are updated when gaps appear.

Summary

By defining required audit content, centralizing log collection, ensuring authoritative user identities, securing timestamps and log integrity, and assigning clear responsibilities, SMBs can reliably map actions back to individual users. These combined policy and technical controls provide the traceability and accountability needed to investigate incidents, support compliance, and deter misuse of systems.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes