🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.9

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.9

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.9 – Limit management of audit logging functionality to a subset of privileged users.

Understanding the Requirement

This control from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 requires that only a clearly defined subset of privileged users can manage audit logging. In practice you must identify who is allowed to configure, delete, or otherwise manage logging systems and then enforce separation of duties so system administrators who perform general admin tasks cannot alter or remove audit records. The objectives are to define the allowed subset of users and ensure that only those users can manage audit logging to prevent tampering or accidental loss of audit evidence.

Technical Implementation

  • Define roles and document responsibilities: Create a written role definition that separates "System Administrator" duties (user creation, software installation, password resets) from "Audit Log Manager" duties (SIEM/syslog configuration, log retention, log integrity). Keep the list of authorized audit managers in your access-control policy and review it quarterly.
  • Use role-based access controls (RBAC) and least privilege: Configure your SIEM, syslog server, and log collectors with distinct roles (e.g., Log Viewer, Log Manager, Log Config). Grant the Log Manager role only to the subset defined above; give system admins only the roles they need for their operational tasks and avoid granting them Log Manager permissions.
  • Enforce privileged access controls and just-in-time elevation: Deploy a lightweight Privileged Access Management (PAM) or just-in-time (JIT) workflow for any temporary access to logging systems. Require change tickets, manager approval, and session recording when a system admin needs temporary access to the syslog/SIEM for troubleshooting.
  • Harden and isolate logging infrastructure: Place your syslog server and SIEM behind separate network segments or firewalls and restrict management access to a jump host controlled by the Audit Log Manager group. Use multi-factor authentication (MFA) and IP allow-lists for management interfaces.
  • Protect logs from alteration: Enable write-once/immutable storage, WORM or append-only settings where available. Configure integrity checks (hashing) and send copies of critical logs to a hardened, off-site repository to prevent a local admin from deleting all evidence.
  • Monitor and alert on administrative actions: Configure alerts for log configuration changes, deletion attempts, or when new users are added to log-management roles. Retain audit trails of who changed logging configurations and review them as part of routine security operations.

Example in a Small or Medium Business

Acme Tech is a 45-person company with one full-time system administrator who maintains servers, endpoints, and the network. To meet AU.L2-3.3.9 they designate two employees—one from IT security and one from compliance—as the only Audit Log Managers and document their responsibilities. The sysadmin retains day-to-day operational roles but has no credentials for the SIEM's log-management account; instead, the sysadmin has a separate account for patching and configuration. When a firewall upgrade requires temporary access to the syslog server, the sysadmin requests time-limited access through the ticketing system, the Audit Log Manager approves, and the session is proxied through a jump server with session recording. The company stores logs in an immutable cloud bucket and configures the SIEM to forward a copy of key logs to an off-site archival service so a local deletion cannot remove all copies. Alerts are configured to notify the security lead when any change to log retention or log-forwarding settings occurs, and monthly reviews of the log-management user list are documented. These steps ensure the administrator can do their job but cannot delete or alter audit records without oversight and traceability.

Summary

By defining a limited set of Audit Log Managers, enforcing RBAC and least privilege, isolating and hardening logging infrastructure, using JIT/PAM for temporary access, protecting logs with immutable storage, and monitoring changes to logging configurations, SMBs can meet AU.L2-3.3.9. The combination of clear policy, technical controls, and documented temporary-access workflows prevents system administrators from unilaterally modifying or deleting audit logs while keeping operational efficiency intact.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes