CM.L2-3.4.5 requires organizations to monitor, log, and audit changes to access permissions so that unauthorized privilege escalations and inappropriate access assignments are detected, investigated, and remediated; this post gives practical implementation steps, tools, metrics, and audit-evidence examples tailored for organizations following the Compliance Framework and pursuing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance.
What CM.L2-3.4.5 means in practice
This control expects you to instrument your environment so that all access change events (role grants, group membership changes, privilege escalations, account creations/deletions, and policy modifications) are recorded, monitored for anomalous patterns, and retained as auditable evidence. For Compliance Framework implementations this typically means mapping the control to system-level logging (OS, directory, cloud IAM), centralizing logs into a SIEM or log store, defining alerting thresholds and review processes, and keeping an evidence trail that links logged events to approvals and change tickets.
Practical implementation steps (step-by-step)
Start by inventorying all identity sources (Active Directory, Azure AD, Okta, G Suite, AWS IAM, local Linux/Unix accounts, and service accounts). Define the event types to collect: create/modify/delete user, group membership changes, role assignments, policy updates, privilege elevation (e.g., addition to Domain Admins), and login failures/successes tied to changes. Next, centralize logs: forward Windows Event Logs (Security channel), Linux auditd outputs, cloud audit logs (CloudTrail, Azure Activity Logs, GCP Audit Logs), and SaaS audit exports to a single SIEM or secure log store (Elastic/ELK, Splunk, Azure Sentinel, or managed solutions). Finally, implement alerting, playbooks, and periodic attestation/review workflows that tie log events to tickets and approvals.
Concrete configuration examples
On Windows: enable Advanced Audit Policy settings—User Account Management and Directory Service Changes—and forward Security logs to your SIEM. Example: AuditPol.exe /set /subcategory:"User Account Management" /success:enable /failure:enable. On Linux: use auditd rules such as auditctl -w /etc/group -p wa -k group_changes and auditctl -w /etc/sudoers -p wa -k sudo_changes to capture membership and sudo policy edits. In AWS: enable multi-region CloudTrail to an S3 bucket with object lock/immutability, configure CloudTrail to deliver events to CloudWatch Logs, and create CloudWatch or GuardDuty alerts for “AddUserToGroup” and “AttachRolePolicy” events.
Tools and architectures that small businesses can afford
Small businesses can meet the control without enterprise budgets by using native cloud logging plus open-source or low-cost tooling. Examples: enable Azure AD and Office 365 audit logs and ship to Microsoft Sentinel (Pay-As-You-Go), or forward AWS CloudTrail to an S3 bucket and use Amazon Athena/QuickSight for queries; use the Elastic Stack (Elasticsearch + Logstash + Kibana) on a small VM or use Elastic Cloud; or use managed SIEMs like Sumo Logic or LogRhythm Cloud. For local infrastructure, combine Windows Event Forwarding (WEF) to a collector and rsyslog/auditd shipping to a central Linux host. Ensure the log store is protected (access control, encryption at rest, and write-once storage where required).
Metrics, alerts, and what to monitor
Define measurable metrics that demonstrate control effectiveness: number of access-change events per period, mean time to detect (MTTD) access-change anomalies, mean time to remediate (MTTR) unauthorized changes, percent of access changes with an associated approved change ticket, and count of privileged role additions. Implement alerts for critical events such as: addition of an account to an administrative group, creation of a new privileged role binding, mass group membership changes, service account key creation, or changes to IAM policies granting wildcards. Tune thresholds to reduce noise—e.g., require alert if >2 admin role additions in 24 hours or if a single user is added to admin roles outside normal business hours.
Evidence and artifacts to produce for auditors
Auditors will expect an evidence package demonstrating continuous logging, monitoring, and review. Provide: exported log snippets showing the time-stamped event (with hashes, if possible), the SIEM alert and associated incident ticket, linked change-request/approval forms (Jira/ServiceNow/printed), screenshots of audit dashboards, copies of retention and log-handling policies, and periodic access review attestations signed by resource owners. For cloud systems, include CloudTrail/Activity Log exports and S3 object-lock configuration or bucket policy snapshots. Maintain a control traceability matrix mapping CM.L2-3.4.5 to the log sources and standard operating procedures (SOPs).
Real-world small-business scenarios and examples
Scenario A: a 30-employee SaaS vendor using Azure AD and AWS. Implementation: Azure AD audit logs forwarded to Sentinel, CloudTrail enabled with CloudWatch alerts for IAM changes, and a lightweight Elastic instance for on-premises firewall and VPN logs. When an employee is promoted, the HR system triggers a deprovisioning workflow that creates a ServiceNow ticket; the SIEM correlates the ticket with the role-change event and requires manager attestation within 48 hours. Scenario B: a small defense contractor uses on-prem AD—Windows events are forwarded via WEF, scripted monthly reports export group membership change logs into a compliance binder, and critical events auto-open an issue in Jira for immediate review.
Risks of not implementing CM.L2-3.4.5
Not instrumenting or auditing access changes increases risk of undetected privilege escalation, persistent insider threat, and unauthorized exfiltration of CUI (Controlled Unclassified Information). From a compliance perspective, failure to provide logs and review evidence will likely result in audit findings, loss of DoD contracts, remediation orders, and reputational damage. Operationally, poor logging leads to slow incident response—without a trail you cannot trace how an attacker gained or elevated access.
In summary, meeting CM.L2-3.4.5 requires a clear inventory of identity sources, centralized and immutable logging of access change events, tuned detection and alerting, documented review and approval workflows, and packaged evidence for auditors. Small businesses can implement these affordably by leveraging native cloud audit features, basic SIEM setups, OS-level auditing, and disciplined change-ticketing processes—ensuring both security and compliance for CUI-handling environments.