CMMC AU.3.050 - Limit Access to Log Management

CMMC AU.3.050 - Limit Access to Log Management

Requirement text: AU.3.050: Limit management of audit logging functionality to a subset of privileged
users.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
Individuals with privileged access to a system and who are also the subject of an audit by
that system, may affect the reliability of audit information by inhibiting audit logging
activities or modifying audit records. This requirement specifies that privileged access be
further defined between audit-related privileges and other privileges, thus limiting the users
with audit-related privileges.

CMMC CLARIFICATION
Organizations should restrict access to audit logging functions to a limited number of
privileged users that can modify audit logs and audit settings. There are three classes of
users: general users, privileged users, and audit managers. General users should not be
granted permissions to perform audit management. All audit managers should come from
the set of privileged users, but only a small subset of privileged users will be given audit
management responsibilities. Functions performed by privileged users must be distinctly
separate from the functions performed by users who have audit-related responsibilities to
reduce the potential of fraudulent activities by privileged users not being detected or
reported.

Example
You are in charge of IT operations in your organization. You are responsible for the
administration of the infrastructure, but you are not an audit manager and cannot review
audit logs, delete audit logs, or modify audit log settings. Full control of audit logging
functions has been given to the security auditors, and they are able to review logs and modify
audit log settings. This separation of system administration duties from audit logging
management is necessary to prevent possible log file tampering.

References
• NIST SP 800-171 Rev 1 3.3.9
• CERT RMM v1.2 MON:SG2.SP2
• NIST SP 800-53 Rev 4 AU-6(7), AU-9(4)
    • Related Articles

    • Access Control: SP 800-171 Security Family 3.1

      Access is the ability to make use of any system resource. Access control is the process of granting or denying requests to:       • use information,       • use information processing services, and       • enter company facilities.  System-based ...
    • CMMC AC.1.001 – Limit Information System Access

      Requirement text: AC.1.001: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Access control ...
    • CMMC AU.4.053 - Automate Log Analysis

      Requirement text: AU.4.053: Automate analysis of audit logs to identify and act on critical indicators (TTPs) and/or organizationally defined suspicious activity. DISCUSSION FROM SOURCE: CMMC Adversary activity typically leaves indications in audit ...
    • Configuration Management: SP 800-171 Security Family 3.4

      Configuration management is a collection of activities focused on establishing and maintaining the integrity of information technology products and systems through the control of processes for initializing, changing, and monitoring the configurations ...
    • CMMC PE.1.133 – Maintain Physical Access Log

      Requirement text:  PE.1.133: Maintain audit logs of physical access. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals ...