CMMC AU.5.055 - Assure Appropriate Logging

CMMC AU.5.055 - Assure Appropriate Logging

Requirement text: AU.5.055: Identify assets not reporting audit logs and assure appropriate
organizationally defined systems are logging.

DISCUSSION FROM SOURCE: CMMC
Practice AU.2.042 required the creation and retention of audit logs. Audit logs are essential
to cybersecurity awareness and incident response. This practice requires organizations to
proactively determine if any assets that should be creating audit logs are not generating the
required logs.

CMMC CLARIFICATION
Robust audit logging is critical in defending against cyber attacks and preventing future
attacks since logs are a common starting point for incident response and a core element in
post-attack cyber forensics. A cyber attacker may try to disrupt logging at the start of an
attack, making the absence of audit logging an initial indicator of a potential attack. Even if
the audit logging failure occurred from benign causes, restoring the logging is needed to
maintain a secure posture.

Identifying assets that are reporting logs and comparing against the inventory of assets
expected to provide audit logs provides the set of assets for which audit remediation is
needed. It is important that the logging requirements for each asset, which may include
many logs to be collected, are documented and compared to the set of received logs. Any
discrepancies will start an investigation and remediation process.

Example
You are working your shift in the security operations center (SOC) when one of your hourly
scanning scripts indicates that a data server is not providing logs to the central log
collection server. The data server is on the list of assets for which a log is required. You
send a notification to the administrator for the server to investigate and turn logging on,
and copy the company threat hunting team as well.

References
• CMMC
• CIS Controls v7.1 6.2
• NIST SP 800-53 Rev 4 AU-12
    • Related Articles

    • CMMC AU.3.046 - Alert Logging Failures

      Requirement text: AU.3.046: Alert in the event of an audit logging process failure. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Audit logging process failures include software and hardware errors, failures in the audit record capturing ...
    • CMMC AU.2.042 - Retain System Audit Logs

      Requirement text: AU.2.042: Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity. DISCUSSION FROM SOURCE: DRAFT NIST SP ...
    • CMMC AU.3.048 - Centralize Audit Information

      Requirement text: AU.3.048: Collect audit information (e.g., logs) into one or more central repositories. DISCUSSION FROM SOURCE: CMMC Aggregate and store audit logs in a central location. Central repositories enable analysis by storing audit record ...
    • CMMC AU.2.041 - Ensure System User Attribution

      Requirement text: AU.2.041: Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 This requirement ensures that the ...
    • CMMC AU.3.045 - Review Logged Events

      Requirement text: AU.3.045: Review and update logged events. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Periodically re-evaluate which events are logged and which events should be added, modified, or deleted. The event types that are logged by ...