CMMC Practices

AU.L2-3.3.9  

Reference: CMMC 2.0

Family: AU

Level Introduced: 2

Title: Audit Management

Practice:
Limit management of audit logging functionality to a subset of privileged users.

CMMC Clarification:
Organizations should restrict access to audit logging functions to a limited number of privileged users that can modify audit logs and audit settings. There are three classes of users: general users, privileged users, and audit managers. General users should not be granted permissions to perform audit management. All audit managers should come from the set of privileged users, but only a small subset of privileged users will be given audit management responsibilities. Functions performed by privileged users must be distinctly separate from the functions performed by users who have audit-related responsibilities to reduce the potential of fraudulent activities by privileged users not being detected or reported.

Example
You are in charge of IT operations in your organization. You are responsible for the administration of the infrastructure, but you are not an audit manager and cannot review audit logs, delete audit logs, or modify audit log settings. Full control of audit logging functions has been given to the security auditors, and they are able to review logs and modify audit log settings. This separation of system administration duties from audit logging management is necessary to prevent possible log file tampering.

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

Source: CMMC v2.0