Skip to content

3.1.7 — Log the Admin Work

Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.

This requirement has two parts, and you need both:

Part 1 — Prevention. Standard users are technically blocked from performing admin functions. Not by policy. By the system. A regular user tries to change a security setting and gets “Access Denied.”

Part 2 — Detection. Every time an admin function is performed, it’s logged with who did it, what they did, and when. If someone accidentally gets elevated privileges, your monitoring catches it.

The assessor will check both: that standard users can’t do admin things, and that when admin things do happen, there’s a record.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are privileged functions defined?Documented list of what counts as an admin action
2Are non-privileged users defined?You know who the standard users are
3Are standard users blocked from privileged functions?The system prevents it technically
4Are privileged function executions logged?Every admin action captured with who, what, when

Documents they’ll review: Access control policy, least privilege procedures, system security plan, list of privileged functions and user assignments, system configuration, audit logs showing privileged actions

People they’ll talk to: Personnel defining least privilege, security staff, system developers

Live demos they’ll ask for: “Log in as a standard user and try to run an admin command — show me the block. Now show me the audit log entry for the last admin action.”


These are the actual questions. Have answers ready.

  • “Can you identify who performed privileged functions at any particular time?”
  • “Are the privileged system functions documented?”
  • “Show me that a standard user is blocked from executing admin functions.”
  • “Show me audit logs capturing privileged function execution.”

No logging of admin actions. Privileged functions happen but there’s no audit trail. You need both prevention AND detection.

Local admin on workstations. Users have local admin rights, meaning they can execute privileged functions freely.

Logs exist but nobody reads them. Logging without monitoring is security theater. Someone has to review the logs.



RequirementWhy it matters here
3.1.5 — Minimum NecessaryThe foundational principle
3.1.6 — Two Hats, Two AccountsAdmins using standard accounts for everyday work
3.3.1 — Log EverythingCreating and retaining the audit logs

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: AC.L2-3.1.7 | SPRS Weight: 1 point | POA&M Eligible: Yes