Skip to content

3.3.1 — Log Everything

Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.

Three things must be in place, and all three are assessed independently:

  1. Define what to log. Not “turn on logging and hope for the best.” You need a documented list of event types: authentication events, privilege escalation, file access to CUI, configuration changes, account management, and system start/stop as a minimum. The assessor will ask to see this list.

  2. Generate the logs. Every CUI system — servers, workstations, network devices, cloud services — must actually produce audit records containing the defined content. At minimum each record needs: timestamp, source/destination, user or process ID, event description, success/fail, and affected resource. If a system can’t log what you’ve defined, that’s a finding.

  3. Retain the logs. Define a retention period and enforce it. Industry standard for DIB: 90 days hot (searchable in your SIEM), one year cold (immutable archive). The assessor will ask for your retention policy and then check whether logs from three months ago actually exist.

This is the foundation for the entire Audit & Accountability family. Without logging, 3.3.2 through 3.3.9 are all automatic failures.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Have you specified which event types to log?Documented list of auditable events — not just “everything” but specific categories tied to CUI system monitoring
2Have you defined the content audit records must contain?Field list: timestamp, user/process ID, source, destination, event description, success/fail, affected resource
3Are audit records actually being generated?Pull a live log from every CUI system — records exist and are current
4Do the generated records contain the defined content?Sample records contain all required fields — no missing timestamps, no blank user IDs
5Are retention requirements defined?Policy states hot and cold retention periods
6Are audit records retained as defined?Pull a log from six months ago — it exists and is searchable

Documents they’ll review: Audit and accountability policy; list of auditable event types; audit record content requirements; retention policy; system security plan; system configuration settings showing logging is enabled; sample audit records from each system type

People they’ll talk to: Personnel with audit and accountability responsibilities; information security personnel; system or network administrators; anyone who reviews or reports on audit logs

Live demos they’ll ask for: “Show me logging is enabled on this server.” “Pull a record from 90 days ago.” “Show me the retention settings in your SIEM.” “Generate an event and show me the resulting log entry.”


These are the actual questions. Have answers ready.

  • “What event types are you logging? Show me the documented list.”
  • “Show me a sample audit record — does it contain timestamps, user IDs, source addresses, and success/fail?”
  • “How long do you retain logs? Show me your retention policy.”
  • “Pull a log entry from three months ago — can you find it?”
  • “Is there any CUI system that doesn’t have logging enabled? How do you know?”
  • “What happens when a log reaches its retention limit — is it archived or deleted?”
  • “Are your retention requirements appropriate to the level of risk?”

Logging not on all systems. Workstations and servers are covered, but the firewall, VPN appliance, or cloud tenant isn’t forwarding logs. Every CUI system means every CUI system — including network devices and cloud services.

No documented event types. Logging is on but nobody defined what events matter. The assessor will ask to see the list. “We log everything” isn’t a policy — it’s a hope.

Retention too short. Logs rolling off after 30 days because nobody configured retention. An incident discovered after 45 days means you’ve lost the evidence. Define retention, test it, and prove old records still exist.

No centralization. Logs exist on individual servers but aren’t forwarded to a central location. When an attacker compromises a server, the first thing they’ll clear is the local logs. A SIEM or central log repository solves this — and makes 3.3.5 and 3.3.6 achievable.

Missing required fields. Logs exist but don’t contain all required content. Windows Security logs might have user and timestamp but no source IP. Check your records against your defined content requirements before the assessor does.



RequirementWhy it matters here
3.3.2 — Trace Every ActionThe records you create here must be traceable to individual users
3.3.5 — Connect the DotsCentralized logs from this requirement feed correlation analysis
3.3.7 — Sync the ClocksTimestamps in your records are only useful if clocks are synchronized
3.3.8 — Tamper-Proof LogsThe records you retain here must be protected from modification

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: AU.L2-3.3.1 | SPRS Weight: 5 points | POA&M Eligible: No