Time
Reading Time
10 min read
Time
Chat
2 Comments

Audit and Accountability Domain

The Audit and Accountability (AU) domain is the "black box flight recorder" of your system. It provides evidence that things are going right and forensics when something goes wrong. The AU controls focus on tracking user and system activity. It requires your organization to decide what events are important enough to record. A policy should define log creation, logging protections, and log reviews.

Implementing these controls turns your network into a monitored environment. When users know the system records their actions, they are less likely to break the rules. Individual accountability means you can tie a specific action to a specific person. Logs can also reveal system errors before they crash your entire network. Several regulatory requirements mandate organizations to keep logs. These controls ensure you meet relevant legal standards and support incident response capabilities.

Policy Writing

Domain level policies address the controls implemented within systems and organizations. Policies are the perfect home to define control parameters, such as frequencies. Procedures describe the implementation of policies or controls. Organizations may document procedures within the system security plan or within separate documents. Here are some of the principles that guided this audit and accountability policy:

  • Restating controls does not constitute an organizational policy or procedure.
  • Policies should omit references to specific technologies.
  • Address procedures to the individual or role performing the task.
  • Use plain language when writing procedures and avoid technical jargon.

Policy Structure 

A cover page tracks specific details regarding the policy, including:

  • Version - number capturing major and minor policy revisions
  • Effective Date - date of policy dissemination
  • Last Review Date - date the policy was last reviewed
  • Next Scheduled Review Date - the date for the next mandatory policy evaluation
  • Classification - internal categorization of the policy’s sensitivity for confidentiality

NIST SP 800-53 defines specific objectives for domain-level policies. From this guidance we incorporate the following major sections into our policy:

The purpose statement should identify why the policy exists and what it aims to achieve. 

The scope should identify who it applies to and under what circumstances.

The policy governance section covers most of the organization defined parameters. These subsections cover the following details:

  • Policy Dissemination List - defines roles or personnel to disseminate the policy
  • Procedure Dissemination List - defines roles or personnel to disseminate the procedures
  • Policy Level - organization-level; mission/business process-level; system-level
  • Policy Owner - defines an official to management the policy and supporting procedures
  • Policy Review Frequency - how often the organization reviews and updates the policy
  • Policy Review Triggers - events that require an out-of-cycle policy review or update
  • Procedure Review Frequency - how often the organization reviews and updates the procedures
  • Procedure Review Triggers - events that require an out-of-cycle procedure review or update

The fourth section includes our policy statements. Subsection headings group related Policy statements together. Each policy statement has a unique number for traceability to other documents. A policy statement number consists of the section, subsection, and policy statement order.

The fifth section identifies the relevant roles and responsibilities identified in the policy. A single, short paragraph describes the responsibilities for each role. The sixth section identifies the supporting procedures. We opted to align our subsection headings with the names of supporting procedures. The seventh section identifies related documents, to include relevant policies. The eighth section documents a revision history. This table captures policy changes, including: version, effective date, approver(s), change summaries. The ninth section captures a formal authorization of the policy by the policy owner.

Policy Statements

NIST identified a named set of procedures for each practice within NIST SP 800-171. The assessment guide (SP 800-171A) contains the original mappings. The CMMC assessment guides include this mapping as well. The potential assessment methods and objects section contains a subsection called examine. Within each practice, NIST identified relevant policies, procedures and other artifacts. We used the relevant procedures to organize the section headings within each policy.

Image Source: CMMC Assessment Guide Level 2

Auditable Events

This section requires systems that handle sensitive data to record important security events. These events include logins and attempts, system setting changes, and privileged user actions. Systems must send logs in real-time to a central monitoring server. Log entries must show who took the action, the device used, when it happened, and whether the action worked. Staff must review logging settings once a year or after major system changes.

CMMC Objectives Covered in This Section:

  • (1) objective from AC.L2-3.1.7
  • (4) objectives from AU.L2-3.3.1
  • (2) objectives from AU.L2-3.3.2
  • (3) objectives from AU.L2-3.3.3

Response to Audit Logging Failures

Active monitoring requires systems to alert the right people if logging processes fail. This section defines these triggers for alerts and automated actions. Triggers may include full storage or loss of connectivity to a data source. In our policy, if the storage space runs, the system will notify the team and overwrite the oldest data. This ensures the system keeps running while protecting the most recent information. This approach falls in line with the moderate baseline of NIST SP 800-53. Less tolerant organizations may opt to shut the system down when audit storage is full.

CMMC Objectives Covered in This Section: 

  • (3) objectives from AU.L2-3.3.3
  • (2) objectives from AU.L2-3.3.4

Audit Record Review

Designated staff must check audit records for sensitive systems at least once a week. They should look for patterns of suspicious behavior across the whole network. If a system cannot send its logs to the central server, staff must check those logs by hand at least once a month. Anything strange must report it to the Incident Response Team right away. These experts will then compare the data with other events to see if a real attack is happening. Any sign of illegal or unauthorized activity must trigger a formal investigation immediately.

CMMC Objectives Covered in This Section:

  • (2) objectives from AU.L2-3.3.5

Audit Record Reduction and Report Generation

A central log server must filter and link records to find possible cyber attacks. This turns massive amounts of data into useful information by spotting suspicious patterns. To help staff focus on important events, the system must hide unneeded or repetitive data. Additionally, the system must allow staff to create custom reports on demand. These reports should let investigators search for specific times, events, or actions.

CMMC Objectives Covered in This Section:

  • (1) objective from AU.L2-3.3.5
  • (2) objectives from AU.L2-3.3.6

Protection of Audit Information

The central log server must be separate from the systems it watches. This prevents a hacker who breaks into one system from changing the audit record. Only a small group of  administrators have the power to manage the logging settings or data. Other users with review accounts can only look at the logs and add notes.  They cannot change or delete anything. Systems that cannot send data to the central server must keep records for 180 days. These systems must also limit log access to authorized administrators only.

CMMC Objectives Covered in This Section:

  • (2) objectives from AU.L2-3.3.1
  • (6) objectives from AU.L2-3.3.8
  • (2) objectives from AU.L2-3.3.9

Audit Record Retention

You must keep audit records for at least one year to support investigations and meet legal rules. Systems that cannot send logs to the central server must store them for at least 180 days.

CMMC Objectives Covered in This Section:

  • (2) objectives from AU.L2-3.3.1

Time Synchronization

All information systems must sync their clocks to a central internal time service. Systems use this shared time to create accurate timestamps for every audit record. The internal service should pull from at least two reliable outside sources. This ensures the system stays on time even if one source fails.

CMMC Objectives Covered in This Section:

  • (3) objectives from AU.L2-3.3.7

Syncing Policies with System Security Plan

FedRAMP guidance on how to write a control implementation statement states the following:

  • Implementation statements should reference supporting policies and procedures.
  • If a document is long, point to the exact sections that matter instead of the whole thing.
  • Write summaries so that reviewers don't have to go look up other documents.

Write your policies before you start drafting your security plan. K2 GRC shows you exactly how each part of your policy connects to your security goals. 

Image Source: K2 GRC

The input screen shows the specific policy rule and its ID number. This identifies relevant policy statements when writing your system security plan implementation statements. The system then adds your work to the final security plan template.

Conclusion

Protecting your organization’s data is about more than checking a box for compliance. It is about having the peace of mind knowing exactly what is happening inside your network. Without a clear Audit and Accountability policy, you are flying blind. If a breach happens, you could lose data and the trust of your clients. Don't let the stress of complex CMMC requirements keep you up at night. You deserve to feel confident and prepared. Jump start your readiness using the CMMC Audit and Accountability Policy template. This resource turns technical jargon into a clear, actionable road map for your team. Download our policy template today and build the "black box" your organization needs.

Tag :

Related Posts

Implementing 3.1.2 from NIST SP 800-171 Rev 2

Aug 22, 2024
If 3.1.1 authorizes access to the system, 3.1.2 authorizes permissions within the system. The rules of chess, for example, limit the types of functions allowed for each piece...
Read More
10 min read

Implementing 3.1.22 from NIST SP 800-171 Rev 2

Aug 22, 2024
Organizations should prevent the release of nonpublic information on systems accessible to the public. Systems accessible to the public include websites and social media...
Read More
10 min read

Implementing 3.5.1 from NIST SP 800-171 Rev 2

Aug 22, 2024
Identifying accounts and devices is foundational to creating a secure and accountable system. Accounts may have assignments to people and non-person entities...
Read More
10 min read

Start your GRC journey today

Discover how K2 GRC can simplify compliance and enhance your organization's governance and risk management.