While examining a contractor's audit and accountability policy, you realize they have documented types of events to be logged and defined content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activities. After the logs are analyzed, the results are fed into a system that automatically generates audit records stored for 30 days. However, mechanisms implementing system audit logging are lacking after several tests because they produce audit logs that are too limited. You find that generated logs cannot be independently used to identify the event they resulted from because the defined content specified therein is too limited. Additionally, you realize the logs are retained for 24 hours before they are automatically deleted. Which of the following is a potential assessment method for AU.L2-3.3.1 -- System Auditing?
Comprehensive and Detailed In-Depth Explanatio n:
AU.L2-3.3.1 requires 'creating and retaining audit records with sufficient content.' Examining procedures (A) verifies if defined content meets requirements, addressing the scenario's deficiency (limited logs). Testing procedures (B) isn't standard, testing configs (C) is secondary, and examining mechanisms (D) isn't a method---testing them is. The CMMC guide lists procedural examination as key.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AU.L2-3.3.1: 'Examine procedures addressing audit record generation.'
NIST SP 800-171A, 3.3.1: 'Examine documented processes for content sufficiency.'
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_202112016_508.pdf
Hester
2 months agoElvera
2 months agoHailey
3 months agoTyisha
3 months agoOliva
3 months agoNadine
3 months agoLasandra
4 months agoDudley
4 months agoRoslyn
4 months agoKimberely
4 months agoCarman
4 months agoJanna
4 months agoDoug
5 months ago