CMMC Practice Requirement:

Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

CMMC Requirement Explanation:

You can technically meet this control by manually reviewing audit logs generated by your systems however using a SIEM is much more practical. A SIEM can help you quickly review, analyze, and create reports on events occuring throughout your system. This allows you to identify unlawful, unauthorized, or suspicious activity.

Example CMMC Implementation:

Use your security information and event management (SIEM) system to analyze logs collected across your systems to help identify unauthorized activity.

Scenario(s):

- Scenario 1:

One of your employee's accounts was taken over by an attacker. You disable the account to prevent the attacker from causing further damage. Using your SIEM, you review audit logs from various systems and are able to determine other systems the attacker was able to access with the compromised account.
 

Discover Our NIST SP 800-171 Solutions:

 /assets/images/compliance_accelerator_white.png

Compliance Accelerator

For contractors seeking compliance
 /assets/images/quantum_assessor_white.png

Quantum Assessor

For IT service providers
 /assets/images/supply_chain_logo_white.png

Supply Chain Verifier

For contractors seeking to verify partner compliance