🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure SIEM and Reporting Pipelines to Correlate Audit Records for CMMC 2.0 Compliance — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.5

Practical, step-by-step guidance to configure SIEM and reporting pipelines that correlate audit records to meet CMMC 2.0 / NIST SP 800-171 Rev.2 AU.L2-3.3.5 requirements for small and mid-sized organizations.

April 13, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

AU.L2-3.3.5 of NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires organizations to correlate audit record review, analysis, and reporting across systems to detect and respond to events affecting Controlled Unclassified Information (CUI); this post provides a practical blueprint for configuring a SIEM and reporting pipeline that meets that requirement while remaining attainable for small businesses.

Overview: what the control requires and what to produce for auditors

The control expects you to aggregate audit data, correlate events across systems, produce actionable alerts and periodic reports, and retain evidence that review/analysis occurred. For Compliance Framework purposes, that means you must show (1) collection and normalization of relevant log sources, (2) correlation logic that links multi-source events, (3) documented incident triage and reporting artifacts, and (4) retention and access controls for audit records. Your evidence can include SIEM ingestion dashboards, correlation rules, alert logs, incident tickets, and scheduled compliance reports.

Key SIEM components and data sources to configure

Start by cataloging data sources that contain audit records tied to CUI: Windows Security Events (Logon/Logoff, Audit Policy changes, Privilege use), Linux auth and syslog, file server access logs (SMB/NFS), DLP/FIM events, Active Directory/LDAP events, identity provider logs (Okta, Azure AD), cloud audit logs (AWS CloudTrail, Azure Activity Logs), VPN/Firewall logs, and application logs that touch CUI. For each source define: log format (CEF, LEEF, JSON, EVT), required fields (timestamp, hostname, username, event_type, process, dst_ip), and expected volume. Small business tip: prioritize sources that directly interact with CUI (file servers, identity stores, remote access) and expand later.

Normalization, time-sync, and enrichment

Practical correlation depends on consistent timestamps and canonical field names. Enforce NTP on all endpoints and ingest logs with timezone-normalized timestamps (ISO 8601) in the SIEM. Configure ingest pipelines (Logstash, Fluentd, Elastic ingest pipelines, or native collectors) to map fields to a canonical schema: host, user, src_ip, dst_ip, event_id, event_category, file_path, process_name, and correlation_id. Enrich logs at ingest with asset metadata (owner, CUI tag, business unit) and identity metadata (role, privileged status). This makes queries performant and correlation rules reliable.

Designing correlation rules and reporting pipelines

Good correlation links related events across time and systems rather than relying on single-event thresholds. Build rules that combine identity events (failed/successful auth), host events (process creation, service changes), and data-access events (file reads, exports). Example correlation use case: "Multiple failed logins to a service account, followed within 5 minutes by a successful login and a large file transfer from a file server" — this should produce a high-priority alert. Implement detection logic in your SIEM (Splunk correlation searches, Elastic Rules, Azure Sentinel analytics). Example Splunk-ish correlation (conceptual): search for failed logins per user over 10 minutes | join with file-access events on host and user within 5 minutes | if file-volume > threshold raise alert.

Sample rule snippets and pipeline ideas

Concrete examples help. In Elastic SIEM create a rule that triggers when: (count(auth_failure) by user,source.ip in last 10m > 10) AND (exists file_read events by same user on same host within 5m). In Azure Sentinel KQL you might write: SecurityEvent | where EventID in (4625,4624) | summarize FailedLogons=countif(EventID==4625), SuccessLogons=countif(EventID==4624) by Account, bin(TimeGenerated, 5m) | join kind=inner (FileEvents | where ActionType == "FileRead") on Account, Computer. For small-business managed SIEMs, use built-in templates (Brute Force + Data Exfil templates) and customize thresholds to reduce false positives.

Real-world small-business scenarios and examples

Scenario 1 — Remote contractor accesses CUI: contractor authenticates via VPN (VPN log), then uses an RDP session (host auth event) to access a file share (SMB read). Correlation links the VPN, RDP, and SMB events and alerts when the contractor downloads >X MB outside business hours. Scenario 2 — Compromised service account: multiple failed AD logons from unusual IPs, followed by successful logon and creation of new scheduled tasks on several hosts. Correlation should surface the cross-host pattern quickly. For both, enrichment with the asset inventory (which hosts store CUI) lets you prioritize alerts that touch CUI.

Implementation checklist and operational steps

Step-by-step for a small org: 1) Define scope: list systems that process CUI. 2) Deploy collectors/agents for those systems and verify logs reach the SIEM. 3) Standardize timestamps/fields in an ingest pipeline and tag CUI-related assets. 4) Implement core correlation rules (authentication anomalies, lateral movement patterns, bulk file access). 5) Create scheduled compliance reports (weekly summary of correlated incidents, monthly audit log health) and a canned report template for auditors showing log sources, retention, and incident artifacts. 6) Document playbooks for triage and link each alert to a ticketing system so auditors can follow chain-of-evidence. 7) Test by running scenarios (simulated failed logins + file transfer) and record the detection timeline.

Risks, tuning, retention, and best practices

Risk of not implementing this control includes missed detection of exfiltration or insider threats, inability to produce correlated evidence during an audit or incident, and potential loss of DFARS/CUI contracts. Best practices: keep at least 90 days of high-fidelity logs on hot storage and archive 1+ year to cold storage depending on contract requirements; restrict log-access with RBAC and audit access to the SIEM; sign/ hash archived logs if chain-of-custody is necessary; integrate threat intelligence and UEBA gradually; instrument meaningful dashboards and a small set of high-quality alerts to avoid alert fatigue. Regularly review and tune correlation thresholds quarterly and after major environment changes.

In summary, meeting AU.L2-3.3.5 in a small-business context is primarily an engineering and process exercise: collect and normalize audit data, enrich with identity and asset context, implement multi-source correlation rules that map to CUI impact, and document your pipelines and incident artifacts for auditors. Start small (identity, file servers, remote access), automate enrichment and reporting, and iterate on detections — that combination delivers both compliance evidence and practical security improvements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes