🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to create and retain system audit logs to meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AU.L2-3.3.1: A practical implementation checklist

A practical, step‑by‑step checklist for small organizations to create, protect, centralize, and retain system audit logs to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AU.L2-3.3.1).

April 19, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 control AU.L2-3.3.1 requires organizations to create and retain system audit logs sufficient to support after-action reviews, incident investigations, and forensic analysis — a requirement that, for small businesses, translates into practical decisions around what to log, how to protect logs, where to store them, and how long to keep them.

What AU.L2-3.3.1 requires (practical interpretation for Compliance Framework)

This control does not simply mean “turn on logging”; it means instrument systems so you capture relevant events, ensure logs are protected and tamper-evident, centralize and index logs for efficient access, and retain them for a period that supports incident response and investigations. Within the Compliance Framework scope, focus on (a) identifying critical systems and events, (b) producing reliable audit records, (c) protecting log integrity and confidentiality, and (d) establishing retention and access controls aligned to business and contractual requirements.

Practical implementation checklist

1) Identify and prioritize log sources

Begin by creating an inventory of systems that process Controlled Unclassified Information (CUI) or are critical to operations: servers (Windows & Linux), firewalls, VPNs, identity providers (Azure AD, Okta), endpoints, cloud management APIs, application logs, and databases. For each system record the minimum event types required (e.g., authentication success/failure, privilege escalations, file access to sensitive directories, configuration changes, admin commands, network ACL changes). Prioritize logging for systems exposed to the internet and those storing or processing CUI.

2) Configure systems to generate authoritative logs

Use native and best-practice logging configurations: enable Windows Security Event Auditing + Sysmon for process and network details; enable auditd on Linux with rules for execve, file open on sensitive paths, and changes to /etc; enable CloudTrail for AWS API activity and Azure Activity Logs for subscription-level changes. Example auditd rule snippet to capture execs and writes to /etc: -a always,exit -F arch=b64 -S execve -k execs; -w /etc -p wa -k etc_changes. Document specific event IDs to capture and avoid noisy logs (too many informational events) that drown out signals.

3) Centralize, secure, and retain logs

Forward logs to a centralized collection and storage system (SIEM, log aggregator or cloud logs). For small businesses, managed services reduce operational burden: AWS CloudTrail → S3 bucket with server-side KMS encryption + lifecycle to Glacier; CloudWatch Logs with Log Insights; Azure Monitor with Log Analytics workspace. For on-prem or hybrid, use rsyslog/Fluentd/Vector to forward to a hardened ELK, Graylog, or Splunk instance. Protect storage with encryption at rest (KMS), strict IAM/ACLs, and network segmentation. Implement write-once/read-many (WORM) capabilities where legally required (S3 Object Lock, on-prem WORM appliances).

4) Ensure log integrity, time synchronization, and access controls

Apply tamper-evidence and chain-of-custody controls: sign or hash logs (SHA-256) as they are ingested, store hashes separately or in an append-only ledger. Use centralized timestamps and sync all hosts to a reliable NTP pool (chrony or ntpd); misaligned clocks undermine correlation and forensics. Restrict who can view or delete logs—use role-based access and multifactor authentication for administrative accounts. Enable immutable storage options when available and maintain an audit trail of who accessed logs.

5) Operationalize logs: monitoring, retention, and incident workflows

Define retention policies that satisfy contractual and investigative needs (recommendation: at minimum 90 days of readily searchable logs; 1 year encrypted archive; maintain longer if required by contracts or litigations). Implement automated alerts for key events (multiple failed logins, privilege escalations, unusual data exfil patterns). Integrate alerts into incident response playbooks so that analysts know which logs to collect, where to find them, and how long they will be available. Regularly test log collection and retention by performing tabletop exercises and verifying you can retrieve and read logs from archives.

Small-business examples and scenarios

Example A — Cloud-first 30-person contractor: Enable AWS CloudTrail and configure multi-region trails to an S3 bucket with server-side encryption (SSE-KMS), enable CloudTrail Insights for unusual API activity, set S3 Object Lock in compliance mode for critical trails, and set lifecycle rules: 90 days in S3 Standard for quick search, then transition to S3 Glacier Deep Archive for 2+ years. Example B — Small hybrid shop with 20 endpoints and on-prem server: deploy an open-source stack (Filebeat → Elasticsearch + Kibana) on a locked VM; enable Windows Event Forwarding from endpoints and rsyslog from Linux servers; store daily offsite encrypted backups of the ELK indices and hash them for integrity verification.

Compliance tips, best practices, and the risk of not implementing

Best practices: keep a logging baseline document, capture config-change events and privileged activity, automate evidence collection for audits, and use separation of duties for log administration. Don’t over-retain unsupported noisy logs—identify sentinel events and tune collection to save storage and reduce analyst fatigue. Risk if you fail: inability to prove what happened during an incident, failed CMMC/NIST assessments, potential contract loss for DoD contractors, increased time-to-detect and time-to-respond, and higher forensic costs. Attackers often try to erase or alter local logs; without centralized protected logging, you lose critical investigative data.

Summary

Meeting AU.L2-3.3.1 is achievable for small businesses with an inventory-driven approach: identify what to log, configure authoritative sources, centralize and protect logs (encryption, immutability, RBAC), keep clocks synchronized, implement searchable retention strategies, and integrate logs into incident response. Use managed cloud logging where possible to reduce operational load, document your logging architecture and retention policy in the Compliance Framework artifacts, and validate log availability through regular tests — these steps together provide the evidence auditors and investigators need while lowering your operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes