🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prepare Evidence and Audit Trails for a Successful NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.2 Assessment: Templates and Best Practices

Practical, step-by-step guidance and ready-to-use templates to collect, protect, and present physical access evidence and audit trails for a successful PE.L2-3.10.2 assessment under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small businesses and contractors can prepare robust evidence and audit trails to satisfy PE.L2-3.10.2-style assessments under compliance frameworks such as NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2—covering exactly what to collect, how to collect it securely, how to document chain-of-custody, and how to present evidence to an assessor so the control is demonstrably implemented.

What PE.L2-3.10.2 typically requires and what to gather

Although the control language varies slightly between frameworks, PE.L2-3.10.2 is focused on monitoring and recording physical access activities to areas that protect Controlled Unclassified Information (CUI). For assessment evidence, collect: access control system exports (badge/credential events), visitor logs, CCTV clips or metadata for relevant windows of time, access control configuration screenshots, policy and procedure documents detailing monitoring and retention, time-synchronization settings (NTP/Chrony), and any SIEM/aggregation rules that process those logs. Make sure each item is accompanied by metadata (time range, extraction method, and custodian).

How to create an evidence package (templates and structure)

Use an evidence index spreadsheet as the central manifest. Columns I recommend: Evidence ID, Control Reference (PE.L2-3.10.2), Source System (e.g., Kisi, Brivo, Honeywell), File Name/Path, Time Range, Export Command or UI Steps, Hash (SHA256), Retention Location (S3 bucket or secure file share), Custodian Name, Date Extracted, and Comments. Include a signed attestation from the IT/security manager that the extraction process is complete and unaltered. Example entry: EVID-001, PE.L2-3.10.2, Kisi, kisi-events-2026-03-01_03.csv, 2026-03-01 00:00—2026-03-01 23:59, Kisi UI Export > CSV, SHA256: abc123..., s3://company-evidence/2026/03/, Alice Jones, 2026-03-05, "Contains badge open events for secure area."

Practical extraction commands and technical details

Provide reproducible extraction commands or UI steps for each system. Examples small businesses can use: for Windows Security events (badge reader integration via Security logs) run PowerShell: Get-WinEvent -FilterHashtable @{LogName='Security'; StartTime='2026-03-01'; EndTime='2026-03-02'} | Where-Object { $_.Id -in 4624,4634 } | Export-Csv C:\evidence\win-log-20260301.csv -NoTypeInformation. For Linux-based door controllers that write syslog to /var/log/door.log, extract a day: awk '/2026-03-01/ && /badge/ {print}' /var/log/door.log > /tmp/door-20260301.log and then compute a SHA256: sha256sum /tmp/door-20260301.log > /tmp/door-20260301.log.sha256. For cloud-managed providers, use their API: curl -H "Authorization: Bearer $TOKEN" "https://api.kisi.com/v1/events?from=2026-03-01&to=2026-03-01" -o kisi-20260301.json. Include the exact API query in the evidence index so assessors can reproduce results.

Protecting the integrity of evidence — chain of custody and storage

Never hand over raw evidence without integrity controls. For each file: compute SHA256, record the hash in the evidence index, and then store the artifact in immutable or versioned storage. For small businesses, use S3 Object Lock (governance mode or compliance mode depending on policy) or an enterprise backup with WORM/immutable snapshots. Encrypt at rest with AES-256 and in transit with TLS 1.2/1.3. Maintain a minimal chain-of-custody form that lists the extractor, date/time, extraction commands, hash, where files were moved, and signatures (digital or printed) for each transfer. If physical media is used (e.g., USB drive with CCTV export), photograph the drive, label it, compute hashes of the files, and store the drive in a locked, access-controlled location.

Time synchronization and timestamp normalization

Assessors will check that timestamps are reliable. Document and export NTP/Chrony configuration for each device that produces physical access logs. Example: /etc/chrony.conf should point to reliable NTP pools (e.g., pool.ntp.org or an internal stratum-1). For mixed environments, include a normalization step (e.g., convert all timestamps to UTC in exports). Provide proof of NTP sync status: chronyc tracking output or w32tm /query /status output. If cameras store local timestamps in a different timezone, include conversion mapping and an explanation in your evidence index.

Real-world small business scenarios

Scenario A: A 20-person subcontractor uses Kisi for badge access and Ring cameras for entryways. Evidence package: Kisi daily CSV exports for the assessment period, Ring video clips for flagged events, a screenshot of Kisi access control list showing assigned roles, Chrony config from their Linux server acting as NTP, S3 upload with Object Lock enabled, and a signed attestation. Scenario B: A small defense supplier uses a hosted access control (Brivo) and an on-prem DVR. They export Brivo logs via API, export DVR footage for the timestamps identified in the badge logs, compute SHA256 sums for footage files, and store both in a locked Azure Blob with immutability policy. These examples show how cloud and on-prem pieces must be combined, time-normalized, and documented.

Compliance tips, common pitfalls, and the risk of not implementing this control

Tips: automate exports where possible, keep retention aligned with policy, keep an evidence index with reproducible extraction commands, and practice the assessor workflow before assessment day. Common pitfalls: missing timezone conversions, relying on screenshots without raw exports, no hash or chain-of-custody, and short retention periods that cause missing evidence. Risks of not implementing: inability to prove physical access controls for CUI areas, failed assessment, contract debarment or lost contracts, potential CUI compromise, and regulatory or contractual penalties. From an operational perspective, lack of logs also impedes incident response and increases detection time for unauthorized access.

Summary: Prepare a structured evidence package with an evidence index, reproducible extraction commands, cryptographic hashes, chain-of-custody records, and immutable storage; include NTP verification and normalization, and collect supporting policy and configuration screenshots. For small businesses, use managed services' APIs for exports, enforce retention via cloud immutability features, and practice the evidence handoff to an assessor. Doing these steps will materially increase the likelihood of passing a PE.L2-3.10.2 assessment and protect your organization from the operational and contractual risks of inadequate physical access auditing.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes