Skip to content

Audit & Accountability

Audit & Accountability is about proof. When the assessor asks “who did what and when?” — your logs must answer.

Create and Retain (3.3.1–3.3.3) — Turn on logging across all CUI systems, define what to capture, keep logs long enough to investigate, and review your logging config as threats evolve.

Correlate and Report (3.3.4–3.3.7) — Alert when logging breaks, correlate across sources to spot attack patterns, search and report on demand, and synchronize clocks so timestamps are reliable.

Protect the Logs (3.3.8–3.3.9) — Make logs tamper-proof and limit who can configure the logging system itself.


RefShort NameWhat It Covers
3.3.1Log EverythingCreate and retain audit logs across all CUI systems
3.3.2Trace Every ActionEvery action ties to a named individual
3.3.3Review What You LogPeriodically review and update logging configuration
3.3.4Alert When Logging BreaksImmediate notification on logging failures
3.3.5Connect the DotsCorrelate logs from multiple sources
3.3.6Search and ReportOn-demand log search, filtering, and reporting
3.3.7Sync the ClocksNTP synchronization for consistent timestamps
3.3.8Tamper-Proof LogsProtect logs from modification and deletion
3.3.9Limit Who Manages LogsOnly designated personnel configure logging