| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Control Group | Control ID | Control Name | Control Definition | Assessment Objective ID | Assessment Objective Definition | NIST Reference (per CMMC L2 Assessment Guide) | FAR Clause Reference (per CMMC L2 Assessment Guide) | ||||||||||||||||||
2 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | a | Determine if authorized users are identified | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
3 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | b | Determine if processes acting on behalf of authorized users are identified | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
4 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | c | Determine if devices (and other systems) authorized to connect to the system are identified | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
5 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | d | Determine if system access is limited to authorized users | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
6 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | e | Determine if system access is limited to processes acting on behalf of authorized users | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
7 | Access Control | AC.L2-3.1.1 | Authorized Access Control [CUI Data] | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems) | f | Determine if system access is limited to authorized devices (including other systems) | NIST SP 800-171 Rev. 2 3.1.1 | FAR Clause 52.204-21 b.1.i | ||||||||||||||||||
8 | Access Control | AC.L2-3.1.2 | Transaction & Function Control | Limit system access to the types of transactions and functions that authorized users are permitted to execute | a | Determine if the types of transactions and functions that authorized users are permitted to execute are defined | NIST SP 800-171 Rev. 2 3.1.2 | FAR Clause 52.204-21 b.1.ii | ||||||||||||||||||
9 | Access Control | AC.L2-3.1.2 | Transaction & Function Control | Limit system access to the types of transactions and functions that authorized users are permitted to execute | b | Determine if system access is limited to the defined types of transactions and functions for authorized users | NIST SP 800-171 Rev. 2 3.1.2 | FAR Clause 52.204-21 b.1.ii | ||||||||||||||||||
10 | Access Control | AC.L2-3.1.3 | Control CUI Flow | Control the flow of CUI in accordance with approved authorizations | a | Determine if information flow control policies are defined | NIST SP 800-171 Rev. 2 3.1.3 | |||||||||||||||||||
11 | Access Control | AC.L2-3.1.3 | Control CUI Flow | Control the flow of CUI in accordance with approved authorizations | b | Determine if methods and enforcement mechanisms for controlling the flow of CUI are defined | NIST SP 800-171 Rev. 2 3.1.3 | |||||||||||||||||||
12 | Access Control | AC.L2-3.1.3 | Control CUI Flow | Control the flow of CUI in accordance with approved authorizations | c | Determine if designated sources and destinations (e.g., networks, individuals, and devices) for CUI within the system and between interconnected systems are identified | NIST SP 800-171 Rev. 2 3.1.3 | |||||||||||||||||||
13 | Access Control | AC.L2-3.1.3 | Control CUI Flow | Control the flow of CUI in accordance with approved authorizations | d | Determine if authorizations for controlling the flow of CUI are defined | NIST SP 800-171 Rev. 2 3.1.3 | |||||||||||||||||||
14 | Access Control | AC.L2-3.1.3 | Control CUI Flow | Control the flow of CUI in accordance with approved authorizations | e | Determine if approved authorizations for controlling the flow of CUI are enforced | NIST SP 800-171 Rev. 2 3.1.3 | |||||||||||||||||||
15 | Access Control | AC.L2-3.1.4 | Separation of Duties | Separate the duties of individuals to reduce the risk of malevolent activity without collusion | a | Determine if the duties of individuals requiring separation are defined | NIST SP 800-171 Rev. 2 3.1.4 | |||||||||||||||||||
16 | Access Control | AC.L2-3.1.4 | Separation of Duties | Separate the duties of individuals to reduce the risk of malevolent activity without collusion | b | Determine if responsibilities for duties that require separation are assigned to separate individuals | NIST SP 800-171 Rev. 2 3.1.4 | |||||||||||||||||||
17 | Access Control | AC.L2-3.1.4 | Separation of Duties | Separate the duties of individuals to reduce the risk of malevolent activity without collusion | c | Determine if access privileges that enable individuals to exercise the duties that require separation are granted to separate individuals | NIST SP 800-171 Rev. 2 3.1.4 | |||||||||||||||||||
18 | Access Control | AC.L2-3.1.5 | Least Privilege | Employ the principle of least privilege, including for specific security functions and privileged accounts | a | Determine if privileged accounts are identified | NIST SP 800-171 Rev. 2 3.1.5 | |||||||||||||||||||
19 | Access Control | AC.L2-3.1.5 | Least Privilege | Employ the principle of least privilege, including for specific security functions and privileged accounts | b | Determine if access to privileged accounts is authorized in accordance with the principle of least privilege | NIST SP 800-171 Rev. 2 3.1.5 | |||||||||||||||||||
20 | Access Control | AC.L2-3.1.5 | Least Privilege | Employ the principle of least privilege, including for specific security functions and privileged accounts | c | Determine if security functions are identified | NIST SP 800-171 Rev. 2 3.1.5 | |||||||||||||||||||
21 | Access Control | AC.L2-3.1.5 | Least Privilege | Employ the principle of least privilege, including for specific security functions and privileged accounts | d | Determine if access to security functions is authorized in accordance with the principle of least privilege | NIST SP 800-171 Rev. 2 3.1.5 | |||||||||||||||||||
22 | Access Control | AC.L2-3.1.6 | Non-Privileged Account Use | Use non-privileged accounts or roles when accessing nonsecurity functions | a | Determine if nonsecurity functions are identified | NIST SP 800-171 Rev. 2 3.1.6 | |||||||||||||||||||
23 | Access Control | AC.L2-3.1.6 | Non-Privileged Account Use | Use non-privileged accounts or roles when accessing nonsecurity functions | b | Determine if users are required to use non-privileged accounts or roles when accessing nonsecurity functions | NIST SP 800-171 Rev. 2 3.1.6 | |||||||||||||||||||
24 | Access Control | AC.L2-3.1.7 | Privileged Functions | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs | a | Determine if privileged functions are defined | NIST SP 800-171 Rev. 2 3.1.7 | |||||||||||||||||||
25 | Access Control | AC.L2-3.1.7 | Privileged Functions | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs | b | Determine if non-privileged users are defined | NIST SP 800-171 Rev. 2 3.1.7 | |||||||||||||||||||
26 | Access Control | AC.L2-3.1.7 | Privileged Functions | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs | c | Determine if non-privileged users are prevented from executing privileged functions | NIST SP 800-171 Rev. 2 3.1.7 | |||||||||||||||||||
27 | Access Control | AC.L2-3.1.7 | Privileged Functions | Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs | d | Determine if the execution of privileged functions is captured in audit logs | NIST SP 800-171 Rev. 2 3.1.7 | |||||||||||||||||||
28 | Access Control | AC.L2-3.1.8 | Unsuccessful Logon Attempts | Limit unsuccessful logon attempts | a | Determine if the means of limiting unsuccessful logon attempts is defined | NIST SP 800-171 Rev. 2 3.1.8 | |||||||||||||||||||
29 | Access Control | AC.L2-3.1.8 | Unsuccessful Logon Attempts | Limit unsuccessful logon attempts | b | Determine if the defined means of limiting unsuccessful logon attempts is implemented | NIST SP 800-171 Rev. 2 3.1.8 | |||||||||||||||||||
30 | Access Control | AC.L2-3.1.9 | Privacy & Security Notices | Provide privacy and security notices consistent with applicable CUI rules | a | Determine if privacy and security notices required by CUI-specified rules are identified, consistent, and associated with the specific CUI category | NIST SP 800-171 Rev. 2 3.1.9 | |||||||||||||||||||
31 | Access Control | AC.L2-3.1.9 | Privacy & Security Notices | Provide privacy and security notices consistent with applicable CUI rules | b | Determine if privacy and security notices are displayed | NIST SP 800-171 Rev. 2 3.1.9 | |||||||||||||||||||
32 | Access Control | AC.L2-3.1.10 | Session Lock | Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity | a | Determine if the period of inactivity after which the system initiates a session lock is defined | NIST SP 800-171 Rev. 2 3.1.10 | |||||||||||||||||||
33 | Access Control | AC.L2-3.1.10 | Session Lock | Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity | b | Determine if access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity | NIST SP 800-171 Rev. 2 3.1.10 | |||||||||||||||||||
34 | Access Control | AC.L2-3.1.10 | Session Lock | Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity | c | Determine if previously visible information is concealed via a pattern-hiding display after the defined period of inactivity | NIST SP 800-171 Rev. 2 3.1.10 | |||||||||||||||||||
35 | Access Control | AC.L2-3.1.11 | Session Termination | Terminate (automatically) a user session after a defined condition | a | Determine if conditions requiring a user session to terminate are defined | NIST SP 800-171 Rev. 2 3.1.11 | |||||||||||||||||||
36 | Access Control | AC.L2-3.1.11 | Session Termination | Terminate (automatically) a user session after a defined condition | b | Determine if a user session is automatically terminated after any of the defined conditions occur | NIST SP 800-171 Rev. 2 3.1.11 | |||||||||||||||||||
37 | Access Control | AC.L2-3.1.12 | Control Remote Access | Monitor and control remote access sessions | a | Determine if remote access sessions are permitted | NIST SP 800-171 Rev. 2 3.1.12 | |||||||||||||||||||
38 | Access Control | AC.L2-3.1.12 | Control Remote Access | Monitor and control remote access sessions | b | Determine if the types of permitted remote access are identified | NIST SP 800-171 Rev. 2 3.1.12 | |||||||||||||||||||
39 | Access Control | AC.L2-3.1.12 | Control Remote Access | Monitor and control remote access sessions | c | Determine if remote access sessions are controlled | NIST SP 800-171 Rev. 2 3.1.12 | |||||||||||||||||||
40 | Access Control | AC.L2-3.1.12 | Control Remote Access | Monitor and control remote access sessions | d | Determine if remote access sessions are monitored | NIST SP 800-171 Rev. 2 3.1.12 | |||||||||||||||||||
41 | Access Control | AC.L2-3.1.13 | Remote Access Confidentiality | Employ cryptographic mechanisms to protect the confidentiality of remote access sessions | a | Determine if cryptographic mechanisms to protect the confidentiality of remote access sessions are identified | NIST SP 800-171 Rev. 2 3.1.13 | |||||||||||||||||||
42 | Access Control | AC.L2-3.1.13 | Remote Access Confidentiality | Employ cryptographic mechanisms to protect the confidentiality of remote access sessions | b | Determine if cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented | NIST SP 800-171 Rev. 2 3.1.13 | |||||||||||||||||||
43 | Access Control | AC.L2-3.1.14 | Remote Access Routing | Route remote access via managed access control points | a | Determine if managed access control points are identified and implemented | NIST SP 800-171 Rev. 2 3.1.14 | |||||||||||||||||||
44 | Access Control | AC.L2-3.1.14 | Remote Access Routing | Route remote access via managed access control points | b | Determine if remote access is routed through managed network access control points | NIST SP 800-171 Rev. 2 3.1.14 | |||||||||||||||||||
45 | Access Control | AC.L2-3.1.15 | Privileged Remote Access | Authorize remote execution of privileged commands and remote access to security-relevant information | a | Determine if privileged commands authorized for remote execution are identified | NIST SP 800-171 Rev. 2 3.1.15 | |||||||||||||||||||
46 | Access Control | AC.L2-3.1.15 | Privileged Remote Access | Authorize remote execution of privileged commands and remote access to security-relevant information | b | Determine if security-relevant information authorized to be accessed remotely is identified | NIST SP 800-171 Rev. 2 3.1.15 | |||||||||||||||||||
47 | Access Control | AC.L2-3.1.15 | Privileged Remote Access | Authorize remote execution of privileged commands and remote access to security-relevant information | c | Determine if the execution of the identified privileged commands via remote access is authorized | NIST SP 800-171 Rev. 2 3.1.15 | |||||||||||||||||||
48 | Access Control | AC.L2-3.1.15 | Privileged Remote Access | Authorize remote execution of privileged commands and remote access to security-relevant information | d | Determine if access to the identified security-relevant information via remote access is authorized | NIST SP 800-171 Rev. 2 3.1.15 | |||||||||||||||||||
49 | Access Control | AC.L2-3.1.16 | Wireless Access Authorization | Authorize wireless access prior to allowing such connections | a | Determine if wireless access points are identified | NIST SP 800-171 Rev. 2 3.1.16 | |||||||||||||||||||
50 | Access Control | AC.L2-3.1.16 | Wireless Access Authorization | Authorize wireless access prior to allowing such connections | b | Determine if wireless access is authorized prior to allowing such connections | NIST SP 800-171 Rev. 2 3.1.16 | |||||||||||||||||||
51 | Access Control | AC.L2-3.1.17 | Wireless Access Protection | Protect wireless access using authentication and encryption | a | Determine if wireless access to the system is protected using authentication | NIST SP 800-171 Rev. 2 3.1.17 | |||||||||||||||||||
52 | Access Control | AC.L2-3.1.17 | Wireless Access Protection | Protect wireless access using authentication and encryption | b | Determine if wireless access to the system is protected using encryption | NIST SP 800-171 Rev. 2 3.1.17 | |||||||||||||||||||
53 | Access Control | AC.L2-3.1.18 | Mobile Device Connection | Control connection of mobile devices | a | Determine if mobile devices that process, store, or transmit CUI are identified | NIST SP 800-171 Rev. 2 3.1.18 | |||||||||||||||||||
54 | Access Control | AC.L2-3.1.18 | Mobile Device Connection | Control connection of mobile devices | b | Determine if mobile device connections are authorized | NIST SP 800-171 Rev. 2 3.1.18 | |||||||||||||||||||
55 | Access Control | AC.L2-3.1.18 | Mobile Device Connection | Control connection of mobile devices | c | Determine if mobile device connections are monitored and logged | NIST SP 800-171 Rev. 2 3.1.18 | |||||||||||||||||||
56 | Access Control | AC.L2-3.1.19 | Encrypt CUI on Mobile | Encrypt CUI on mobile devices and mobile computing platforms | a | Determine if mobile devices and mobile computing platforms that process, store, or transmit CUI are identified | NIST SP 800-171 Rev. 2 3.1.19 | |||||||||||||||||||
57 | Access Control | AC.L2-3.1.19 | Encrypt CUI on Mobile | Encrypt CUI on mobile devices and mobile computing platforms | b | Determine if encryption is employed to protect CUI on identified mobile devices and mobile computing platforms | NIST SP 800-171 Rev. 2 3.1.19 | |||||||||||||||||||
58 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | a | Determine if connections to external systems are identified | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
59 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | b | Determine if the use of external systems is identified | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
60 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | c | Determine if connections to external systems are verified | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
61 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | d | Determine if the use of external systems is verified | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
62 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | e | Determine if connections to external systems are controlled/limited | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
63 | Access Control | AC.L2-3.1.20 | External Connections [CUI Data] | Verify and control/limit connections to and use of external systems | f | Determine if the use of external systems is controlled/limited | NIST SP 800-171 Rev. 2 3.1.20 | FAR Clause 52.204-21 b.1.iii | ||||||||||||||||||
64 | Access Control | AC.L2-3.1.21 | Portable Storage Use | Limit use of portable storage devices on external systems | a | Determine if the use of portable storage devices containing CUI on external systems is identified and documented | NIST SP 800-171 Rev. 2 3.1.21 | |||||||||||||||||||
65 | Access Control | AC.L2-3.1.21 | Portable Storage Use | Limit use of portable storage devices on external systems | b | Determine if limits on the use of portable storage devices containing CUI on external systems are defined | NIST SP 800-171 Rev. 2 3.1.21 | |||||||||||||||||||
66 | Access Control | AC.L2-3.1.21 | Portable Storage Use | Limit use of portable storage devices on external systems | c | Determine if the use of portable storage devices containing CUI on external systems is limited as defined | NIST SP 800-171 Rev. 2 3.1.21 | |||||||||||||||||||
67 | Access Control | AC.L2-3.1.22 | Control Public Information [CUI Data] | Control CUI posted or processed on publicly accessible systems | a | Determine if individuals authorized to post or process information on publicly accessible systems are identified | NIST SP 800-171 Rev. 2 3.1.22 | FAR Clause 52.204-21 b.1.iv | ||||||||||||||||||
68 | Access Control | AC.L2-3.1.22 | Control Public Information [CUI Data] | Control CUI posted or processed on publicly accessible systems | b | Determine if procedures to ensure CUI is not posted or processed on publicly accessible systems are identified | NIST SP 800-171 Rev. 2 3.1.22 | FAR Clause 52.204-21 b.1.iv | ||||||||||||||||||
69 | Access Control | AC.L2-3.1.22 | Control Public Information [CUI Data] | Control CUI posted or processed on publicly accessible systems | c | Determine if a review process is in place prior to posting of any content to publicly accessible systems | NIST SP 800-171 Rev. 2 3.1.22 | FAR Clause 52.204-21 b.1.iv | ||||||||||||||||||
70 | Access Control | AC.L2-3.1.22 | Control Public Information [CUI Data] | Control CUI posted or processed on publicly accessible systems | d | Determine if content on publicly accessible systems is reviewed to ensure that it does not include CUI | NIST SP 800-171 Rev. 2 3.1.22 | FAR Clause 52.204-21 b.1.iv | ||||||||||||||||||
71 | Access Control | AC.L2-3.1.22 | Control Public Information [CUI Data] | Control CUI posted or processed on publicly accessible systems | e | Determine if mechanisms are in place to remove and address improper posting of CUI | NIST SP 800-171 Rev. 2 3.1.22 | FAR Clause 52.204-21 b.1.iv | ||||||||||||||||||
72 | Awareness and Training | AT.L2-3.2.1 | Role-Based Risk Awareness | Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems | a | Determine if security risks associated with organizational activities involving CUI are identified | NIST SP 800-171 Rev. 2 3.2.1 | |||||||||||||||||||
73 | Awareness and Training | AT.L2-3.2.1 | Role-Based Risk Awareness | Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems | b | Determine if policies, standards, and procedures related to the security of the system are identified | NIST SP 800-171 Rev. 2 3.2.1 | |||||||||||||||||||
74 | Awareness and Training | AT.L2-3.2.1 | Role-Based Risk Awareness | Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems | c | Determine if managers, systems administrators, and users of the system are made aware of the security risks associated with their activities | NIST SP 800-171 Rev. 2 3.2.1 | |||||||||||||||||||
75 | Awareness and Training | AT.L2-3.2.1 | Role-Based Risk Awareness | Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems | d | Determine if managers, systems administrators, and users of the system are made aware of the applicable policies, standards, and procedures related to the security of the system | NIST SP 800-171 Rev. 2 3.2.1 | |||||||||||||||||||
76 | Awareness and Training | AT.L2-3.2.2 | Role-Based Training | Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities | a | Determine if information security-related duties, roles, and responsibilities are defined | NIST SP 800-171 Rev. 2 3.2.2 | |||||||||||||||||||
77 | Awareness and Training | AT.L2-3.2.2 | Role-Based Training | Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities | b | Determine if information security-related duties, roles, and responsibilities are assigned to designated personnel | NIST SP 800-171 Rev. 2 3.2.2 | |||||||||||||||||||
78 | Awareness and Training | AT.L2-3.2.2 | Role-Based Training | Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities | c | Determine if personnel are adequately trained to carry out their assigned information security- related duties, roles, and responsibilities | NIST SP 800-171 Rev. 2 3.2.2 | |||||||||||||||||||
79 | Awareness and Training | AT.L2-3.2.3 | Insider Threat Awareness | Provide security awareness training on recognizing and reporting potential indicators of insider threat | a | Determine if potential indicators associated with insider threats are identified | NIST SP 800-171 Rev. 2 3.2.3 | |||||||||||||||||||
80 | Awareness and Training | AT.L2-3.2.3 | Insider Threat Awareness | Provide security awareness training on recognizing and reporting potential indicators of insider threat | b | Determine if security awareness training on recognizing and reporting potential indicators of insider threat is provided to managers and employees | NIST SP 800-171 Rev. 2 3.2.3 | |||||||||||||||||||
81 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | a | Determine if audit logs needed (i.e., event types to be logged) to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity are specified | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
82 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | b | Determine if the content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity is defined | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
83 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | c | Determine if audit records are created (generated) | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
84 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | d | Determine if audit records, once created, contain the defined content | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
85 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | e | Determine if retention requirements for audit records are defined | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
86 | Audit and Accountability | AU.L2-3.3.1 | System Auditing | Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity | f | Determine if audit records are retained as defined | NIST SP 800-171 Rev. 2 3.3.1 | |||||||||||||||||||
87 | Audit and Accountability | AU.L2-3.3.2 | User Accountability | Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions | a | Determine if the content of the audit records needed to support the ability to uniquely trace users to their actions is defined | NIST SP 800-171 Rev. 2 3.3.2 | |||||||||||||||||||
88 | Audit and Accountability | AU.L2-3.3.2 | User Accountability | Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions | b | Determine if audit records, once created, contain the defined content | NIST SP 800-171 Rev. 2 3.3.2 | |||||||||||||||||||
89 | Audit and Accountability | AU.L2-3.3.3 | Event Review | Review and update logged events | a | Determine if a process for determining when to review logged events is defined | NIST SP 800-171 Rev. 2 3.3.3 | |||||||||||||||||||
90 | Audit and Accountability | AU.L2-3.3.3 | Event Review | Review and update logged events | b | Determine if event types being logged are reviewed in accordance with the defined review process | NIST SP 800-171 Rev. 2 3.3.3 | |||||||||||||||||||
91 | Audit and Accountability | AU.L2-3.3.3 | Event Review | Review and update logged events | c | Determine if event types being logged are updated based on the review | NIST SP 800-171 Rev. 2 3.3.3 | |||||||||||||||||||
92 | Audit and Accountability | AU.L2-3.3.4 | Audit Failure Alerting | Alert in the event of an audit logging process failure | a | Determine if personnel or roles to be alerted in the event of an audit logging process failure are identified | NIST SP 800-171 Rev. 2 3.3.4 | |||||||||||||||||||
93 | Audit and Accountability | AU.L2-3.3.4 | Audit Failure Alerting | Alert in the event of an audit logging process failure | b | Determine if types of audit logging process failures for which alert will be generated are defined | NIST SP 800-171 Rev. 2 3.3.4 | |||||||||||||||||||
94 | Audit and Accountability | AU.L2-3.3.4 | Audit Failure Alerting | Alert in the event of an audit logging process failure | c | Determine if identified personnel or roles are alerted in the event of an audit logging process failure | NIST SP 800-171 Rev. 2 3.3.4 | |||||||||||||||||||
95 | Audit and Accountability | AU.L2-3.3.5 | Audit Correlation | Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity | a | Determine if audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity are defined | NIST SP 800-171 Rev. 2 3.3.5 | |||||||||||||||||||
96 | Audit and Accountability | AU.L2-3.3.5 | Audit Correlation | Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity | b | Determine if defined audit record review, analysis, and reporting processes are correlated | NIST SP 800-171 Rev. 2 3.3.5 | |||||||||||||||||||
97 | Audit and Accountability | AU.L2-3.3.6 | Reduction & Reporting | Provide audit record reduction and report generation to support on-demand analysis and reporting | a | Determine if an audit record reduction capability that supports on-demand analysis is provided | NIST SP 800-171 Rev. 2 3.3.6 | |||||||||||||||||||
98 | Audit and Accountability | AU.L2-3.3.6 | Reduction & Reporting | Provide audit record reduction and report generation to support on-demand analysis and reporting | b | Determine if a report generation capability that supports on-demand reporting is provided | NIST SP 800-171 Rev. 2 3.3.6 | |||||||||||||||||||
99 | Audit and Accountability | AU.L2-3.3.7 | Authoritative Time Source | Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records | a | Determine if internal system clocks are used to generate time stamps for audit records | NIST SP 800-171 Rev. 2 3.3.7 | |||||||||||||||||||
100 | Audit and Accountability | AU.L2-3.3.7 | Authoritative Time Source | Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records | b | Determine if an authoritative source with which to compare and synchronize internal system clocks is specified | NIST SP 800-171 Rev. 2 3.3.7 |