Audit and Accountability

CMMC Assessment with IntelComp

IntelComp is an independent compliance management platform designed to support businesses in navigating and preparing for cybersecurity frameworks, including CMMC 2.0. While not affiliated with or endorsed by the U.S. Department of Defense (DoD), CMMC-AB, or NIST, IntelComp offers tools and guidance aligned with standards such as NIST SP 800-171A to help organizations strengthen security posture and readiness. All references to government standards are for informational purposes only. IntelComp does not provide certification but empowers you with the resources to pursue compliance confidently and effectively.

CMMC Audit and Accountability (AU) Overview

The Audit and Accountability (AU) domain in CMMC ensures that organizations monitor system activity, maintain audit logs, and hold users accountable for their actions—especially when handling Controlled Unclassified Information (CUI).

Key objectives include:

  • Generating and retaining audit logs of system and user activity

    Reviewing logs regularly to detect unauthorized or suspicious behavior

    Protecting audit records from tampering or unauthorized access

    Identifying who performed specific actions within systems

    Supporting investigations and demonstrating compliance during audits

Strong audit and accountability practices provide visibility into system usage, help detect and respond to security incidents, and support compliance with CMMC 2.0 requirements—particularly at Level 2.

CMMC Audit and Accountability (AU) Overview

The Audit and Accountability (AU) domain in CMMC ensures that organizations monitor system activity, maintain audit logs, and hold users accountable for their actions—especially when handling Controlled Unclassified Information (CUI).

Key objectives include:

  • Generating and retaining audit logs of system and user activity

    Reviewing logs regularly to detect unauthorized or suspicious behavior

    Protecting audit records from tampering or unauthorized access

    Identifying who performed specific actions within systems

    Supporting investigations and demonstrating compliance during audits

Strong audit and accountability practices provide visibility into system usage, help detect and respond to security incidents, and support compliance with CMMC 2.0 requirements—particularly at Level 2.

P - Programs, Policies, Procedures (SOPs) | A - Artifacts/Records | T - Training Materials/Comprehension Quiz

Control ID PAT Security Requirement
3.3.1.a P Audit Logs for Monitoring Unauthorized System Activity
3.3.1.a T Audit Logs for Monitoring Unauthorized System Activity Training Material and Comprehension Quiz
3.3.1.b P Defined Audit Record Content for Monitoring Unauthorized System Activity
3.3.1.b T Audit Record Content for Monitoring Unauthorized System Activity Training Material and Comprehension Quiz
3.3.1.c P Audit Records
3.3.1.c T Audit Records Creation Training Material and Comprehension Quiz
3.3.1.d P Ensuring Audit Records Contain the Required Content
3.3.1.d T Ensuring Required Content in Audit Records Training Material and Comprehension Quiz
3.3.1.e P Retention Requirements for Audit Records
3.3.1.e T Retention Requirements for Audit Records Training Material and Comprehension Quiz
3.3.1.f P Audit Records Retention
3.3.1.f T Audit Records Retention Training Material and Comprehension Quiz
3.3.2 P Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
3.3.2 T Training Materials: User Accountability (AU.L2-3.3.2)
3.3.2.a P Defining the Content of Audit Records to Uniquely Trace Users to Their Actions
3.3.2.b P Ensuring Audit Records Contain the Defined Content
3.3.3 P Event Review Policy
3.3.3 T Training Materials: Event Review (AU.L2-3.3.3)
3.3.3.a P Defining a Process for Determining When to Review Logged Events
3.3.3.a T Defining a Process for Determining When to Review Logged Events Policy Training Material and Comprehension Quiz
3.3.3.b P Reviewing Logged Event Types in Accordance with the Defined Review Process
3.3.3.b T Reviewing Logged Event Types in Accordance with the Defined Review Process Policy Training Material and Comprehension Quiz
3.3.3.c P Updating Logged Event Types Based on Review
3.3.3.c T Updating Logged Event Types Based on Review Policy Training Material and Comprehension Quiz
3.3.4 P Alert in the event of an audit logging process failure.
3.3.4 T Training Materials: Audit Failure Alerting (AU.L2-3.3.4)
3.3.4.b P Audit Logging Process Failures That Trigger Alerts
3.3.4.b T Audit Logging Process Failures That Trigger Alerts Training Material and Comprehension Quiz
3.3.4.c P Alerting Identified Personnel During Audit Logging Failures
3.3.4.c T Alerting Identified Personnel During Audit Logging Failures Training Material and Comprehension Quiz
3.3.5 P Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
3.3.5 T Training Materials: Audit Correlation (AU.L2-3.3.5)
3.3.5.a P Audit Record Review, Analysis, and Reporting Processes for Investigation and Response to Unlawful, Unauthorized, Suspicious, or Unusual Activity
3.3.5.a T Audit Record Review, Analysis, and Reporting Processes for Investigation and Response to Unlawful, Unauthorized, Suspicious, or Unusual Activity Policy Training Material and Comprehension Quiz
3.3.5.b P Correlating Audit Record Review, Analysis, and Reporting Processes
3.3.5.b T Correlating Audit Record Review, Analysis, and Reporting Processes Policy Training Material and Comprehension Quiz
3.3.6 P Provide audit record reduction and report generation to support on-demand analysis and reporting.
3.3.6 T Training Materials: Reduction & Reporting (AU.L2-3.3.6)
3.3.6.a P Audit Record Reduction Capability for On-Demand Analysis
3.3.6.a T Audit Record Reduction Capability for On-Demand Analysis Training Material and Comprehension Quiz
3.3.6.b P Report Generation Capability for On-Demand Reporting
3.3.6.b T Report Generation Capability for On-Demand Reporting Training Material and Comprehension Quiz
3.3.7 P Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
3.3.7 T Training Materials: Authoritative Time Source (AU.L2-3.3.7)
3.3.7.a P Internal System Clocks to Generate Audit Record Timestamps
3.3.7.a T Internal System Clocks to Generate Audit Record Timestamps Policy Training Material and Comprehension Quiz
3.3.7.b P Specifying and Synchronizing Internal System Clocks
3.3.7.b T Specifying and Synchronizing Internal System Clocks Policy Training Material and Comprehension Quiz
3.3.7.c P Comparing and Synchronizing Internal System Clocks
3.3.7.c T Comparing and Synchronizing Internal System Clocks Policy Training Material and Comprehension Quiz
3.3.8 P Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
3.3.8 T Training Materials: Audit Protection (AU.L2-3.3.8)
3.3.8.a P Protection of Audit Information from Unauthorized Access
3.3.8.a T Protection of Audit Information from Unauthorized Access Training Material and Comprehension Quiz
3.3.8.b P Protection of Audit Information from Unauthorized Modification
3.3.8.b T Protection of Audit Information from Unauthorized Modification Training Material and Comprehension Quiz
3.3.8.c P Protection of Audit Information from Unauthorized Deletion
3.3.8.c T Protection of Audit Information from Unauthorized Deletion Training Material and Comprehension Quiz
3.3.8.d P Protection of Audit Logging Tools from Unauthorized Access
3.3.8.d T Protection of Audit Logging Tools from Unauthorized Access Training Material and Comprehension Quiz
3.3.8.e P Protection of Audit Logging Tools from Unauthorized Modification
3.3.8.e T Protection of Audit Logging Tools from Unauthorized Modification Training Material and Comprehension Quiz
3.3.9 P Limit management of audit logging functionality to a subset of privileged users.
3.3.9 T Training Materials: Audit Management (AU.L2-3.3.9)
3.3.9.a P Audit Logging Privileged Users
3.3.9.a T Audit Logging Privileged Users Policy Training Material and Comprehension Quiz
3.3.9.b P Limiting Audit Logging Management to Authorized Privileged Users
3.3.9.b T Limiting Audit Logging Management to Authorized Privileged Users Policy Training Material and Comprehension Quiz

Need Help Simplifying Your Compliance Journey?

Discover how IntelComp Compliance Management System can help you achieve and maintain CMMC 2.0 compliance effortlessly.