AU.L2-3.3.3

AU.L2-3.3.3: Audit Review, Analysis, and Reporting

Regularly review and analyze audit logs to identify security events, then report findings to management.

Audit log review is the center of gravity for the entire AU family. You collect logs from endpoints, networks, identity systems, and applications. Then you need to actually look at them regularly, find the problems, and tell leadership what you found. This isn’t a technical detail. It’s the main mechanism for detecting incidents, compliance violations, and security failures in real time.

AU.L2-3.3.3 requires three specific components: regular review, analysis for anomalies, and management reporting. If your organization has an MSSP or internal security operations center (SOC), they typically own the daily review work. But you still need to document what happened and what decisions were made. The logs you create under AU.L2-3.3.1 are worthless if nobody reviews them. This practice is where logs become intelligence.

Family Audit and Accountability
Practice AU.L2-3.3.3
Difficulty Medium
Key evidence Monthly/quarterly audit review summaries, log analysis reports, management findings documentation

What the assessor is actually evaluating

The assessor will ask two real questions. First: “Show me the documentation that you reviewed audit logs during the period we’re assessing.” This means they want evidence that audit review happened on the schedule you defined. Not raw logs. Not a SIEM screenshot. A document that says “We reviewed logs from [date range], found [X] anomalies, and took [Y] action.”

Second: “How do you distinguish normal activity from anomalies?” They want to see that you have criteria for what matters. If everything is an anomaly, nothing is. If nothing is flagged, you’re not looking carefully. The middle ground is a defined set of detection rules or risk thresholds that guide your analysis. This is where AU.L2-3.3.5 (correlation) becomes powerful. Single-source alerts are noise. Multi-source patterns reveal real attacks.

Third, unstated but checked: “Did you report findings to someone with authority to act?” If the analysis stays in the SOC and never reaches leadership, it fails this practice. Management needs a summary at the frequency your SSP defines. Monthly is standard. Quarterly is defensible. Yearly is usually not.

What a realistic SSP definition looks like

Example SSP Language: AU.L2-3.3.3
"Our organization conducts complete review and analysis of audit logs monthly. All audit records from endpoints, network devices, firewalls, email gateways, and identity management systems are aggregated into a centralized SIEM platform. A designated security analyst reviews these logs according to the following criteria:
  • Failed authentication attempts exceeding [X] per account per day
  • Privilege escalation events
  • Data access to sensitive systems from unusual network locations or times
  • Configuration changes to security controls
  • Deletion or modification of audit logs
  • User account creation, modification, or deletion
  • File or data transfers exceeding normal thresholds

Anomalies and potential security events are documented in a monthly audit review log with timestamps, affected systems, severity assessment, and action taken. This summary is reported to [title] and [title] within [X] days of month end. Corrective actions are tracked through [system/process] and verified by [responsible party]."

Note the specifics: monthly, named person, specific criteria, documentation format, reporting timeline. This is what assessors expect to see.

How to present your evidence

Evidence checklist
  • Monthly audit review summaries or logs (12 months)
  • Management reports showing findings and actions taken
  • Documentation of analysis criteria or detection rules
  • Evidence of management notification (emails, meeting notes)

Pull together your actual audit review documentation for the past 12 months (or since last assessment). This should include:

  1. Monthly audit summaries or review logs. These don’t need to be lengthy. Include date range, systems reviewed, number of events processed, anomalies identified, severity levels, and actions taken.

  2. Management reports. These are the distilled versions sent to leadership. Focus on risk. Include findings, trends, and what was done in response.

  3. Criteria or rules documentation. Show the assessor the specific conditions that trigger your analysis focus. This can be a SIEM rule set printout, an internal procedure document, or your security operations playbook.

  4. Evidence of management notification. Email copies, meeting notes, or a review log that shows findings reached the right people on schedule.

Get assessment room tips in your inbox

Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.

Assessment room tips

Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.

Q: "Walk me through your last monthly audit review. What did you find?"
Pull up the most recent monthly summary. Describe one or two real anomalies you detected, what they were, and what you did about them. The assessor is checking that you actually analyzed something, not that you ran a canned report.
Q: "Who defines what counts as an anomaly? And how often do you actually find things?"
Name the person or role responsible for setting detection criteria. If you never find anomalies, the criteria are either too loose or you're not reviewing carefully. "We found 2-3 events per month that warranted investigation" is normal. "We find nothing" or "We find everything" are both red flags.
Q: "How quickly do findings reach management?"
Explain your timeline. Critical findings should trigger immediate escalation. Lower-risk items roll into the monthly summary. Show how the escalation path is defined.

Common failures

Raw SIEM output as evidence: Showing the assessor a SIEM dashboard or export file and saying "This is our audit review" fails this practice. The assessor needs documentation that proves you analyzed it, found something, and reported it. The dashboard is a tool you use. The review summary is the evidence you present.
Review documentation with no anomalies found, ever: If 12 months of logs show zero security events, either your environment is impossibly clean or you're not looking carefully. Real findings mean you're analyzing properly. Plan to document at least a few per quarter.
Documented escalation path: Define when findings bypass the monthly summary and reach management immediately. Critical events (multiple failed logins, privilege escalations, system compromises) get reported the day they're found. Less critical items roll into the monthly report. This demonstrates thoughtful triage beyond automated reporting.
Clear link between audit findings and incident response: When your audit review finds something, it should connect to your incident response process. A monthly audit review that feeds into IR investigations demonstrates that the two practices work together. Have documentation showing at least one finding from the past year that triggered an IR investigation.

If you use an MSSP

Your MSSP typically owns log collection, aggregation, daily review, and initial analysis. They handle the continuous monitoring and flag anomalies. What they provide to you is a documented summary of their findings and recommendations. You review their summary, understand their conclusions, and sign off on corrective actions. The final approval of responses stays with you.

A good MSSP maintains their own analysis logs showing what they reviewed, what they found, and what they escalated. They send you a monthly or quarterly summary explaining their analysis methodology, what they reviewed, what they found (even if nothing significant), and any items that required your attention. Your role is oversight and decision-making, not daily log review.

Request documented MSSP analysis

Have your MSSP provide monthly or quarterly summaries that clearly state what they reviewed, what their analysis methodology is, what they found, and what they escalated. This documentation becomes your evidence of review. In the assessment room, the MSSP should be able to walk the assessor through their analysis process. You confirm you received and reviewed their reports.


Disclaimer: This guide is educational and not official CMMC documentation. Always refer to NIST SP 800-171 and the official CMMC Assessment Guide for authoritative requirements. Individual assessment results depend on implementation details specific to your organization.

New practice breakdowns and assessment tips every week. Follow on Substack to stay current as the November 2026 deadline gets closer.