A single log entry tells you what happened at one moment on one system. An attacker over two days making three failed login attempts, then stealing credentials, then accessing sensitive data, then exfiltrating files, generates dozens of log entries across four different systems. If you only look at logs in isolation, you see four small problems. If you correlate them, you see an intrusion.
AU.L2-3.3.5 requires you to connect the dots across systems. This is where a SIEM or log aggregation platform becomes critical to your security posture. You feed it logs from identity systems, endpoints, networks, and applications. Then you configure it to look for patterns that indicate a real attack. This is the skill that turns AU.L2-3.3.3 (log review) from checking boxes into actual threat detection.
What the assessor is actually evaluating
The assessor is looking for evidence that you use logs from multiple sources to detect complex attack patterns. They’ll ask: “Show me an example of an incident you detected where correlation mattered. What would you have missed if you only looked at one log source?”
The answer matters. If you say “We looked at failed login attempts on our identity system and found a brute force attempt,” that’s one log source. That’s not correlation. If you say “A user had three failed logins on Tuesday, then someone logged in with their credentials from an unusual IP on Wednesday, then we saw that IP accessing the file server Thursday morning,” now you’re correlating identity logs, VPN or network logs, and file server logs. That’s this practice. This is also where your incident response team from IR.L2-3.6.1 gets visibility into the scope of a breach.
The assessor also wants to know your correlation approach. Are you using built-in SIEM rules, custom rules you built, statistical analysis, or a combination? Do your analysts know how to search for related events across systems? Is correlation part of your standard incident response procedure?
What a realistic SSP definition looks like
- Identity management and directory services (authentication attempts, group changes, privilege escalations)
- Endpoint detection and response (process execution, file access, network connections)
- Network security (firewall, intrusion detection, VPN access)
- Email gateway (phishing, malware, unusual recipients or attachment types)
- File servers and databases (access logs, modification logs, unusual query patterns)
Our SIEM is configured with correlation rules that detect patterns including:
- Multiple failed login attempts followed by successful login from an unusual location or time
- Process execution on an endpoint immediately after suspicious email receipt
- Unusual file access patterns following privilege escalation events
- Data transfer to an external IP following successful compromise indicators
- Account activity during hours when that user is not normally active
Correlation rules are reviewed and updated quarterly. Analysts conducting audit log review use correlation to investigate incidents and identify the full scope of compromise. When correlation reveals a multi-system incident, it is immediately escalated to incident response for investigation and containment."
The key elements: multiple source systems, specific correlation scenarios, regular updates, integration with incident response.
How to present your evidence
- SIEM correlation rules or query documentation
- Example incidents (2-3) showing correlation across multiple log sources
- Analyst documentation or incident templates showing correlation methodology
- Monthly audit summaries noting incidents detected through correlation
Gather four types of evidence:
SIEM correlation rules or queries. Export or screenshot your correlation configurations. Document what they look for. This can be a SIEM rule export, a list of saved searches, or documentation of your correlation methodology. Include the rationale for each rule or pattern.
Example incidents showing correlation in action. Find two or three cases from the past 12 months where you detected an incident that involved multiple log sources. Document the timeline. For example: “Identity logs showed three failed logins for user X on 2025-11-15. Endpoint logs showed credential theft malware executing on that user’s machine on 2025-11-16. File server logs showed unusual access from that user’s account to sensitive directories on 2025-11-17. Correlation of these three events revealed the scope of the intrusion.”
Analyst documentation. Show how your security team documents and investigates correlated events. This might be an incident report template that explicitly calls for investigating related events across systems, or a procedure that describes how analysts query the SIEM for correlated data.
Evidence that correlation is ongoing. Alert logs or review summaries showing that correlation is part of your regular analysis, not a one-time event. This might be a monthly audit review summary that notes “3 multi-system incidents identified through correlation and escalated to IR” or specific tickets documenting correlated investigations.
Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.
Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.
Common failures
If you use an MSSP
Your MSSP owns correlation configuration and rule maintenance. They build and tune correlation rules based on threat intelligence and their observation of your environment. They use correlation during their daily analysis work to identify multi-system attacks. What they provide to you is documentation of the correlation rules they’re running and specific examples of incidents they detected through correlation.
An MSSP that doesn’t correlate is just aggregating logs. A good one builds rules, tests them, and actively looks for patterns across systems. Your role is to review their correlation approach, understand what they’re looking for, and approve changes to the correlation strategy. They execute the technical work. You oversee it.
Request documentation of your MSSP's correlation rules and ask them to walk through a specific incident they detected through correlation. Their monthly or quarterly summary should note incidents detected through correlation and the systems involved. This documentation becomes your evidence of active correlation implementation in practice.
Disclaimer: This guide is educational and not official CMMC documentation. Always refer to NIST SP 800-171 and the official CMMC Assessment Guide for authoritative requirements. Individual assessment results depend on implementation details specific to your organization.