Skip to main content
โ† All controls
AU-2 / AU-6 / AC-7 / SI-4 / A.8.15 / A.8.16 / CIS-8.2 / CIS-8.11 NIST SP 800-53 Rev 5

Logging + alerting on failed/unusual logins

Demonstrate that all authentication systems log failed and unusual login events, forward those logs to a monitored security platform, and generate alerts that trigger timely investigation and response by authorized personnel.

Description

What this control does

This control requires the organization to configure authentication systems to generate timestamped log entries for both failed login attempts and anomalous successful logins (e.g., unusual geographic location, time of day, or device). Logs must be forwarded to a centralized system capable of generating real-time or near-real-time alerts to security operations personnel based on defined thresholds and behavioral patterns. This capability enables early detection of credential compromise, brute-force attacks, and unauthorized access attempts before attackers establish persistence.

Control objective

What auditing this proves

Demonstrate that all authentication systems log failed and unusual login events, forward those logs to a monitored security platform, and generate alerts that trigger timely investigation and response by authorized personnel.

Associated risks

Risks this control addresses

  • Undetected brute-force password attacks against user accounts or service principals
  • Credential stuffing campaigns leveraging previously breached username-password pairs
  • Successful account takeover resulting from phishing, malware, or social engineering going unnoticed
  • Insider threat activity using compromised or shared credentials outside normal behavior patterns
  • Lateral movement by attackers using stolen credentials across multiple systems without triggering investigation
  • Delayed incident response due to lack of visibility into authentication anomalies
  • Compliance violations from failure to detect and document unauthorized access attempts

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's inventory of authentication systems including identity providers, VPNs, remote access gateways, privileged access management tools, and critical applications.
  2. Select a representative sample of at least three authentication systems spanning different infrastructure tiers (e.g., corporate SSO, cloud IAM, administrative jump host).
  3. Review logging configuration for each sampled system to confirm failed login attempts are captured with timestamp, username, source IP address, and failure reason.
  4. Review logging configuration to confirm unusual login detection criteria are defined, such as geographic anomalies, impossible travel, off-hours access, new device enrollment, or multiple concurrent sessions.
  5. Trace log flow from each sampled authentication system to the centralized SIEM, log aggregator, or monitoring platform, verifying automated forwarding is active and functional.
  6. Review alerting rules and thresholds configured in the monitoring platform for failed login events (e.g., five failures within ten minutes) and unusual login patterns.
  7. Interview SOC or security operations personnel to confirm alert receipt process, escalation procedures, and typical response timeframes for authentication-related alerts.
  8. Perform or review records of a recent test simulation where failed or unusual logins were generated intentionally, and verify corresponding logs and alerts were produced and investigated.
Evidence required Authentication system configuration files or screenshots showing logging parameters enabled for failed and anomalous login events. Exported SIEM or log management platform configurations displaying log sources, parsing rules, and alerting thresholds for authentication events. Sample log entries from the past 30 days demonstrating capture of failed login attempts with required metadata fields. Alert ticket records or incident response documentation showing investigation of recent authentication anomalies.
Pass criteria All sampled authentication systems generate logs for failed and unusual logins, forward logs to a monitored platform within 15 minutes, and trigger alerts that are reviewed by security personnel according to documented response procedures.

Where this control is tested

Audit programs including this control