Skip to main content
← All controls
AU-2 / AU-3 / AU-9 / A.8.15 / CIS-8.2 NIST SP 800-53 Rev 5

Telemetry + audit: who used what, when

Demonstrate that all access to critical systems and sensitive data is logged with sufficient detail to establish accountability, support incident response, and detect unauthorized activity through complete attribution of actions to individual users.

Description

What this control does

This control requires the implementation of comprehensive logging and auditing mechanisms that capture user access to sensitive systems, data, and applications, recording the identity of the user (who), the resource accessed or action performed (what), and the timestamp (when). Telemetry data is centrally collected, retained for a defined period, and protected from unauthorized modification or deletion. This enables forensic investigation, compliance reporting, and detection of anomalous or unauthorized activities across the enterprise environment.

Control objective

What auditing this proves

Demonstrate that all access to critical systems and sensitive data is logged with sufficient detail to establish accountability, support incident response, and detect unauthorized activity through complete attribution of actions to individual users.

Associated risks

Risks this control addresses

  • Insider threats performing unauthorized data exfiltration without detection due to insufficient activity logging
  • Compromised accounts being used laterally across systems with no audit trail to detect abnormal behavior patterns
  • Inability to perform root cause analysis following a security incident due to missing or incomplete access logs
  • Regulatory non-compliance resulting from failure to demonstrate who accessed protected data during audit periods
  • Privileged users abusing administrative access without accountability mechanisms to deter or detect misuse
  • Log tampering or deletion by attackers to cover tracks after compromise, eliminating forensic evidence
  • Delayed breach detection due to lack of centralized telemetry enabling correlation of suspicious access patterns across systems

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's logging and audit policy, including scope of systems covered, data retention requirements, and log protection mechanisms
  2. Inventory all critical systems, applications, and data repositories to establish the universe of resources requiring audit logging
  3. Select a representative sample of systems from the inventory spanning different technology types (databases, cloud services, network devices, privileged access management tools)
  4. Examine logging configurations for each sampled system to verify user identification, resource/action capture, and timestamp accuracy with timezone information
  5. Review access to the logging infrastructure itself to confirm segregation of duties and protection against unauthorized modification or deletion
  6. Request and analyze sample audit logs from the past 30 days, verifying the presence of who/what/when fields and confirming logs are forwarded to centralized SIEM or log management platform
  7. Test log integrity by attempting to identify any gaps in timestamp sequences or missing events during known access periods
  8. Validate log retention by confirming availability of historical logs meeting regulatory or policy-defined retention periods and verify backup/archive procedures
Evidence required Artefacts include logging and audit policy documentation, system inventory with logging status, configuration exports showing audit settings from sampled systems (Windows Event Forwarding, syslog configs, cloud audit trail settings), screenshots of SIEM or log management console showing centralized collection, sample log files demonstrating who/what/when capture, and retention/backup policy documentation with evidence of historical log availability spanning the required retention period.
Pass criteria All sampled critical systems generate audit logs containing authenticated user identity, specific actions or resources accessed, and accurate timestamps, with logs centrally aggregated, protected from tampering, and retained according to policy requirements with no significant gaps identified.

Where this control is tested

Audit programs including this control