NIST 800-53 REV 5 • AUDIT AND ACCOUNTABILITY

AU-2(3)Reviews and Updates

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Periodically review your audit event selections and update them based on new threats, incidents, or changes to your environment. What you needed to log last year may not be enough this year.

Example 1: Include audit event selection in your annual security review. After any security incident, ask: "Did our logging capture enough to investigate this?" If not, add the missing event categories. Document the rationale for each change.

Example 2: Review CISA advisories and MITRE ATT&CK technique updates quarterly. If a new attack technique becomes prevalent (e.g., a new lateral movement method), verify your logging captures the relevant events. For example, if Kerberoasting is trending, ensure you are logging Event ID 4769 (Kerberos Service Ticket Operations).