Company Name
[Not entered β click Edit]
Location
[Not entered]
Employee Count
[Not entered]
Primary Business
[Not entered]
CMMC Level
[Not entered]
Report Date
[Not entered]
SIEM Platform
[Not entered]
Audit Log Retention Period
[Not entered]
Update each control's compliance status and implementation description for your organization. Click "Update Status" to edit all controls at once, or click an individual card to edit it.
Document every system or device that generates security-relevant audit logs in your environment. CMMC Level 2 requires comprehensive coverage of all systems that process, store, or transmit CUI. Target: 15β20 sources minimum.
| Source ID | System / Device | Log Type | Purpose of Monitoring | Status | Actions |
|---|---|---|---|---|---|
| No log sources added yet β click "+ Add Log Source" to begin documenting your log inventory. | |||||
Document your organization's specific log retention policies, review schedules, and analysis procedures. All fields are directly editable.
π Retention Policy
π Review Schedule
π§ SIEM Configuration
π Audit Log Protection
β° Time Synchronization
π¨ Incident Response Integration
Simulate security event log entries as they would appear in a SIEM. Add events representative of your case study scenario β include normal operational events, warnings, and security-relevant alerts.