NIST 800-171 requires organizations to create, protect, and retain system audit records, and to ensure that the actions of individual users can be traced back to them. The Audit and Accountability (AU) control family is one of the most technically demanding areas of the framework, and for many small defense contractors, meeting these requirements without a Security Information and Event Management (SIEM) platform is nearly impossible.
What the AU Controls Require
The audit and accountability controls in NIST 800-171 include requirements to:
- Create audit records for defined events (logins, file access, configuration changes, privilege use)
- Ensure audit logging capacity is sufficient and that alerts trigger before logs are full
- Protect audit information from unauthorized access, modification, and deletion
- Review and analyze audit records for indications of inappropriate or unusual activity
- Correlate audit records across multiple systems to build a coherent picture of events
- Retain audit records for a defined period to support after-the-fact investigation
Why SIEM Is Essential
Meeting these requirements with native operating system logs alone creates several problems:
Log Volume
A typical small business network generates millions of log events per day across servers, workstations, firewalls, and applications. Without a SIEM to aggregate and normalize these logs, meaningful analysis is impossible.
Correlation
Security events rarely appear in a single log source. A successful attack might leave traces in firewall logs, authentication logs, and file access logs across multiple systems. SIEM platforms correlate events across sources to detect patterns that individual log reviews would miss.
Retention
NIST 800-171 requires audit records to be retained for investigation purposes. Storing raw logs from every system for months or years requires significant storage. SIEM platforms efficiently index and compress log data for long-term retention.
Alerting
The requirement to review and analyze audit records for unusual activity implies near-real-time analysis. SIEM platforms provide automated alerting based on predefined rules and behavioral analysis, making this requirement achievable without a dedicated SOC team.
SIEM Solutions for Small Organizations
Enterprise SIEM platforms like Splunk or QRadar are powerful but often cost-prohibitive for small defense contractors. Several alternatives make SIEM accessible to smaller organizations:
- Huntress SIEM: Purpose-built for small and mid-sized businesses, with managed detection and response included
- Microsoft Sentinel: Cloud-native SIEM that integrates tightly with Microsoft 365 GCC and Azure environments
- Elastic Security: Open-source option that can be self-hosted or cloud-managed
Implementation Approach
- Define your audit events. Identify which events need to be logged based on the AU controls and your SSP
- Deploy log collectors. Install agents or configure log forwarding from all in-scope systems
- Configure retention policies. Set retention periods that meet your compliance requirements
- Build detection rules. Create alerts for the specific indicators relevant to your environment
- Establish review procedures. Define who reviews alerts, how often, and what the escalation process looks like
- Document everything. Your SSP should describe your audit architecture, retention policies, and review procedures
The Bottom Line
A SIEM isn't optional for NIST 800-171 compliance — it's a practical necessity. The good news is that modern solutions have made enterprise-grade log management accessible to organizations of all sizes.
Need help selecting and implementing a SIEM? Talk to PCShards about our security monitoring solutions.