NIST 800-53 REV 5 • AUDIT AND ACCOUNTABILITY
AU-6(2) — Automated Security Alerts
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Set up automated alerts for security-relevant events so your team does not have to manually hunt through logs for problems. The system should tell you when something is wrong.
Example 1: In Microsoft Sentinel, enable the built-in analytics rules for common threats: brute force attacks, impossible travel sign-ins, and suspicious mailbox forwarding rules. Customize the severity levels and notification targets for your organization.
Example 2: In Splunk, create correlation searches that detect multi-stage attacks. For example: alert if Account A has 10+ failed logons (Event 4625) followed by a successful logon (Event 4624) from a different source IP within 30 minutes — this pattern suggests a successful brute force attack. Route these alerts to your SOC with high priority.