Back to BlogCMMC Compliance

SIEM Requirements for CMMC Compliance in 2026

MLMatthew Locke (Co-Founder & CTO)
14 min read
Cybersecurity operations center with multiple monitors displaying SIEM dashboards, security alerts, and log monitoring tools relevant to CMMC compliance.

Key Takeaways

  • CMMC does not explicitly mandate a SIEM, but it requires strong logging, monitoring, and incident response controls that often necessitate SIEM-like capabilities.

  • Assessors expect evidence of centralized log collection, correlation, alerting, and timely incident response, not necessarily the use of a specific SIEM product.

  • For many defense contractors, especially those with multiple systems or limited staff, deploying a SIEM or managed service is the most practical way to meet CMMC requirements.

  • CMMC Phase 2 enforcement begins November 10, 2026. Contractors that cannot demonstrate functioning audit controls risk failing their C3PAO assessment.


In This Article

  • What CMMC Requires for Logging and Monitoring

  • Specific NIST 800-171 Controls

  • What a SIEM Provides

  • When You Need a SIEM vs. Alternatives

  • Decision Framework

  • Tools and Scripts

  • Frequently Asked Questions


If you are a small or mid-sized defense contractor working toward CMMC 2.0 compliance, you have likely encountered the advice that a SIEM (Security Information and Event Management) system is essential. The short answer: CMMC does not require a SIEM by name, but the logging and monitoring controls it enforces are difficult to satisfy without one.

The logging and monitoring requirements come from NIST SP 800-171 Revision 2, which CMMC Level 2 maps to through 32 CFR Part 170. Assessors look for concrete evidence that these controls are functioning, not just documented. A well-implemented SIEM provides that evidence naturally. This article clarifies exactly what the regulations require, what assessors expect to see, and how to determine whether a SIEM, a managed service, or a lighter alternative is right for your organization.

Note: NIST SP 800-171 Revision 3 was published in May 2024, but CMMC Level 2 assessments continue to map to Revision 2. Organizations should monitor for future rulemaking that may adopt Rev 3 requirements while ensuring current compliance against the Rev 2 control set.

With CMMC Phase 2 enforcement beginning November 10, 2026, contractors pursuing DoD contracts need functioning audit and monitoring controls before their C3PAO assessment. For background on what CUI and FCI mean under the final rule, see CUI vs FCI Under 48 CFR Final Rule.


What Does CMMC Actually Require for Logging and Monitoring?

CMMC does not require a SIEM by name, but it requires the outcomes a SIEM produces: centralized log collection, active monitoring, automated alerting, and documented incident response. These requirements come from three NIST 800-171 control families.

Where Do the Logging Requirements Come From?

CMMC verifies compliance with FAR 52.204-21 (Level 1), NIST SP 800-171 Rev 2 (Level 2), and a selected subset of NIST SP 800-172 (Level 3). DFARS 252.204-7012 applies separately and requires 72-hour cyber incident reporting and 90-day evidence preservation. Fulfillment of all 110 NIST 800-171 controls is mandatory for Level 2.

Several control families emphasize log management and incident response:

  • Audit and Accountability (AU): Create, protect, retain, and review audit logs.

  • System and Information Integrity (SI): Monitor systems for attacks and unauthorized use.

  • Incident Response (IR): Detect, report, and respond to incidents.

For detailed insights on CMMC certification timing and contract award requirements, see CMMC Certification Timing for DoD Contract Awards.


Which NIST 800-171 Controls Require Logging and Monitoring?

The table below maps the specific NIST SP 800-171 controls that drive logging and monitoring requirements. These are the controls assessors examine most closely during the AU, SI, and IR portions of a CMMC Level 2 assessment.

Control ID:
3.3.1
Domain:
Audit & Accountability
Control Description:
Create and retain system audit logs
What Assessors Look For:
Logs from all in-scope systems collected centrally; retention policy documented
Control ID:
3.3.2
Domain:
Audit & Accountability
Control Description:
Ensure actions can be traced to individual users
What Assessors Look For:
User attribution in log entries; no shared accounts in scope
Control ID:
3.3.3
Domain:
Audit & Accountability
Control Description:
Review and update logged events
What Assessors Look For:
Evidence of periodic review; documented decisions about what to log
Control ID:
3.3.4
Domain:
Audit & Accountability
Control Description:
Alert on audit logging process failures
What Assessors Look For:
Automated alerts when log collection stops or fails
Control ID:
3.3.5
Domain:
Audit & Accountability
Control Description:
Correlate audit review, analysis, and reporting
What Assessors Look For:
Evidence of log correlation (manual or automated); incident timelines
Control ID:
3.3.6
Domain:
Audit & Accountability
Control Description:
Provide audit record reduction and report generation
What Assessors Look For:
Dashboards, reports, or documented manual review procedures
Control ID:
3.3.7
Domain:
Audit & Accountability
Control Description:
Provide a system capability that compares and synchronizes internal clocks
What Assessors Look For:
NTP configuration across all log sources
Control ID:
3.3.8
Domain:
Audit & Accountability
Control Description:
Protect audit information and audit logging tools
What Assessors Look For:
Access controls on log storage; integrity protections
Control ID:
3.3.9
Domain:
Audit & Accountability
Control Description:
Limit management of audit logging to a subset of privileged users
What Assessors Look For:
Role-based access to SIEM/log management; documented access list
Control ID:
3.14.1
Domain:
System & Info Integrity
Control Description:
Identify, report, and correct system flaws in a timely manner
What Assessors Look For:
Vulnerability scan logs; patch management evidence
Control ID:
3.14.6
Domain:
System & Info Integrity
Control Description:
Monitor organizational systems to detect attacks
What Assessors Look For:
Active monitoring with alerting; SIEM dashboards or equivalent
Control ID:
3.14.7
Domain:
System & Info Integrity
Control Description:
Identify unauthorized use of organizational systems
What Assessors Look For:
Login anomaly detection; after-hours access alerts
Control ID:
3.6.1
Domain:
Incident Response
Control Description:
Establish an operational incident-handling capability
What Assessors Look For:
IR plan, IR team roles, evidence of exercises
Control ID:
3.6.2
Domain:
Incident Response
Control Description:
Track, document, and report incidents
What Assessors Look For:
Incident tickets, timelines, and post-incident reports

The essence is continuous monitoring with actionable insights, not mere log storage. Assessors expect to see that logs are collected, reviewed, correlated, and acted upon, with documented evidence at each step.


What Does a SIEM Actually Provide?

A SIEM addresses the AU, SI, and IR control requirements in an integrated platform. For contractors evaluating whether they need one, here is what a SIEM does and how it maps to the controls above.

  • Centralized Logging (AU 3.3.1, 3.3.2). Collects and normalizes logs from servers, endpoints, firewalls, applications, and cloud services into a single searchable location. Removes silos and ensures user attribution across all sources.

  • Real-Time Alerting (AU 3.3.4, SI 3.14.6, 3.14.7). Detects unusual behaviors such as repeated login failures, abnormal network traffic, or after-hours access. Notifies the security team and integrates with ticketing systems for tracking.

  • Event Correlation (AU 3.3.5, 3.3.6). Links related events into incident chains. For example: a phishing email receipt followed by unusual account activity and data access attempt, surfaced as a single correlated alert rather than three separate log entries.

  • Incident Response Support (IR 3.6.1, 3.6.2). Provides investigation dashboards, timeline reconstruction, and report generation. Helps meet DFARS 252.204-7012 72-hour notification requirements by surfacing incidents faster.

  • Compliance Evidence (all AU controls). Generates audit trails that prove logging, monitoring, and incident handling are operational. These artifacts are what assessors review during a C3PAO assessment.

For how MFA and access controls interact with logging requirements, see Passwords, MFA, and WiFi Requirements for CMMC.


When Do You Need a SIEM vs. When Can Alternatives Suffice?

Not every contractor needs a full SIEM. The right choice depends on your environment size, contract risk profile, and available staff. Here is how to think about it.

When a SIEM Is the Most Practical Answer

  • Multiple and varied log sources. Running several servers, endpoints, networking devices, and cloud services makes manual collection impractical and error-prone.

  • Limited internal IT or security staff. Managed SIEM or managed detection and response (MDR) services provide expertise and 24/7 monitoring without requiring a dedicated SOC.

  • High-risk contracts with sensitive CUI. Prime contractors or subcontractors handling sensitive CUI face heightened assessor expectations for continuous monitoring.

  • Pursuing CMMC Level 3. Advanced requirements under NIST SP 800-172 call for sophisticated monitoring that typically requires SIEM-class tools.

When Lighter Alternatives Can Work

For smaller contractors with limited scope, lighter approaches may satisfy the requirements:

  • Centralized syslog with monitoring scripts. Tools like Graylog, Wazuh, or syslog-ng can centralize logs and provide basic alerting without expensive licenses.

  • Cloud-native logging platforms. Microsoft Defender for Business (powered by Microsoft Sentinel), AWS CloudWatch, or Google Cloud Logging can meet core requirements if properly configured. For Google Workspace environments specifically, see Google Workspace and CMMC Level 2 Compliance.

  • Manual review of logs. For organizations with very few systems, documented daily or weekly log reviews with screenshots can sometimes pass assessments, though this approach is burdensome and fragile at scale.

Important: While no regulation explicitly states 'you must have a SIEM,' assessors expect SIEM-like outcomes: centralization, alerting, monitoring, and evidence of response.


What Are Common Pitfalls with SIEM Implementations?

The most common failure we hear is not a missing SIEM; it is a SIEM that was purchased, partially configured, and then neglected. Contractors deploy the tool, connect a few log sources, and then never tune the alerts or document their review process. When the assessor asks to see evidence of log review, there is nothing to show.

Three specific pitfalls to avoid:

  • Purchasing an overly complex SIEM. Enterprise-grade tools like Splunk Enterprise can overwhelm a small team and incur costs exceeding $100,000 annually. A 20-person contractor does not need the same platform as a Fortune 500 company.

  • Inadequate configuration. SIEMs do not function optimally out of the box. Failing to connect all in-scope log sources, tune alert thresholds, or configure retention policies creates coverage gaps that assessors will find.

  • Relying solely on technology without process. A SIEM without documented review workflows, incident tickets, or response reports will not satisfy assessors. Tools support processes but cannot replace them. Your IR plan must describe who reviews alerts, how often, and what happens when something is flagged.


How Should You Choose Between a SIEM and Alternatives?

The right monitoring approach depends on four factors: the number of systems in your CUI scope, your available IT/security staff, your contract risk profile, and your budget. The decision matrix below provides a starting point.

Factor:
Systems in CUI scope
Lightweight / Manual:
1-5
Managed SIEM / MDR:
5-25
Full SIEM Deployment:
25+
Factor:
IT/Security staff
Lightweight / Manual:
0-1 dedicated
Managed SIEM / MDR:
0-2 dedicated (vendor manages)
Full SIEM Deployment:
2+ dedicated security staff
Factor:
Contract risk profile
Lightweight / Manual:
FCI only or low-volume CUI
Managed SIEM / MDR:
Standard CUI subcontracts
Full SIEM Deployment:
Prime contracts, high-volume CUI
Factor:
Approximate annual cost
Lightweight / Manual:
$0-5K (open-source + time)
Managed SIEM / MDR:
$10-30K (managed service)
Full SIEM Deployment:
$30-100K+ (license + staff)
Factor:
CMMC Level target
Lightweight / Manual:
Level 1, or Level 2 with very small scope
Managed SIEM / MDR:
Level 2 (most common)
Full SIEM Deployment:
Level 2 complex, or Level 3
Factor:
Assessor confidence
Lightweight / Manual:
Acceptable if well-documented
Managed SIEM / MDR:
High; vendor provides evidence support
Full SIEM Deployment:
Highest; full audit trail
Factor:
Best-fit tools
Lightweight / Manual:
Wazuh, Graylog, syslog-ng, PowerShell scripts
Managed SIEM / MDR:
Arctic Wolf, Blumira, Huntress, Microsoft Sentinel (consumption)
Full SIEM Deployment:
Splunk, Elastic Security, Microsoft Sentinel (committed)

For most small contractors (10-50 users, Level 2), a managed SIEM or MDR service provides the best balance of cost, coverage, and assessor confidence. The vendor handles log collection, alert tuning, and 24/7 monitoring, while you maintain oversight and produce evidence for assessments.

Keep in mind that SIEM licensing is only part of the equation. Continuous tuning, alert triage, and incident response demand ongoing investment in skilled staff or trusted managed services. Many SMBs find managed SIEM/MDR providers more cost-effective and sustainable over time.

Organizations running Microsoft 365 GCC High should evaluate Microsoft Sentinel first, as it integrates natively with the GCC High environment. See Microsoft 365 GCC High Migration Roadmap for details on that platform.

Need help mapping your logging controls to CMMC requirements?

CMMC Dashboard helps you track AU, SI, and IR domain controls alongside all 110 NIST 800-171 practices.


What Tools and Scripts Help with CMMC Log Management?

Commercial SIEM Solutions

Tool:
Microsoft Sentinel
Best For:
Microsoft-native environments, GCC High
Approximate Cost:
Pay-per-GB ingestion (~$2.46/GB)
Notes:
Cloud-native; strong M365 integration
Tool:
Splunk Enterprise
Best For:
Large organizations with dedicated SOC
Approximate Cost:
$100K+/year
Notes:
Feature-rich but expensive; requires skilled staff
Tool:
Elastic Security
Best For:
Organizations wanting open-source flexibility
Approximate Cost:
Free tier available; paid from ~$95/month
Notes:
Strong community; self-hosted or cloud

Managed SIEM / MDR Services

Service:
Arctic Wolf
Best For:
SMBs wanting turnkey monitoring
Approximate Cost:
~$15-25K/year
Notes:
Concierge security team included
Service:
Blumira
Best For:
Small contractors, fast deployment
Approximate Cost:
~$7-15K/year
Notes:
Designed for teams without a SOC
Service:
Huntress
Best For:
Endpoint-focused detection + response
Approximate Cost:
~$5-10K/year
Notes:
Strong for MSP-managed environments

Open-Source and Lightweight Options

Tool:
Wazuh
Best For:
Combined endpoint security + SIEM
Cost:
Free (open source)
Notes:
Active community; supports compliance dashboards
Tool:
Graylog
Best For:
Centralized log management
Cost:
Free tier; paid from ~$1,250/month
Notes:
Good for log centralization without full SIEM
Tool:
Security Onion
Best For:
Network monitoring + log analysis
Cost:
Free (open source)
Notes:
Comprehensive but requires Linux expertise

PowerShell Scripts for Windows Log Collection

The scripts below supplement your monitoring by providing documented evidence of proactive log review. They are not a replacement for a SIEM but can fill gaps for very small environments or serve as additional evidence for assessors.

Script 1: Export failed login events from the last 24 hours

# Export failed login attempts (Event ID 4625) from the last 24 hours
# Run on each Windows server in CUI scope; save output for assessor evidence

$startTime = (Get-Date).AddHours(-24)
$failedLogins = Get-WinEvent -FilterHashtable @{
    LogName   = 'Security'
    Id        = 4625
    StartTime = $startTime
} -ErrorAction SilentlyContinue

$failedLogins | Select-Object TimeCreated,
    @{N='TargetUser';E={$_.Properties[5].Value}},
    @{N='SourceIP';E={$_.Properties[19].Value}},
    @{N='FailureReason';E={$_.Properties[8].Value}} |
    Export-Csv ".\FailedLogins_$(Get-Date -Format 'yyyyMMdd').csv" -NoTypeInformation

Write-Host "Exported $($failedLogins.Count) failed login events"

Script 2: Verify audit policy configuration across domain controllers

# Verify that Windows Advanced Audit Policy is configured for CMMC AU controls
# Run on each domain controller; compare output against SSP baseline

$auditCategories = @(
    'Account Logon',
    'Account Management',
    'Logon/Logoff',
    'Object Access',
    'Policy Change',
    'Privilege Use',
    'System'
)

foreach ($category in $auditCategories) {
    $policy = auditpol /get /category:$category 2>$null
    Write-Host "`n=== $category ===" -ForegroundColor Cyan
    $policy | Select-String "Success|Failure|No Auditing"
}

Write-Host "`nCompare results against SSP baseline configuration document"

Script 3: Check Windows Event Log retention settings

# Verify event log retention settings meet CMMC requirements
# Minimum: Security log should retain at least 90 days of data

$logs = @('Security', 'Application', 'System')

foreach ($logName in $logs) {
    $log = Get-WinEvent -ListLog $logName
    $maxSizeMB = [math]::Round($log.MaximumSizeInBytes / 1MB, 1)
    $retention = $log.LogMode
    Write-Host "$logName : MaxSize=$maxSizeMB MB, Mode=$retention"
}

Write-Host "`nNote: 'Circular' mode overwrites old events. For CMMC, export logs"
Write-Host "to a SIEM or archive before they are overwritten."

What Do Assessors Expect to See During a CMMC Evaluation?

During a CMMC assessment by a C3PAO or DCMA DIBCAC, auditors focus on whether you can demonstrate functioning controls, not whether you own a specific product. Assessors typically verify:

  • Centralized log visibility. Logs are systematically collected in one or few accessible locations. They will ask to see the log sources and the collection mechanism.

  • Alerting mechanisms. Automated or manual processes that identify and flag suspicious events. They will ask to see recent alerts and what action was taken.

  • Documented retention. Preserve images and relevant monitoring/packet-capture data for at least 90 days after reporting a DFARS-reportable incident. Define retention that supports monitoring, analysis, and investigations.

  • Incident response documentation. Evidence such as tickets, reports, or workflows tied to analyzed logs. They will ask for examples of past incidents or exercises.

The form of the tool you use matters less than whether your controls consistently perform as required. For deeper guidance on what evidence assessors review, see What Evidence is Needed for a CMMC Level 2 Assessment? and What to Expect During a C3PAO CMMC Assessment.


Frequently Asked Questions

Frequently Asked Questions

Does CMMC actually require a SIEM?

No. The regulations mandate log collection, review, and monitoring controls but do not specify a SIEM by name. However, for most organizations with more than a handful of systems, a SIEM or managed SIEM service is the most practical way to satisfy AU controls 3.3.1 through 3.3.9 and demonstrate compliance to a C3PAO assessor.

What tools do contractors use to comply with CMMC 2.0?

Most use a combination of Microsoft 365 security features, endpoint detection and response (EDR), vulnerability management, and a SIEM or log management solution. Managed SIEM/MDR services like Arctic Wolf, Blumira, and Huntress are increasingly popular with small and mid-sized contractors because they provide 24/7 monitoring without requiring dedicated security staff.

Can log management without a SIEM meet CMMC requirements?

Yes, provided you can prove logs are centrally collected, regularly reviewed, retained according to policy, and that incident detection is effective. For very small environments (fewer than 5 systems), centralized syslog with documented manual review and PowerShell-based evidence collection can work. Document your review schedule and keep evidence of every review session.

How long must logs be retained for CMMC Level 2?

NIST SP 800-171 does not prescribe a fixed duration. Define retention that supports monitoring, analysis, and investigations. If you report a DFARS 252.204-7012 cyber incident, preserve images of known affected systems and relevant monitoring/packet-capture data for at least 90 days after reporting. Many organizations adopt 90 days online and 1-3 years archived as a practical standard.

What is the best SIEM option for small businesses?

For Microsoft-native environments, Microsoft Sentinel with pay-per-GB pricing is often the most cost-effective starting point. For organizations wanting a managed service, Blumira (starting around $7K/year) is designed for teams without a dedicated SOC. Wazuh offers a strong free open-source alternative for organizations with Linux expertise.

Is outsourcing SIEM monitoring acceptable for CMMC?

Yes. Managed SIEM or Managed Detection and Response (MDR) services are common and accepted by assessors, as long as you maintain oversight, retain access to your logs, and can produce evidence of monitoring and incident response during your assessment. Document the managed service relationship in your SSP.

What are some recommended lightweight scripts for log collection?

PowerShell scripts that export Windows Security Event Log entries (Event IDs 4625 for failed logins, 4624 for successful logins, 4720/4726 for account changes) are common building blocks. See the PowerShell examples in the Tools section above. These scripts supplement a SIEM or serve as evidence of proactive log review for very small environments.


CMMC does not require a SIEM by name, but it requires the outcomes a SIEM delivers. For most defense contractors, the question is not whether to invest in logging and monitoring, but which approach fits your environment, budget, and risk profile.

Start by auditing your current logging practices. Can you demonstrate centralized collection, active alerting, and documented retention? If not, the decision framework above will help you choose between a lightweight approach, a managed service, or a full SIEM deployment.

With CMMC Phase 2 enforcement set for November 10, 2026, contractors that implement functioning audit controls now will be positioned for a successful C3PAO assessment. Those that wait risk compressed timelines and the possibility of failing their assessment before they can qualify for new DoD contracts.


References

Track the controls behind your monitoring stack

Free compliance tracker for all 110 NIST 800-171 practices.

Ready to move forward?

Start your free CMMC tracker