CMMC Level 2 Practice 3.7.2: Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system
CMMC Level 2 Practice 3.7.2 requires you to control who can perform system monitoring and how they do it by governing the tools, techniques, mechanisms, and personnel involved in monitoring and related security functions. To operationalize it, you need an approved monitoring toolset, restricted and logged access, defined analyst procedures, and durable evidence that monitoring activities are authorized, traceable, and protected. (NIST SP 800-171 Rev. 2)
Key takeaways:
- Treat monitoring capability as privileged: restrict tools, configs, and consoles to authorized roles and managed devices. (NIST SP 800-171 Rev. 2)
- Standardize monitoring techniques (what to collect, how to respond, how to store) and prove they run consistently. (NIST SP 800-171 Rev. 2)
- Evidence wins assessments: maintain tool inventories, access lists, logging, and runbooks tied to your CUI environment boundary. (DoD CMMC Program Guidance)
For most CMMC Level 2 programs, “monitoring” sprawl is the silent failure mode: too many consoles, too many browser-based admin panels, too many people with standing access, and too little proof that monitoring is controlled. Practice 3.7.2 addresses that risk directly by requiring controls over the monitoring capability itself, not only the systems being monitored. (NIST SP 800-171 Rev. 2)
As the Compliance Officer, CCO, or GRC lead, your job is to turn this into an assessable control that an external assessor can test quickly: (1) you know which tools and mechanisms are used to monitor the CUI environment, (2) you can show only approved personnel use them, (3) you can show defined techniques and procedures are followed, and (4) you can produce evidence without scrambling. (DoD CMMC Program Guidance)
This page gives requirement-level implementation guidance you can put into tickets, SOPs, and access control changes. It assumes you have a defined CMMC Level 2 assessment scope and a CUI boundary, and it focuses on operational monitoring functions such as SIEM, EDR, vulnerability scanning, alert triage, and administrative access to security tooling. (NIST SP 800-171 Rev. 2)
Regulatory text
Excerpt (as provided): “CMMC Level 2 practice mapped to NIST SP 800-171 Rev. 2 requirement 3.7.2 (Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system).” (NIST SP 800-171 Rev. 2)
Operator interpretation: You must prevent unauthorized or unmanaged monitoring activity by controlling:
- Tools (products and platforms used to monitor or assess security)
- Techniques (methods and procedures analysts use, such as queries, scans, data collection, triage, escalation)
- Mechanisms (technical means: accounts, APIs, agents, collectors, sensors, integrations, admin consoles)
- Personnel (who is allowed to do monitoring, under what conditions, with what training/authorization)
In practice, assessors look for two things: (1) governance and access control around the monitoring toolchain, and (2) repeatable evidence that the governance actually operates in your CUI environment. (DoD CMMC Program Guidance)
Plain-English requirement interpretation
You must run monitoring like a controlled security function, not an ad hoc activity. That means you:
- Decide which monitoring stack is “approved” for the CUI boundary.
- Limit monitoring access to named roles and authorized individuals.
- Enforce secure configurations and change control for collectors, agents, rules, and integrations.
- Keep monitoring outputs (alerts, logs, cases) protected from tampering and inappropriate access.
- Maintain evidence that proves all of the above. (NIST SP 800-171 Rev. 2)
A useful mental model: your monitoring tools are “security-sensitive systems” because they can expose broad system data and can be abused to hide malicious activity. So you control them like you control admin access. (NIST SP 800-171 Rev. 2)
Who it applies to
Entities: Defense contractors and other federal contractors handling CUI that are pursuing or maintaining CMMC Level 2 certification. (32 CFR Part 170)
Operational context: Any environment in scope for CMMC Level 2 (your CUI boundary) where you perform or outsource:
- Security monitoring and alerting (SIEM/SOAR, MDR portal, log management)
- Endpoint or server security operations (EDR/XDR consoles)
- Network security monitoring (IDS/IPS dashboards, network detection tools)
- Vulnerability scanning and security assessment tools
- Centralized identity monitoring tied to privileged actions (IdP admin, PAM monitoring)
- Incident response case management where monitoring evidence is stored. (NIST SP 800-171 Rev. 2)
Third parties: If a managed security provider (MDR/MSSP), IR retainer, or IT outsourcer performs monitoring for your CUI boundary, 3.7.2 still applies. You must control their personnel access, their tool pathways, and the mechanisms that connect into your environment. (NIST SP 800-171 Rev. 2)
What you actually need to do (step-by-step)
Step 1: Define your “monitoring capability” for the CUI boundary
Create a short list of what counts as monitoring for your scoped systems:
- Tools: SIEM/log platform, EDR, vulnerability scanner, ticketing/case tool used for alerts, cloud-native monitoring consoles, MDR portals.
- Mechanisms: agents, collectors, API connectors, service accounts, syslog forwarders, admin consoles, jump hosts.
- Techniques: alert triage steps, query patterns, scanning cadence approach, escalation paths. (NIST SP 800-171 Rev. 2)
Deliverable: Monitoring Toolchain Inventory (CUI scope) owned by Security/GRC.
Step 2: Approve the toolset and block “shadow monitoring”
Write and enforce a rule: only approved tools and mechanisms may collect/receive/security-monitor data from the CUI boundary.
- Route log forwarding to sanctioned destinations only.
- Disable or restrict ad hoc tools that duplicate monitoring (personal scanners, unapproved agents).
- Require change approval before adding a new collector, integration, or monitoring destination. (NIST SP 800-171 Rev. 2)
Practical control: a simple “Allowed Monitoring Tools and Integrations” standard paired with technical enforcement (config management, network controls, endpoint controls).
Step 3: Lock down personnel access (least privilege + strong admin hygiene)
For each monitoring tool, implement:
- Role-based access control (RBAC) aligned to job functions (Tier 1 analyst vs. engineer vs. auditor/read-only).
- Named accounts only; avoid shared admin accounts.
- MFA for console access.
- Privileged access restrictions (admin actions only from managed devices or controlled access paths such as a jump host).
- Joiner/mover/leaver integration: immediate removal when roles change. (NIST SP 800-171 Rev. 2)
Assessment-ready tip: maintain a current access roster per tool and map each person to an approved role and authorization record.
Step 4: Control techniques with written procedures (runbooks) that match reality
Document how monitoring is performed, at least at a level an assessor can test:
- What gets monitored (log sources, endpoints, cloud accounts) in the CUI boundary.
- Alert triage workflow, severity categories, and escalation.
- How to handle false positives, tuning, and rule changes.
- How to preserve monitoring evidence for investigations (case notes, exported logs, snapshots). (NIST SP 800-171 Rev. 2)
Common hangup: teams have runbooks that describe an ideal state, but analysts follow tribal knowledge. Make the runbook reflect the actual sequence and actual tool names.
Step 5: Control mechanisms (service accounts, APIs, agents, and rule/config change)
Monitoring mechanisms are where attackers hide:
- Treat SIEM connectors, EDR policies, and logging pipelines as configuration-controlled items.
- Use change control for: new log sources, parser changes, correlation rules, EDR exclusions, sensor disablement, API token changes.
- Review privileged changes to monitoring configurations and keep logs of those changes. (NIST SP 800-171 Rev. 2)
Minimum expectation: you can show who changed a detection rule, when, why, and under what approval.
Step 6: Verify and capture recurring evidence (make it easy to prove)
Build a recurring evidence package for assessors:
- Monthly (or other defined cadence) access review exports for monitoring tools.
- Change records for monitoring configuration changes.
- Samples of alert handling showing consistent process execution. (DoD CMMC Program Guidance)
If you use Daydream, this is a good place to map 3.7.2 to a single control narrative and set recurring evidence requests so you stop chasing screenshots during assessment season. (DoD CMMC Program Guidance)
Required evidence and artifacts to retain
Keep evidence tied to the CUI boundary and the specific toolchain in scope.
Governance and scope
- Monitoring Toolchain Inventory (tools, mechanisms, integrations, owners) (NIST SP 800-171 Rev. 2)
- Approved tool standard / security monitoring policy statement (NIST SP 800-171 Rev. 2)
Access control
- Current RBAC matrix (roles → permissions) per tool (NIST SP 800-171 Rev. 2)
- List of users with access + approval/authorization basis (NIST SP 800-171 Rev. 2)
- MFA enforcement screenshots/config exports for consoles (NIST SP 800-171 Rev. 2)
- Access review records and remediation tickets (DoD CMMC Program Guidance)
Operational procedures
- Monitoring runbooks and escalation paths (NIST SP 800-171 Rev. 2)
- Training/qualification records for personnel with monitoring access (NIST SP 800-171 Rev. 2)
Mechanism/config control
- Change control tickets for rule changes, new integrations, collector changes (NIST SP 800-171 Rev. 2)
- Audit logs from the monitoring tools showing admin actions (NIST SP 800-171 Rev. 2)
Execution proof
- Sample alert-to-ticket workflows, including timestamps and analyst actions (DoD CMMC Program Guidance)
- Evidence of log pipeline health checks or source coverage checks (NIST SP 800-171 Rev. 2)
Common exam/audit questions and hangups
Expect assessors to test control operation, not just policy. Common questions:
- “Which tools are used to monitor the CUI environment, and who approved them?” (NIST SP 800-171 Rev. 2)
- “Show me who has admin access to the SIEM/EDR/MDR portal and how you review it.” (DoD CMMC Program Guidance)
- “How do you prevent a contractor from exporting sensitive logs or disabling sensors?” (NIST SP 800-171 Rev. 2)
- “Show evidence of a monitoring configuration change and the approval trail.” (NIST SP 800-171 Rev. 2)
- “Do third-party analysts use named accounts and MFA?” (NIST SP 800-171 Rev. 2)
Hangup to anticipate: “system monitoring” language can be interpreted narrowly. Don’t fight that battle. Treat security monitoring and vulnerability monitoring as in scope wherever they touch the CUI boundary. (NIST SP 800-171 Rev. 2)
Frequent implementation mistakes (and how to avoid them)
-
Uncontrolled MDR portals. Teams outsource monitoring and forget that the portal is a privileged interface into security telemetry. Fix: require named accounts, RBAC, MFA, and periodic access reviews for the provider. (NIST SP 800-171 Rev. 2)
-
Shared admin accounts for tooling. This breaks accountability fast. Fix: unique identities and tool audit logging turned on; use break-glass accounts with documented control. (NIST SP 800-171 Rev. 2)
-
No change control for detections and exclusions. EDR exclusions and SIEM rule changes are high-risk. Fix: ticketed approval and post-change review for monitoring configs. (NIST SP 800-171 Rev. 2)
-
Evidence scattered across teams. Security says access is controlled; IT has the screenshots; the MDR has the logs. Fix: define a single evidence owner and a recurring evidence capture routine (Daydream can track and request artifacts on schedule). (DoD CMMC Program Guidance)
-
Over-scoping the requirement. Some teams try to govern every IT admin tool as “monitoring.” Fix: document the monitoring toolchain for the CUI boundary, and keep the scope crisp. (NIST SP 800-171 Rev. 2)
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific practice. (DoD CMMC Program Guidance)
Risk-wise, weak controls over monitoring tools create two assessment problems:
- You cannot demonstrate that monitoring is trustworthy or repeatable.
- You cannot demonstrate that unauthorized personnel cannot access or manipulate security telemetry and detection logic. (NIST SP 800-171 Rev. 2)
Those gaps tend to cascade into other CMMC/NIST expectations around audit logging, incident response, configuration management, and access control, which increases the scope of remediation during certification preparation. (NIST SP 800-171 Rev. 2)
Practical 30/60/90-day execution plan
First 30 days (stabilize scope + access)
- Establish the monitoring toolchain inventory for the CUI boundary and name an owner per tool. (NIST SP 800-171 Rev. 2)
- Pull current access lists for each monitoring console and remove obvious over-privilege (shared accounts, stale users, excessive admins). (NIST SP 800-171 Rev. 2)
- Require MFA and named accounts for all monitoring portals and admin interfaces in scope. (NIST SP 800-171 Rev. 2)
- Start an evidence folder structure aligned to each tool and each requirement test step. (DoD CMMC Program Guidance)
Next 60 days (standardize technique + mechanism control)
- Publish runbooks for alert handling and escalation that match actual practice. (NIST SP 800-171 Rev. 2)
- Implement change control for SIEM rules, EDR policies/exclusions, log source onboarding, and connector credentials. (NIST SP 800-171 Rev. 2)
- Turn on and retain admin/audit logs for monitoring tools, and confirm you can retrieve them on request. (NIST SP 800-171 Rev. 2)
- Formalize third-party monitoring access requirements in contracts/SOWs and ensure the provider meets identity and logging expectations. (NIST SP 800-171 Rev. 2)
Next 90 days (prove operation + make it repeatable)
- Run an internal “assessment-style” test: pick a recent monitoring change and an alert, then produce end-to-end evidence in one sitting. (DoD CMMC Program Guidance)
- Perform a periodic access review for monitoring tools and track remediation to closure. (DoD CMMC Program Guidance)
- Create a recurring evidence capture routine (exports, screenshots, tickets) so evidence is current without manual chasing; Daydream can automate reminders and map artifacts directly to 3.7.2. (DoD CMMC Program Guidance)
Frequently Asked Questions
Does 3.7.2 apply to vulnerability scanners, or only SIEM/EDR?
If the scanner and its results are part of how you monitor the security state of the CUI boundary, treat it as in scope for 3.7.2 controls. Control access, scanning configuration changes, and who can run scans and view results. (NIST SP 800-171 Rev. 2)
We use an MDR. Can we rely on the provider’s controls?
You can rely on them operationally, but you still need governance and evidence for your environment: named access, MFA, RBAC, and auditable approval for who at the third party can access your telemetry. Keep provider attestations plus your own access and contract artifacts. (NIST SP 800-171 Rev. 2)
What counts as “mechanisms” in practice?
Mechanisms include the technical pathways that make monitoring work: agents, collectors, API tokens, service accounts, forwarding rules, and admin consoles. Control them with least privilege, secure configuration, and change approval. (NIST SP 800-171 Rev. 2)
How do we prove “techniques” are controlled?
Show runbooks and actual records that match them, such as alert tickets with consistent triage steps, escalation notes, and rule-tuning change records. Assessors want to see repeatability, not a policy binder. (DoD CMMC Program Guidance)
Do we need a separate policy just for 3.7.2?
A separate policy is optional; assessability is not. Many teams meet 3.7.2 with a monitoring standard, tool inventory, RBAC documentation, and change control procedures that clearly cover the toolchain. (NIST SP 800-171 Rev. 2)
What’s the fastest way to fail this control during an assessment?
Having no authoritative list of monitoring tools and no clean access story. If you cannot show who has access to the SIEM/EDR/MDR portal and why, the assessor will treat the control as not implemented. (DoD CMMC Program Guidance)
Frequently Asked Questions
Does 3.7.2 apply to vulnerability scanners, or only SIEM/EDR?
If the scanner and its results are part of how you monitor the security state of the CUI boundary, treat it as in scope for 3.7.2 controls. Control access, scanning configuration changes, and who can run scans and view results. (NIST SP 800-171 Rev. 2)
We use an MDR. Can we rely on the provider’s controls?
You can rely on them operationally, but you still need governance and evidence for your environment: named access, MFA, RBAC, and auditable approval for who at the third party can access your telemetry. Keep provider attestations plus your own access and contract artifacts. (NIST SP 800-171 Rev. 2)
What counts as “mechanisms” in practice?
Mechanisms include the technical pathways that make monitoring work: agents, collectors, API tokens, service accounts, forwarding rules, and admin consoles. Control them with least privilege, secure configuration, and change approval. (NIST SP 800-171 Rev. 2)
How do we prove “techniques” are controlled?
Show runbooks and actual records that match them, such as alert tickets with consistent triage steps, escalation notes, and rule-tuning change records. Assessors want to see repeatability, not a policy binder. (DoD CMMC Program Guidance)
Do we need a separate policy just for 3.7.2?
A separate policy is optional; assessability is not. Many teams meet 3.7.2 with a monitoring standard, tool inventory, RBAC documentation, and change control procedures that clearly cover the toolchain. (NIST SP 800-171 Rev. 2)
What’s the fastest way to fail this control during an assessment?
Having no authoritative list of monitoring tools and no clean access story. If you cannot show who has access to the SIEM/EDR/MDR portal and why, the assessor will treat the control as not implemented. (DoD CMMC Program Guidance)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream