Audit Record Review, Analysis, and Reporting | Correlate Audit Record Repositories

To meet AU-6(3), you must analyze and correlate audit records across separate log repositories (cloud, endpoint, identity, network, app) so you can detect cross-system activity and maintain organization-wide situational awareness (NIST Special Publication 800-53 Revision 5). Operationally, that means normalizing log data, linking identities and assets, running correlation rules, and producing actionable review outputs with evidence.

Key takeaways:

  • Correlation is the requirement: single-source log review is not sufficient for AU-6(3) (NIST Special Publication 800-53 Revision 5).
  • You need repeatable joins across repositories (identity, asset, time, and event taxonomy), not ad hoc investigations.
  • Evidence must show the pipeline, the correlation logic, and the human review/reporting outcomes.

AU-6(3) is where “we collect logs” stops being a checkbox and becomes a detection capability. The enhancement requires you to analyze and correlate audit records across different repositories to gain organization-wide situational awareness (NIST Special Publication 800-53 Revision 5). For a CCO, GRC lead, or security compliance owner, the fastest way to operationalize this is to treat correlation as a defined, tested process: ingest from each authoritative source, normalize into a common schema, enrich with identity and asset context, then run correlation rules tied to real risk scenarios.

Auditors will look for two things: (1) coverage across distinct repositories (not just one SIEM feed), and (2) proof that correlation happens in practice and drives review and reporting outcomes. “We could correlate if we needed to” does not hold up; you need to show that you do correlate, you review the results, and you can report on what you found. This page gives you requirement-level implementation guidance, concrete evidence to retain, and a practical execution plan that a serious operator can run.

Regulatory text

Requirement (AU-6(3)): “Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.” (NIST Special Publication 800-53 Revision 5)

Operator interpretation:
You must be able to connect events that live in separate log stores (for example: IdP logs, cloud control plane logs, endpoint telemetry, application audit trails, network device logs) into a coherent timeline and narrative at the organization level. The outcome is not “more logs,” it is visibility into multi-step activity that spans systems, accounts, and environments (NIST Special Publication 800-53 Revision 5).

Plain-English interpretation (what AU-6(3) really asks for)

AU-6(3) expects you to answer questions like these without manual heroics:

  • “Did the same identity authenticate, elevate privileges, access sensitive data, and then exfiltrate?”
  • “Did a suspicious endpoint process map to a user, a SaaS session, and cloud API activity?”
  • “Did a third party support account behave normally across VPN/IdP, jump host, and production app logs?”

Correlation means you can reliably join events across repositories using shared context:

  • Identity correlation (human user, service account, workload identity, API key owner)
  • Asset correlation (hostname, instance ID, container/workload, device ID)
  • Time correlation (normalized timestamps and time zones)
  • Event taxonomy correlation (common categories like authentication, authorization, data access, administrative change)

Who it applies to

Entity types and environment:

  • Cloud Service Providers and Federal Agencies operating systems subject to NIST SP 800-53 controls (including FedRAMP-aligned environments) (NIST Special Publication 800-53 Revision 5).

Operational contexts where AU-6(3) becomes a practical requirement:

  • Hybrid environments (on-prem + cloud) with separate logging stacks.
  • Multi-cloud deployments with multiple control-plane log sources.
  • SaaS-heavy identity footprints (IdP + multiple SaaS audit logs).
  • Segmented environments (prod vs. dev) with separate repositories.
  • Managed security service arrangements where some logs are external, some internal.

If you have more than one repository that contains security-relevant audit records, AU-6(3) is asking you to correlate across them, not just review them independently (NIST Special Publication 800-53 Revision 5).

What you actually need to do (step-by-step)

1) Inventory audit record repositories and declare “authoritative sources”

Create a log source register that answers:

  • Source system (IdP, cloud platform, EDR, application, database, network)
  • Owner (team/system)
  • What events it records (auth, admin actions, data access, configuration change)
  • How you access it (API, agent, syslog, export)
  • Retention location(s) (native, centralized, archive)
  • Data quality risks (missing fields, inconsistent timestamps, high noise)

Deliverable: Audit Record Repository Inventory with named owners and access method per source.

2) Define a common event schema and normalization rules

To correlate, fields must mean the same thing across sources. Establish a normalized schema (even if your tooling enforces it) for:

  • event_time (UTC)
  • actor_id (user/service identity)
  • actor_type (human/service)
  • source_ip
  • target_resource (system, dataset, bucket, VM, application record)
  • action (login, create, delete, read, policy change)
  • result (success/fail)
  • session_id / request_id (where available)

Deliverable: Log Normalization Standard and mapping documentation per source.

3) Build identity and asset correlation lookups

Correlation breaks without strong join keys. Maintain reference datasets:

  • Identity directory export (IdP user IDs, email aliases, role groups)
  • Service account registry (owners, purpose, where used)
  • Asset inventory mapping (hostnames to instance IDs, device IDs to users)
  • Network reference tables (NAT gateways, VPN concentrators, proxy egress IPs)

Deliverable: Correlation Lookup Tables with refresh process and ownership.

4) Centralize or federate correlation analytics

You do not have to physically store all logs in one place, but you must be able to analyze and correlate across repositories (NIST Special Publication 800-53 Revision 5). Two viable patterns:

  • Centralized analytics: feed sources into a SIEM/data lake, correlate there.
  • Federated analytics: keep logs in place but run cross-repository queries through a correlation layer.

Deliverable: Correlation Architecture Diagram showing data flows, controls, and responsible teams.

5) Implement correlation rules tied to defined scenarios

Start with scenario-driven correlations that span at least two repositories. Examples:

  • IdP successful login from new geo + privileged role assignment in directory/audit logs.
  • Endpoint detection on host + cloud control plane API calls from same user within the same window.
  • Failed logins in app + password reset in IdP + successful login + data export event in app audit log.
  • Third party remote access session start + unusual admin action in production app.

Deliverable: Correlation Rule Catalog with logic, inputs, severity, and owner.

6) Operationalize review and reporting outputs

AU-6(3) sits under audit record review, analysis, and reporting. Treat correlated detections as reviewable work:

  • Triage workflow with assignment and SLAs appropriate to severity.
  • Documented disposition categories (benign, suspicious, confirmed incident, false positive with tuning action).
  • Reporting rhythm for stakeholders (security leadership, system owners, compliance as needed).

Deliverable: Alert/Triage SOP plus evidence of performed reviews.

7) Test correlation regularly and tune for drift

Correlation quality degrades when schemas change, IDs rotate, or repositories drop fields. Test by:

  • Injecting known events (tabletop or controlled test accounts)
  • Validating joins (does actor_id map correctly? do timestamps align?)
  • Monitoring ingestion and parsing failures
  • Retiring noisy rules and replacing with higher-signal logic

Deliverable: Correlation Test Records and tuning/change tickets.

Practical tooling note (where Daydream fits)

If you struggle to keep evidence consistent across multiple teams and tools, Daydream can act as the system of record for your AU-6(3) narrative: source inventory, mapping artifacts, correlation rule catalog, review evidence, and audit-ready exports. The point is not the tool, it is compressing the time from “we have logs” to “we can prove correlation and review happened.”

Required evidence and artifacts to retain

Auditors typically want objective proof that correlation exists and is used. Keep:

  • Audit Record Repository Inventory (sources, owners, access paths)
  • Normalization/mapping documentation (source-to-schema mappings)
  • Identity and asset lookup datasets (or documented system-of-record references)
  • Correlation architecture diagram and data flow description
  • Correlation Rule Catalog (rule logic, inputs, severity, tuning history)
  • Samples of correlated outputs (alerts/cases) with timestamps and involved sources
  • Review records (tickets/cases) showing analysis, disposition, and escalation
  • Change management artifacts for parser updates and rule tuning
  • Access control evidence for log analytics platform (who can query/modify rules)

Common exam/audit questions and hangups

Expect these lines of inquiry:

  • “Which repositories are correlated?” Have the inventory ready, and show at least a few cross-repo use cases.
  • “Show me an example where correlation changed the outcome.” Provide a case that required two sources to understand (IdP + cloud audit, endpoint + app).
  • “How do you ensure identity consistency across systems?” Show lookup tables, alias handling, and service account ownership.
  • “How do you know correlation is working today?” Show ingestion health monitoring and test evidence.
  • “Who reviews correlated outputs, and how is it tracked?” Show the SOP and completed review tickets.

Hangup to avoid: presenting a SIEM screenshot of a single log feed and calling it correlation. AU-6(3) requires cross-repository analysis (NIST Special Publication 800-53 Revision 5).

Frequent implementation mistakes and how to avoid them

  1. No stable join keys (identity/asset gaps)
    Fix: make identity resolution a deliverable (aliases, unique IDs, service accounts). Tie it to IAM governance.

  2. Parsing “mostly works” but breaks silently
    Fix: alerts on ingestion/parsing failures, plus scheduled validation queries.

  3. Correlation rules exist but nobody reviews outputs
    Fix: connect alerts to a case workflow and require disposition notes.

  4. All correlation is ad hoc during incidents
    Fix: maintain a standing rule catalog and a recurring tuning cadence.

  5. Over-correlation creates noise and audit fatigue
    Fix: start with a small scenario set that crosses repositories and has clear response playbooks. Expand based on lessons learned.

Enforcement context and risk implications

No public enforcement sources were provided for this requirement, so do not tie AU-6(3) to specific cases here. Practically, weak correlation increases risk of:

  • Missing multi-stage intrusions that span identity, endpoint, and cloud control plane activity.
  • Delayed containment because analysts cannot link actions to an actor and impacted assets.
  • Inability to support audit assertions about “organization-wide situational awareness” (NIST Special Publication 800-53 Revision 5).

Practical 30/60/90-day execution plan

First 30 days (foundation)

  • Build the audit record repository inventory and name owners.
  • Select your normalized schema and document mappings for high-value sources (IdP, cloud control plane, endpoint, core application).
  • Stand up identity and asset lookup tables and define refresh ownership.
  • Produce one correlation example that joins at least two repositories end-to-end, with saved queries and a review record.

Days 31–60 (operationalize)

  • Implement a correlation rule catalog with defined scenarios, severity, and triage steps.
  • Connect correlated outputs to your ticketing/case workflow.
  • Start basic ingestion/parsing health monitoring and document remediation steps.
  • Run a tabletop test to validate that correlation links identity → asset → action across repositories, and retain the artifacts.

Days 61–90 (audit-ready maturity)

  • Expand to additional repositories (network, database audit, SaaS audit logs where relevant).
  • Tune rules based on false positives and missing joins; track changes.
  • Produce periodic reporting that summarizes correlated findings, trends, and remediation actions.
  • Package evidence in an auditor-friendly folder structure (inventory, mappings, rules, samples, reviews, tests).

Frequently Asked Questions

What counts as “different repositories” for AU-6(3)?

Any distinct log store or authoritative audit trail counts, such as your IdP logs, cloud provider audit logs, EDR console, application audit database, or network device logging. AU-6(3) expects correlation across those separate sources (NIST Special Publication 800-53 Revision 5).

Do we need a SIEM to satisfy the correlate audit record repositories requirement?

The control does not mandate a specific tool. You need a demonstrable capability to analyze and correlate across repositories, plus evidence of review and reporting outcomes (NIST Special Publication 800-53 Revision 5).

If logs are centralized in one platform, is AU-6(3) automatically met?

No. Centralization helps, but auditors will still ask for proof that you actually correlate across sources, maintain join logic, and review the correlated results in operations.

How do we handle correlation when identities differ across systems (email vs. UPN vs. GUID)?

Maintain an identity resolution table keyed on a stable unique identifier and map aliases to it. Document the mapping rules and show an example case where the alias mapping enabled cross-repository correlation.

What evidence is most persuasive in an assessment?

A small set of end-to-end artifacts: source inventory, a correlation rule definition, a correlated event output showing multiple repositories, and the review ticket showing disposition and follow-up actions.

How should we scope AU-6(3) for third parties that manage parts of our stack?

Require log access and correlation-relevant fields in contracts and operating procedures, then include those sources in your inventory and correlation flows. If a third party holds a repository you cannot query, document the compensating process you use to correlate their outputs with your internal sources.

Frequently Asked Questions

What counts as “different repositories” for AU-6(3)?

Any distinct log store or authoritative audit trail counts, such as your IdP logs, cloud provider audit logs, EDR console, application audit database, or network device logging. AU-6(3) expects correlation across those separate sources (NIST Special Publication 800-53 Revision 5).

Do we need a SIEM to satisfy the correlate audit record repositories requirement?

The control does not mandate a specific tool. You need a demonstrable capability to analyze and correlate across repositories, plus evidence of review and reporting outcomes (NIST Special Publication 800-53 Revision 5).

If logs are centralized in one platform, is AU-6(3) automatically met?

No. Centralization helps, but auditors will still ask for proof that you actually correlate across sources, maintain join logic, and review the correlated results in operations.

How do we handle correlation when identities differ across systems (email vs. UPN vs. GUID)?

Maintain an identity resolution table keyed on a stable unique identifier and map aliases to it. Document the mapping rules and show an example case where the alias mapping enabled cross-repository correlation.

What evidence is most persuasive in an assessment?

A small set of end-to-end artifacts: source inventory, a correlation rule definition, a correlated event output showing multiple repositories, and the review ticket showing disposition and follow-up actions.

How should we scope AU-6(3) for third parties that manage parts of our stack?

Require log access and correlation-relevant fields in contracts and operating procedures, then include those sources in your inventory and correlation flows. If a third party holds a repository you cannot query, document the compensating process you use to correlate their outputs with your internal sources.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
Audit Record Review, Analysis, and Reporting | Correlate ... | Daydream