https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf
This NIST Special Publication provides practical guidance on developing and maintaining effective log management practices.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd346db979178897d/5e9dfdd5dac81811514a1b08/information_logging_standard.pdf
This policy from SANS helps identify requirements that must be met by a system to generate logs.
https://www.sans.org/white-papers/33528
This SANS whitepaper offers common elements to success for log management, in order to prepare for regulatory compliance audits.
https://www.techtarget.com/searchsecurity/tip/Security-log-management-and-logging-best-practices
Learn how to conduct security log management that provides visibility into IT infrastructure activities and traffic, improves troubleshooting and prevents service disruptions.
https://www.youtube.com/watch?v=N2ixPAuymZQ
If everyone can manage your logs, no one is really accountable—and your CMMC assessor will definitely notice. This video covers how to comply with CMMC Control AU.L2-3.3.9, which is all about restricting audit logging privileges to a trusted few.
https://www.youtube.com/watch?v=lHHBz_nBZnQ
Audit logs are your evidence, your insurance policy, and your best friend during a CMMC assessment—but only if they’re secure. This video shows you exactly how to protect them and comply with CMMC Control AU.L2-3.3.8.