The logs never lie. Every request, every change, every access—etched into a trail you can read if you know where to look. NIST 800-53 calls this the “Who Accessed What and When” requirement. It is the anchor for traceability, the mechanism that keeps systems honest and secure.
Under NIST 800-53, security control families like AU (Audit and Accountability) mandate that organizations track user activity with precision. “Who” means identifying the exact account or identity, even when that account belongs to a service or automated process. “What” defines the resource—file, database table, API endpoint, configuration—anything that can be touched or altered. “When” is the timestamp, synchronized to trusted time sources, recorded without gaps.
This is not optional logging. It is about ensuring you can reconstruct events after the fact, detect unauthorized actions in real time, and meet compliance audits without scrambling for missing data. Implementing it starts with centralizing logs from every component of your stack. Applications, databases, network devices, and authentication services must feed into a unified audit stream.
Identity correlation is essential. NIST 800-53 emphasizes linking actions to authenticated users across systems. This often means integrating with your identity provider and embedding session IDs or tokens into every log entry. Without this binding, your “who” becomes guesswork.