💼 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.
- ID:
/frameworks/pci-dss-v3.2.1/10/06
Description​
Log harvesting, parsing, and alerting tools may be used to meet this Requirement.
Similar​
- Internal
- ID:
dec-c-c3738046
- ID:
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 10.6.1 Review security events and critical system component logs at least daily. | 2 | no data | |||
| 💼 10.6.2 Review logs of all other system components periodically based on the organization's policies and risk management strategy, as determined by the organization's annual risk assessment. | 5 | no data | |||
| 💼 10.6.3 Follow up exceptions and anomalies identified during the review process. | 2 | no data |