Skip to main content

💼 10.2 Audit logs are implemented to support the detection of anomalies and suspicious activity, and the forensic analysis of events.

Description​

Empty...

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 10.2.1 Audit logs are enabled and active for all system components and cardholder data.718
    💼 10.2.1.1 Audit logs capture all individual user access to cardholder data.14
    💼 10.2.1.2 Audit logs capture all actions taken by any individual with administrative access, including any interactive use of application or system accounts.15
    💼 10.2.1.3 Audit logs capture all access to audit logs.9
    💼 10.2.1.4 Audit logs capture all invalid logical access attempts.14
    💼 10.2.1.5 Audit logs capture all changes to identification and authentication credentials.16
    💼 10.2.1.6 Audit logs capture all initialization of new audit logs, starting, stopping, or pausing of the existing audit logs.9
    💼 10.2.1.7 Audit logs capture all creation and deletion of system-level objects.9
💼 10.2.2 Audit logs record the described details for each auditable event.9