💼 10.2 Audit logs are implemented to support the detection of anomalies and suspicious activity, and the forensic analysis of events.
- ID:
/frameworks/pci-dss-v4.0.1/10/02
Description​
Empty...
Similar​
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 10.2.1 Audit logs are enabled and active for all system components and cardholder data. | 7 | 27 | no data | ||
|  💼 10.2.1.1 Audit logs capture all individual user access to cardholder data. | 14 | no data | |||
|  💼 10.2.1.2 Audit logs capture all actions taken by any individual with administrative access, including any interactive use of application or system accounts. | 16 | no data | |||
|  💼 10.2.1.3 Audit logs capture all access to audit logs. | 9 | no data | |||
|  💼 10.2.1.4 Audit logs capture all invalid logical access attempts. | 14 | no data | |||
|  💼 10.2.1.5 Audit logs capture all changes to identification and authentication credentials. | 16 | no data | |||
|  💼 10.2.1.6 Audit logs capture all initialization of new audit logs, starting, stopping, or pausing of the existing audit logs. | 9 | no data | |||
|  💼 10.2.1.7 Audit logs capture all creation and deletion of system-level objects. | 9 | no data | |||
| 💼 10.2.2 Audit logs record the described details for each auditable event. | 9 | no data |