Skip to main content

πŸ’Ό 10.2.1 Audit logs are enabled and active for all system components and cardholder data.

Description​

Empty...

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/10/02/01
    • /frameworks/aws-fsbp-v1.0.0/ec2/51
    • /frameworks/aws-fsbp-v1.0.0/eks/08
    • /frameworks/aws-fsbp-v1.0.0/opensearch/05
    • /frameworks/aws-fsbp-v1.0.0/rds/09
    • /frameworks/aws-fsbp-v1.0.0/rds/34
    • /frameworks/aws-fsbp-v1.0.0/redshift/04
    • /frameworks/aws-fsbp-v1.0.0/s3/09

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EC2.51] EC2 Client VPN endpoints should have client connection logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EKS.8] EKS clusters should have audit logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Opensearch.5] OpenSearch domains should have audit logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.9] RDS DB instances should publish logs to CloudWatch Logs
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.34] Aurora MySQL DB clusters should publish audit logs to CloudWatch Logs
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Redshift.4] Amazon Redshift clusters should have audit logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [S3.9] S3 general purpose buckets should have server access logging enabled12
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 10.2.1 Audit logs are enabled and active for all system components and cardholder data.78

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 10.2.1 Audit logs are enabled and active for all system components and cardholder data.78

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό 10.2.1.1 Audit logs capture all individual user access to cardholder data.4
πŸ’Ό 10.2.1.2 Audit logs capture all actions taken by any individual with administrative access, including any interactive use of application or system accounts.
πŸ’Ό 10.2.1.3 Audit logs capture all access to audit logs.1
πŸ’Ό 10.2.1.4 Audit logs capture all invalid logical access attempts.4
πŸ’Ό 10.2.1.5 Audit logs capture all changes to identification and authentication credentials.1
πŸ’Ό 10.2.1.6 Audit logs capture all initialization of new audit logs, starting, stopping, or pausing of the existing audit logs.
πŸ’Ό 10.2.1.7 Audit logs capture all creation and deletion of system-level objects.

Policies (2)​

PolicyLogic CountFlags
πŸ“ AWS CloudTrail S3 Bucket Access Logging is not enabled. 🟒1🟒 x6
πŸ“ AWS S3 Bucket Server Access Logging is not enabled 🟒1🟒 x6