Skip to main content

💼 10.4.2 Logs of all other system components are reviewed periodically.

Description

Those not specified in Requirement 10.4.1

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/10/04/02
    • /frameworks/aws-fsbp-v1.0.0/api-gateway/09
    • /frameworks/aws-fsbp-v1.0.0/appsync/02
    • /frameworks/aws-fsbp-v1.0.0/cloudfront/05
    • /frameworks/aws-fsbp-v1.0.0/dms/07
    • /frameworks/aws-fsbp-v1.0.0/dms/08
    • /frameworks/aws-fsbp-v1.0.0/ec2/171
    • /frameworks/aws-fsbp-v1.0.0/elastic-beanstalk/03
    • /frameworks/aws-fsbp-v1.0.0/es/05
    • /frameworks/aws-fsbp-v1.0.0/route-53/02
    • /frameworks/aws-fsbp-v1.0.0/rds/36
    • /frameworks/aws-fsbp-v1.0.0/rds/37
    • /frameworks/aws-fsbp-v1.0.0/step-functions/01
    • /frameworks/aws-fsbp-v1.0.0/waf/01

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [AppSync.2] AWS AppSync should have field-level logging enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [APIGateway.9] Access logging should be configured for API Gateway V2 Stages11
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudFront.5] CloudFront distributions should have logging enabled11
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DMS.7] DMS replication tasks for the target database should have logging enabled1
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DMS.8] DMS replication tasks for the source database should have logging enabled1
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.171] EC2 VPN connections should have logging enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [ElasticBeanstalk.3] Elastic Beanstalk should stream logs to CloudWatch
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [ES.5] Elasticsearch domains should have audit logging enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.36] RDS for PostgreSQL DB instances should publish logs to CloudWatch Logs
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.37] Aurora PostgreSQL DB clusters should publish logs to CloudWatch Logs
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Route53.2] Route 53 public hosted zones should log DNS queries
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [StepFunctions.1] Step Functions state machines should have logging turned on
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [WAF.1] AWS WAF Classic Global Web ACL logging should be enabled
💼 PCI DSS v4.0 → 💼 10.4.2 Logs of all other system components are reviewed periodically.15

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 PCI DSS v4.0 → 💼 10.4.2 Logs of all other system components are reviewed periodically.15

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 10.4.2.1 The frequency of periodic log reviews for all other system components is defined in the entity's targeted risk analysis.2

Policies (5)

PolicyLogic CountFlags
📝 AWS API Gateway API Access Logging in CloudWatch is not enabled 🟢1🟠 x1, 🟢 x5
📝 AWS CloudFront Distribution Logging is not enabled 🟢1🟢 x6
📝 AWS DMS Migration Task Logging is not enabled 🟢1🟢 x6
📝 Google Cloud Audit Logging is not configured properly 🟢1🟢 x6
📝 Google GCE Network DNS Policy Logging is not enabled 🟢1🟢 x6