Skip to main content

💼 10.4.2 Logs of all other system components are reviewed periodically.

  • ID: /frameworks/pci-dss-v4.0.1/10/04/02

Description

Those not specified in Requirement 10.4.1

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/10/04/02
    • /frameworks/aws-fsbp-v1.0.0/api-gateway/09
    • /frameworks/aws-fsbp-v1.0.0/appsync/02
    • /frameworks/aws-fsbp-v1.0.0/cloudfront/05
    • /frameworks/aws-fsbp-v1.0.0/dms/07
    • /frameworks/aws-fsbp-v1.0.0/dms/08
    • /frameworks/aws-fsbp-v1.0.0/ec2/171
    • /frameworks/aws-fsbp-v1.0.0/elastic-beanstalk/03
    • /frameworks/aws-fsbp-v1.0.0/es/05
    • /frameworks/aws-fsbp-v1.0.0/route-53/02
    • /frameworks/aws-fsbp-v1.0.0/rds/36
    • /frameworks/aws-fsbp-v1.0.0/rds/37
    • /frameworks/aws-fsbp-v1.0.0/step-functions/01
    • /frameworks/aws-fsbp-v1.0.0/waf/01

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [AppSync.2] AWS AppSync should have field-level logging enabledno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [APIGateway.9] Access logging should be configured for API Gateway V2 Stages11no data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CloudFront.5] CloudFront distributions should have logging enabled11no data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DMS.7] DMS replication tasks for the target database should have logging enabled1no data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DMS.8] DMS replication tasks for the source database should have logging enabled1no data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.171] EC2 VPN connections should have logging enabledno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [ElasticBeanstalk.3] Elastic Beanstalk should stream logs to CloudWatchno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [ES.5] Elasticsearch domains should have audit logging enabledno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.36] RDS for PostgreSQL DB instances should publish logs to CloudWatch Logsno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.37] Aurora PostgreSQL DB clusters should publish logs to CloudWatch Logsno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Route53.2] Route 53 public hosted zones should log DNS queriesno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [StepFunctions.1] Step Functions state machines should have logging turned onno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [WAF.1] AWS WAF Classic Global Web ACL logging should be enabledno data
💼 PCI DSS v4.0 → 💼 10.4.2 Logs of all other system components are reviewed periodically.15no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v4.0 → 💼 10.4.2 Logs of all other system components are reviewed periodically.15no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 10.4.2.1 The frequency of periodic log reviews for all other system components is defined in the entity's targeted risk analysis.2no data

Policies (5)

PolicyLogic CountFlagsCompliance
🛡️ AWS API Gateway API Access Logging in CloudWatch is not enabled🟢1🟠 x1, 🟢 x5no data
🛡️ AWS CloudFront Distribution Logging is not enabled🟢1🟢 x6no data
🛡️ AWS DMS Migration Task Logging is not enabled🟢1🟢 x6no data
🛡️ Google Cloud Audit Logging is not configured properly🟢1🟢 x6no data
🛡️ Google GCE Network DNS Policy Logging is not enabled🟢1🟢 x6no data