Skip to main content

πŸ’Ό 10.4.2 Logs of all other system components are reviewed periodically.

Description​

Those not specified in Requirement 10.4.1

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/10/04/02
    • /frameworks/aws-fsbp-v1.0.0/api-gateway/09
    • /frameworks/aws-fsbp-v1.0.0/appsync/02
    • /frameworks/aws-fsbp-v1.0.0/cloudfront/05
    • /frameworks/aws-fsbp-v1.0.0/dms/07
    • /frameworks/aws-fsbp-v1.0.0/dms/08
    • /frameworks/aws-fsbp-v1.0.0/ec2/171
    • /frameworks/aws-fsbp-v1.0.0/elastic-beanstalk/03
    • /frameworks/aws-fsbp-v1.0.0/es/05
    • /frameworks/aws-fsbp-v1.0.0/route-53/02
    • /frameworks/aws-fsbp-v1.0.0/rds/36
    • /frameworks/aws-fsbp-v1.0.0/rds/37
    • /frameworks/aws-fsbp-v1.0.0/step-functions/01
    • /frameworks/aws-fsbp-v1.0.0/waf/01

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [AppSync.2] AWS AppSync should have field-level logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [APIGateway.9] Access logging should be configured for API Gateway V2 Stages11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [CloudFront.5] CloudFront distributions should have logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DMS.7] DMS replication tasks for the target database should have logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DMS.8] DMS replication tasks for the source database should have logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EC2.171] EC2 VPN connections should have logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ElasticBeanstalk.3] Elastic Beanstalk should stream logs to CloudWatch
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ES.5] Elasticsearch domains should have audit logging enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.36] RDS for PostgreSQL DB instances should publish logs to CloudWatch Logs
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.37] Aurora PostgreSQL DB clusters should publish logs to CloudWatch Logs
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Route53.2] Route 53 public hosted zones should log DNS queries
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [StepFunctions.1] Step Functions state machines should have logging turned on
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [WAF.1] AWS WAF Classic Global Web ACL logging should be enabled
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 10.4.2 Logs of all other system components are reviewed periodically.11

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 10.4.2 Logs of all other system components are reviewed periodically.11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό 10.4.2.1 The frequency of periodic log reviews for all other system components is defined in the entity's targeted risk analysis.

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS API Gateway API Access Logging in CloudWatch is not enabled 🟒1🟠 x1, 🟒 x5