10.2: 1. Audit logs are enabled and active for all system components and cardholder data.
  • Interview the system administrator and examine system configurations to verify that audit logs are enabled and active for all system components.

Description

Purpose

Audit logs must exist for all system components. Audit logs send alerts the system administrator, provides data to other monitoring mechanisms, such as intrusion-detection systems (IDS) and security information and event monitoring systems (SIEM) tools, and provide a history trail for post-incident investigation.

Logging and analyzing security-relevant events enable an organization to identify and trace potentially malicious activities.

Good Practice

When an entity considers which information to record in their logs, it is important to remember that information stored in audit logs is sensitive and should be protected per requirements in this standard. Care should be taken to only store essential information in the audit logs to minimize risk.

10.2: 1.1. Audit logs capture all individual user access to cardholder data.
  • Examine audit log configurations and log data to verify that all individual user access to cardholder data is logged.

Description

Purpose

It is critical to have a process or system that links user access to system components accessed. Malicious individuals could obtain knowledge of a user account with access to systems in the CDE, or they could create a new, unauthorized account to access cardholder data.

Good Practice

A record of all individual access to cardholder data can identify which accounts may have been compromised or misused.

10.2: 1.2. Audit logs capture all actions taken by any individual with administrative access, including any interactive use of application or system accounts.
  • Examine audit log configurations and log data to verify that all actions taken by any individual with administrative access, including any interactive use of application or system accounts, are logged.

Description

Purpose

Accounts with increased access privileges, such as the “administrator” or “root” account, have the potential to significantly impact the security or operational functionality of a system. Without a log of the activities performed, an organization is cannot trace any issues resulting from an administrative mistake or misuse of privilege back to the specific action and account.

Definitions

The functions or activities considered to be administrative are beyond those performed by regular users as part of routine business functions.

Refer to Appendix G for the definition of “administrative access.”

10.2: 1.3. Audit logs capture all access to audit logs.
  • Examine audit log configurations and log data to verify that access to all audit logs is captured.

Description

Purpose

Malicious users often attempt to alter audit logs to hide their actions. A record of access allows an organization to trace any inconsistencies or potential tampering of the logs to an individual account. Having logs identify changes, additions, and deletions to the audit logs can help retrace steps made by unauthorized personnel.

10.2: 1.4. Audit logs capture all invalid logical access attempts.
  • Examine audit log configurations and log data to verify that invalid logical access attempts are captured.

Description

Purpose

Malicious individuals will often perform multiple access attempts on targeted systems. Multiple invalid login attempts may be an indication of an unauthorized user’s attempts to “brute force” or guess a password.

10.2: 1.5. Audit logs capture all changes to identification and authentication credentials including, but not limited to: (a) Creation of new accounts, (b) Elevation of privileges, (c) All changes, additions, or deletions to accounts with administrative access.
  • Examine audit log configurations and log data to verify that changes to identification and authentication credentials are captured in accordance with all elements specified in this requirement.

Description

Purpose

Logging changes to authentication credentials (including elevation of privileges, additions, and deletions of accounts with administrative access) provides residual evidence of activities.

Malicious users may attempt to manipulate authentication credentials to bypass them or impersonate a valid account.

10.2: 1.6. Audit logs capture the following: (a) All initialization of new audit logs, and, (b) All starting, stopping, or pausing of the existing audit logs.
  • Examine audit log configurations and log data to verify that all elements specified in this requirement are captured.

Description

Purpose

Turning off or pausing audit logs before performing illicit activities is common practice for malicious users who want to avoid detection. Initialization of audit logs could indicate that that a user disabled the log function to hide their actions.

10.2: 1.7. Audit logs capture all creation and deletion of system-level objects.
  • Examine audit log configurations and log data to verify that creation and deletion of system level objects is captured.

Description

Purpose

Malicious software, such as malware, often creates or replaces system-level objects on the target system to control a particular function or operation on that system. By logging when system-level objects are created or deleted, it will be easier to determine whether such modifications were authorized.

10.2: 2. Audit logs record the following details for each auditable event: (a) User identification, (b) Type of event, (c) Date and time, (d) Success and failure indication, (e) Origination of event, (f) Identity or name of affected data, system component, resource, or service (for example, name and protocol).
  • Interview personnel and examine audit log configurations and log data to verify that all elements specified in this requirement are included in log entries for each auditable event (from 10.2.1.1 through 10.2.1.7).

Description

Purpose

By recording these details for the auditable events at 10.2.1.1 through 10.2.1.7, a potential compromise can be quickly identified, with sufficient detail to facilitate following up on suspicious activities.