SAMMY works best on screens 1024px wide or larger.
10.1: All security policies and operational procedures that are identified in Requirement 10 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures identified in Requirement 10 are managed in accordance with all elements specified in this requirement.
Description

Requirement 10.1.1

Purpose

Requirement 10.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 10. While it is important to define the specific policies or procedures called out in Requirement 10, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 10.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

10.1: Roles and responsibilities for performing activities in Requirement 10 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 10 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 10 to verify that roles and responsibilities are assigned as defined and are understood.
Description

Requirement 10.1.1

Purpose

Requirement 10.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 10. While it is important to define the specific policies or procedures called out in Requirement 10, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 10.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

10.2: Audit logs are enabled and active for all system components and cardholder data.
  • Interview the system administrator and examine system configurations to verify that audit logs are enabled and active for all system components.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all individual user access to cardholder data.
  • Examine audit log configurations and log data to verify that all individual user access to cardholder data is logged.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all actions taken by any individual with administrative access, including any interactive use of application or system accounts.
  • Examine audit log configurations and log data to verify that all actions taken by any individual with administrative access, including any interactive use of application or system accounts, are logged.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all access to audit logs.
  • Examine audit log configurations and log data to verify that access to all audit logs is captured.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all invalid logical access attempts.
  • Examine audit log configurations and log data to verify that invalid logical access attempts are captured. invalid login attempts may be an indication of an unauthorized user’s attempts to “brute force” or guess a password. Records of all invalid access attempts are captured.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all changes to identification and authentication credentials including, but not limited to: (a) Creation of new accounts, (b) Elevation of privileges, (c) All changes, additions, or deletions to accounts with administrative access.
  • Examine audit log configurations and log data to verify that changes to identification and authentication credentials are captured in accordance with all elements specified in this requirement.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture the following: (a) All initialization of new audit logs, and, (b) All starting, stopping, or pausing of the existing audit logs.
  • Examine audit log configurations and log data to verify that all elements specified in this requirement are captured.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs capture all creation and deletion of system-level objects.
  • Examine audit log configurations and log data to verify that creation and deletion of system level objects is captured.
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.2: Audit logs record the following details for each auditable event: (a) User identification, (b) Type of event, (c) Date and time, (d) Success and failure indication, (e) Origination of event, (f) Identity or name of affected data, system component, resource, or service (for example, name and protocol).
  • Interview personnel and examine audit log configurations and log data to verify that all elements specified in this requirement are included in log entries for each auditable event (from 10.2.1.1 through 10.2.1.7).
Description

Requirement 10.2.1

Purpose

Audit logs provide a record of system activities that can be used to detect unauthorized access, identify security incidents, and support forensic investigations. Without audit logs, it may be impossible to determine what happened during a security incident.

Good Practice

Audit logs should be enabled for all system components in the CDE and for any system components that could affect the security of the CDE. Logs should capture sufficient detail to support security monitoring and forensic analysis.

Requirement 10.2.1.1

Purpose

Logging individual user access to cardholder data helps detect and investigate unauthorized access. If individual access is not logged, it may be impossible to determine who accessed the data during a security incident.

Good Practice

Log entries should include the user ID, date and time, type of access (read, write, delete), the data or resource accessed, and whether the access was successful or failed.

Requirement 10.2.1.2

Purpose

Actions taken by individuals with administrative privileges have a greater potential impact on system security. Logging all actions by these individuals helps detect misuse of privileges and supports forensic investigations.

Good Practice

All actions by administrators or users with elevated privileges should be logged, including configuration changes, account management activities, and access to sensitive data.

Requirement 10.2.1.3

Purpose

Access to audit logs should be logged to detect attempts to view or tamper with log data. If access to logs is not monitored, an attacker could view or modify log entries to cover their tracks.

Good Practice

All access to audit logs should be recorded, including who accessed the logs, when, and what actions were performed. Alerts should be generated for unauthorized access attempts.

Requirement 10.2.1.4

Purpose

Logging invalid logical access attempts helps detect brute-force attacks and other unauthorized access attempts. Patterns of failed access attempts may indicate an ongoing attack that requires immediate response.

Good Practice

All failed authentication attempts and unauthorized access attempts should be logged with sufficient detail to identify the source and target of the attempt.

Requirement 10.2.1.5

Purpose

Changes to identification and authentication credentials indicate potential account compromise or unauthorized access. Logging these changes helps detect and investigate suspicious activity.

Good Practice

All changes to user credentials, including password changes, password resets, and changes to authentication mechanisms, should be logged.

Requirement 10.2.1.6

Purpose

Modifications to audit logs could indicate an attempt to cover tracks after unauthorized activity. Logging any initialization, stopping, or pausing of audit logs helps detect tampering.

Good Practice

Any initialization, stopping, or pausing of audit log mechanisms should be logged and should generate alerts. These events should be investigated promptly.

Requirement 10.2.1.7

Purpose

Creation and deletion of system-level objects can indicate system compromise or unauthorized changes. Logging these events helps detect unauthorized modifications to the system.

Good Practice

The creation and deletion of system-level objects, including database tables, stored procedures, system files, and user accounts, should be logged.

Requirement 10.2.2

Purpose

Audit log entries need to contain sufficient detail to enable effective monitoring, alerting, and analysis. Without adequate detail, it may not be possible to determine the who, what, when, and where of an event.

Good Practice

Each audit log entry should include user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of affected data, system component, or resource.

10.3: Read access to audit logs files is limited to those with a job-related need.
  • Interview system administrators and examine system configurations and privileges to verify that only individuals with a job-related need have read access to audit log files.
Description

Requirement 10.3.1

Purpose

If audit log files can be read by unauthorized individuals, the information they contain could be used to facilitate further attacks or to identify opportunities for data theft.

Good Practice

Read access to audit trail files should be limited to those with a job-related need. Access controls should be implemented at both the operating system and application levels.

Requirement 10.3.2

Purpose

If audit log files are not protected from unauthorized modifications, the accuracy and reliability of the log data cannot be ensured. An attacker who gains access to log files could alter them to hide evidence of unauthorized activity.

Good Practice

Audit log files should be protected from unauthorized modifications using access controls, integrity monitoring, and other security measures. Centralized log management systems can help protect logs from local tampering.

Requirement 10.3.3

Purpose

Backing up audit log files to a central log server or separate media helps protect log data from loss due to system failure, intentional deletion, or other events. Having log data available on a separate system also supports forensic investigations.

Good Practice

Audit logs should be promptly backed up to a centralized log server that is difficult to alter. The log server should have different access controls than the systems generating the logs.

Requirement 10.3.4

Purpose

File integrity monitoring or change-detection mechanisms on audit logs help ensure that existing log data cannot be altered without generating alerts. This provides assurance that log data is reliable for security monitoring and forensic purposes.

Good Practice

File integrity monitoring should be implemented on audit log files and should generate alerts when modifications are detected. Alerts should be reviewed and investigated promptly.

10.3: Audit log files are protected to prevent modifications by individuals.
  • Examine system configurations and privileges and interview system administrators to verify that current audit log files are protected from modifications by individuals via access control mechanisms, physical segregation, and/or network segregation.
Description

Requirement 10.3.1

Purpose

If audit log files can be read by unauthorized individuals, the information they contain could be used to facilitate further attacks or to identify opportunities for data theft.

Good Practice

Read access to audit trail files should be limited to those with a job-related need. Access controls should be implemented at both the operating system and application levels.

Requirement 10.3.2

Purpose

If audit log files are not protected from unauthorized modifications, the accuracy and reliability of the log data cannot be ensured. An attacker who gains access to log files could alter them to hide evidence of unauthorized activity.

Good Practice

Audit log files should be protected from unauthorized modifications using access controls, integrity monitoring, and other security measures. Centralized log management systems can help protect logs from local tampering.

Requirement 10.3.3

Purpose

Backing up audit log files to a central log server or separate media helps protect log data from loss due to system failure, intentional deletion, or other events. Having log data available on a separate system also supports forensic investigations.

Good Practice

Audit logs should be promptly backed up to a centralized log server that is difficult to alter. The log server should have different access controls than the systems generating the logs.

Requirement 10.3.4

Purpose

File integrity monitoring or change-detection mechanisms on audit logs help ensure that existing log data cannot be altered without generating alerts. This provides assurance that log data is reliable for security monitoring and forensic purposes.

Good Practice

File integrity monitoring should be implemented on audit log files and should generate alerts when modifications are detected. Alerts should be reviewed and investigated promptly.

10.3: Audit log files, including those for external- facing technologies, are promptly backed up to a secure, central, internal log server(s) or other media that is difficult to modify.
  • Examine backup configurations or log files to verify that current audit log files, including those for external-facing technologies, are promptly backed up to a secure, central, internal log server(s) or other media that is difficult to modify.
Description

Requirement 10.3.1

Purpose

If audit log files can be read by unauthorized individuals, the information they contain could be used to facilitate further attacks or to identify opportunities for data theft.

Good Practice

Read access to audit trail files should be limited to those with a job-related need. Access controls should be implemented at both the operating system and application levels.

Requirement 10.3.2

Purpose

If audit log files are not protected from unauthorized modifications, the accuracy and reliability of the log data cannot be ensured. An attacker who gains access to log files could alter them to hide evidence of unauthorized activity.

Good Practice

Audit log files should be protected from unauthorized modifications using access controls, integrity monitoring, and other security measures. Centralized log management systems can help protect logs from local tampering.

Requirement 10.3.3

Purpose

Backing up audit log files to a central log server or separate media helps protect log data from loss due to system failure, intentional deletion, or other events. Having log data available on a separate system also supports forensic investigations.

Good Practice

Audit logs should be promptly backed up to a centralized log server that is difficult to alter. The log server should have different access controls than the systems generating the logs.

Requirement 10.3.4

Purpose

File integrity monitoring or change-detection mechanisms on audit logs help ensure that existing log data cannot be altered without generating alerts. This provides assurance that log data is reliable for security monitoring and forensic purposes.

Good Practice

File integrity monitoring should be implemented on audit log files and should generate alerts when modifications are detected. Alerts should be reviewed and investigated promptly.

10.3: File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts.
  • Examine system settings, monitored files, and results from monitoring activities to verify the use of file integrity monitoring or change-detection software on audit logs.
Description

Requirement 10.3.1

Purpose

If audit log files can be read by unauthorized individuals, the information they contain could be used to facilitate further attacks or to identify opportunities for data theft.

Good Practice

Read access to audit trail files should be limited to those with a job-related need. Access controls should be implemented at both the operating system and application levels.

Requirement 10.3.2

Purpose

If audit log files are not protected from unauthorized modifications, the accuracy and reliability of the log data cannot be ensured. An attacker who gains access to log files could alter them to hide evidence of unauthorized activity.

Good Practice

Audit log files should be protected from unauthorized modifications using access controls, integrity monitoring, and other security measures. Centralized log management systems can help protect logs from local tampering.

Requirement 10.3.3

Purpose

Backing up audit log files to a central log server or separate media helps protect log data from loss due to system failure, intentional deletion, or other events. Having log data available on a separate system also supports forensic investigations.

Good Practice

Audit logs should be promptly backed up to a centralized log server that is difficult to alter. The log server should have different access controls than the systems generating the logs.

Requirement 10.3.4

Purpose

File integrity monitoring or change-detection mechanisms on audit logs help ensure that existing log data cannot be altered without generating alerts. This provides assurance that log data is reliable for security monitoring and forensic purposes.

Good Practice

File integrity monitoring should be implemented on audit log files and should generate alerts when modifications are detected. Alerts should be reviewed and investigated promptly.

10.4: The following audit logs are reviewed at least once daily: (a) All security events, (b) Logs of all system components that store, process, or transmit CHD and/or SAD, (c) Logs of all critical system components, (d) Logs of all servers and system components that perform security functions (for example, network security controls, intrusion-detection systems/intrusion-prevention systems (IDS/IPS), authentication servers).
  • Examine security policies and procedures to verify that processes are defined for reviewing all elements specified in this requirement at least once daily.
  • Observe processes and interview personnel to verify that all elements specified in this requirement are reviewed at least once daily
Description

Requirement 10.4.1

Purpose

Reviewing audit logs regularly helps identify anomalous or suspicious activity that could indicate a security incident. Without regular reviews, malicious activity recorded in audit logs may go undetected.

Good Practice

Audit logs should be reviewed at least daily. Reviews should focus on security events, critical system alerts, and logs from systems that store, process, or transmit cardholder data. Automated log analysis tools can help identify patterns and anomalies.

Requirement 10.4.1.1

Purpose

Automated mechanisms for performing audit log reviews help ensure that reviews are comprehensive and timely. Manual review of large volumes of log data is impractical and may miss important events.

Good Practice

Automated log review mechanisms should be configured to identify known attack patterns, anomalous behavior, and policy violations. Alerts should be generated for events that require human investigation.

Requirement 10.4.2

Purpose

Reviewing logs of all other system components periodically helps identify security events that might be missed by reviewing only CDE system logs. Attackers may target systems outside the CDE as a stepping stone to the CDE.

Good Practice

Logs of all system components, not just those in the CDE, should be reviewed periodically. The review frequency should be based on the entity's risk assessment.

Requirement 10.4.2.1

Purpose

The frequency of periodic log reviews should be based on a risk analysis that considers the system component's function, its exposure to threats, and the potential impact of a compromise.

Good Practice

A targeted risk analysis should define the review frequency for each system component or group of components. Higher-risk systems should be reviewed more frequently.

Requirement 10.4.3

Purpose

Exceptions and anomalies identified during log reviews need to be addressed promptly to prevent security incidents from escalating. Without follow-up, identified threats may result in data breaches.

Good Practice

A process should be in place for investigating and resolving exceptions and anomalies identified during log reviews. Investigations should be documented and completed in a timely manner.

10.4: Automated mechanisms are used to perform audit log reviews.
  • Examine log review mechanisms and interview personnel to verify that automated mechanisms are used to perform log reviews.
Description

Requirement 10.4.1

Purpose

Reviewing audit logs regularly helps identify anomalous or suspicious activity that could indicate a security incident. Without regular reviews, malicious activity recorded in audit logs may go undetected.

Good Practice

Audit logs should be reviewed at least daily. Reviews should focus on security events, critical system alerts, and logs from systems that store, process, or transmit cardholder data. Automated log analysis tools can help identify patterns and anomalies.

Requirement 10.4.1.1

Purpose

Automated mechanisms for performing audit log reviews help ensure that reviews are comprehensive and timely. Manual review of large volumes of log data is impractical and may miss important events.

Good Practice

Automated log review mechanisms should be configured to identify known attack patterns, anomalous behavior, and policy violations. Alerts should be generated for events that require human investigation.

Requirement 10.4.2

Purpose

Reviewing logs of all other system components periodically helps identify security events that might be missed by reviewing only CDE system logs. Attackers may target systems outside the CDE as a stepping stone to the CDE.

Good Practice

Logs of all system components, not just those in the CDE, should be reviewed periodically. The review frequency should be based on the entity's risk assessment.

Requirement 10.4.2.1

Purpose

The frequency of periodic log reviews should be based on a risk analysis that considers the system component's function, its exposure to threats, and the potential impact of a compromise.

Good Practice

A targeted risk analysis should define the review frequency for each system component or group of components. Higher-risk systems should be reviewed more frequently.

Requirement 10.4.3

Purpose

Exceptions and anomalies identified during log reviews need to be addressed promptly to prevent security incidents from escalating. Without follow-up, identified threats may result in data breaches.

Good Practice

A process should be in place for investigating and resolving exceptions and anomalies identified during log reviews. Investigations should be documented and completed in a timely manner.

10.4: Logs of all other system components (those not specified in Requirement 10.4.1) are reviewed periodically.
  • Examine security policies and procedures to verify that processes are defined for reviewing logs of all other system components periodically.
  • Examine documented results of log reviews and interview personnel to verify that log reviews are performed periodically.
Description

Requirement 10.4.1

Purpose

Reviewing audit logs regularly helps identify anomalous or suspicious activity that could indicate a security incident. Without regular reviews, malicious activity recorded in audit logs may go undetected.

Good Practice

Audit logs should be reviewed at least daily. Reviews should focus on security events, critical system alerts, and logs from systems that store, process, or transmit cardholder data. Automated log analysis tools can help identify patterns and anomalies.

Requirement 10.4.1.1

Purpose

Automated mechanisms for performing audit log reviews help ensure that reviews are comprehensive and timely. Manual review of large volumes of log data is impractical and may miss important events.

Good Practice

Automated log review mechanisms should be configured to identify known attack patterns, anomalous behavior, and policy violations. Alerts should be generated for events that require human investigation.

Requirement 10.4.2

Purpose

Reviewing logs of all other system components periodically helps identify security events that might be missed by reviewing only CDE system logs. Attackers may target systems outside the CDE as a stepping stone to the CDE.

Good Practice

Logs of all system components, not just those in the CDE, should be reviewed periodically. The review frequency should be based on the entity's risk assessment.

Requirement 10.4.2.1

Purpose

The frequency of periodic log reviews should be based on a risk analysis that considers the system component's function, its exposure to threats, and the potential impact of a compromise.

Good Practice

A targeted risk analysis should define the review frequency for each system component or group of components. Higher-risk systems should be reviewed more frequently.

Requirement 10.4.3

Purpose

Exceptions and anomalies identified during log reviews need to be addressed promptly to prevent security incidents from escalating. Without follow-up, identified threats may result in data breaches.

Good Practice

A process should be in place for investigating and resolving exceptions and anomalies identified during log reviews. Investigations should be documented and completed in a timely manner.

10.4: The frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) is defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1
  • Examine the entity’s targeted risk analysis for the frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) to verify the risk analysis was performed in accordance with all elements specified at Requirement 12.3.1.
  • Examine documented results of periodic log reviews of all other system components (not defined in Requirement 10.4.1) and interview personnel to verify log reviews are performed at the frequency specified in the entity’s targeted risk analysis performed for this requirement.
Description

Requirement 10.4.1

Purpose

Reviewing audit logs regularly helps identify anomalous or suspicious activity that could indicate a security incident. Without regular reviews, malicious activity recorded in audit logs may go undetected.

Good Practice

Audit logs should be reviewed at least daily. Reviews should focus on security events, critical system alerts, and logs from systems that store, process, or transmit cardholder data. Automated log analysis tools can help identify patterns and anomalies.

Requirement 10.4.1.1

Purpose

Automated mechanisms for performing audit log reviews help ensure that reviews are comprehensive and timely. Manual review of large volumes of log data is impractical and may miss important events.

Good Practice

Automated log review mechanisms should be configured to identify known attack patterns, anomalous behavior, and policy violations. Alerts should be generated for events that require human investigation.

Requirement 10.4.2

Purpose

Reviewing logs of all other system components periodically helps identify security events that might be missed by reviewing only CDE system logs. Attackers may target systems outside the CDE as a stepping stone to the CDE.

Good Practice

Logs of all system components, not just those in the CDE, should be reviewed periodically. The review frequency should be based on the entity's risk assessment.

Requirement 10.4.2.1

Purpose

The frequency of periodic log reviews should be based on a risk analysis that considers the system component's function, its exposure to threats, and the potential impact of a compromise.

Good Practice

A targeted risk analysis should define the review frequency for each system component or group of components. Higher-risk systems should be reviewed more frequently.

Requirement 10.4.3

Purpose

Exceptions and anomalies identified during log reviews need to be addressed promptly to prevent security incidents from escalating. Without follow-up, identified threats may result in data breaches.

Good Practice

A process should be in place for investigating and resolving exceptions and anomalies identified during log reviews. Investigations should be documented and completed in a timely manner.

10.4: Exceptions and anomalies identified during the review process are addressed.
  • Examine security policies and procedures to verify that processes are defined for addressing exceptions and anomalies identified during the review process.
  • Observe processes and interview personnel to verify that, when exceptions and anomalies are identified, they are addressed.
Description

Requirement 10.4.1

Purpose

Reviewing audit logs regularly helps identify anomalous or suspicious activity that could indicate a security incident. Without regular reviews, malicious activity recorded in audit logs may go undetected.

Good Practice

Audit logs should be reviewed at least daily. Reviews should focus on security events, critical system alerts, and logs from systems that store, process, or transmit cardholder data. Automated log analysis tools can help identify patterns and anomalies.

Requirement 10.4.1.1

Purpose

Automated mechanisms for performing audit log reviews help ensure that reviews are comprehensive and timely. Manual review of large volumes of log data is impractical and may miss important events.

Good Practice

Automated log review mechanisms should be configured to identify known attack patterns, anomalous behavior, and policy violations. Alerts should be generated for events that require human investigation.

Requirement 10.4.2

Purpose

Reviewing logs of all other system components periodically helps identify security events that might be missed by reviewing only CDE system logs. Attackers may target systems outside the CDE as a stepping stone to the CDE.

Good Practice

Logs of all system components, not just those in the CDE, should be reviewed periodically. The review frequency should be based on the entity's risk assessment.

Requirement 10.4.2.1

Purpose

The frequency of periodic log reviews should be based on a risk analysis that considers the system component's function, its exposure to threats, and the potential impact of a compromise.

Good Practice

A targeted risk analysis should define the review frequency for each system component or group of components. Higher-risk systems should be reviewed more frequently.

Requirement 10.4.3

Purpose

Exceptions and anomalies identified during log reviews need to be addressed promptly to prevent security incidents from escalating. Without follow-up, identified threats may result in data breaches.

Good Practice

A process should be in place for investigating and resolving exceptions and anomalies identified during log reviews. Investigations should be documented and completed in a timely manner.

10.5: Retain audit log history for at least 12 months, with at least the most recent three months immediately available for analysis.
  • Examine documentation to verify that the following is defined: • Audit log retention policies. • Procedures for retaining audit log history for at least 12 months, with at least the most recent three months immediately available online.
  • Examine configurations of audit log history, interview personnel and examine audit logs to verify that audit logs history is retained for at least 12 months.
  • Interview personnel and observe processes to verify that at least the most recent three months’ audit log history is immediately available for analysis.
Description

Requirement 10.5.1

Purpose

Retaining audit log history for at least 12 months provides sufficient data for detecting and investigating security incidents. Many security breaches are not detected for weeks or months, so having historical log data available is critical for forensic investigations.

Good Practice

At least the most recent three months of audit log data should be immediately available for analysis. Older log data can be archived but should be restorable within a reasonable timeframe. Log retention policies should be documented.

Definitions

Immediately available means that the data can be accessed and analyzed without delay, such as from online storage or near-line storage. Archived data may require additional time to restore from offline storage media.

10.6: System clocks and time are synchronized using time-synchronization technology.
  • Examine system configuration settings to verify that time-synchronization technology is implemented and kept current.
Description

Requirement 10.6.1

Purpose

Without consistent time across all systems, it is difficult to correlate events from different systems during forensic analysis. Inaccurate time stamps can make it impossible to determine the sequence of events during a security incident.

Good Practice

All critical system clocks should be synchronized using a recognized time synchronization technology such as NTP. Time synchronization should be configured for all system components in the CDE.

Requirement 10.6.2

Purpose

Using a consistent and authoritative time source ensures that all systems have accurate and synchronized time. Without an authoritative source, time synchronization may drift or be manipulated.

Good Practice

Time data should be received from industry-accepted external time sources. If NTP is used, NTP servers should be configured to receive time from authoritative sources. Internal time servers should synchronize with external authoritative sources.

Requirement 10.6.3

Purpose

Unauthorized changes to time settings could be used to manipulate audit logs and hide evidence of malicious activity. Protecting time settings helps maintain the integrity of audit data.

Good Practice

Time data should be protected from unauthorized changes through access controls and monitoring. Changes to time settings should be logged and reviewed. NTP configurations should be restricted to authorized personnel.

10.6: Systems are configured to the correct and consistent time as follows: (a) One or more designated time servers are in use, (b) Only the designated central time server(s) receives time from external sources, (c) Time received from external sources is based on International Atomic Time or Coordinated Universal Time (UTC), (d) The designated time server(s) accept time updates only from specific industry-accepted external sources, (e) Where there is more than one designated time server, the time servers peer with one another to keep accurate time, (f) Internal systems receive time information only from designated central time server(s).
  • Examine system configuration settings for acquiring, distributing, and storing the correct time to verify the settings are configured in accordance with all elements specified in this requirement.
Description

Requirement 10.6.1

Purpose

Without consistent time across all systems, it is difficult to correlate events from different systems during forensic analysis. Inaccurate time stamps can make it impossible to determine the sequence of events during a security incident.

Good Practice

All critical system clocks should be synchronized using a recognized time synchronization technology such as NTP. Time synchronization should be configured for all system components in the CDE.

Requirement 10.6.2

Purpose

Using a consistent and authoritative time source ensures that all systems have accurate and synchronized time. Without an authoritative source, time synchronization may drift or be manipulated.

Good Practice

Time data should be received from industry-accepted external time sources. If NTP is used, NTP servers should be configured to receive time from authoritative sources. Internal time servers should synchronize with external authoritative sources.

Requirement 10.6.3

Purpose

Unauthorized changes to time settings could be used to manipulate audit logs and hide evidence of malicious activity. Protecting time settings helps maintain the integrity of audit data.

Good Practice

Time data should be protected from unauthorized changes through access controls and monitoring. Changes to time settings should be logged and reviewed. NTP configurations should be restricted to authorized personnel.

10.6: Time synchronization settings and data are protected as follows: (a) Access to time data is restricted to only personnel with a business need, (b) Any changes to time settings on critical systems are logged, monitored, and reviewed.
  • Examine system configurations and time- synchronization settings to verify that access to time data is restricted to only personnel with a business need.
  • Examine system configurations and time synchronization settings and logs and observe processes to verify that any changes to time settings on critical systems are logged, monitored, and reviewed.
Description

Requirement 10.6.1

Purpose

Without consistent time across all systems, it is difficult to correlate events from different systems during forensic analysis. Inaccurate time stamps can make it impossible to determine the sequence of events during a security incident.

Good Practice

All critical system clocks should be synchronized using a recognized time synchronization technology such as NTP. Time synchronization should be configured for all system components in the CDE.

Requirement 10.6.2

Purpose

Using a consistent and authoritative time source ensures that all systems have accurate and synchronized time. Without an authoritative source, time synchronization may drift or be manipulated.

Good Practice

Time data should be received from industry-accepted external time sources. If NTP is used, NTP servers should be configured to receive time from authoritative sources. Internal time servers should synchronize with external authoritative sources.

Requirement 10.6.3

Purpose

Unauthorized changes to time settings could be used to manipulate audit logs and hide evidence of malicious activity. Protecting time settings helps maintain the integrity of audit data.

Good Practice

Time data should be protected from unauthorized changes through access controls and monitoring. Changes to time settings should be logged and reviewed. NTP configurations should be restricted to authorized personnel.

10.7: Additional requirement for service providers only: Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems: (a) Network security controls, (b) IDS/IPS, (c) FIM, (d) Anti-malware solutions, (e) Physical access controls, (f) Logical access controls, (g) Audit logging mechanisms, (h) Segmentation controls (if used).
  • Additional testing procedure for service provider assessments only: Examine documentation to verify that processes are defined for the prompt detection and addressing of failures of critical security control systems, including but not limited to failure of all elements specified in this requirement.
  • Additional testing procedure for service provider assessments only: Observe detection and alerting processes and interview personnel to verify that failures of critical security control systems are detected and reported, and that failure of a critical security control results in the generation of an alert.
Description

Requirement 10.7.1

Purpose

Critical security control systems such as firewalls, IDS/IPS, anti-malware, and audit logging must function properly to protect the CDE. Detecting failures in these controls allows organizations to respond promptly and maintain security.

Good Practice

Monitoring mechanisms should be in place to detect failures in all critical security controls. Alerts should be generated immediately upon detection of a failure so that corrective action can be taken promptly.

Examples

Critical security control systems include firewalls/NSCs, IDS/IPS, file integrity monitoring, anti-malware solutions, physical access controls, logical access controls, audit logging mechanisms, and segmentation controls.

Requirement 10.7.2

Purpose

Failures of critical security control systems that are not responded to promptly leave the CDE unprotected and vulnerable to attack. Timely response helps minimize the window of exposure.

Good Practice

A process should be in place for responding to detected failures, including identifying the cause, implementing a fix, and verifying that the control is functioning properly. Response procedures should be documented and tested.

Requirement 10.7.3

Purpose

If failures of critical security control systems are not addressed promptly, the CDE may remain unprotected for an extended period, increasing the risk of a security incident. Timely resolution of failures is essential for maintaining security.

Good Practice

Failures should be resolved as quickly as possible. Root cause analysis should be performed to prevent recurrence. The resolution should be documented and verified.

10.7: Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems: (a) Network security controls, (b) IDS/IPS, (c) Change-detection mechanisms, (d) Anti-malware solutions, (e) Physical access controls, (f) Logical access controls, (g) Audit logging mechanisms, (h) Segmentation controls (if used), (i) Audit log review mechanisms, (j) Automated security testing tools (if used).
  • Examine documentation to verify that processes are defined for the prompt detection and addressing of failures of critical security control systems, including but not limited to failure of all elements specified in this requirement.
  • Observe detection and alerting processes and interview personnel to verify that failures of critical security control systems are detected and reported, and that failure of a critical security control results in the generation of an alert.
Description

Requirement 10.7.1

Purpose

Critical security control systems such as firewalls, IDS/IPS, anti-malware, and audit logging must function properly to protect the CDE. Detecting failures in these controls allows organizations to respond promptly and maintain security.

Good Practice

Monitoring mechanisms should be in place to detect failures in all critical security controls. Alerts should be generated immediately upon detection of a failure so that corrective action can be taken promptly.

Examples

Critical security control systems include firewalls/NSCs, IDS/IPS, file integrity monitoring, anti-malware solutions, physical access controls, logical access controls, audit logging mechanisms, and segmentation controls.

Requirement 10.7.2

Purpose

Failures of critical security control systems that are not responded to promptly leave the CDE unprotected and vulnerable to attack. Timely response helps minimize the window of exposure.

Good Practice

A process should be in place for responding to detected failures, including identifying the cause, implementing a fix, and verifying that the control is functioning properly. Response procedures should be documented and tested.

Requirement 10.7.3

Purpose

If failures of critical security control systems are not addressed promptly, the CDE may remain unprotected for an extended period, increasing the risk of a security incident. Timely resolution of failures is essential for maintaining security.

Good Practice

Failures should be resolved as quickly as possible. Root cause analysis should be performed to prevent recurrence. The resolution should be documented and verified.

10.7: Failures of any critical security control systems are responded to promptly, including but not limited to: (a) Restoring security functions, (b) Identifying and documenting the duration (date and time from start to end) of the security failure, (c) Identifying and documenting the cause(s) of failure and documenting required remediation, (d) Identifying and addressing any security issues that arose during the failure, (e) Determining whether further actions are required as a result of the security failure, (f) Implementing controls to prevent the cause of failure from reoccurring, (g) Resuming monitoring of security controls.
  • Examine documentation and interview personnel to verify that processes are defined and implemented to respond to a failure of any critical security control system and include at least all elements specified in this requirement.
  • Examine records to verify that failures of critical security control systems are documented to include: • Identification of cause(s) of the failure. • Duration (date and time start and end) of the security failure. • Details of the remediation required to address the root cause.
Description

Requirement 10.7.1

Purpose

Critical security control systems such as firewalls, IDS/IPS, anti-malware, and audit logging must function properly to protect the CDE. Detecting failures in these controls allows organizations to respond promptly and maintain security.

Good Practice

Monitoring mechanisms should be in place to detect failures in all critical security controls. Alerts should be generated immediately upon detection of a failure so that corrective action can be taken promptly.

Examples

Critical security control systems include firewalls/NSCs, IDS/IPS, file integrity monitoring, anti-malware solutions, physical access controls, logical access controls, audit logging mechanisms, and segmentation controls.

Requirement 10.7.2

Purpose

Failures of critical security control systems that are not responded to promptly leave the CDE unprotected and vulnerable to attack. Timely response helps minimize the window of exposure.

Good Practice

A process should be in place for responding to detected failures, including identifying the cause, implementing a fix, and verifying that the control is functioning properly. Response procedures should be documented and tested.

Requirement 10.7.3

Purpose

If failures of critical security control systems are not addressed promptly, the CDE may remain unprotected for an extended period, increasing the risk of a security incident. Timely resolution of failures is essential for maintaining security.

Good Practice

Failures should be resolved as quickly as possible. Root cause analysis should be performed to prevent recurrence. The resolution should be documented and verified.