Requirement 10: Track and monitor all access to network resources and cardholder data

Logging mechanisms and the ability to track user activities are critical. Effective logging and auditing mechanisms across all in-scope systems and applications helps ensure thorough tracking and analysis when troubleshooting or forensic investigation is required. Determining the root cause of a system or data compromise is difficult or impossible without appropriate system activity logs.

The following table lists the specific sub-requirements in Requirement 10 that are addressed by TIBCO LogLogic® Compliance Suite - PCI Edition.

Requirement 10 Track and monitor al aces to network resources

and cardholder data

10.1 Establish a process for linking all access to system components (especially those done with administrative privileges such as root) to each individual user
10.2.1 Implement automated audit trails for all system components to reconstruct the following events:

All individual user accesses to cardholder data

10.2.2 Implement automated audit trails for all system components to reconstruct the following events:

All actions taken by any individual with root or administrative privileges

10.2.3 Implement automated audit trails for all system components to reconstruct the following events:

Access to all audit trails

10.2.4 Implement automated audit trails for all system components to reconstruct the following events:

Invalid logical access attempts

10.2.5 Implement automated audit trails for all system components to reconstruct the following events:

Use of identification and authentication mechanisms

10.2.6 Implement automated audit trails for all system components to reconstruct the following events:

Initialization of the audit logs

10.2.7 Implement automated audit trails for all system components to reconstruct the following events:

Creation and deletion of system-level objects

10.3.1 Record at least the following audit trail entries for all system components for each event:

User identification

10.3.2 Record at least the following audit trail entries for all system components for each event:

Type of event

10.3.3 Record at least the following audit trail entries for all system components for each event:

Date and time

10.3.4 Record at least the following audit trail entries for all system components for each event:

Success or failure indication

10.3.5 Record at least the following audit trail entries for all system components for each event:

Origination of event

10.3.6 Record at least the following audit trail entries for all system components for each event:

Identity or name of affected data, system component, or resource

10.5.1 Limit viewing of audit trails to those with a job-related need
10.5.2 Protect audit trail files from unauthorized modifications
10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter
10.5 Use file integrity monitoring and change detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert)
10.6 Review logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS). (Note: Log harvesting, parsing, and alerting tools may be used to meet compliance with Requirement 10.6)
10.7 Retain audit trail history for at least one year, with a minimum of three months available online
10.8 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are documented, in use, and known to all affected parties. Update:v3.0 November 2013.