Sub-Requirement 10.2.5

10.2.5 Implement automated audit trails for all system components to reconstruct the following events:

  • Use of identification and authentication mechanisms

Illustrative Controls and TIBCO LogLogic Solution

To satisfy this requirement, administrators must ensure that login attempts to in-scope systems (including hosts, applications, databases, and network devices) are logged. This includes both successful and failed attempts, and also includes other operations involving authentication mechanisms (e.g., switching user context).

Reports and Alerts

Use the following link/reference to see the 10.2.5 reports and alerts: 10.2.5 on page 138.