10.5.2 Protect audit trail files from unauthorized modifications
|
|
0
|
101
|
February 19, 2023
|
10.5.1 Limit viewing of audit trails to those with a job-related need
|
|
0
|
64
|
February 19, 2023
|
10.5 Secure audit trails so they cannot be altered
|
|
0
|
56
|
February 19, 2023
|
10.4.3 Time settings are received from industry-accepted time sources
|
|
0
|
52
|
February 19, 2023
|
10.4.2 Time data is protected
|
|
0
|
104
|
February 19, 2023
|
10.4.1 Critical systems have the correct and consistent time
|
|
0
|
88
|
February 19, 2023
|
10.4 Using time-synchronization technology, synchronize all critical system clocks and times and ensure that the following is implemented for acquiring, distributing, and storing time
|
|
0
|
94
|
February 19, 2023
|
10.3 Record at least the following audit trail entries for all system components for each event:
|
|
0
|
65
|
February 19, 2023
|
10.2.7 Creation and deletion of system- level objects
|
|
0
|
96
|
February 19, 2023
|
10.2.6 Initialization, stopping, or pausing of the audit logs
|
|
0
|
114
|
February 19, 2023
|
10.2.5 Use of and changes to identification and authentication mechanisms
|
|
0
|
101
|
February 19, 2023
|
10.2.4 Invalid logical access attempts
|
|
0
|
72
|
February 19, 2023
|
10.2.3 Access to all audit trails
|
|
0
|
64
|
February 19, 2023
|
10.2.2 All actions taken by any individual with root or administrative privileges
|
|
0
|
114
|
February 19, 2023
|
10.2.1 All individual user accesses to cardholder data
|
|
0
|
56
|
February 19, 2023
|
10.2 Implement automated audit trails for all system components to reconstruct the following events:
|
|
0
|
51
|
February 19, 2023
|
10.1 Implement audit trails to link all access to system components to each individual user
|
|
0
|
51
|
February 19, 2023
|
Requirement 10: Track and monitor all access to network resources and cardholder data
|
|
0
|
111
|
February 14, 2023
|