12.5.5 Monitor and control all access to data

12.5.5 Monitor and control all access to data.

12.5.5 Verify that responsibility for monitoring and controlling all access to data is formally assigned.

Each person or team with responsibilities for information security management should be clearly aware of their responsibilities and related tasks, through specific policy. Without this accountability, gaps in processes may open access into critical resources or cardholder data.

Entities should also consider transition and/or succession plans for key personnel to avoid potential gaps in security assignments, which could result in responsibilities not being assigned and therefore not performed.