PCI Requirement 10.6.3 – Follow Up Exceptions and Anomalies Identified During the Review Process

by Randy Bartels / December 20, 2022

 Follow Up Once an organization has completed log review, they must follow up exceptions and anomalies identified during the review process. The purpose of PCI Requirement 10.6.3 is a little obvious, right? If exceptions and anomalies are not investigated, then what’s the point of the log review process? The follow up process helps make organizations aware of unauthorized activities occurring in their network. During an assessment, policies and procedures…

PCI Requirement 10.6.2 – Review Logs of All Other System Components Periodically Based on the Organization’s Policies and Risk Management Strategy

by Randy Bartels / December 20, 2022

 How to Prioritize Log Review PCI Requirement 10.6.1 requires daily review of logs of system components that store, process, or transmit cardholder data, logs of all critical system components, and logs of all servers and system components that perform security functions. But what about all other system components? PCI Requirement 10.6.2 addresses this and requires that organizations review logs of all other system components periodically based on the organization’s…

PCI Requirement 10.6.1 – Review the Following Daily: All Security Events, Logs of All System Components, Logs of All Critical System Components, and Logs of All Servers and System Components that Perform Security Functions

by Randy Bartels / December 20, 2022

 Daily Review By reviewing logs daily, organizations can maximize their security efforts and minimize the exposure to potential breaches. PCI Requirement 10.6.1 requires that organizations review the following at least daily: All security events Logs of all system components that store, process, or transmit cardholder data Logs of all critical system components Logs of all servers and system components that perform security functions From many breaches that have recently…

PCI Requirement 10.6 – Review Logs and Security Events for All System Components to Identify Anomalies or Suspicious Activity

by Randy Bartels / December 20, 2022

 Log Review Many breaches occur over a period of time before being detected. That’s why it’s not enough for you to just create logs, you also have to create a process for reviewing them. How could you ever spot a pattern of suspicious activity if you don’t review your logs? PCI Requirement 10.6 requires that organizations review logs and security events for all system components to identify anomalies or…

PCI Requirement 10.5.5 – Use File-Integrity Monitoring or Change-Detection Software on Logs to Ensure that Existing Log Data Cannot be Changed Without Generating Alerts

by Randy Bartels / December 20, 2022

 File-Integrity Monitoring PCI Requirement 10.5.5 requires organizations to use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert). The PCI DSS guidance explains that file-integrity monitoring or change-detection systems check for changes to critical files and provide notification when such changes are noted. Organizations usually monitor files that don’t…