{"id":261,"date":"2020-04-07T16:57:17","date_gmt":"2020-04-07T16:57:17","guid":{"rendered":"http:\/\/www.pcidssguide.com\/?p=261"},"modified":"2023-10-09T07:55:12","modified_gmt":"2023-10-09T07:55:12","slug":"pci-dss-requirement-10","status":"publish","type":"post","link":"https:\/\/pcidssguide.com\/pci-dss-requirement-10\/","title":{"rendered":"PCI DSS Requirement 10 Explained"},"content":{"rendered":"\n\n\n\n\n

PCI DSS Requirement 10: Track and monitor all access to network resources and cardholder data<\/strong><\/h2>\n\n\n\n

Logging mechanisms and the ability to track user activity are critical to preventing, detecting or minimizing the impact of data security.<\/p>\n\n\n\n

Keeping logs in all environments allows extensive monitoring, warning and analysis when something goes wrong. Determining the cause of the attack is very difficult without logging the activity of the system.<\/p>\n\n\n\n

See Also: PCI DSS Logging Requirements Explained<\/a><\/strong><\/p>\n\n\n\n

The PCI DSS Requirement 10 relates to the monitoring and tracking of individual access to system components, applications, databases, or any other device where cardholder data can be stored, processed or transmitted.<\/p>\n\n\n\n

PCI DSS Requirement 10.1: Apply audit trails to associate all access to system components with individual users.<\/strong><\/h2>\n\n\n\n

It is essential to have a process or system that connects and associates user access to the system components that are accessed. This system creates audit logs and provides the ability to track suspicious activity back to a specific user.<\/p>\n\n\n\n