PCI Requirement 10.2.1 – All Individual User Accesses to Cardholder Data
PCI v4.0 - 10.2.1: Audit Logs Are Enabled and Active
PCI Requirement 10.2 – Implement Automated Audit Trails for all System Components
PCI Requirement 10.2.7 – Creation and Deletion of System-Level Objects
PCI Requirement 10.2.4 – Invalid Logical Access Attempts
PCI Requirement 8.1.8 – Require Re-Authentication After 15 Minutes of Inactivity
PCI Requirement 10.2.5 – Use of and Changes to Identification Accounts with Root Privileges
PCI Requirement 10.2.3 – Access to All Audit Trails
PCI Requirement 10.2.2 – All Actions Taken by Any Individual with Root or Administrative Privileges
PCI Requirement 10.2.6 – Initialization, Stopping, or Pausing of the Audit Logs
PCI Requirement 10.3.1 – User Identification
The PCI Compliant Database
PCI Requirement 10.5.1 – Limit Viewing of Audit Trails to Those with a Job-Related Need
PCI Requirement 9.1.2 – Implement Physical Controls to Restrict Access to Accessible Network Jacks
PCI Requirement 7.2.1 – Coverage of all System Components
PCI Requirement 8.2.1 – Use Strong Cryptography to Render All Authentication Credentials Unreadable
PCI Requirement 10.4.1 – Critical Systems Have the Correct and Consistent Time
PCI Requirement 8.6 – Authentication Mechanisms Must Not Be Shared Among Multiple Accounts
PCI Requirement 10.3 – Record at Least the Following Audit Trail Entries for All System Components
PCI Requirement 10.5.2 – Protect Audit Trail Files from Unauthorized Modifications
PCI Requirement 10.5 – Secure Audit Trails so They Cannot Be Altered
PCI and FileSure - Basic auditing requirements
PCI Requirement 8.8 – Ensure Policies & Procedures for Authentication are Documented
PCI Requirement 10.8 –Implement a Process for the Detection of Failures of Critical Control Systems