PCI Requirement 10.2.4 – Invalid Logical Access Attempts
PCI Requirement 10.4.2 – Time Data is Protected
PCI Requirement 10.2 – Implement Automated Audit Trails for all System Components
PCI Requirement 10.2.7 – Creation and Deletion of System-Level Objects
PCI Requirement 10.2.5 – Use of and Changes to Identification Accounts with Root Privileges
PCI Requirement 10.2.3 – Access to All Audit Trails
The PCI Compliant Database
PCI Requirement 10.2.6 – Initialization, Stopping, or Pausing of the Audit Logs
PCI Requirement 10.2.1 – All Individual User Accesses to Cardholder Data
PCI Requirement 10.3.4 – Success or Failure Indication
PCI Requirement 10.2.2 – All Actions Taken by Any Individual with Root or Administrative Privileges
PCI Requirement 10.4 – Using Time-Synchronization Technology, Synchronize All Critical Systems
PCI Requirement 10.5.4 – Write Logs for External-Facing Technologies onto a Secure Device
PCI Requirement 8.4 – Document and Communicate Authentication Policies and Procedures to All Users
PCI Requirement 10.4.1 – Critical Systems Have the Correct and Consistent Time
PCI Requirement 10.3 – Record at Least the Following Audit Trail Entries for All System Components
PCI Requirement 10.5 – Secure Audit Trails so They Cannot Be Altered
PCI Requirement 8.2.5 – New Passwords Can’t Be the Same as Any of the Last Four Passwords Used
PCI Requirement 10.3.1 – User Identification