PCI Requirement 10.3.2 – Type of Event
PCI v4.0 - 10.3.2: Audit Log Files Are Protected from Modification
PCI Requirement 10.3.4 – Success or Failure Indication
PCI Requirement 10.3 – Record at Least the Following Audit Trail Entries for All System Components
PCI Requirement 10.3.5 – Origination of Event
PCI Requirement 10.3.3 – Date and Time
PCI Requirement 10.2.3 – Access to All Audit Trails
PCI Requirement 10.2.4 – Invalid Logical Access Attempts
PCI Requirement 10.2.5 – Use of and Changes to Identification Accounts with Root Privileges
PCI Requirement 10.2.2 – All Actions Taken by Any Individual with Root or Administrative Privileges
PCI Requirement 10.4 – Using Time-Synchronization Technology, Synchronize All Critical Systems
PCI Requirement 11.3.2 – Perform Internal Penetration Testing at Least Annually
PCI Requirement 11 - Regularly Test Security Systems & Processes
PCI Requirement 10.2 – Implement Automated Audit Trails for all System Components
PCI Requirement 10.4.1 – Critical Systems Have the Correct and Consistent Time
PCI Requirement 8.3.2 – Incorporate Multi-Factor Authentication for all Remote Network Access
PCI Requirement 10.2.7 – Creation and Deletion of System-Level Objects
PCI Requirement 10.4.3 – Time Settings Are Received from Industry-Accepted Time Sources