PCI Requirement 10.5.3 – Promptly Back Up Audit Trail Files to a Centralized Log Server
PCI Requirement 10.5.2 – Protect Audit Trail Files from Unauthorized Modifications
PCI Requirement 10.5.1 – Limit Viewing of Audit Trails to Those with a Job-Related Need
PCI Requirement 11.3.3 – Exploitable Vulnerabilities Found During Penetration Testing are Corrected
PCI Requirement 8.6 – Authentication Mechanisms Must Not Be Shared Among Multiple Accounts
PCI Requirement 7.1.4 – Require Documented Approval by Authorized Parties
PCI Requirement 3.5.1 Maintain a Documented Description of The Cryptographic Architecture
PCI Requirement 8.3 – Secure All Individual Non-Console Administrative Access
PCI Requirement 10.2.5 – Use of and Changes to Identification Accounts with Root Privileges
PCI and FileSure - Protecting the audit logs
PCI Requirement 10.2.4 – Invalid Logical Access Attempts
PCI Requirement 5.2 – Ensure Anti-Virus Mechanisms are Current, Perform Scans, & Generate Audit Logs
PCI Requirement 11.2.1 – Perform Quarterly Internal Vulnerability Scans
PCI Requirement 10.2.7 – Creation and Deletion of System-Level Objects
PCI Requirement 9.6 – Maintain Control Over the Internal/External Distribution of Any Kind of Media
PCI Requirement 11.4 – Use Intrusion-Detection and/or Intrusion-Prevention Techniques
PCI Requirement 5.4 – Ensure Security Policies and Procedures are Known to all Affected Parties
PCI Requirement 8.2.2 – Verify User Identity Before Modifying Any Authentication Credential
PCI Requirement 10.2.2 – All Actions Taken by Any Individual with Root or Administrative Privileges