Systems Monitoring
Compliance requirements primarily focus on logging of security events and security exceptions. In reality that covers events to identity/access/events but also availability concerns. Ultimately, a security exception is any event that interrupts normal business and sufficient monitoring will assist in identifying those issues. Most commonly small companies transfer this responsibility to a managed service provider, but the organizations should define monitoring objectives instead of relying on canned offerings.
| Category | Sub-Category | Name | Activity |
---|---|---|---|---|
Systems Monitoring | Logging | Audit Logging | [The organization] logs critical information system activity. | |
Systems Monitoring | Logging | Secure Audit Logging | [The organization] logs critical information system activity to a secure repository. [the organization] disables administrators ability to delete or modify enterprise audit logs; the number of administrators with access to audit logs is limited. | |
Systems Monitoring | Logging | Audit Logging: | [The organization] logs the following activity for cardholder data environments: | |
Systems Monitoring | Logging | Audit Logging: Cardholder Data Environment Event Information | [The organization] records the following information for confirmed events in the cardholder data environment: | |
Systems Monitoring | Logging | Audit Logging: | [The organization] establishes unique logging and audit trails for each entity's cardholder | |
Systems Monitoring | Logging | Log Reconciliation: CMDB | [The organization] reconciles the established device inventory against the enterprise log repository [in accordance with the organization-defined frequency]; devices which do not forward log data are remediated. | |
Systems Monitoring | Logging | Audit Log | [The organization] allocates audit record storage capacity in accordance with logging | |
Systems Monitoring | Logging | Enterprise | If applicable, [the organization's] managed enterprise antivirus deployments generate audit logs which are retained [in accordance with the organization-defined duration] with [the organization-defined duration] of data immediately available for analysis. | |
Systems Monitoring | Security | Security | [The organization] defines security monitoring alert criteria, how alert criteria will be flagged, and identifies authorized personnel for flagged system alerts. | |
Systems Monitoring | Security Monitoring | Log-tampering Detection | [The organization] monitors and flags tampering to the audit logging and monitoring tools in the production environment. | |
Systems Monitoring | Security Monitoring | Security Monitoring Alert | [The organization] defines security monitoring alert criteria for failed login attempts on [the organization's] network. | |
Systems Monitoring | Security Monitoring | Security | [The organization] defines security monitoring alert criteria for privileged functions executed by both authorized and unauthorized users. | |
Systems Monitoring | Security Monitoring | Security | [The organization] defines security monitoring alert criteria for changes to the integrity of audit logs. | |
Systems Monitoring | Security Monitoring | Security | [The organization] defines security monitoring alert criteria for system components that store, process, transmit, or could impact the security of cardholder data and/or sensitive authentication data. | |
Systems Monitoring | Security Monitoring | System Security Monitoring | Critical systems are monitored in accordance to predefined security criteria and alerts are sent to authorized personnel. Confirmed incidents are tracked to resolution. | |
Systems Monitoring | Security Monitoring | Intrusion Detection Systems | [The organization] has an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) deployment(s) and ensures the following: | |
Systems Monitoring | Availability Monitoring | Availability Monitoring Alert Criteria | [The organization] defines availability monitoring alert criteria, how alert criteria will be flagged, and identifies authorized personnel for flagged system alerts. | |
Systems Monitoring | Availability | System | Critical systems are monitored in accordance to predefined availability criteria and alerts are sent to authorized personnel. |