PCI Requirement- 10.1 - 10.3.6 Track and monitor all access to network resources and cardholder data.ID: oval:org.secpod.oval:def:6362 | Date: (C)2012-07-16 (M)2017-11-20 |
Class: COMPLIANCE | Family: macos |
Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult, if not impossible, without system activity logs.