PCI Requirement- 10.1 - 10.3.6 Track and monitor all access to network resources and cardholder data.
|ID: oval:org.secpod.oval:def:6362||Date: (C)2012-07-16 (M)2015-05-20|
|Class: COMPLIANCE||Family: macos|
Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult, if not impossible, without system activity logs.