Global

PCI DSS: Monitoring and Testing

Monitoring and Testing [Req 10-11]

Rule: Log and monitor all access to system components and cardholder data. Test security of systems and networks regularly through vulnerability scans and penetration tests.

Requirement 10: Logging and Monitoring

10.2 — Audit Logs Implemented

Must log:

EventRequirement
User accessAll individual access to cardholder data
Admin actionsAll actions by anyone with admin privileges
Access to logsAll access to audit logs
AuthenticationAll invalid authentication attempts
ChangesCreation/deletion of system objects
IdentificationAll changes to user accounts
InitializationInitialization, starting, stopping of audit logs

Log Content

Each log entry must include:

  • User identification
  • Event type
  • Date and time
  • Success or failure
  • Origination (source)
  • Identity/name of affected data, component, or resource

10.3 — Protect Audit Logs

ControlRequirement
Read accessLimited to those with job need
Tampering protectionCannot be modified
Integrity monitoringDetect unauthorized changes
Prompt backupTo central server or media

10.4 — Log Review

ControlRequirement
Daily reviewSecurity events and logs of critical systems
Review all other logsAt least periodically (based on risk)
Anomaly responseFollow up on anomalies

10.5 — Log Retention

PeriodRequirement
Online/availableAt least 3 months
Total retentionAt least 12 months
RetrievableFor analysis

10.6 — Time Synchronization

ControlRequirement
NTP or similarCritical systems synchronized
Correct timeFrom industry-accepted source
ProtectedTime data protected from unauthorized changes

Requirement 11: Security Testing

11.2 — Wireless Monitoring

ControlRequirement
Authorized inventoryMaintain list of authorized APs
DetectionIdentify unauthorized wireless APs
Quarterly scansAt least quarterly
Automated monitoringOr quarterly manual scans

11.3 — Vulnerability Scans

Scan TypeFrequencyScope
Internal vulnerability scansAt least quarterlyAll systems in CDE and connected
External vulnerability scansAt least quarterlyAll externally-facing IPs
After significant changesAfter each changeAffected systems

ASV requirement: External scans must be performed by PCI SSC Approved Scanning Vendor (ASV).

Passing criteria:

  • No vulnerabilities scored CVSS 4.0 or higher
  • Address high/critical vulnerabilities
  • Rescan until passing

11.4 — Penetration Testing

Test TypeFrequencyScope
External penetration testAt least annuallyExternal-facing systems
Internal penetration testAt least annuallyInternal CDE
Segmentation testingAt least annually (every 6 months for service providers)Verify segmentation effectiveness
After significant changesAfter changesAffected systems

Penetration test must:

  • Follow industry-accepted methodology (PTES, OWASP, NIST)
  • Include network and application layer testing
  • Address discovered vulnerabilities
  • Retest after remediation

11.5 — Intrusion Detection

ControlRequirement
IDS/IPSDetect and/or prevent intrusions
All trafficMonitor traffic in CDE
AlertsPersonnel alerted to suspected compromises
SignaturesKept current

11.6 — Change Detection (Payment Pages)

ControlRequirement
MechanismDetect unauthorized changes to payment pages
HTTP headersMonitor scripts and content
FrequencyAt least weekly
AlertPersonnel alerted to changes

Testing Summary

TestFrequencyPerformed By
Vulnerability scan (internal)Quarterly + after changesInternal or qualified external
Vulnerability scan (external)Quarterly + after changesASV (Approved Scanning Vendor)
Penetration testAnnually + after changesQualified internal or external
Segmentation testAnnually (6 months for SP)Penetration tester
Wireless scanQuarterlyInternal or external

Citation

PCI DSS v4.0.1 Requirements 10-11

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt