10.4.2.1 Frequency of periodic log reviews is defined in targeted risk analysis
Defined Approach Requirements
10.4.2.1 The frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) is defined in the entity's targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.
Customized Approach Objective
Log reviews for lower-risk system components are performed at a frequency that addresses the entity's risk.
Applicability Notes
This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.
Defined Approach Testing Procedures
10.4.2.1.a Examine the entity's targeted risk analysis for the frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) to verify the risk analysis was performed in accordance with all elements specified at Requirement 12.3.1.
10.4.2.1.b Examine documented results of periodic log reviews of all other system components (not defined in Requirement 10.4.1) and interview personnel to verify log reviews are performed at the frequency specified in the entity's targeted risk analysis performed for this requirement.
Purpose
Entities can determine the optimum period to review these logs based on criteria such as the complexity of each entity's environment, the number of types of systems that are required to be evaluated, and the functions of such systems.
purpose
Follow up exceptions and anomalies identified during log reviews.
compliance strategies
- Incident response integration
- Ticketing for log anomalies
typical policies
- Log Exception Handling Policy
common pitfalls
- No follow-up on alerts
- Unresolved anomalies
type
Process Control
difficulty
Moderate
key risks
- Unaddressed security incidents
recommendations
- Integrate SIEM with incident management
Eligible SAQ
- SAQ-A-EP
- SAQ-C
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy