PCI DSS Requirement 10: Logging and Monitoring That Actually Passes Assessment | Lorikeet Security Skip to main content
Back to Blog

PCI DSS Requirement 10: Logging and Monitoring That Actually Passes Assessment

Lorikeet Security Team February 28, 2026 11 min read

Requirement 10 is where PCI DSS assessments most frequently stall. The requirement itself is straightforward: log everything relevant, protect the logs, review them regularly, and keep them long enough. The implementation is where companies struggle. Incomplete log sources, missing timestamps, inadequate retention, and the new v4.0 automated review mandate create a compliance gap that catches organizations off guard.

We see Requirement 10 failures in the majority of our PCI DSS penetration testing engagements. Not because logging is technically difficult, but because it requires coordination across teams, tools, and environments that rarely happens organically.


What Must Be Logged

PCI DSS Requirement 10.2 specifies the events that must generate audit log entries. Every one of these must be captured for all system components in the cardholder data environment:

Log entry contents

Each log entry must contain specific data elements per Requirement 10.3: user identification, type of event, date and time, success or failure indication, origination of event, and the identity or name of the affected data, system component, or resource. Missing any of these fields is a finding.


Time Synchronization

Requirement 10.6 mandates that all system clocks and times are synchronized using NTP or similar technology. This seems minor until you try to correlate events across systems during an incident investigation and discover your web server is three minutes ahead of your database server.

Configure all CDE systems to synchronize with the same authoritative time source. Use NTP with at least two upstream servers. Monitor for clock drift exceeding one second. Document your time synchronization architecture, because your assessor will ask for it.


Log Retention Requirements

Requirement Retention Period Availability
10.7.1 At least 12 months total At least 3 months immediately available for analysis
10.7.2 (Service providers) At least 12 months total At least 3 months immediately available; failures detected and reported within 24 hours

"Immediately available" means searchable and queryable without needing to restore from backup. If your logs older than 30 days are in cold storage on tape, you do not meet this requirement. Hot or warm storage for the most recent three months, with archived storage for the remaining nine months, is the standard architecture.


The v4.0 Automated Review Mandate

PCI DSS v4.0 introduced Requirement 10.4.1.1, which requires automated mechanisms to perform audit log reviews. This is the requirement that has caused the most operational disruption since the March 2025 transition deadline.

Under v3.2.1, daily log review could be performed manually. Under v4.0, you need automated detection of anomalies, suspicious activity, and security events. In practice, this means a SIEM or equivalent log analysis platform with correlation rules, alerting, and automated triage.

What assessors look for: Your QSA will ask to see your SIEM correlation rules, alert thresholds, escalation procedures, and evidence that alerts are being investigated. Having a SIEM is not enough. You need to demonstrate that it is actively monitored and that alerts result in documented investigations.

Minimum detection use cases


Log Integrity and Protection

Requirement 10.3.2 requires that audit log files are protected from modifications. An attacker who compromises a system and can delete or alter logs can cover their tracks entirely. Your log architecture must prevent this.

Forward logs to a centralized log server or SIEM in near real-time. The log collection infrastructure should be in a separate security zone from the systems generating logs. Use write-once storage or append-only log destinations. In cloud environments, services like S3 Object Lock, Azure Immutable Blob Storage, or Cloud Storage retention policies provide tamper-evident log storage.


Common Requirement 10 Failures

Need help with PCI DSS logging compliance?

We assess logging and monitoring architectures as part of our PCI DSS penetration testing and compliance support. Get your Requirement 10 implementation validated before your assessment.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!