Compliance Framework

PCI DSS Audit Logging Requirements

PCI DSS v4.0 Requirement 10 mandates logging of all access to cardholder data environments, protection of audit trails from tampering, and regular log review and analysis.

Overview

PCI DSS is the payment card industry standard developed by the PCI Security Standards Council (Visa, Mastercard, Amex, Discover, JCB). Version 4.0 became mandatory on March 31, 2024, replacing v3.2.1. Requirement 10 ("Log and Monitor All Access to System Components and Cardholder Data") is one of the most prescriptive logging requirements in any compliance framework. PCI DSS specifies exactly what events must be logged, what data each log entry must contain, how logs must be protected, and how frequently they must be reviewed.

Key facts

PCI DSS v4.0 became mandatory on March 31, 2024

Requirement 10 is one of the 12 core PCI DSS requirements and covers all logging obligations

Non-compliance can result in fines of $5,000-$100,000 per month from payment brands

PCI DSS explicitly requires log integrity protection (Requirement 10.5)

Retention period: Minimum 12 months, with 3 months immediately available (Requirement 10.7)

Audit logging requirements

Requirement 10.2 - Audit Logs Record User Activities

Implement automated audit trails for all system components to reconstruct the following events: individual user access to cardholder data, all actions taken by any individual with root or admin privileges, access to all audit trails, invalid logical access attempts, use of and changes to identification and authentication mechanisms, and initialization, stopping, or pausing of audit logs.

How AuditKit helps: Comprehensive event capture with structured schemas covering all PCI DSS required event types

Requirement 10.3 - Audit Trail Content

Record at least the following for each event: user identification, type of event, date and time, success or failure indication, origination of event, and identity or name of affected data, component, or resource.

How AuditKit helps: Structured event schemas capture all required fields with extensible metadata

Requirement 10.5 - Secure Audit Trails

Secure audit trails so they cannot be altered. Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts.

How AuditKit helps: SHA-256 hash chains and Merkle tree proofs provide cryptographic tamper detection

Requirement 10.7 - Log Retention

Retain audit trail history for at least 12 months, with at least the most recent three months immediately available for analysis.

How AuditKit helps: Configurable retention with hot/warm/cold storage tiers

Frequently asked questions

What does PCI DSS require for audit logging?

PCI DSS v4.0 Requirement 10 mandates logging all access to cardholder data, admin actions, authentication events, and access control changes. Logs must include user ID, event type, date/time, success/failure, source, and affected resource. Logs must be tamper-proof (10.5) and retained for 12 months (10.7). AuditKit provides all of these capabilities with cryptographic integrity.

How does AuditKit satisfy PCI DSS Requirement 10.5?

PCI DSS Requirement 10.5 requires that audit trails cannot be altered. AuditKit uses SHA-256 hash chains where each log entry includes a hash of the previous entry, creating a cryptographic chain. Merkle tree proofs allow any entry to be verified without scanning the entire log. This exceeds the file-integrity monitoring that PCI DSS 10.5 requires.

Related compliance frameworks

Related resources

Get PCI DSS-ready with AuditKit

Tamper-proof audit logging that satisfies PCI DSS requirements. Start from $99/mo with no lock-in.