SM — Systems Monitoring
32 controls in the Systems Monitoring domain
SM-01Audit Logging
SM-02Secure Audit Logging
SM-03Audit Logging: Cardholder Data Environment Activity
SM-04Audit Logging: Cardholder Data Environment Event Information
SM-05Audit Logging: Service Provider Logging Requirements
SM-06Configuration Management: Remote Logging
SM-07Chain of Accountability
SM-08Audit Record Time Stamps
SM-09Log Reconciliation: CMDB
SM-10Audit Log Capacity and Retention
SM-11Enterprise Antivirus Logging
SM-12Security Monitoring Alert Criteria
SM-13Security Monitoring Alert Criteria Review
SM-14Log-tampering Detection
SM-15Unauthorized Devices Addition
SM-16Security Monitoring Alert Criteria: Guest, Anonymous and Temp Accounts
SM-17Security Monitoring Alert Criteria: VoIP Usage
SM-18Prohibited Activity Monitoring: Remote Access
SM-19Prohibited Activity Monitoring: Client Run Time Technologies
SM-20Security Monitoring Alert Criteria: Wireless Access Point
SM-21Security Monitoring Alert Criteria: Failed Logins
SM-22Security Monitoring Alert Criteria: Privileged Functions
SM-23Security Monitoring Alert Criteria: Audit Log Integrity
SM-24Security Monitoring Alert Criteria: Cardholder System Components
SM-25System Security Monitoring
SM-26Intrusion Detection Systems
SM-27System Monitoring Legal Opinion
SM-28Privileged Session Monitoring
SM-29Availability Monitoring Alert Criteria
SM-30Availability Monitoring Alert Criteria Review
SM-31System Availability Monitoring
SM-32Remote Access: Activity Log Audit