Log Access to Audit Logs
To meet the log access to audit logs requirement, you must record every read, search, export, modification, deletion, and permission change affecting audit logs, and make those records tamper-evident and reviewable. PCI DSS expects “audit logs [to] capture all access to all audit logs,” so you can detect unauthorized viewing or attempts to erase evidence. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Key takeaways:
- Log readers too: access to the logs is a security event and must be captured, not just the underlying system activity. (PCI DSS v4.0.1 Requirement 10.2.1.3)
- Include humans, service accounts, APIs, and third parties; exports and permission changes are common blind spots.
- Prove it with evidence: configurations, sample events, and end-to-end testing that shows log-access events are generated, retained, and monitored.
Most logging programs focus on “what happened on the system” and forget to monitor “who looked at the evidence.” PCI DSS closes that gap. If an attacker, an insider, or an over-permissioned third party can read, suppress, or delete audit logs without leaving a trace, your incident response timeline collapses and you can’t trust your own telemetry.
PCI DSS v4.0.1 Requirement 10.2.1.3 is short but operationally demanding: audit logs must capture all access to all audit logs. (PCI DSS v4.0.1 Requirement 10.2.1.3) That means you need a design where (1) log platforms generate their own access audit trails, (2) those access trails are protected from tampering, and (3) you can produce evidence quickly during an assessment.
This page translates that requirement into an implementation you can execute: scope what counts as “audit logs,” define “access” precisely, instrument your logging stack (SIEM, cloud logging, EDR, databases, and SaaS admin consoles), and retain defensible artifacts. It also covers the exam questions that tend to stall teams and the mistakes that trigger findings.
Regulatory text
Requirement: “Audit logs capture all access to all audit logs.” (PCI DSS v4.0.1 Requirement 10.2.1.3)
Operator interpretation (what you must do):
- Identify every system that stores, processes, or presents audit logs (for example, SIEM, log management, cloud logging service, EDR console, database audit tables, application log buckets).
- Configure each of those systems so that access to the logs themselves generates an audit event.
- Ensure the resulting “log-access logs” are protected and available for review (so you can detect unauthorized log access and tampering attempts). (PCI DSS v4.0.1 Requirement 10.2.1.3)
Plain-English meaning (what counts as “access”)
Treat “access to audit logs” as any action that could reveal, change, remove, or weaken the integrity of audit logs, including:
- Read/view/search/query: opening a log viewer, running a search, viewing an event, querying audit tables.
- Export/forward/download: exporting results, downloading raw files, API pulls, report generation that includes log content.
- Modify/delete/rotate: deleting events, changing retention, truncating indexes, altering parsing pipelines in ways that drop events.
- Permission and configuration changes: granting log-read roles, changing bucket ACLs, altering SIEM roles, modifying “who can clear logs.”
If your current tools only log “admin activity” but not “read activity,” you likely have a gap. The requirement is explicit that access must be captured. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Who it applies to (entity + operational context)
Entities: Merchants, service providers, and payment processors in scope for PCI DSS. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Operational context: Any environment where cardholder data environment (CDE) systems generate security logs, and where those logs are centralized, stored, or reviewed. Common scoped components include:
- SIEM/log management platforms and their underlying storage (indexes, buckets, object stores).
- Cloud-native logging (cloud audit trails, logging workspaces).
- Databases or applications storing audit trails in tables/files.
- Jump hosts, bastions, and privileged access tools used to reach log platforms.
- Third parties with support access to logging or security tooling.
If a third party has break-glass access to your SIEM or log storage, that access must create a trace in the audit trail as well.
What you actually need to do (step-by-step)
1) Define “audit logs” and map where they live
Create a simple inventory that answers:
- What systems produce audit logs?
- Where are those logs stored/aggregated?
- How do analysts/admins access them (UI, API, CLI)?
- Who has access (roles, groups, service accounts, third parties)?
Practical tip: start with your central log platform, then trace upstream (sources) and downstream (archives, cold storage, exports).
2) Enable log-platform auditing for log access events
For each log repository or log platform, turn on (or verify) auditing that captures:
- Authentication events (login, SSO, MFA challenges if recorded).
- Authorization events (role assignment, privilege escalation).
- Read/search/export actions against log datasets.
- Administrative actions affecting logging configuration, retention, and deletion.
You are aiming for complete coverage of “access to audit logs,” not just “security admin actions.” (PCI DSS v4.0.1 Requirement 10.2.1.3)
3) Centralize and protect the “log-access logs”
If your SIEM is the place you monitor everything, ensure the SIEM’s own audit trail is:
- Collected out-of-band where feasible (for example, native audit stream to a separate index or separate project/account).
- Stored in tamper-evident storage (append-only controls, immutability features, or restricted write paths).
- Access-controlled with least privilege and separation of duties (the people who administer logging should not be the only people who can erase evidence of their access).
This is where many teams fail in practice: the SIEM audit trail stays inside the same admin boundary, so a privileged user can both access logs and alter the evidence.
4) Capture API and service account access
UI auditing alone is rarely enough. Ensure you capture:
- API token usage against log search endpoints.
- Programmatic exports (scheduled jobs, SOAR playbooks).
- Service accounts that query logs for operational dashboards.
If you cannot attribute an access event to a person, you should still log it, and you should be able to map the credential to an owner and purpose.
5) Implement alerts and review workflows for suspicious log access
The requirement is about capture, but assessors often expect you to operationalize it as part of your detection and response posture. Make sure you can identify:
- Non-standard users accessing logs (new principals, unusual locations).
- Spikes in log exports or bulk queries.
- Log deletion/retention reductions.
- Permission changes granting broad log-read access.
Route these to your existing incident triage process, or a dedicated queue owned by Security/GRC with defined SLAs.
6) Test end-to-end and document the results
Run controlled tests that generate evidence:
- A normal analyst searches a sensitive log index; confirm an audit event is created.
- An admin exports logs; confirm export access is audited.
- A privileged user changes retention or deletes a log object (in a test area); confirm the action is audited and alerted.
Store test outputs with timestamps and screenshots/log extracts to prove the control works.
Required evidence and artifacts to retain
Maintain an “assessor-ready” packet for log access to audit logs:
- Logging architecture diagram showing log sources, central storage, and where log-access auditing is generated and stored.
- Inventory of audit log repositories (systems and storage locations) with owners.
- Configuration evidence (screenshots or configuration exports) proving audit logging for access is enabled on each repository.
- Role/permission matrices for log platforms, including third-party access paths.
- Sample log-access events showing fields such as actor, time, action (view/search/export/admin change), target dataset, and outcome.
- Alert rules and tickets (or case management records) tied to suspicious log access scenarios.
- Test scripts and results demonstrating end-to-end generation, collection, retention, and review of log-access events.
Common exam/audit questions and hangups
Expect these, and prepare crisp answers plus proof:
- “Show me that viewing/searching logs is logged.” Bring sample events and the config that enables them. (PCI DSS v4.0.1 Requirement 10.2.1.3)
- “Who can access the SIEM/log buckets, and how is that access monitored?” Provide role lists, group membership exports, and the log-access audit trail.
- “Can an admin delete or alter the log-access logs?” Explain separation of duties and immutability controls; show restricted permissions.
- “How do you cover third-party support access?” Show named accounts, time-bound access approvals, and corresponding access events.
- “What about API exports and automated queries?” Provide API audit records and service account ownership mapping.
Frequent implementation mistakes (and how to avoid them)
-
Only logging system events, not log reads.
Fix: validate that read/search/export actions produce audit events in each tool. (PCI DSS v4.0.1 Requirement 10.2.1.3) -
Relying on “administrator activity” logs as a proxy.
Fix: confirm the audit taxonomy includes non-admin viewing/searching. Many incidents involve legitimate users accessing logs they shouldn’t. -
Storing SIEM audit logs inside the same privilege boundary.
Fix: isolate the SIEM’s own audit trail into a separate protected store, with tighter permissions than general SIEM admin. -
Ignoring permission changes as “IAM’s problem.”
Fix: treat role grants to log repositories as log-access events worth alerting on; they often precede log tampering. -
No evidence packet.
Fix: pre-package configs, sample events, and test results. During an assessment, “we think it’s enabled” fails quickly.
Enforcement context and risk implications
No public enforcement cases were provided in the available source catalog for this requirement. Practically, the risk is straightforward: if attackers can access or erase audit logs without creating traceable evidence, you lose detection capability and may be unable to reconstruct events for incident response or PCI investigations. PCI DSS makes this an explicit logging requirement because log integrity depends on controlling and monitoring log access. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Practical 30/60/90-day execution plan
Use this phased plan to move from gap discovery to defensible operations without guessing timelines.
First 30 days (Immediate: scope + minimum viable coverage)
- Build the inventory of all audit log repositories and access paths (UI/API/CLI).
- Confirm which platforms can generate audit events for read/search/export/admin actions; document gaps.
- Enable auditing for log access wherever it exists but is disabled.
- Define ownership: who approves access, who reviews suspicious log access, who maintains evidence.
Days 31–60 (Near-term: harden + centralize + alert)
- Centralize log-access audit trails into your monitoring stack, with restricted write access.
- Implement least privilege roles for log readers/admins; remove shared accounts.
- Add alerts for log exports, retention reductions, permission grants, and deletion attempts.
- Run tabletop scenarios focused on log tampering and confirm your workflows catch them.
Days 61–90 (Operationalize: testing + audit readiness)
- Execute end-to-end tests and archive results in an assessor-ready packet.
- Review third-party access patterns; enforce time-bound access and ticketed approvals.
- Add periodic access reviews for log repositories and service accounts that query logs.
- If you struggle to keep the inventory, evidence, and control mapping current, Daydream can help by turning requirement text into an auditable control checklist and tracking the exact artifacts you need to keep ready for assessors. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Frequently Asked Questions
Does “access to audit logs” include just admins, or also analysts who only search and view logs?
It includes everyone. PCI DSS requires audit logs to capture all access to all audit logs, so read/search actions by analysts and other users must be recorded too. (PCI DSS v4.0.1 Requirement 10.2.1.3)
If our SIEM stores logs, do we still need to log access to logs on the original source systems?
You need coverage for “all audit logs,” which means any repository where audit logs are stored and accessed. If source-system logs remain accessible or authoritative (even temporarily), access there should be captured. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Are API exports and scheduled searches in scope?
Yes. If a token, service account, or integration can query or export audit logs, that is access and must generate audit events you can review. (PCI DSS v4.0.1 Requirement 10.2.1.3)
How do we handle third-party support access to our log platform?
Give third parties named accounts, least privilege roles, and time-bound approvals, then verify their logins, searches, and exports appear in the log-access audit trail. Retain the approval record and the corresponding access events. (PCI DSS v4.0.1 Requirement 10.2.1.3)
What evidence is most persuasive to an assessor for this requirement?
Configuration proof that log-access auditing is enabled, plus sample events showing a user viewing/searching/exporting logs and the system recording that access. Add a short test record that ties the action to the captured audit event. (PCI DSS v4.0.1 Requirement 10.2.1.3)
What’s the most common gap teams discover late?
The SIEM’s own audit trail is missing, incomplete, or not protected from the same admins who can access logs. Fix this early by isolating and restricting the log-access logs. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Frequently Asked Questions
Does “access to audit logs” include just admins, or also analysts who only search and view logs?
It includes everyone. PCI DSS requires audit logs to capture all access to all audit logs, so read/search actions by analysts and other users must be recorded too. (PCI DSS v4.0.1 Requirement 10.2.1.3)
If our SIEM stores logs, do we still need to log access to logs on the original source systems?
You need coverage for “all audit logs,” which means any repository where audit logs are stored and accessed. If source-system logs remain accessible or authoritative (even temporarily), access there should be captured. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Are API exports and scheduled searches in scope?
Yes. If a token, service account, or integration can query or export audit logs, that is access and must generate audit events you can review. (PCI DSS v4.0.1 Requirement 10.2.1.3)
How do we handle third-party support access to our log platform?
Give third parties named accounts, least privilege roles, and time-bound approvals, then verify their logins, searches, and exports appear in the log-access audit trail. Retain the approval record and the corresponding access events. (PCI DSS v4.0.1 Requirement 10.2.1.3)
What evidence is most persuasive to an assessor for this requirement?
Configuration proof that log-access auditing is enabled, plus sample events showing a user viewing/searching/exporting logs and the system recording that access. Add a short test record that ties the action to the captured audit event. (PCI DSS v4.0.1 Requirement 10.2.1.3)
What’s the most common gap teams discover late?
The SIEM’s own audit trail is missing, incomplete, or not protected from the same admins who can access logs. Fix this early by isolating and restricting the log-access logs. (PCI DSS v4.0.1 Requirement 10.2.1.3)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream