Audit Log Content Requirements

PCI DSS requires your audit logs to capture specific fields for every auditable event: who did it, what happened, when it happened, whether it succeeded or failed, where it came from, and what asset/data/service was affected. Operationally, you must configure each in-scope system to emit these fields consistently, then prove it with log samples, configuration evidence, and reviewable mappings. (PCI DSS v4.0.1 Requirement 10.2.2)

Key takeaways:

  • Every auditable event needs six content elements in the log record, not just “an entry exists.” (PCI DSS v4.0.1 Requirement 10.2.2)
  • You pass or fail this requirement on log quality and consistency across the CDE, not on tool brand names.
  • The fastest path is a field-by-field mapping from PCI’s required elements to your actual log sources, with gaps closed by configuration or enrichment.

“Audit log content requirements requirement” is usually where PCI logging programs break: teams have logs, but the entries don’t contain the fields an assessor expects to see for investigations. PCI DSS 4.0.1 Requirement 10.2.2 is explicit about what must be recorded in each auditable event record: user identification, event type, date/time, success or failure, origination, and the affected resource identity. (PCI DSS v4.0.1 Requirement 10.2.2)

For a Compliance Officer, CCO, or GRC lead, the work is less about writing a policy and more about turning the requirement into a repeatable operational standard: define what “user identification” means across shared accounts and service principals, ensure timestamps are usable, ensure “origination” is captured even through proxies and load balancers, and ensure the affected system/data is named in a way responders can act on.

This page gives requirement-level implementation guidance you can hand to security engineering and platform owners: a field checklist, step-by-step configuration approach, the evidence package to retain, and the exam questions that commonly trigger follow-ups.

Regulatory text

Requirement statement (verbatim): “Audit logs record the following details for each auditable event: user identification, type of event, date and time, success and failure indication, origination of event, and identity or name of affected data, system component, resource, or service.” (PCI DSS v4.0.1 Requirement 10.2.2)

Operator interpretation: for every event you decide is “auditable” in-scope, the resulting log entry must include all six elements. Assessors typically validate by inspecting sample logs from key systems and checking for missing fields, ambiguous identities, inconsistent timestamps, or records that can’t be tied to a user and an affected asset.

Plain-English interpretation (what PCI is really asking for)

You need logs that support incident reconstruction. A record that says “login failed” is not enough if it doesn’t identify the actor (user ID), when it occurred (timestamp), where it came from (origination), and what system it targeted (affected resource). PCI DSS 4.0.1 Requirement 10.2.2 turns that into a minimum content schema you must meet consistently. (PCI DSS v4.0.1 Requirement 10.2.2)

Who it applies to (entity and operational context)

Entities: merchants, service providers, and payment processors with PCI DSS scope. (PCI DSS v4.0.1 Requirement 10.2.2)

Operational context (where this shows up):

  • Systems in or connected to the cardholder data environment (CDE), including security tooling that generates or brokers security-relevant events.
  • Central logging/SIEM pipelines if they transform, normalize, or enrich logs. The “record” the assessor reviews may be the post-processed event in your log platform, so transformations must preserve required elements.
  • Cloud control planes, identity providers, API gateways, bastion hosts, and admin interfaces, where “origination” and “user identification” can become ambiguous without careful configuration.

What you actually need to do (step-by-step)

Step 1: Set a minimum audit log schema for in-scope systems

Create a one-page “PCI audit log content standard” that defines each required element and acceptable representations:

PCI-required element Your definition (make this explicit) Pass criteria (what a log must show)
User identification Human user ID, service account name, role/session identity Unique identifier that ties to an identity system record
Type of event Authentication, authorization, config change, data access, etc. Clear event/action name, not free-text only
Date and time Timestamp with timezone handling Consistent, parseable timestamp
Success/failure Outcome field Explicit success/failure (or equivalent result code)
Origination Source IP, host, client, process, upstream proxy Traceable source (not always “127.0.0.1”)
Affected resource identity System/component, dataset, table, API, object, service Name/ID responders can locate

This document becomes your control narrative and the basis for testing.

Step 2: Build an “in-scope log source inventory”

For each in-scope component (OS, DB, firewall/WAF, IAM, application, hypervisor, cloud service), record:

  • Log source name and owner
  • Where logs are stored/forwarded
  • Event categories emitted (auth, admin actions, object access)
  • Which of the six required fields are present natively vs missing

Treat this as a living register tied to your PCI scope.

Step 3: Map required fields to actual log fields (field-by-field)

Do a deterministic mapping, not a general statement. Example format:

  • User identificationuser, principal, uid, accountId, serviceAccount, session.user
  • Type of eventeventName, action, operation, method, category
  • Date/timetimestamp, time, eventTime
  • Success/failureoutcome, status, result, errorCode presence with rule
  • Originationsrc_ip, client_ip, source.address, x-forwarded-for (with parsing rules)
  • Affected resourceresource, object, db.table, host, service, target

Where a required element is missing, record the remediation approach: enable a log option, add an application log field, adjust a proxy header capture, or enrich in the SIEM from a trusted lookup.

Step 4: Close gaps with configuration or enrichment (with discipline)

Gap closure options, in preferred order:

  1. Enable native auditing with the right verbosity on the source system, so fields are generated at origin.
  2. Fix application logging to include resource identifiers and outcomes explicitly.
  3. Enrich in the pipeline only when the enrichment is deterministic and reviewable (for example, mapping hostnames from asset inventory). If enrichment is probabilistic or depends on ephemeral context, expect assessor questions.

Important operational rule: if your pipeline parses or normalizes logs, it must not drop raw fields needed to demonstrate compliance. Keep raw events available or prove field preservation.

Step 5: Validate with sampling tests that mirror an assessor’s approach

For each major log source, perform controlled test events:

  • Successful login and failed login
  • Privileged action (role change, configuration change)
  • Access attempt to an in-scope resource (or a representative system component)

Then inspect the resulting log entries and confirm each contains all six required elements. Document the test case, the exact log entry (redact secrets), and the field mapping.

Step 6: Operationalize ownership and drift control

Make logging content a configuration baseline:

  • Assign a system owner accountable for meeting the schema
  • Add checks to change management: changes that affect identity, proxies, logging agents, or app middleware must include a “logging impact” step
  • Add periodic validations (for example, after major releases or platform migrations) so fields do not disappear over time

Step 7: Package the evidence for assessment

Create a single evidence folder per environment/CDE boundary with:

  • The logging content standard (Step 1)
  • Log source inventory (Step 2)
  • Field mappings (Step 3)
  • Configuration screenshots/exports showing audit logging enabled
  • Sample logs demonstrating each required element for representative event types

If you use Daydream to manage control narratives and evidence requests, treat the field-mapping table and sample-log packets as reusable evidence objects. That reduces scramble during PCI cycles and makes logging drift visible when systems change.

Required evidence and artifacts to retain

Keep artifacts that prove both design (what you intended) and operating effectiveness (what actually happens):

  1. Audit log content standard aligned to the six required elements. (PCI DSS v4.0.1 Requirement 10.2.2)
  2. In-scope system/log source inventory with owners and log destinations.
  3. Field mapping matrix from PCI-required elements to each system’s log fields.
  4. System configurations demonstrating audit logging settings (exports preferred over screenshots where possible).
  5. Representative log samples showing the six elements present for each major log source. (PCI DSS v4.0.1 Requirement 10.2.2)
  6. Parsing/enrichment rules in the SIEM/log pipeline if they affect required fields (document how “origination” is derived, for example).

Common exam/audit questions and hangups

Assessors tend to focus on ambiguity. Expect questions like:

  • “Show me a failed login event. Where is the success/failure indicated?” (PCI DSS v4.0.1 Requirement 10.2.2)
  • “This event shows a username, but is it unique and traceable to an identity record?”
  • “Your logs show the proxy IP as source. How do you capture the true client origination?”
  • “What is the affected resource here? Is it a host, a database object, an API endpoint?”
  • “Do you preserve the raw logs, or only normalized events? How do you prove the required fields were present?”

Have one prepared packet per critical system (IAM, admin access, CDE boundary controls, core payment app, key databases).

Frequent implementation mistakes and how to avoid them

  1. User identification is missing for service-to-service actions.
    Fix: require service account names, workload identities, or certificate principals in logs; forbid “anonymous” for privileged paths.

  2. Outcome is implied, not explicit.
    Fix: ensure an explicit success/failure field or a consistent result code mapping; document your interpretation rules.

  3. Origination is wrong because of NAT/proxies.
    Fix: capture and parse forward headers at the edge, log both immediate source and client source, and document which field is authoritative.

  4. Affected resource names are not actionable.
    Fix: standardize resource identifiers (hostnames, instance IDs, database+table, API route) and ensure applications include them in events.

  5. Log normalization drops fields.
    Fix: preserve raw events or prove normalized events retain all required elements; add regression checks after parser updates.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. Practically, the risk is operational: if an investigation starts and you cannot tie actions to identities and affected resources with clear time and origin context, you lose containment speed and credibility with assessors. PCI DSS 4.0.1 Requirement 10.2.2 is designed to make investigations feasible using your logs. (PCI DSS v4.0.1 Requirement 10.2.2)

Practical 30/60/90-day execution plan

First 30 days (stabilize and baseline)

  • Publish the minimum audit log schema aligned to the six required elements. (PCI DSS v4.0.1 Requirement 10.2.2)
  • Inventory in-scope log sources, owners, and log destinations.
  • Select the “top” systems for sampling (IAM/admin, core app, key databases, perimeter/security controls).

By 60 days (close gaps and prove it works)

  • Complete field mapping for each in-scope log source.
  • Remediate missing fields via configuration and application changes; document each fix.
  • Run controlled test events and collect sample logs that show all required elements.

By 90 days (operationalize and prevent drift)

  • Add logging content checks to change management and release processes.
  • Implement recurring validation triggers (post-upgrade, new service onboarding, proxy changes).
  • Build an assessor-ready evidence package with mappings, configs, and samples, stored centrally (Daydream can keep this aligned to the requirement and reduce evidence rework).

Frequently Asked Questions

Do all systems need to log all six fields, or only “security tools”?

Any in-scope system that produces auditable events must record the required elements in its audit logs. The assessor will typically sample across key system types, not just the SIEM. (PCI DSS v4.0.1 Requirement 10.2.2)

What counts as “user identification” for API calls and service accounts?

“User identification” can be a service account, workload identity, certificate subject, or assumed role, as long as it uniquely identifies the actor and you can trace it back to an identity record. Document the identity type per system and show it in log samples. (PCI DSS v4.0.1 Requirement 10.2.2)

Our logs show timestamps, but timezones differ across systems. Is that a problem?

The requirement is that audit logs record date and time, and assessors need it to be usable across systems. Standardize on a consistent timestamp format in your pipeline and show sample events where the time is unambiguous. (PCI DSS v4.0.1 Requirement 10.2.2)

How do we meet “origination of event” behind load balancers and NAT?

Capture both the immediate source (proxy/NAT) and the client origination field (for example, forwarded client IP) and document which field responders should rely on. Then show an event where origination is present and interpretable. (PCI DSS v4.0.1 Requirement 10.2.2)

Can SIEM enrichment satisfy missing fields like “affected resource”?

It can, if enrichment is deterministic and you can explain the rule and demonstrate it consistently produces the required element. If the field is critical (like resource identity), prefer generating it at the source application or system where feasible. (PCI DSS v4.0.1 Requirement 10.2.2)

What’s the simplest evidence set to pass an assessment for this requirement?

A field mapping matrix per major log source, the configs showing audit logging enabled, and sample log entries for representative events that clearly display all six required elements. Keep it organized by system owner and environment. (PCI DSS v4.0.1 Requirement 10.2.2)

Frequently Asked Questions

Do all systems need to log all six fields, or only “security tools”?

Any in-scope system that produces auditable events must record the required elements in its audit logs. The assessor will typically sample across key system types, not just the SIEM. (PCI DSS v4.0.1 Requirement 10.2.2)

What counts as “user identification” for API calls and service accounts?

“User identification” can be a service account, workload identity, certificate subject, or assumed role, as long as it uniquely identifies the actor and you can trace it back to an identity record. Document the identity type per system and show it in log samples. (PCI DSS v4.0.1 Requirement 10.2.2)

Our logs show timestamps, but timezones differ across systems. Is that a problem?

The requirement is that audit logs record date and time, and assessors need it to be usable across systems. Standardize on a consistent timestamp format in your pipeline and show sample events where the time is unambiguous. (PCI DSS v4.0.1 Requirement 10.2.2)

How do we meet “origination of event” behind load balancers and NAT?

Capture both the immediate source (proxy/NAT) and the client origination field (for example, forwarded client IP) and document which field responders should rely on. Then show an event where origination is present and interpretable. (PCI DSS v4.0.1 Requirement 10.2.2)

Can SIEM enrichment satisfy missing fields like “affected resource”?

It can, if enrichment is deterministic and you can explain the rule and demonstrate it consistently produces the required element. If the field is critical (like resource identity), prefer generating it at the source application or system where feasible. (PCI DSS v4.0.1 Requirement 10.2.2)

What’s the simplest evidence set to pass an assessment for this requirement?

A field mapping matrix per major log source, the configs showing audit logging enabled, and sample log entries for representative events that clearly display all six required elements. Keep it organized by system owner and environment. (PCI DSS v4.0.1 Requirement 10.2.2)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
PCI DSS 4.0: Audit Log Content Requirements | Daydream