Audit Log Retention
PCI DSS requires you to keep audit logs for at least 12 months and ensure the most recent three months are immediately available for analysis (PCI DSS v4.0.1 Requirement 10.5.1). To operationalize this fast, define what “audit logs” means for your cardholder data environment (CDE), centralize logs, enforce retention in every logging layer, and prove retrieval speed with repeatable evidence.
Key takeaways:
- Keep at least 12 months of audit log history, and keep the newest three months immediately accessible (PCI DSS v4.0.1 Requirement 10.5.1).
- “Retention” is an end-to-end control across SIEM, endpoints, databases, cloud control planes, and third parties that touch the CDE.
- Auditors will test both time (12 months exist) and accessibility (three months can be retrieved quickly) using samples, not promises.
“Audit log retention requirement” usually fails in practice for one reason: teams treat it as a storage setting in the SIEM, while PCI DSS treats it as an outcome you must achieve across the whole CDE logging chain. Requirement 10.5.1 is short, but operationally it forces decisions about scope (which systems generate security-relevant logs), architecture (where logs land and how they are protected), and procedures (how you retrieve and review logs on demand).
This page translates the requirement into an execution plan a Compliance Officer, CCO, or GRC lead can drive with Security, IT Operations, and engineering. You will get: a plain-English interpretation, applicability boundaries, step-by-step implementation actions, evidence to retain, and common audit hangups. The goal is to help you pass assessment and, more importantly, to make log history useful during an incident where time and completeness matter.
Regulatory text
Requirement (verbatim): “Retain audit log history for at least 12 months, with at least the most recent three months immediately available for analysis.” (PCI DSS v4.0.1 Requirement 10.5.1)
What the operator must do:
You must (1) retain audit logs for a full year, and (2) design storage and access so analysts can promptly retrieve and analyze the newest three months without waiting on slow restores, offline media, or ad hoc tickets (PCI DSS v4.0.1 Requirement 10.5.1).
Plain-English interpretation (what the requirement really demands)
This requirement has two separate tests:
- Duration test: You can produce audit log history covering at least a year for in-scope systems (PCI DSS v4.0.1 Requirement 10.5.1).
- Accessibility test: For the newest three months, you can query and retrieve logs fast enough to support investigation and review workflows, without extraordinary effort (PCI DSS v4.0.1 Requirement 10.5.1).
“Immediately available” is assessed in practice: can you pull logs during an interview or evidence request, using normal tools, without a multi-day restore project. Build the control as if you’ll need it during an incident call.
Who it applies to (entity types and operational context)
Entity types: Merchants, service providers, and payment processors that must comply with PCI DSS (PCI DSS v4.0.1 Requirement 10.5.1).
Operational context (where it bites):
- Your CDE and connected systems that generate security-relevant events (authentication, privilege changes, system changes, security alerts, network events). The exact “what to log” details live elsewhere in PCI DSS, but retention applies to whatever logs you are required to collect and whatever logs you rely on for security monitoring.
- Hybrid environments: on-prem syslog + cloud logs + SaaS admin logs. Retention must be consistent across sources.
- Third parties operating in-scope systems: if a third party hosts, manages, or monitors CDE components, you still need contractual and operational assurance that retention and access meet the requirement.
What you actually need to do (step-by-step)
Use this as a build sheet you can assign to owners.
Step 1: Define log retention scope for the CDE
Create a list of in-scope log sources, mapped to CDE assets and security tooling. Include:
- Infrastructure (firewalls, WAF, IDS/IPS, VPN, load balancers)
- Servers and endpoints (OS audit logs, EDR telemetry if used as audit evidence)
- Identity (directory services, SSO, PAM)
- Applications handling payment flows (app logs, API gateway logs)
- Data stores (database audit logs)
- Cloud control plane logs (for accounts hosting CDE workloads)
Deliverable: “CDE Audit Log Source Register” with system owner, log type, collection method, and retention location.
Step 2: Choose a retention architecture that satisfies both tests
You need two storage tiers aligned to the requirement (PCI DSS v4.0.1 Requirement 10.5.1):
- Hot / readily searchable tier for the most recent three months.
- Warm/cold archive tier for the remainder of the 12-month period, still retrievable and preserved.
Common patterns that work:
- SIEM with searchable storage for recent data + object storage archive for older logs.
- Central log platform with tiered storage policies and immutable/WORM options.
Make one person accountable for confirming retention is enforced at every layer (log source, forwarder, aggregator, SIEM, archive).
Step 3: Configure retention policies in every system that can delete data
Teams often set retention in the SIEM but forget upstream deletion (or vice versa). Validate:
- SIEM index retention for the “immediately available” window.
- Archive bucket lifecycle policies (do not expire before the 12-month threshold).
- Forwarder/buffer behavior (ensure outages don’t cause log loss that breaks the 12-month history expectation).
- SaaS log availability windows and export jobs for platforms that only keep short histories by default.
Deliverable: Retention configuration screenshots/exports for each platform storing in-scope logs.
Step 4: Prove “immediately available” with a repeatable retrieval procedure
Write a short runbook: “Retrieve last three months of logs for system X.” Include:
- Who can run queries (roles, access approvals)
- Where to query (SIEM index, log platform)
- How to export and preserve results (case folder, ticket attachment, evidence repository)
- Expected retrieval path for common audit asks (failed logins, admin changes, firewall denies)
Then test it with a tabletop: pick two systems and pull events from within the newest three months during a timed working session. Keep the artifacts.
Deliverable: Log retrieval runbook + executed test record.
Step 5: Add controls for integrity and defensibility (so logs count)
PCI DSS 10.5.1 is about retention duration and availability, but auditors will still care whether logs are trustworthy. Operationally, build in:
- Access control: least privilege to read, export, and delete logs.
- Change control for retention settings.
- Time synchronization and consistent timestamps (or your analysis falls apart quickly).
Deliverable: Access list/role mapping for log systems and change records for retention policy changes.
Step 6: Handle third-party and SaaS logging explicitly
If a third party provides a managed firewall, managed SIEM, hosted payment app, or cloud environment administration:
- Contractually require retention and access that meets the requirement (PCI DSS v4.0.1 Requirement 10.5.1).
- Ensure you can retrieve the newest three months without waiting on their custom engagement process.
- Require an evidence package (retention policy, sample exports, and an attestation or report they can provide during your assessment).
Practical note: this is where teams lose time. A lightweight third-party evidence checklist in Daydream helps you track which providers can meet retrieval requests quickly and which ones need contract changes.
Required evidence and artifacts to retain (what auditors ask for)
Keep evidence that proves both duration and availability (PCI DSS v4.0.1 Requirement 10.5.1):
Governance
- Audit log retention policy (states 12 months retained; newest three months immediately available)
- CDE Audit Log Source Register (system inventory of log sources)
Technical configuration
- SIEM/log platform retention settings (screenshots or exported config)
- Archive lifecycle policies showing no deletion before the required period
- Samples of logs stored in hot tier (recent) and archive tier (older)
Operational proof
- Log retrieval runbook
- Retrieval test records (queries executed, export files, timestamps, ticket/case reference)
- Access control evidence (role assignments, admin group membership for log systems)
- Change tickets/approvals for retention changes
Common exam/audit questions and hangups (prepare answers now)
Expect these lines of questioning:
- “Show me logs from nine months ago for a CDE system.” (Proves 12-month retention.)
- “Now show me logs from last month and filter for admin actions.” (Proves immediate availability and analytical usefulness.)
- “Which systems are included in your log retention program?” (Tests scope discipline.)
- “Who can delete logs or change retention?” (Tests integrity and governance.)
- “How do you ensure SaaS/admin logs are retained if the provider keeps short histories?” (Tests third-party and cloud reality.)
Hangups that trigger follow-up sampling:
- Needing a special admin to access logs (and that admin is unavailable).
- Having the data “somewhere,” but no one can query it without engineering help.
- Inconsistent retention across sources (some have 12 months, others silently keep less).
Frequent implementation mistakes (and how to avoid them)
-
Assuming SIEM retention equals end-to-end retention.
Fix: validate deletion settings in sources, collectors, SIEM indexes, and archives. -
No proof that three months are “immediately available.”
Fix: run and document retrieval drills; keep exports and query screenshots. -
Relying on a third party’s portal with limited lookback.
Fix: require export pipelines or delivered log archives that satisfy the retention and access requirement (PCI DSS v4.0.1 Requirement 10.5.1). -
Letting storage lifecycle rules delete data early.
Fix: centralize ownership of lifecycle policies and review them whenever costs are optimized. -
Storing logs but failing to preserve searchability for the newest three months.
Fix: confirm indexing/search tier retains three months of relevant fields and that analysts have permissions to query.
Enforcement context and risk implications (what’s at stake)
No public enforcement cases were provided in the source catalog for this requirement, so treat risk as operational and assessment-driven rather than case-law-driven. The practical risk is straightforward: without a full year of logs and rapid access to recent logs, you may fail PCI assessment testing (PCI DSS v4.0.1 Requirement 10.5.1) and you will have reduced incident investigation capability, especially for slow-moving compromise patterns.
Practical 30/60/90-day execution plan (phased, operator-friendly)
First 30 days (stabilize scope and policy)
- Publish/update the audit log retention policy to match the requirement language (PCI DSS v4.0.1 Requirement 10.5.1).
- Build the CDE Audit Log Source Register and identify missing log sources.
- Confirm current retention settings in the SIEM/log platform and any archives; document gaps.
Next 60 days (implement retention controls and retrieval proof)
- Implement or correct tiered retention: newest three months searchable; full 12 months retained (PCI DSS v4.0.1 Requirement 10.5.1).
- Set lifecycle policies and access controls; route all in-scope sources to centralized storage.
- Write the retrieval runbook and complete at least one retrieval drill per major log source category (network, identity, servers, cloud).
Next 90 days (harden and make it audit-proof)
- Add change-control checkpoints for retention setting changes.
- Operationalize third-party evidence collection: contract clauses, periodic evidence requests, and retrieval SLAs in practice.
- Store all evidence artifacts in a dedicated audit repository and link them to controls in your GRC system (Daydream can keep the log-source register, evidence requests to third parties, and audit-ready retrieval proofs in one place).
Frequently Asked Questions
Does “12 months” mean 12 rolling months or a calendar year?
The text requires retaining audit log history for at least 12 months (PCI DSS v4.0.1 Requirement 10.5.1). Treat it as rolling history so you can always produce the prior 12 months on request.
What does “immediately available for analysis” mean in practice?
It means your newest three months of logs can be queried and exported using normal tools and access paths without offline restores or special projects (PCI DSS v4.0.1 Requirement 10.5.1). Prove it with a documented retrieval drill.
If a SaaS platform only keeps admin logs for a short window, how do we comply?
Export or stream those logs into your central log store so you control retention and can keep the newest three months searchable and a full year retained (PCI DSS v4.0.1 Requirement 10.5.1). If a third party manages it, require evidence and access terms contractually.
Are backups an acceptable way to meet audit log retention?
Backups may help with long-term preservation, but they often fail the “immediately available” test for the newest three months if restores are slow or irregular (PCI DSS v4.0.1 Requirement 10.5.1). Keep recent logs in a searchable tier.
How do we show an auditor that retention is enforced and not just a written policy?
Provide system-generated retention settings, archive lifecycle rules, and samples showing older logs exist plus recent logs are searchable (PCI DSS v4.0.1 Requirement 10.5.1). Pair that with a runbook and retrieval test output.
Who should own this control: Security, IT, or Compliance?
Compliance should own the requirement and evidence model; Security/IT should own the technical implementation and runbooks. Assign a single accountable owner for end-to-end retention across all log pipelines so settings do not drift.
Frequently Asked Questions
Does “12 months” mean 12 rolling months or a calendar year?
The text requires retaining audit log history for at least 12 months (PCI DSS v4.0.1 Requirement 10.5.1). Treat it as rolling history so you can always produce the prior 12 months on request.
What does “immediately available for analysis” mean in practice?
It means your newest three months of logs can be queried and exported using normal tools and access paths without offline restores or special projects (PCI DSS v4.0.1 Requirement 10.5.1). Prove it with a documented retrieval drill.
If a SaaS platform only keeps admin logs for a short window, how do we comply?
Export or stream those logs into your central log store so you control retention and can keep the newest three months searchable and a full year retained (PCI DSS v4.0.1 Requirement 10.5.1). If a third party manages it, require evidence and access terms contractually.
Are backups an acceptable way to meet audit log retention?
Backups may help with long-term preservation, but they often fail the “immediately available” test for the newest three months if restores are slow or irregular (PCI DSS v4.0.1 Requirement 10.5.1). Keep recent logs in a searchable tier.
How do we show an auditor that retention is enforced and not just a written policy?
Provide system-generated retention settings, archive lifecycle rules, and samples showing older logs exist plus recent logs are searchable (PCI DSS v4.0.1 Requirement 10.5.1). Pair that with a runbook and retrieval test output.
Who should own this control: Security, IT, or Compliance?
Compliance should own the requirement and evidence model; Security/IT should own the technical implementation and runbooks. Assign a single accountable owner for end-to-end retention across all log pipelines so settings do not drift.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream