Visitor Log
PCI DSS 4.0.1 requires you to keep a visitor log for facilities and sensitive areas that records each visitor’s name, organization, visit date/time, and the internal personnel who authorized access, and you must retain the log for at least three months unless law restricts retention. Build a controlled sign-in/out process, define “sensitive areas,” and keep logs reviewable for audit. 1
Key takeaways:
- The log must capture specific data elements (identity, company, time, authorizer) for every visitor entry into facilities and sensitive areas. 1
- “Retention for at least three months” is a hard floor unless a legal restriction forces a shorter period. 1
- Auditors typically test completeness (no gaps), authorization (who approved), and retrievability (can you produce logs on request).
A “visitor log requirement” sounds simple until you try to run it across multiple offices, shared data centers, and mixed staff/third-party traffic. PCI DSS 4.0.1 Requirement 9.3.4 is explicit: you need a visitor log that maintains a physical record of visitor activity within the facility and within sensitive areas, and the log must contain specific fields and be retained for a minimum period. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing this is to treat the visitor log as a control with clear scope, defined “sensitive areas,” an enforced front-desk workflow, and reliable evidence production. The control will fail if it depends on memory (“people usually sign in”) or if it’s unclear who counts as a visitor (contractors, auditors, cleaners, interview candidates, delivery personnel, other employees from different sites).
This page translates the requirement into an implementable standard: what to log, where to log it, who approves access, how to handle exceptions, what evidence to retain, and how to prepare for audit testing without disrupting operations.
Regulatory text
PCI DSS 4.0.1 Requirement 9.3.4 states: “A visitor log is used to maintain a physical record of visitor activity within the facility and within sensitive areas, including the visitor name and the organization represented, the date and time of the visit, the name of the personnel authorizing physical access, and the log is retained for at least three months unless otherwise restricted by law.” 1
Operator translation (what you must do):
- Use a visitor log (paper or electronic) as the system of record for visitor activity in facilities and sensitive areas. 1
- Capture, at minimum: visitor name, organization represented, date/time of visit, and the personnel authorizing physical access. 1
- Retain logs for at least three months, unless a law restricts retention. 1
Plain-English interpretation
You need a repeatable way to prove who entered your buildings and sensitive areas, when they entered, and which employee approved that access. Then you must be able to pull those records going back at least three months (unless legal rules force shorter retention). 1
This is a physical security requirement, but it supports broader PCI outcomes: limiting exposure of cardholder data environments and demonstrating controlled access. Expect assessors to look for disciplined execution, not a “template that exists.”
Who it applies to (entity and operational context)
Entity types in scope: Merchants, service providers, and payment processors assessed against PCI DSS 4.0.1. 1
Operational contexts where this becomes real work:
- Corporate offices that host payment operations, call centers, finance teams, or IT teams supporting cardholder data systems.
- Data centers, co-location cages, server rooms, network closets, and other controlled areas you designate as “sensitive.”
- Shared buildings (multi-tenant) where you control suite access but not the lobby.
- Facilities with frequent third-party presence (maintenance, cleaning crews, consultants, auditors, onsite tech support).
Practical scoping rule: If a person is not a regular authorized occupant of the space, treat them as a visitor for logging purposes. Document any exceptions as part of your physical security standard so your process is consistent in audits.
What you actually need to do (step-by-step)
1) Define “facility” and “sensitive areas” in writing
Create a short, usable definition that maps to your physical footprint:
- Facility: the office/site where your organization operates.
- Sensitive areas: specific rooms or zones with heightened access controls (for example, server rooms, network closets, secure records storage, operations floors).
Then publish a list (by site) of sensitive areas and owners. Auditors will ask how you determined scope and how you keep it current.
2) Standardize the visitor log format (required fields)
Your log must capture these fields:
- Visitor name 1
- Organization represented 1
- Date and time of the visit 1
- Name of personnel authorizing physical access 1
Add operational fields (recommended, not required) to reduce friction later:
- Location/site and sensitive area visited (dropdown works well)
- Sign-in time and sign-out time (separate from “date/time of visit”)
- Visitor badge ID issued/returned
- Escort name (if you require escorting)
- Reason for visit / ticket reference (especially useful for third-party work orders)
3) Build a front-desk (or entry-point) workflow that cannot be skipped
Define the workflow for every site:
- Visitor arrives at reception/security entry point.
- Staff verifies identity (your method) and collects required log fields.
- Staff confirms an authorizing employee (host) approves access.
- Staff issues a visitor badge that is visually distinct and time-bound.
- Visitor is escorted when required by your physical security rules.
- Visitor signs out; badge is returned.
Control objective: no badge, no entry; no log entry, no badge.
4) Set rules for “authorization” that are testable
The requirement calls for “the name of the personnel authorizing physical access.” 1
Make authorization real:
- Authorization must be a named employee (or named role) who accepts responsibility for the visitor.
- Reception/security should not self-authorize except under a documented emergency procedure.
- For recurring third parties (weekly maintenance), require authorization each visit, not a blanket approval, unless your policy explicitly defines how blanket approvals work and how they are revoked.
5) Decide paper vs. electronic logs, then lock down integrity
PCI DSS requires a “physical record,” which can be satisfied by a controlled paper logbook or an electronic system that produces a durable record for audit. 1
Integrity controls to implement:
- Paper: bound logbook, no loose sheets; ink entries; corrections initialed; stored in a locked cabinet when not attended.
- Electronic: role-based access to edit; audit trail; export capability; time sync; backups.
6) Implement retention and retrieval
Retention must be “at least three months unless otherwise restricted by law.” 1
Operationalize it:
- Set a retention standard that meets or exceeds the minimum and is consistent across sites, unless legal requirements differ by jurisdiction. 1
- Assign an owner for archiving (often Facilities, Security, or IT for electronic systems).
- Test retrieval: pick a random date in the lookback window and confirm you can produce the log quickly with required fields visible.
7) Train the people who actually run the control
Training must reach:
- Reception/front desk
- Onsite security
- Office managers
- Site leaders who authorize visitors
Use short job aids at the point of entry: “No log entry = no access.”
8) Add monitoring so gaps don’t persist
Most visitor log failures are not malicious; they are operational drift. Add lightweight monitoring:
- Weekly spot-check by site admin (are entries complete? are authorizers named?)
- Monthly compliance sampling across sites (do logs exist for each day visitors were present? are sign-outs recorded?)
If you manage controls in Daydream, track this as a recurring evidence request with assigned control owners per site, plus automated reminders before audit fieldwork.
Required evidence and artifacts to retain
Keep evidence that proves both design and operating effectiveness:
Core artifacts
- Visitor log records covering the required retention period. 1
- A written procedure or standard describing:
Supporting artifacts (high value in audits)
- Screenshots/config exports for electronic visitor management configuration (required fields, retention settings).
- Samples showing authorizer names populated and consistent.
- Training records or sign-off acknowledgments for reception/security staff.
- Exception records (emergency access, after-hours procedures) with approvals.
Common exam/audit questions and hangups
Assessors tend to probe the same weak spots:
- “Show me logs for sensitive areas, not just the lobby.” The requirement covers facilities and sensitive areas. 1
- “Where is the authorizing personnel recorded?” Missing authorizer names is a common finding. 1
- “How do you know the log is complete?” Expect sampling around known visitor-heavy days (maintenance windows, audits).
- “Can you produce the last three months quickly?” Retention and retrievability are part of the control, not an afterthought. 1
- “What about contractors who come every day?” If they are not employees with normal badge access, auditors often still expect visitor logging or an equivalent controlled process.
Frequent implementation mistakes (and how to avoid them)
- Logging only at headquarters. Fix: create a site-by-site control matrix; assign an owner per location.
- No clear definition of “sensitive areas.” Fix: publish a sensitive area list and keep it current through a simple change process (new server room, remodel, office move).
- Visitor badge issued without authorization recorded. Fix: make “authorizer name” mandatory in the visitor management tool or on the paper form. 1
- Logs exist but are unreadable or incomplete. Fix: require printed names for paper logs; add periodic spot checks.
- Retention breaks during office moves or vendor changes. Fix: include visitor logs in your records management checklist and transition plan.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement. Treat the risk as audit failure and control breakdown: incomplete visitor logs undermine your ability to demonstrate controlled physical access, and assessors may view that as a systemic weakness in Requirement 9 physical security controls. 1
Practical 30/60/90-day execution plan
First 30 days (stabilize and standardize)
- Confirm scope: facilities and sensitive areas per site owner.
- Choose log method per site (paper vs electronic) and standardize required fields. 1
- Publish a one-page SOP for reception/security with “no log, no access.”
- Run a pilot at one site; fix friction points (missing authorizer, sign-out confusion).
Next 60 days (roll out and evidence)
- Roll the workflow to remaining sites with training for front desk/security and site leads.
- Implement archiving and retrieval steps so logs are retained and searchable for the minimum period. 1
- Start periodic spot checks and document results and remediation.
By 90 days (operational maturity)
- Perform an internal audit-style sample: pick dates/sites and verify required fields, retention, and sensitive-area coverage.
- Close recurring issues with targeted retraining or process changes.
- Centralize evidence collection (for example, in Daydream) so each site owner can upload monthly log extracts and attest to completeness before PCI assessment.
Frequently Asked Questions
Do we need a visitor log for every office, or only where cardholder data systems are located?
The requirement calls for a visitor log “within the facility and within sensitive areas.” Scope it to sites and areas in your PCI environment and your defined sensitive areas list. 1
Can an electronic visitor management system satisfy the “physical record” requirement?
Yes, if it produces a durable record you can retain and retrieve, and it captures the required fields. Make sure the authorizer name and visit date/time are recorded and retained for at least three months unless law restricts retention. 1
What exact fields must be captured in the visitor log?
At minimum: visitor name, organization represented, date and time of the visit, and the name of the personnel authorizing physical access. 1
How long do we have to keep visitor logs?
Retain the log for at least three months unless a law restricts retention. If you operate in multiple jurisdictions, document any location-specific legal restriction and apply it consistently. 1
Are employees considered “visitors” when entering sensitive areas?
The requirement is written for visitors, but auditors will still expect you to control and evidence access to sensitive areas. Define “visitor” in your procedure and ensure the log process covers non-employees and any other categories you decide to treat as visitors for consistency. 1
What’s the simplest way to pass audit testing for this control?
Make required fields mandatory, make authorization explicit, and be able to produce complete logs covering the minimum retention window on request. Store logs centrally or with controlled site-level archiving and a documented retrieval process. 1
Footnotes
Frequently Asked Questions
Do we need a visitor log for every office, or only where cardholder data systems are located?
The requirement calls for a visitor log “within the facility and within sensitive areas.” Scope it to sites and areas in your PCI environment and your defined sensitive areas list. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
Can an electronic visitor management system satisfy the “physical record” requirement?
Yes, if it produces a durable record you can retain and retrieve, and it captures the required fields. Make sure the authorizer name and visit date/time are recorded and retained for at least three months unless law restricts retention. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
What exact fields must be captured in the visitor log?
At minimum: visitor name, organization represented, date and time of the visit, and the name of the personnel authorizing physical access. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
How long do we have to keep visitor logs?
Retain the log for at least three months unless a law restricts retention. If you operate in multiple jurisdictions, document any location-specific legal restriction and apply it consistently. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
Are employees considered “visitors” when entering sensitive areas?
The requirement is written for visitors, but auditors will still expect you to control and evidence access to sensitive areas. Define “visitor” in your procedure and ensure the log process covers non-employees and any other categories you decide to treat as visitors for consistency. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
What’s the simplest way to pass audit testing for this control?
Make required fields mandatory, make authorization explicit, and be able to produce complete logs covering the minimum retention window on request. Store logs centrally or with controlled site-level archiving and a documented retrieval process. (Source: PCI DSS v4.0.1 Requirement 9.3.4)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream