SIEM Use-Cases Pertaining To PCI DSS V3
SIEM Use-Cases Pertaining To PCI DSS V3
# Scenario Threat
Detect all the insecure services, ports and protocols Group by application/port
Verify that a DMZ is implemented to limit inbound Analyse flow data from your DMZ
traffic to only system components that provide firewall and check for
authorized publicly accessible services, protocols, and inbound/outbound traffic not
ports. destined for legitimate servers.
Look for the services that should not be present on the Group by applications
machines
Detect when anti-virus protection is disabled on the Include qid 'protection disabled'
machines
Detect when agents are not receiving any updates Search for qid that is related to old
database or old signatures
Identify all the vulnerable systems running in the Integrate VM with an exiting SIEM
organization solution
Create a list of default accounts and
Identify all the systems using default accounts check for authentication events
related to those accounts
Detect addition, deletion, and modification of user IDs, Include qids that are related to
credentials, and other identifier objects. addition, deletion and modification
of users in the rule.
When not a single event is detected within 60 days define a time frame of 60 days and
from the same user. look for the authentication events
for the same user.
Alert when a privileged account is shared between two Look for authentication events
or more employees. made for the same username by
diff ip addresses.
Alert when someone is trying to access the audit/log Enable auditing on the audit file
file of any application/system. and check for the access related
events.
Log Source(s) Requirement(s) Mapping