Home > Storage > ObjectScale and ECS > Product Documentation > ECS PCI DSS Compliance > Requirement 10: Track and monitor all access to network resources and cardholder data
In the event where data is stolen or compromised, it is important to have a history of user activities through logging, ensuring a trail of user activity is always available. Not only is logging useful after an event, but it is essential for early detection and minimizing future impacts.
ECS can audit system configuration events, allowing events to be tracked and recorded. For more information on auditing in ECS refer to the ECS Administration Guide white paper.
ECS provide rich monitoring tools to monitoring the events message (audit and alert) in the ECS portal. Alert policies can be created to alert about metrics and are triggered when the specified conditions are met. Audits can be filtered with date time range and namespace. For more information about the ECS morning, refer to the ECS Monitoring Guide white paper.
ECS support SNMPv2, SNMPv3 servers, and Syslog servers to ECS to route SNMP and Syslog event notifications to external systems for the audit requirement. For more information about the SNMPv2, SNMPv3 servers, and Syslog servers, refer to ECS Administration Guide white paper.
The other requirements in this section are enforced through policies, procedures, and processes external to the ECS cluster.