Skip to main content
Skip table of contents

NCA OT: PCI DSS 4.0 User Guide – AI Engine Rules

AI Engine Rules leverage LogRhythm technology to correlate events across your environment, helping to identify events of interest and potential compliance issues.

Malware Alarm Rule

This alarm is the ability to continuously monitor the environment from all layers. This alarm (#1217) is configured to alert when malicious activity occurs within the environment. This AIE Rule creates an event and notification alarm for malware detection on devices that have been designated as log sources or devices that support network monitoring.

Data Loss Prevention

Data Loss Prevention (DLP) within CCF is focused on protection of sensitive information within the organization’s environment. DLP can be coupled with enabling File Integrity Monitoring (FIM) policies to provide a more robust monitoring of sensitive data and user activities impact that data. For this example, we look at three rules: CCF: Data Loss Prevention, CCF: Corroborated Data Access Anomalies, and Abnormal Amount of Data Transferred. In addition to FIM rules and policies, DLP provides objects that look at suspicious activity that may be indicative of malicious activity impacting sensitive data. Log sources should include CDE systems for PCI DSS 4.0 to ensure monitoring controls are in place to track tampering of data or unauthorized transfers of data that occur.

LogRhythm Silent Log Source Error Alarm

Since LogRhythm Enterprise may serve as a mitigating control, it is crucial to be able to alarm on any instance where an in-scope log source does not send any logs. This rule (#1209) could be indicative of a control failure that needs to be addressed. This rule, in conjunction with other auditing failures, allows the organization to limit the time of control failure relating to logging and monitoring.

Invalid Account Usage Rule

This AIE rule looks for any disabled, terminated, or default accounts that successfully or unsuccessfully attempt to authenticate into the environment. This rule is based on lists that are established and maintained by the organization according to access management policies.

Audit Log Cleared Rule

In PCI DSS 4.0, it is critical to identify any attempt to erase audit logs to cover up potentially malicious activity across the environment. In order to ensure that auditing logs of systems are secured, this AIE rule creates an event any time an audit log is cleared for any log source or system being monitored.

Log Requirements

These AIE rules cover all log sources in your environment, but specifically require logs from anti-malware systems, firewalls, servers, workstations, security enforcing devices, access management systems, and vulnerability detection systems. When configured correctly, LogRhythm’s advanced correlation and AIE rules provide near real-time alerts for malicious activities and/or attacks.

KB Content

Object Type

Name

ID

AIE Alarm Rule

CCF: LogRhythm Silent Log Source Error Alarm

1209

AIE Alarm Rule

CCF: Malware Alarm

1217

AIE Rule

CCF: Abnormal Amount of Data Transferred

1230

AIE Rule

CCF: Corroborated Data Access Anomalies

1201

AIE Rule

CCF: Data Loss Prevention

1232

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.