Compliance

Compliance Monitoring: Meeting PCI-DSS, HIPAA, and SOC 2 Requirements

Regulatory frameworks require specific network monitoring capabilities. Learn what each compliance standard demands and how to implement monitoring that satisfies auditors.

Why Compliance Monitoring Matters

Compliance isn't optional. PCI-DSS applies if you handle credit cards. HIPAA applies if you handle health data. SOC 2 is often required by enterprise customers. Failing to meet these standards means fines, lost business, and reputational damage.

The Audit Reality

Auditors want evidence. Saying "we monitor the network" isn't enough. You need logs showing what was monitored, when, and proof that alerts were investigated.

PCI-DSS Network Requirements

PCI-DSS has specific network monitoring and logging requirements. Note that PCI-DSS 4.0 (mandatory since March 2025) has renumbered some requirements - always verify against the current standard:

Requirement Description Monitoring Need
1.1Network segmentationVerify CDE isolation, detect unauthorized flows
10.1Audit trails for all accessLog all connections to cardholder data systems
10.2Log security eventsTrack failed logins, privilege changes, access attempts
10.7Retain logs 1 yearStore network logs with 90 days immediately available
11.4Intrusion detectionMonitor for and alert on network intrusions

Key point: PCI-DSS requires you to monitor ALL traffic in and out of the Cardholder Data Environment (CDE). This means firewall logs, flow data, and IDS alerts for CDE segments.

HIPAA Network Safeguards

HIPAA's Technical Safeguards include network monitoring requirements:

Access Controls (§164.312(a))

Monitor who accesses systems containing PHI. Log all access attempts, successful and failed. Alert on unusual access patterns.

Audit Controls (§164.312(b))

Implement mechanisms to record and examine activity in systems containing PHI. Review logs regularly for unauthorized access.

Transmission Security (§164.312(e))

Monitor that PHI in transit is encrypted. Detect unencrypted transmissions of sensitive data. Track TLS/encryption status.

HIPAA is less prescriptive than PCI-DSS. You must demonstrate "reasonable and appropriate" safeguards based on your risk analysis.

SOC 2 Trust Service Criteria

SOC 2 audits evaluate controls across five Trust Service Criteria. Network monitoring supports several:

Criteria Monitoring Role
Security (CC6)Intrusion detection, access logging, vulnerability monitoring
Availability (A1)Uptime monitoring, capacity tracking, performance metrics
Confidentiality (C1)Data flow monitoring, encryption verification, access controls
Processing Integrity (PI1)Transaction monitoring, error tracking, completeness checks

Common Monitoring Controls

These monitoring practices satisfy multiple frameworks:

Centralized Log Collection

Aggregate logs from all network devices, security systems, and applications into a SIEM or log management platform. Essential for all three frameworks.

Network Segmentation Monitoring

Verify that network segments remain isolated. Alert on any traffic crossing segment boundaries unexpectedly.

Change Detection

Monitor network device configurations. Detect unauthorized changes to firewall rules, routing tables, or ACLs.

Encryption Verification

Confirm that sensitive data travels over encrypted channels. Alert on cleartext protocols where encryption is required.

Log Retention Requirements

Framework Minimum Retention Notes
PCI-DSS1 year (90 days online)Logs must be available within 90 days for investigation
HIPAA6 years (documentation)No explicit audit log retention; 6 years commonly adopted
SOC 2Varies by controlAuditors expect 12+ months for trend analysis

Design your log retention to meet the most stringent requirement you face. If you're subject to multiple frameworks, keep logs for 6+ years to be safe.

Audit Evidence Collection

Prepare these artifacts for auditors:

  • -Network diagrams: Current, accurate diagrams showing segmentation, data flows, and monitoring points.
  • -Alert history: Records of security alerts, investigation notes, and resolution actions.
  • -Log review records: Evidence that logs are reviewed regularly, not just collected.
  • -Uptime reports: Historical availability metrics for systems in scope.
  • -Change logs: History of network changes with approval evidence.

Automating Compliance Reporting

Manual compliance is unsustainable. Automate where possible:

Scheduled Reports

Generate weekly/monthly reports showing monitoring coverage, alert volumes, and control effectiveness. Have these ready before auditors ask.

Compliance Dashboards

Real-time visibility into control status. Show which devices are being monitored, log collection health, and alert response times.

Gap Detection

Alert when monitoring gaps appear: new devices not enrolled, log collection failures, or missing data. Fix issues before audits.