File Integrity Monitoring
You need to track how the file or system was modified; who made the change, and exactly what the changed was in order to understand the potential security and business impact. File Integrity Monitoring can therefore provide you with the essential information your security team needs to detect attacks that could lead to a serious data breach, and provide detailed reports that help you maintain compliance.
PCI on File Integrity Monitoring
PCI 10.5.5: "Use file-integrity monitoring and change detection software on logs to ensure that existing log data cannot be changed without generating alerts."
PCI 11.5: "Deploy file-integrity monitoring software to alert personnel to unauthorized modification of critical system files, configuration files, or content files, and configure the software to perform critical file comparisons at least weekly."