{"id":603499,"date":"2019-09-26T06:15:00","date_gmt":"2019-09-26T06:15:00","guid":{"rendered":"https:\/\/www.capgemini.com\/us-en\/?p=603499"},"modified":"2026-02-27T07:35:09","modified_gmt":"2026-02-27T12:35:09","slug":"pci-compliance-log-management","status":"archive","type":"post","link":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","title":{"rendered":"PCI compliance \u2013 Log management"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>PCI compliance \u2013 Log management<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2021\/06\/cg-logo.png?w=601?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Capgemini<\/h5><h5 class=\"blog-date\">2019-09-26<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\" id=\"quoteWrapper\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<h1 class=\"wp-block-heading\" id=\"h-pci-compliance\">PCI compliance<\/h1>\n\n\n\n<p>We talk a lot about PCI in the digital-commerce space, whether that\u2019s TLS versions, vulnerability scans, iframes, and verifying code security. What we don\u2019t talk enough about, though, is logging, log retention, and log monitoring.<\/p>\n\n\n\n<p>When was the last time that you know someone looked through your commerce site\u2019s logs? Do you know how long you are keeping your logs? Are you sure you\u2019re logging enough information?<\/p>\n\n\n\n<p>These questions, and other questions like them, are essential for developing a solid \u201csituational awareness\u201d of your commerce site. The PCI DSS Requirement 10 states that you need to be aware of the technical performance of your site. You need to be aware of who is using the administrative functions of your site, when they are using them, and what they are doing with their administrative access. You need to be able to see who has access to the audit trails and who can turn the audit trails off and on. You even need to report on invalid access attempts to your administration pages.<\/p>\n\n\n\n<p>Beyond this, your application logs can tell you that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You\u2019ve had a persistent attacker attempting to steal data from your site by performing low-level encapsulated SQL injection attacks from an open proxy in South Africa.<\/li>\n\n\n\n<li>You have a group of organized criminals using your site to validate their stock of stolen credit card numbers.<\/li>\n\n\n\n<li>You have an issue connecting to one of your backend data services, causing service level issues for your fulfillment processes.<\/li>\n\n\n\n<li>The newly deployed code is generating volumes of errors related to a change that your payment processor asked you to make.<\/li>\n<\/ul>\n\n\n\n<p>Hopefully, you see the point that this can go on and on and on. Essentially, there is an incredible wealth of knowledge in your logs.<\/p>\n\n\n\n<p>These logs are different from the metrics that you are collecting from a business perspective. Your conversion rates, server response time graphs, average cart values, and so on, all provide tremendous insight into the business performance of your commerce site but provide limited security value.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-why-do-we-need-to-collect-logs\">Why do we need to collect logs?<\/h1>\n\n\n\n<p>There are two significant reasons why we need to be concerned about collecting and maintaining application logs. The first is the most obvious \u2013 when something goes wrong, you need to be able to trace back to what happened and when so you can begin to fix the problems. In the case of an intrusion or data breach, your logs will help trace down how the attackers were able to exploit your platform, when they were able to get in, what they accessed, and provide details for how to start fixing the vulnerability. The logs will also help investigators develop reports so you can begin the process of remediating the business impact of the incident.<\/p>\n\n\n\n<p>The second reason is more \u201clong tail\u201d \u2013 your logs can provide insight into the who, what, when, where, and why of your site performance. Logs won\u2019t give you the quantitative measurements showing slowdowns and speedups but, if you are doing a good job of generating and capturing logs, the logs will show you why those slowdowns and speedups are happening. Good logs will also help your support and developer teams identify and resolve problems faster and with greater confidence than without logs.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-how-do-we-deal-with-logs\">How do we deal with logs?<\/h1>\n\n\n\n<p>Getting your level of logging right can be difficult. Too many logs and you\u2019ll get washed away in noise. Too few, and you could miss important data trends. In either case, it\u2019s very likely that you are going to have too many messages for a human to manage on their own.<\/p>\n\n\n\n<p>Fortunately for us humans, many good tools exist to help us make sense of all the data in the logs. As a class, these tools are called \u201clog aggregation\u201d tools. The name means that the tools are meant to combine logs from any different sources into a single logging system. These tools come in many shapes and sizes and many different costs.<\/p>\n\n\n\n<p>Among the best free options, you will find tools like ELK and Graylog. These are very good tools and will get the job done. The software is free, but the time and server resources to run them are not. If you have people and technical resources to run them, these tools can be configured to answer many of the questions asked earlier and can be configured to satisfy PCI DSS requirements.<\/p>\n\n\n\n<p>You have many more options if you go the commercial route. Tools such as Splunk, Loggly, Datadog, and many others offer both on-premises and cloud-based log aggregation and analysis. These tools provide additional automated insight into the logs and offer a managed service, so you don\u2019t have to dedicate your own resources to manage the logs. The commercial terms for these tools are usually based on the volume of logs you are storing and the level of automated analysis you want to be done with those logs.<\/p>\n\n\n\n<p>Your day-to-day PCI DSS log monitoring compliance efforts become less of a burden once you have your log management solution running and tuned. All the tools mentioned allow you to configure automated alerts for known conditions and can be configured to store logs in accordance with PCI DSS policy. PCI DSS compliance then becomes a matter of validating that your log management solution is functioning as expected and reviewing the results of its analysis. Not only will you improve your PCI DSS compliance, but you will also be generating value from the knowledge gleaned from the logs and their analysis.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-going-further\">Going further<\/h1>\n\n\n\n<p>If you would like to improve your PCI DSS compliance efforts with respect to log monitoring, give Capgemini a call. You can also review the PCI DSS Security Council\u2019s advice for log management here: <a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/Effective-Daily-Log-Monitoring-Guidance.pdf\">https:\/\/www.pcisecuritystandards.org\/documents\/Effective-Daily-Log-Monitoring-Guidance.pdf<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":103,"featured_media":603509,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"","cg_seo_canonical_relation":"{\"uuid\":\"505081ba-0894-44d4-bde7-0e328f27bd01\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"fc9ec342-ac6d-4cec-a158-c1cb0e973a85\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[],"industry":[],"partners":[],"blog-topic":[],"content-group":[],"class_list":["post-603499","post","type-post","status-archive","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PCI compliance \u2013 Log management - Capgemini USA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PCI compliance \u2013 Log management\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini USA\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-26T06:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T12:35:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Capgemini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sai Kiran\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/\",\"name\":\"PCI compliance \u2013 Log management - Capgemini USA\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg\",\"datePublished\":\"2019-09-26T06:15:00+00:00\",\"dateModified\":\"2026-02-27T12:35:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PCI compliance \u2013 Log management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/\",\"name\":\"Capgemini USA\",\"description\":\"Just another www.capgemini.com site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2\",\"name\":\"Sai Kiran\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/author\/saikiranb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PCI compliance \u2013 Log management - Capgemini USA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","og_locale":"en_US","og_type":"article","og_title":"PCI compliance \u2013 Log management","og_url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","og_site_name":"Capgemini USA","article_published_time":"2019-09-26T06:15:00+00:00","article_modified_time":"2026-02-27T12:35:09+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","type":"image\/jpeg"}],"author":"Capgemini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sai Kiran","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","name":"PCI compliance \u2013 Log management - Capgemini USA","isPartOf":{"@id":"https:\/\/www.capgemini.com\/us-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","datePublished":"2019-09-26T06:15:00+00:00","dateModified":"2026-02-27T12:35:09+00:00","author":{"@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2"},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#primaryimage","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","contentUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/us-en\/"},{"@type":"ListItem","position":2,"name":"PCI compliance \u2013 Log management"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/us-en\/#website","url":"https:\/\/www.capgemini.com\/us-en\/","name":"Capgemini USA","description":"Just another www.capgemini.com site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2","name":"Sai Kiran","url":"https:\/\/www.capgemini.com\/us-en\/author\/saikiranb\/"}]}},"blog_topic_info":[],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/us-en\/insights\/expert-perspectives\/pci-compliance-log-management\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":[],"rendered":"","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","archive_status":true,"featured_image_src":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","featured_image_alt":"","jetpack-related-posts":[{"id":759068,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/technology-solutions-to-support-web3-tokenization-in-asset-management\/","url_meta":{"origin":603499,"position":0},"title":"Technology solutions to support web3 tokenization in asset management","author":"pawanballa","date":"June 26, 2024","format":false,"excerpt":"Traditional asset management investments and opportunities rely on traditional technology solutions to support them \u2013 but the asset management industry has to move forward, evolution to meet changing investor expectations and needs is an imperative.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/02\/Web3.0-podcast-series.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/02\/Web3.0-podcast-series.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/02\/Web3.0-podcast-series.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/02\/Web3.0-podcast-series.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":748720,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/achieving-regulatory-excellence-with-indias-managed-services\/","url_meta":{"origin":603499,"position":1},"title":"Achieving regulatory excellence with India\u2019s managed services\u00a0","author":"anjumukeshmadnani","date":"July 7, 2025","format":false,"excerpt":"Achieving regulatory excellence with India\u2019s managed services\u00a0","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/trade-and-transaction-blog.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/trade-and-transaction-blog.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/07\/trade-and-transaction-blog.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":709907,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/continuous-compliance-sec-cyber-disclosure-requirements-and-the-impact-on-the-blueprint-for-cybersecurity\/","url_meta":{"origin":603499,"position":2},"title":"Continuous compliance \u2013 SEC cyber disclosure requirements and the impact on the blueprint for cybersecurity","author":"","date":"December 4, 2023","format":false,"excerpt":"Continuous compliance \u2013 SEC cyber disclosure requirements and the impact on the blueprint for cybersecurityGeert van der Linden & Marieke van de Putte4 Dec 2023 FacebookTwitterLinkedin SEC's cybersecurity risk management, strategy, governance, and incident disclosure We are all aware that the use of digital technologies and electronic solutions in companies'\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/Continous-Compliance-Web-banner.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/Continous-Compliance-Web-banner.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/Continous-Compliance-Web-banner.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2023\/12\/Continous-Compliance-Web-banner.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":761861,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/go-beyond-compliance-with-data-driven-product-lifecycle-intelligence-across-the-electric-vehicle-battery-value-chain\/","url_meta":{"origin":603499,"position":3},"title":"Go beyond compliance with data-driven product lifecycle intelligence across the electric vehicle battery value chain","author":"subhranilsengupta","date":"April 22, 2025","format":false,"excerpt":"Compiling and communicating upstream and downstream data on industrial batteries is key to increased circularity and transparency throughout the electric vehicle (EV) battery\u2019s lifecycle.\u00a0","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/03\/Blog3-Banner-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/03\/Blog3-Banner-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/03\/Blog3-Banner-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2026\/03\/Blog3-Banner-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":753387,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/unleash-generative-ai-tools-to-boost-automation-of-enterprise-resilience-and-regulatory-compliance\/","url_meta":{"origin":603499,"position":4},"title":"Unleash generative AI tools to boost automation of enterprise resilience and regulatory compliance","author":"naveenkumarkannan","date":"October 14, 2025","format":false,"excerpt":"Gen AI tools and AI agents strengthen enterprise resilience and compliance, helping organizations build robust foundations and minimize unexpected risks.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/10\/ServiceNowDotCom_Banner_2880X1800.webp?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":745896,"url":"https:\/\/www.capgemini.com\/us-en\/insights\/expert-perspectives\/solving-challenges-in-the-know-your-customer-process\/","url_meta":{"origin":603499,"position":5},"title":"Solving challenges in the Know-Your-Customer process","author":"","date":"April 8, 2025","format":false,"excerpt":"Take incremental steps to automate using modern technology.","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/04\/KYC-process.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/04\/KYC-process.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/04\/KYC-process.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2025\/04\/KYC-process.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini USA","distributor_original_site_url":"https:\/\/www.capgemini.com\/us-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/603499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/comments?post=603499"}],"version-history":[{"count":2,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/603499\/revisions"}],"predecessor-version":[{"id":699211,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/posts\/603499\/revisions\/699211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media\/603509"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media?parent=603499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/categories?post=603499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/tags?post=603499"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/brand?post=603499"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/service?post=603499"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/industry?post=603499"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/partners?post=603499"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/blog-topic?post=603499"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/content-group?post=603499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]},"featured_image_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/9k6ktia6xRBvjuNQq9P3GU-970-80.jpg","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2021\/06\/cg-logo.png?w=601","author_thumbnail_alt":""}