-
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
-
1.1 Firewall/Router Configurations
- 1.1.1 Formal change process
- 1.1.2 Network Diagrams
- 1.1.3 Data Flow Diagrams
- 1.1.4 Firewall implementation (Internet connection/DMZ/Internal Network)
- 1.1.5 Groups, Roles & Responsibilities for management of network components
- 1.1.6 Business Justification
- 1.1.7 6 Month Firewall/Router reviews
-
1.2 Firewall/Router configurations to restrict connections between trusted and untrusted
- 1.2.1 Restrict inbound/outbound traffic to least privilege
- 1.2.2 Secure & Synchronise router configurations
- 1.2.3 Install perimeter firewalls (wireless to CDE)
-
1.3 Prohibit direct public access between Internet & CDE
- 1.3.1 Implement a DMZ
- 1.3.2 Limit inbound Internet traffic to IP address in the DMZ
- 1.3.3 Implement anti-spoofing
- 1.3.4 Prevent unauthorised outbound traffic from CDE to Intenet
- 1.3.5 Permit only 'established' connections into the network
- 1.3.6 Place system components that store CHD in a secure silo (isolated from DMZ)
- 1.3.7 Prevent unauthorised disclosure of private IP addresses
- 1.4 Personal software firewall installed on portable devices.
- 1.5 Secure networkingpolicies & SOPs
-
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
-
2.1 Change vendor defaults
- 2.1.1 Change defaults for wireless environments connected to CDE
-
2.2 Secure Build Standards
- 2.2.1 Establish 1 primary function per server
- 2.2.2 Enable only necessary services,
protocols, daemons, etc., as required
for the function of the system.
- 2.2.3 Implement additional security
features for any required services,
protocols, or daemons that are
considered to be insecure.
- 2.2.4 Configure system security
parameters to prevent misuse.
- 2.2.5 Remove all unnecessary
functionality, such as scripts, drivers,
features, subsystems, file systems, and
unnecessary web servers.
- 2.3 Encrypt all non-console
administrative access using strong
cryptography.
- 2.4 Maintain an inventory of system
components that are in scope for PCI
DSS.
- 2.5 Secure Configuration policies & SOPs
- 2.6 Shared hosting providers must
protect each entity’s hosted environment
and cardholder data. (Appendix A1)
-
Requirement 3: Protect stored cardholder data
- 3.1 Data Retention
-
3.2 Sensitive Authentication (SAD)
- 3.2.1 Rrack data
- 3.2.2 Card Verification Code/Value (CVC/V)
- 3.2.3 Personal Identification Number (PIN)
- 3.3 Mask PAN (1st 6, Last 4)
-
3.4 Render PAN unreadable anywhere it is
stored
- 3.4.1 Disk encryption
-
3.5 Key Management SOPs
- 3.5.1 Additional requirement for
service providers only: Maintain a
documented description of the
cryptographic architecture
- 3.5.2 Restrict access to cryptographic
keys to the fewest number of custodians
necessary.
- 3.5.3 Secret and private keys (used
to encrypt/decrypt cardholder data) secure storage
-
3.6 Documented key management SOPs
- 3.6.1 Key generation
- 3.6.2 Secure key distribution
- 3.6.3 Secure key storage
- 3.6.4 Key changes
- 3.6.5 Key retirement/replacement
- 3.6.6 Manual clear-text
- 3.6.7 Unauthorised key substitution
- 3.6.8 Key custodian acknowledgement of responsibilities
- 3.7 Secure storage policies & SOPs
-
Requirement 4: Encrypt transmission of cardholder data across open, public networks
-
4.1 Use strong cryptography and security
protocols to safeguard sensitive cardholder
data during transmission over open, public
networks
- 4.1.1 Ensure wireless networks transmitting
cardholder data or connected to the
cardholder data environment, use industry
best practices to implement strong
encryption for authentication and
transmission.
- 4.3 Secure transmission policies & SOPs
- 4.2 Never send unprotected PANs by enduser messaging technologies (for example, email, instant messaging, SMS, chat, etc.).
-
Requirement 12: Maintain a policy that addresses information security for all personnel.
-
12.1 Establish, publish, maintain, &
disseminate a security policy.
- 12.1.1 Annual security policy review
- 12.2 Annual Risk Assessment
-
12.3 Acceptable Usage Policy
- 12.3.1 Explicit approval
- 12.3.2 Authenticated use
- 12.3.3 List of devices & personnel with access
- 12.3.4 Determine ownership
- 12.3.5 Acceptable use
- 12.3.6 Acceptable network locations
- 12.3.7 List of company -approved products
- 12.3.8 Auto disconnect - Remote access
- 12.3.9 Remote access tech - 3rd parties
- 12.3.10 Remote access to CHD
-
12.4 InfoSec responsibilities
- 12.4.1 Service Providers Senior Exec program support
-
12.5 Individual & Team responsibilities
- 12.5.1 Security policies & SOPs awareness
- 12.5.2 Monitor and analyze security alerting
- 12.5.3 Security incident response team
- 12.5.4 User account admin
- 12.5.5 Monitor and control all access to data.
-
12.6 Formal security awareness
program
- 12.6.1 Annual security education
- 12.6.2 Training acknowledgement
- 12.7 Security vetting
-
12.8 3rd-Party security assurance
- 12.8.1 Maintain list of 3rd-Parties
- 12.8.2 3rd-Party security contracts
- 12.8.3 Due diligence
- 12.8.4 Monitor 3rd-Party PCI DSS compliance
- 12.8.5 Identified outsourced services/PCI DSS controls
- 12.9 Service provider written customer acknowldgement
-
12.10 Incident Response (IR)
- 12.10.1 Create IR Plan
- 12.10.2 Annual IRP test & review
- 12.10.3 Establish IR team
- 12.10.4 IR team training
- 12.10.5 Alerts response
- 12.10.6 Lessons-learned
-
12.11 Service Providers: Internal audit
- 12.11 Maintain quarterly internal audit program
-
Requirement 11: Regularly test security systems and processes.
-
11.1 Quarterly testing for rogue wireless devices
- 11.1.1 Maintain an inventory of
authorized wireless access points
including a documented business
justification.
- 11.1.2 Implement incident response
procedures in the event unauthorized
wireless access points are detected.
-
11.2 Quarterly internal & external vulnerability scans
- 11.2.1 Perform quarterly internal
vulnerability scans. Address
vulnerabilities and perform rescans to
verify all “high risk” vulnerabilities are
resolved in accordance with the entity’s
vulnerability ranking (per Requirement
6.1). Scans must be performed by
qualified personnel.
- 11.2.2 Perform quarterly external
vulnerability scans, via an Approved
Scanning Vendor (ASV) approved by the
Payment Card Industry Security
Standards Council (PCI SSC). Perform
rescans as needed, until passing scans
are achieved.
- 11.2.3 Perform internal and external
scans, and rescans as needed, after any
significant change. Scans must be
performed by qualified personnel.
-
11.3 Pentesting methodology
- 11.3.1 Perform external penetration
testing at least annually and after any
significant infrastructure or application
upgrade or modification (such as an
operating system upgrade, a sub-network
added to the environment, or a web
server added to the environment).
- 11.3.2 Perform internal penetration
testing at least annually and after any
significant infrastructure or application
upgrade or modification (such as an
operating system upgrade, a sub-network
added to the environment, or a web
server added to the environment).
- 11.3.3 Exploitable vulnerabilities found
during penetration testing are corrected
and testing is repeated to verify the
corrections.
-
11.3.4 If segmentation is used to isolate
the CDE from other networks, perform
penetration tests at least annually and
after any changes to segmentation
controls/methods to verify that the
segmentation methods are operational
and effective, and isolate all out-of-scope
systems from systems in the CDE.
- 11.3.4.1 Additional requirement for
service providers only: If segmentation
is used, confirm PCI DSS scope by
performing penetration testing on
segmentation controls at least every six
months and after any changes to
segmentation controls/methods.
- 11.4 Itrusion Detection System(IDS)/Intrusion Prevention System(IPS)
-
11.5 Change detection
- 11.5.1 Implement a process to respond to
any alerts generated by the changedetection solution.
- 11. Security testing policies & SOPs
-
Requirement 10: Track and monitor all access to network resources and cardholder data
- 10.1 Linked audit trails
-
10.2 Automated audit trails
- 10.2.1 All individual user accesses to
cardholder data
- 10.2.2 All actions taken by any
individual with root or administrative
privileges
- 10.2.3 Access to all audit trails
- 10.2.4 Invalid logical access attempts
- 10.2.5 Use of and changes to
identification and authentication
mechanisms—including but not limited
to creation of new accounts and
elevation of privileges—and all
changes, additions, or deletions to
accounts with root or administrative
privileges
- 10.2.6 Initialization, stopping, or
pausing of the audit logs
- 10.2.7 Creation and deletion of systemlevel objects
-
10.3 Audit logs
- 10.3.1 User identification
- 10.3.2 Type of event
- 10.3.3 Date and time
- 10.3.4 Success or failure indication
- 10.3.5 Origination of event
- Subtopic 6
-
10.4 Time synch
- 10.4.1 Critical systems have the
correct and consistent time.
- 10.4.1 Critical systems have the
correct and consistent time.
- 10.4.3 Time settings are received from
industry-accepted time sources.
-
10.5 Secure audit trails
- 10.5.1 Limit viewing of audit trails to
those with a job-related need
- 10.5.2 Protect audit trail files from
unauthorized modifications
- 10.5.3 Promptly back up audit trail files
to a centralized log server or media
that is difficult to alte
- 10.5.4 Write logs for external-facing
technologies onto a secure,
centralized, internal log server or
media device
- 10.5.5 Use file-integrity monitoring or
change-detection software on logs to
ensure that existing log data cannot be
changed without generating alerts
(although new data being added
should not cause an alert)
-
10.6 Log and security event reviews
- 10.6.1 Daily reviews
- 10.6.2 Review logs of all other system
components periodically based on the
organization’s policies and risk
management strategy, as determined
by the organization’s annual risk
assessment
- 10.6.3 Follow up exceptions and
anomalies identified during the review
process
- 10.7 Audit retention (12 months (3 months immediate))
-
10.8 Service Providers: Timely detection of critical system failures
- 10.8.1 Additional requirement for
service providers only: Respond to
failures of any critical security controls in
a timely manner.
- 10.9 Monitoring policies & SOPs
-
Requirement 9: Restrict physical access to cardholder data
-
9.1 Use appropriate facility entry controls
- 9.1.1 Use either video cameras or
access control mechanisms (or both) to
monitor individual physical access to
sensitive areas. Review collected data
and correlate with other entries. Store
for at least three months, unless
otherwise restricted by law
- 9.1.2 Implement physical and/or logical
controls to restrict access to publicly
accessible network jacks.
- 9.1.3 Restrict physical access to
wireless access points, gateways,
handheld devices,
networking/communications hardware,
and telecommunication lines.
- 9.2 Visitor ID
- 9.3 Visitor control
-
9.4 Visitor process
- 9.4.1 Visitors are authorized before
entering, and escorted at all times
within, areas where cardholder data is
processed or maintained.
- 9.4.2 Visitors are identified and given a
badge or other identification that
expires and that visibly distinguishes
the visitors from onsite personnel.
- 9.4.3 Visitors are asked to surrender
the badge or identification before
leaving the facility or at the date of
expiration
- 9.4.4 A visitor log is used to maintain a
physical audit trail of visitor activity to
the facility as well as computer rooms
and data centers where cardholder
data is stored or transmitted.
-
9.5 Secure backups
- 9.5.1 Store media backups in a secure
location, preferably an off-site facility,
such as an alternate or backup site, or
a commercial storage facility. Review
the location’s security at least annually.
-
9.6 Secure media handling
- 9.6.1 Classify media so the sensitivity
of the data can be determined
- 9.6.2 Send the media by secured
courier or other delivery method that
can be accurately tracked.
- 9.6.3 Ensure management approves
any and all media that is moved from a
secured area (including when media is
distributed to individuals)
-
9.7 Secure media storage
- 9.7.1 Properly maintain inventory logs
of all media and conduct media
inventories at least annually.
-
9.8 Secure media destruction/disposal
- 9.8.1 Shred, incinerate, or pulp hardcopy materials so that cardholder data
cannot be reconstructed. Secure
storage containers used for materials
that are to be destroyed.
- 9.8.2 Render cardholder data on
electronic media unrecoverable so that
cardholder data cannot be
reconstructed.
-
9.9 Card present device tampering protection
- 9.9.1 Maintain an up-to-date list of
devices
- 9.9.2 Periodically inspect device
surfaces to detect tampering (for
example, addition of card skimmers to
devices), or substitution (for example,
by checking the serial number or other
device characteristics to verify it has
not been swapped with a fraudulent
device).
- 9.9.3 Provide training for personnel to
be aware of attempted tampering or
replacement of devices
- 9.10 Physical security policies & SOPs
-
Requirement 8: Identify and authenticate access to system components
-
8.1 Defines access policies & SOPs
- 8.1.1 Assign all users a unique ID
before allowing them to access system
components or cardholder data
- 8.1.2 Control addition, deletion, and
modification of user IDs, credentials,
and other identifier objects.
- 8.1.3 Immediately revoke access for
any terminated users
- 8.1.4 Remove/disable inactive user
accounts within 90 days.
- 8.1.5 Manage IDs used by third parties
to access, support, or maintain system
components via remote access
- 8.1.6 Limit repeated access attempts
by locking out the user ID after not
more than six attempts.
- 8.1.7 Set the lockout duration to a
minimum of 30 minutes or until an
administrator enables the user ID.
- 8.1.8 If a session has been idle for
more than 15 minutes, require the user
to re-authenticate to re-activate the
terminal or session.
-
8.2 User-authentication management
- 8.2.1 Using strong cryptography,
render all authentication credentials
(such as passwords/phrases)
unreadable during transmission and
storage on all system components.
- 8.2.2 Verify user identity before
modifying any authentication
credential
- 8.2.3 Passwords/passphrases requirements
- 8.2.4 Change user
passwords/passphrases at least once
every 90 days.
- 8.2.5 Do not allow an individual to
submit a new password/passphrase
that is the same as any of the last four
passwords/passphrases he or she has
used.
- 8.2.6 Set passwords/passphrases for
first-time use and upon reset to a
unique value for each user, and
change immediately after the first use.
-
8.3 Secure remote access using Multi Factor Auth (MFA)
- 8.3.1 Incorporate multi-factor
authentication for all non-console
access into the CDE for personnel with
administrative access.
- 8.3.2 Incorporate multi-factor
authentication for all remote network
access (both user and administrator, and
including third-party access for support
or maintenance) originating from outside
the entity’s network.
- 8.4 Authentication policies & SOPs
-
8.5 Prohibit group/shared/generic IDs/password/authentication methods
- 8.5.1 Additional requirement for
service providers only: Service
providers with remote access to
customer premises (for example, for
support of POS systems or servers)
must use a unique authentication
credential (such as a password/phrase)
for each customer
- 8.6 Appropriate use of physical or logical tokens/smart card/certificates
- 8.7 CHD database access restrictions
- 8.8 Access Control polices & SOPs
-
Requirement 7: Restrict access to cardholder data by business need to know
-
7.1 Limit access
- 7.1.1 Define access needs for
each role
- 7.1.2 Least privilege
- 7.1.3 Role based asccess control
- 7.1.4 Documented approval
-
7.2 Access Control System
- 7.2.1 Coverage of all system
components
- 7.2.2 Assignment of privileges to
individuals based on job
classification and function.
- 7.2.3 Default “deny-all” setting.
- 7.3 Need To Know/Access policies & SOPs
-
Requirement 6: Develop and maintain secure systems and applications
- 6.1 Vulnerability identification & threat management
- 6.2 Security patching & updates
-
6.3 Secure DevOps (internal/external applications)
- 6.3.1 Remove development, test and/or
custom application accounts, user IDs, and
passwords before applications become
active or are released to customers.
- 6.3.2 Review custom code prior to release
to production or customers in order to
identify any potential coding vulnerability
(using either manual or automated
processes)
-
6.4 Formal change control
- 6.4.1 Separate development/test
environments from production
environments, and enforce the separation
with access controls.
- 6.4.2 Separation of duties between
development/test and production
environments
- 6.4.3 Production data (live PANs) are not
used for testing or development
- 6.4.4 Removal of test data and accounts
from system components before the system
becomes active / goes into production.
-
6.4.5 Change control procedures
- 6.4.5.1 Documentation of impact.
- 6.4.5.2 Documented change approval by
authorized parties.
- 6.4.5.3 Functionality testing
- 6.4.5.4 Back-out procedures.
- 6.4.6 PCI DSS controls implementation
-
6.5 Common code vulnerability remediation
- 6.5.1 Injection flaws
- 6.5.2 Buffer overflows
- 6.5.3 Insecure cryptographic storage
- 6.5.4 Insecure communications
- 6.5.5 Improper error handling
- 6.5.6 All “high risk” vulnerabilities identified
in the vulnerability identification process (as
defined in PCI DSS Requirement 6.1).
-
Note: Requirements 6.5.7 through 6.5.10, below, apply to web applications and application interfaces
(internal or external):
- 6.5.7 Cross-site scripting (XSS)
- 6.5.8 Improper access control
- 6.5.9 Cross-site request forgery (CSRF)
- 6.5.10 Broken authentication and session
management.
- 6.6 Web Application Testing (Annual/Significant change) or Web Application /Firewall
- 6.7 SecDevOps policies & SOPs
-
Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs
-
5.1 Deploy anti-virus software on all
systems commonly affected by malicious
software (particularly personal computers
and servers).
-
5.1.1 Ensure that anti-virus programs
are capable of detecting, removing,
and protecting against all known types
of malicious software
- 5.1.2 For systems considered to be not
commonly affected by malicious
software, perform periodic evaluations
to identify and evaluate evolving
malware threats in order to confirm
whether such systems continue to not
require anti-virus software.
- 5.2 Ensure that all anti-virus mechanisms
are maintained
- 5.3 Ensure that anti-virus mechanisms
are actively running and cannot be
disabled or altered by users, unless
specifically authorized by management
on a case-by-case basis for a limited
time period.
- 5.4 Antivirus policies & SOPs