PCI Compliance
PCI Compliance
Enjoy!
Didier Godart
Version history
What's new in this version
PCI 30 seconds newsletters
Table of content
Executive Summary
How to use this dashboard?
1.Select your Merchant type (Excutive Summary sheet)
2.Define your scope (Scope sheet)
3.Define your PCI Team (PCI team sheet)
4.For each requirement sheet:
5.Select the appropriate answer (In place, not in place, compensating control) and fill appropriate cells
6. Use the compensating controls page to document and justify them
7. Use the NA sheet to document and justify the NA requirements
8. Use the navigation links on the top of each sheet to navigate through the various sections and access
9.Control your compliance status through the Excutive summary board (Executive sheet) and associated
10.Use the vulnerability scans sheet to maintain a record of your scans
11.Use the penetration testing form to maintain record of your pen tests
12.Use the documentation sheet to get a detailed list on the required documentation and maintain you
13.Use the Crypto key sheet to make an inventory of your cryptographic keys
14.Use the Training and knowledge form to maintain records and evidence of trainings and knowledges
Version History
V0.1 Requirements and testing procedures
V0.2 Add merchant type for each requirements
V0.4 Add a sheet" What is my merchant Type?" with the full description of the
merchant types
Add Major observations from the 2011 Verizon PCI Compliance Report for each of
the twelve requirement
Add a column "Validation instructions for QSA/ISA" from the new released ROC-
QSA Reporting Instruction Manual
V0.5 Add Guidance for each requirements from the "Navigating PCI DSS V2.0"
Add a compensating control sheet for the definition and management of
compensating controls. Whenever a compensating control is present refer to it
into the column (in place) by the associated ID into the compensating controls
sheet
Add Glossary
Add an Executive Summary Tab Including # of requirements, % of compliance,
Severity (sum of all severities) depending on the selected merchant type.
Add Charts Tab including Severity per Requirement and % compliance per
requirement
Add Severity Column (= PCI defined priority for not in place requirements)
Add list boxes for the In place/not in place and Compensating control present.
V0.6 All sheets are protected to avoid accidental deletion. (No password)
Instructions:
1.Select your merchant type within the sheet "Executive summary"
2.Select the appropriate answer for each requirements (Column L: Y/N/C)
3. Use the compensating controls sheet to describe your controls whenever used.
4.View your compliance progress through the "Executive summary" and " Charts"
sheets.
V0.7 1.Navigation: Add Table of content and navigation links
2.Rename sheet "PCI Actor" to "PCI Team"
3.Associate column "Owner" in requirements sheets to the name of individuals
listed within sheet "PCI Team". A list box allows the selection of a name from this
sheet.
4. Add Documentation sheet listing all your documentation related to PCI.
5.Add row "SANS Top 20 Critical Security Controls" - Matching subcontrols for each
PCI requirement wherever possible.
6.Add Sheet " SANS-PCI" Listing all SANS Top 20 Critical Security Controls and Sub-
controls together with PCI requirements partially or fully matching the sub-
controls. Also % of match for each SANS Controls. For more details on the
Matching matrix read the associated Technical paper "PCI-SANS Top 20 Critical
Security Controls"
7.Add "Scope" sheet allowing you to define the Card Data Environment (CDE)
8. Add two buttons within the Executive Summary Sheet allowing you to
hide/unhide non applicable requirements associated to the selected Merchant
Type (THANKS to Tony). Macros do not work on MAC.
9. Dissociate form chart sheet in two specific chart sheets (% of compliance and
Severity)
V0.8 Adapt SANS numerotation to new version (Version 3.1 October 3, 2011)
V0.9 Update the documentation sheet with the list of (required or optional) technical
and non-technical documents together with their associated PCI DSS requirements.
V10 Update Scope sheet with Criticality, Patch level, Scan date and Scan report location
Add a sheet "PCI Crypto Key list" to list all keys used within the scope: KeyId,
Purpose, Key custodians, status.
Add sheet Vulnerability scans (When, By who, results)
Add sheet Penetration Tests (When, By who, resulls)
Other articles
Ebook - Demystifying PCI DSS
Thoughts on the Verizon PCI Compliance Report
Can I use compensating control to resolve vulnerabilities found during a scan?
What to do if my organization can't demonstrate four passing Internal or external scans?
Verizon 2011 PCI Compliance Report
Business and IT security: two worlds that can't talk.
Cyber attack ranked within the top 5 risks in terms of probability
rd VERSION 14 - PCI DSS V3
” to sustain your PCI compliance journey, to support the discussion with your inter
aligned with PCI DSS V3.
WELCOME. Send them to Didier Godart (d@dgozone.com).
ommunity know about it.
RAPID7
Start Here
ng control) and fill appropriate cells (Proof, Stage,remediation, estimated, Comments and select the owner responsible for
em
Contributors
Swathy Anand
Vice President - Project Management
Fuze Network
swathyanand@gmail.com
Tony Wilson
Managing Director
Indelible Data (a division of Indelible Designs
Limited)
tony@indelible-data.co.uk
"
Dec 2013 "Didier Godart
Founder Dgozone (www.dgozone.com)
+32 498787744
SkypeID Dgozone
d@dgozone.com
March 2014 "Didier Godart
Founder Dgozone (www.dgozone.com)
+32 498787744
SkypeID Dgozone
d@dgozone.com
meeting 2013
Should You Care?
ou need to know
external scans?
DSS V3
, to support the discussion with your internal team, QSA
(d@dgozone.com).
About Didier
on, estimated, Comments and select the owner responsible for actions)
y
e and Severity)
Contributors:
Jim Seaman
Principle Security Consultant
MSc, CCP, CISM, CRISC, QSA, A.Inst.IISP
Randomstorm.com
jim.seaman@randomstorm.com
--------
Paul McMillan | Consulting Manager
PCI QSA
Sysnet Global Solutions
paul.mcmillan@sysnetgs.com
Access Control Mechanisms that limit availability of information or information-processing resources only to authorized persons
or applications.
Account Data Account data consists of cardholder data plus sensitive authentication data. See Cardholder Data and Sensitive
Authentication Data
Account Number See Primary Account Number (PAN).
Acquirer Also referred to as “acquiring bank” or “acquiring financial institution.” Entity that initiates and maintains
relationships with merchants for the acceptance of payment cards.
Adware Type of malicious software that, when installed, forces a computer to automatically display or download
advertisements.
AES Abbreviation for “Advanced Encryption Standard.” Block cipher used in symmetric key cryptography adopted by
NIST in November 2001 as U.S. FIPS PUB 197 (or “FIPS 197”).
ANSI Acronym for “American National Standards Institute.” Private, non-profit organization that administers and
coordinates the U.S. voluntary standardization and conformity assessment system.
Anti-Virus Program or software capable of detecting, removing, and protecting against various forms of malicious software
(also called “malware”) including viruses, worms, Trojans or Trojan horses, spyware, adware, and rootkits.
Application Includes all purchased and custom software programs or groups of programs, including both internal and external
(for example, web) applications.
Audit Log Also referred to as “audit trail.” Chronological record of system activities. Provides an independently verifiable
trail sufficient to permit reconstruction, review, and examination of sequence of environments and activities
surrounding or leading to operation, procedure, or event in a transaction from inception to final results.
Authentication Credentials Combination of the user ID or account ID plus the authentication factor(s) used to authenticate an individual,
device, or process,
Authorization Granting of access or other rights to a user, program, or process. For a network, authorization defines what an
individual or program can do after successful authentication.
For the purposes of a payment card transaction authorization occurs when a merchant receives transaction
approval after the acquirer validates the transaction with the issuer/processor.
B
Backup Duplicate copy of data made for archiving purposes or for protecting against damage or loss.
Bluetooth Wireless protocol using short-range communications technology to facilitate transmission of data over short
distances.
C
Cardholder Non-consumer or consumer customer to whom a payment card is issued to or any individual authorized to use
the payment card.
Cardholder Data At a minimum, cardholder data consists of the full PAN. Cardholder data may also appear in the form of the full
PAN plus any of the following: cardholder name, expiration date and/or service code
See Sensitive Authentication Data for additional data elements that may be transmitted or processed (but not
stored) as part of a payment transaction.
Cardholder Data The people, processes and technology that store, process or transmit cardholder data or sensitive authentication
Environment data, including any connected system components.
Card Verification Code or Also known as Card Validation Code or Value, or Card Security Code.
Value Refers to either: (1) magnetic-stripe data, or (2) printed security features.
(1) Data element on a card's magnetic stripe that uses secure cryptographic process to protect data integrity on
the stripe, and reveals any alteration or counterfeiting. Referred to as CAV, CVC, CVV, or CSC depending on
payment card brand. The following list provides the terms for each card brand:
CAV – Card Authentication Value (JCB payment cards)
CVC – Card Validation Code (MasterCard payment cards)
CVV – Card Verification Value (Visa and Discover payment cards)
CSC – Card Security Code (American Express)
(2) For Discover, JCB, MasterCard, and Visa payment cards, the second type of card verification value or code is
the rightmost three-digit value printed in the signature panel area on the back of the card. For American Express
payment cards, the code is a four-digit unembossed number printed above the PAN on the face of the payment
cards. The code is uniquely associated with each individual piece of plastic and ties the PAN to the plastic. The
following list provides the terms for each card brand:
CID – Card Identification Number (American Express and Discover payment cards)
CAV2 – Card Authentication Value 2 (JCB payment cards)
CVC2 – Card Validation Code 2 (MasterCard payment cards)
CVV2 – Card Verification Value 2 (Visa payment cards)
CERT Acronym for Carnegie Mellon University's “Computer Emergency Response Team.” The CERT Program develops
and promotes the use of appropriate technology and systems management practices to resist attacks on
networked systems, to limit damage, and to ensure continuity of critical services.
CIS Acronym for “Center for Internet Security.” Non-profit enterprise with mission to help organizations reduce the
risk of business and e-commerce disruptions resulting from inadequate technical security controls.
Column-Level Database Technique or technology (either software or hardware) for encrypting contents of a specific column in a database
Encryption versus the full contents of the entire database. Alternatively, see Disk Encryption or File-Level Encryption.
Compensating Controls Compensating controls may be considered when an entity cannot meet a requirement explicitly as stated, due to
legitimate technical or documented business constraints, but has sufficiently mitigated the risk associated with
the requirement through implementation of other controls. Compensating controls must:
(1) Meet the intent and rigor of the original PCI DSS requirement;
(2) Provide a similar level of defense as the original PCI DSS requirement;
(3) Be “above and beyond” other PCI DSS requirements (not simply in compliance with other PCI DSS
requirements); and
(4) Be commensurate with the additional risk imposed by not adhering to the PCI DSS requirement.
See “Compensating Controls” Appendices B and C in PCI DSS Requirements and Security Assessment Procedures
for guidance on the use of compensating controls.
Compromise Also referred to as “data compromise,” or “data breach.” Intrusion into a computer system where unauthorized
disclosure/theft, modification, or destruction of cardholder data is suspected.
Console Screen and keyboard which permits access and control of a server, mainframe computer or other system type in
a networked environment.
Consumer Individual purchasing goods, services, or both.
Cryptography Discipline of mathematics and computer science concerned with information security, particularly encryption and
authentication. In applications and network security, it is a tool for access control, information confidentiality,
and integrity.
D
Database Structured format for organizing and maintaining easily retrievable information. Simple database examples are
tables and spreadsheets.
Database Administrator Also referred to as “DBA.” Individual responsible for managing and administering databases.
Default Accounts Login account predefined in a system, application, or device to permit initial access when system is first put into
service. Additional default accounts may also be generated by the system as part of the installation process.
Default Password Password on system administration, user, or service accounts predefined in a system, application, or device;
usually associated with default account. Default accounts and passwords are published and well known, and
therefore easily guessed.
Degaussing Also called “disk degaussing.” Process or technique that demagnetizes the disk such that all data stored on the
disk is permanently destroyed.
Disk Encryption Technique or technology (either software or hardware) for encrypting all stored data on a device (for example, a
hard disk or flash drive). Alternatively, File- Level Encryption or Column-Level Database Encryption is used to
encrypt contents of specific files or columns.
DMZ Abbreviation for “demilitarized zone.” Physical or logical sub-network that provides an additional layer of security
to an organization’s internal private network. The DMZ adds an additional layer of network security between the
Internet and an organization’s internal network so that external parties only have direct connections to devices in
the DMZ rather than the entire internal network.
DNS Acronym for “Domain Name System” or “domain name server.” System that stores information associated with
domain names in a distributed database on networks such as the Internet.
DSS Acronym for “Data Security Standard” and also referred to as “PCI DSS.”
Dual Control Process of using two or more separate entities (usually persons) operating in concert to protect sensitive
functions or information. Both entities are equally responsible for the physical protection of materials involved in
vulnerable transactions. No single person is permitted to access or use the materials (for example, the
cryptographic key). For manual key generation, conveyance, loading, storage, and retrieval, dual control requires
dividing knowledge of the key among the entities. (See also Split Knowledge.)
E
ECC Acronym for “Elliptic Curve Cryptography.” Approach to public-key cryptography based on elliptic curves over
finite fields. See Strong Cryptography.
Egress Filtering Method of filtering outbound network traffic such that only explicitly allowed traffic is permitted to leave the
network.
Encryption Process of converting information into an unintelligible form except to holders of a specific cryptographic key.
Use of encryption protects information between the encryption process and the decryption process (the inverse
of encryption) against unauthorized disclosure. See Strong Cryptography.
Encryption Algorithm A sequence of mathematical instructions used for transforming unencrypted text or data to encrypted text or
data, and back again. See Strong Cryptography.
Entity Term used to represent the corporation, organization or business which is undergoing a PCI DSS review.
F
File Integrity Monitoring Technique or technology under which certain files or logs are monitored to detect if they are modified. When
critical files or logs are modified, alerts should be sent to appropriate security personnel.
File-Level Encryption Technique or technology (either software or hardware) for encrypting the full contents of specific files.
Alternatively, see Disk Encryption or Column-Level Database Encryption.
FIPS Acronym for “Federal Information Processing Standards.” Standards that are publicly recognized by the U.S.
Federal Government; also for use by non- government agencies and contractors.
Firewall Hardware and/or software technology that protects network resources from unauthorized access. A firewall
permits or denies computer traffic between networks with different security levels based upon a set of rules and
other criteria.
Forensics Also referred to as “computer forensics.” As it relates to information security, the application of investigative
tools and analysis techniques to gather evidence from computer resources to determine the cause of data
compromises.
FTP Acronym for “File Transfer Protocol.” Network protocol used to transfer data from one computer to another
through a public network such as the Internet. FTP is widely viewed as an insecure protocol because passwords
and file contents are sent unprotected and in clear text. FTP can be implemented securely via SSH or other
technology.
G
Acronym for “General Packet Radio Service.” Mobile data service available to users of GSM mobile phones.
Recognized for efficient use of limited bandwidth. Particularly suited for sending and receiving small bursts of
data, such as e-mail and web browsing.
GPRS
GSM Acronym for “Global System for Mobile Communications.” Popular standard for mobile phones and networks.
Ubiquity of GSM standard makes international roaming very common between mobile phone operators, enabling
subscribers to use their phones in many parts of the world.
H
Hashing Process of rendering cardholder data unreadable by converting data into a fixed-length message digest via Strong
Cryptography. Hashing is a (mathematical) function in which a non-secret algorithm takes any arbitrary length
message as input and produces a fixed length output (usually called a “hash code” or “message digest”). A hash
function should have the following properties:
(1) It is computationally infeasible to determine the original input given only the hash code,
(2) It is computationally infeasible to find two inputs that give the same hash code.
In the context of PCI DSS, hashing must be applied to the entire PAN for the hash code to be considered rendered
unreadable. It is recommended that hashed cardholder data includes a salt value as input to the hashing function
(see Salt).
HTTP Acronym for “hypertext transfer protocol.” Open internet protocol to transfer or convey information on the
World Wide Web.
HTTPS Acronym for “hypertext transfer protocol over secure socket layer.” Secure HTTP that provides authentication
and encrypted communication on the World Wide Web designed for security-sensitive communication such as
web-based logins.
Hypervisor Software or firmware responsible for hosting and managing virtual machines. For the purposes of PCI DSS, the
hypervisor system component also includes the virtual machine monitor (VMM).
I
ID Identifier for a particular user or application.
IDS Acronym for “intrusion detection system.” Software or hardware used to identify and alert on network or system
intrusion attempts. Composed of sensors that generate security events; a console to monitor events and alerts
and control the sensors; and a central engine that records events logged by the sensors in a database. Uses
system of rules to generate alerts in response to security events detected.
IETF Acronym for “Internet Engineering Task Force.” Large, open international community of network designers,
operators, vendors, and researchers concerned with evolution of Internet architecture and smooth operation of
Internet. The IETF has no formal membership and is open to any interested individual.
Index Token A cryptographic token that replaces the PAN, based on a given index for an unpredictable value.
Information Security Protection of information to insure confidentiality, integrity, and availability.
Information System Discrete set of structured data resources organized for collection, processing, maintenance, use, sharing,
dissemination, or disposition of information.
Ingress Filtering Method of filtering inbound network traffic such that only explicitly allowed traffic is permitted to enter the
network.
Insecure A protocol, service, or port that introduces security concerns due to the lack of controls over confidentiality
Protocol/Service/Port and/or integrity. These security concerns include services, protocols, or ports that transmit data and
authentication credentials (e.g., password/passphrase in clear-text over the Internet), or that easily allow for
exploitation by default or if misconfigured. Examples of insecure services, protocols, or ports include but are not
limited to FTP, Telnet, POP3, IMAP, and SNMP.
IP Acronym for “internet protocol.” Network-layer protocol containing address information and some control
information that enables packets to be routed. IP is the primary network-layer protocol in the Internet protocol
suite.
IP Address Also referred to as “internet protocol address.” Numeric code that uniquely identifies a particular computer on
the Internet.
IP Address Spoofing Attack technique used by a malicious individual to gain unauthorized access to computers. The malicious
individual sends deceptive messages to a computer with an IP address indicating that the message is coming from
a trusted host.
IPS Acronym for “intrusion prevention system.” Beyond an IDS, an IPS takes the additional step of blocking the
attempted intrusion.
IPSEC Abbreviation for “Internet Protocol Security.” Standard for securing IP communications by encrypting and/or
authenticating all IP packets. IPSEC provides security at the network layer.
ISO Better known as “International Organization for Standardization.” Non- governmental organization consisting of a
network of the national standards institutes of over 150 countries, with one member per country and a central
secretariat in Geneva, Switzerland, that coordinates the system.
Issuer Entity that issues payment cards or performs, facilitates, or supports issuing services including but not limited to
issuing banks and issuing processors. Also referred to as “issuing bank” or “issuing financial institution.”
Issuing services Examples of issuing services may include but are not limited to authorization and card personalization.
K
Key In cryptography, a key is a value that determines the output of an encryption algorithm when transforming plain
text to ciphertext. The length of the key generally determines how difficult it will be to decrypt the ciphertext in a
given message. See Strong Cryptography.
Key Management In cryptography, it is the set of processes and mechanisms which support key establishment and maintenance,
including replacing older keys with new keys as necessary.
L
Acronym for “local area network.” A group of computers and/or other devices that share a common
LAN communications line, often in a building or group of buildings.
LDAP Acronym for “Lightweight Directory Access Protocol.” Authentication and authorization data repository utilized
for querying and modifying user permissions and granting access to protected resources.
M
MAC Acronym for “message authentication code.” In cryptography, it is a small piece of information used to
authenticate a message. See Strong Cryptography.
MAC Address Abbreviation for “media access control address.” Unique identifying value assigned by manufacturers to network
adapters and network interface cards.
Magnetic-Stripe Data Also referred to as “track data.” Data encoded in the magnetic stripe or chip used for authentication and/or
authorization during payment transactions. Can be the magnetic stripe image on a chip or the data on the track 1
and/or track 2 portion of the magnetic stripe.
Mainframe Computers that are designed to handle very large volumes of data input and output and emphasize throughput
computing. Mainframes are capable of running multiple operating systems, making it appear like it is operating as
multiple computers. Many legacy systems have a mainframe design.
Malicious Software / Software designed to infiltrate or damage a computer system without the owner's knowledge or consent. Such
Malware software typically enters a network during many business-approved activities, which results in the exploitation of
system vulnerabilities. Examples include viruses, worms, Trojans (or Trojan horses), spyware, adware, and
rootkits.
Masking In the context of PCI DSS, it is a method of concealing a segment of data when displayed or printed. Masking is
used when there is no business requirement to view the entire PAN. Masking relates to protection of PAN when
displayed or printed. See Truncation for protection of PAN when stored in files, databases, etc.
Merchant For the purposes of the PCI DSS, a merchant is defined as any entity that accepts payment cards bearing the logos
of any of the five members of PCI SSC (American Express, Discover, JCB, MasterCard or Visa) as payment for
goods and/or services. Note that a merchant that accepts payment cards as payment for goods and/or services
can also be a service provider, if the services sold result in storing, processing, or transmitting cardholder data on
behalf of other merchants or service providers. For example, an ISP is a merchant that accepts payment cards for
monthly billing, but also is a service provider if it hosts merchants as customers.
Monitoring Use of systems or processes that constantly oversee computer or network resources for the purpose of alerting
personnel in case of outages, alarms, or other predefined events.
MPLS Acronym for “multi protocol label switching.” Network or telecommunications mechanism designed for
connecting a group of packet-switched networks.
N
NAT Acronym for “network address translation.” Known as network masquerading or IP masquerading. Change of an
IP address used within one network to a different IP address known within another network.
Network Two or more computers connected together via physical or wireless means.
Network Administrator Personnel responsible for managing the network within an entity. Responsibilities typically include but are not
limited to network security, installations, upgrades, maintenance and activity monitoring.
Network Components Include, but are not limited to firewalls, switches, routers, wireless access points, network appliances, and other
security appliances.
Network Security Scan Process by which an entity’s systems are remotely checked for vulnerabilities through use of manual or
automated tools. Security scans that include probing internal and external systems and reporting on services
exposed to the network. Scans may identify vulnerabilities in operating systems, services, and devices that could
be used by malicious individuals.
Network Segmentation Network segmentation isolates system components that store, process, or transmit cardholder data from systems
that do not. Adequate network segmentation may reduce the scope of the cardholder data environment and thus
reduce the scope of the PCI DSS assessment. See the Network Segmentation section in the PCI DSS Requirements
and Security Assessment Procedures for guidance on using network segmentation. Network segmentation is not
a PCI DSS requirement. See System Components.
NIST Acronym for “National Institute of Standards and Technology.” Non-regulatory federal agency within U.S.
Commerce Department's Technology Administration. Their mission is to promote U.S. innovation and industrial
competitiveness by advancing measurement science, standards, and technology to enhance economic security
and improve quality of life.
NMAP Security-scanning software that maps networks and identifies open ports in network resources.
Non-Consumer Users Individuals, excluding cardholders, who access system components, including but not limited to employees,
administrators, and third parties.
NTP Acronym for “Network Time Protocol.” Protocol for synchronizing the clocks of computer systems, network
devices and other system components.
O
Off-the-Shelf Description of products that are stock items not specifically customized or designed for a specific customer or
user and are readily available for use.
Operating System / OS Software of a computer system that is responsible for the management and coordination of all activities and the
sharing of computer resources. Examples of operating systems include Microsoft Windows, Mac OS, Linux and
Unix.
OWASP Acronym for “Open Web Application Security Project.” A non-profit organization focused on improving the
security of application software. OWASP maintains a list of critical vulnerabilities for web applications. (See
http://www.owasp.org).
P
PA-QSA Acronym for “Payment Application Qualified Security Assessor,” company approved by the PCI SSC to conduct
assessments on payment applications against the PA-DSS.
PAN Acronym for “primary account number” and also referred to as “account number.” Unique payment card number
(typically for credit or debit cards) that identifies the issuer and the particular cardholder account.
Parameterized Queries A means of structuring SQL queries to limit escaping and thus prevent injection attacks.
PAT Acronym for “port address translation” and also referred to as “network address port translation.” Type of NAT
that also translates the port numbers.
Patch Update to existing software to add functionality or to correct a defect.
Payment Application Any application that stores, processes, or transmits cardholder data as part of authorization or settlement
Payment Cards For purposes of PCI DSS, any payment card/device that bears the logo of the founding members of PCI SSC, which
are American Express, Discover Financial Services, JCB International, MasterCard Worldwide, or Visa, Inc.
PIN Block A block of data used to encapsulate a PIN during processing. The PIN block format defines the
content of the PIN block and how it is processed to retrieve the PIN. The PIN block is composed of the
PIN, the PIN length, and may contain subset of the PAN.
POI Acronym for “Point of Interaction,” the initial point where data is read from a card. An electronic
transaction-acceptance product, a POI consists of hardware and software and is hosted in acceptance
equipment to enable a cardholder to perform a card transaction. The POI may be attended or
unattended. POI transactions are typically integrated circuit (chip) and/or magnetic-stripe card-based
payment transactions.
Policy Organization-wide rules governing acceptable use of computing resources, security practices, and guiding
development of operational procedures
POS Acronym for “point of sale.” Hardware and/or software used to process payment card transactions at merchant
locations.
Private Network Network established by an organization that uses private IP address space. Private networks are commonly
designed as local area networks. Private network access from public networks should be properly protected with
the use of firewalls and routers.
Procedure Descriptive narrative for a policy. Procedure is the “how to” for a policy and describes how the policy is to be
implemented.
Protocol Agreed-upon method of communication used within networks. Specification describing rules and procedures that
computer products should follow to perform activities on a network.
PTS Acronym for “PIN Transaction Security,” PTS is a set of modular evaluation requirements managed by PCI Security
Standards Council, for PIN acceptance POI terminals. Please refer to www.pcisecuritystandards.org.
Public Network Network established and operated by a telecommunications provider, for specific purpose of providing data
transmission services for the public. Data over public networks can be intercepted, modified, and/or diverted
while in transit. Examples of public networks in scope of the PCI DSS include, but are not limited to, the Internet,
wireless, and mobile technologies.
PVV Acronym for “PIN verification value.” Discretionary value encoded in magnetic stripe of payment card.
Q
QSA Acronym for “Qualified Security Assessor,” company approved by the PCI SSC to conduct PCI DSS on-site
assessments.
R
RADIUS Abbreviation for “Remote Authentication Dial-In User Service.” Authentication and accounting system. Checks if
information such as username and password that is passed to the RADIUS server is correct, and then authorizes
access to the system. This authentication method may be used with a token, smart card, etc., to provide two-
factor authentication.
Acronym for “role-based access control.” Control used to restrict access by specific authorized users based on
RBAC their job responsibilities.
Remote Access Access to computer networks from a remote location, typically originating from outside the network. An example
of technology for remote access is VPN.
Removable Electronic Media Media that store digitized data and which can be easily removed and/or transported from one computer system
to another. Examples of removable electronic media include CD-ROM, DVD-ROM, USB flash drives and removable
hard drives.
ROC Report on Compliance - Report containing details documenting an entity’s compliance status with the PCI DSS.
Report on Validation Also referred to as “ROV.” Report containing details documenting a payment application’s compliance with the
PCI PA-DSS.
Process of changing cryptographic keys. Periodic re-keying limits the amount of data encrypted by a single key.
Re-keying
Remote Lab Environment A lab that is not maintained by the PA-QSA.
Reseller / Integrator An entity that sells and/or integrates payment applications but does not develop them.
RFC 1918 The standard identified by the Internet Engineering Task Force (IETF) that defines the usage and appropriate
address ranges for private (non-internet routable) networks.
Risk Analysis / Risk Process that identifies valuable system resources and threats; quantifies loss exposures (that is, loss potential)
Assessment based on estimated frequencies and costs of occurrence; and (optionally) recommends how to allocate resources
to countermeasures so as to minimize total exposure.
Rootkit Type of malicious software that when installed without authorization, is able to conceal its presence and gain
administrative control of a computer system.
Router Hardware or software that connects two or more networks. Functions as sorter and interpreter by looking at
addresses and passing bits of information to proper destinations. Software routers are sometimes referred to as
gateways.
RSA Algorithm for public-key encryption described in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at
Massachusetts Institute of Technology (MIT); letters RSA are the initials of their surnames.
S
Salt Random string that is concatenated with other data prior to being operated on by a hash function. See also Hash.
Sampling The process of selecting a cross-section of a group that is representative of the entire group. Sampling may be
used by assessors to reduce overall testing efforts, when it is validated that an entity has standard, centralized PCI
DSS security and operational processes and controls in place. Sampling is not a PCI DSS requirement.
SANS Acronym for “SysAdmin, Audit, Networking and Security,” an institute that provides computer security training
and professional certification. (See www.sans.or
Scoping Process of identifying all system components, people, and processes to be included in a PCI DSS assessment. The
first step of a PCI DSS assessment is to accurately determine the scope of the review.
SDLC Acronym for “system development life cycle.” Phases of the development of a software or computer system that
includes planning, analysis, design, testing, and implementation.
Secure Coding The process of creating and implementing applications that are resistant to tampering and/or compromise.
Secure Wipe Also called “secure delete,” a program utility used to delete specific files permanently from a computer system.
Security Officer Also called “secure delete,” a program utility used to delete specific files permanently from a computer system.
Security Policy Set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive
information
Security Protocols Network communications protocols designed to secure the transmission of data. Examples of security protocols
include, but are not limited to SSL/TLS, IPSEC, SSH, etc.
SAQ Acronym for “Self-Assessment Questionnaire.” Tool used by any entity to validate its own compliance with the
PCI DSS.
Sensitive Area Any data center, server room or any area that houses systems that stores, processes, or transmits cardholder
data. This excludes the areas where only point-of-sale terminals are present such as the cashier areas in a retail
store.
Sensitive Authentication Security-related information (including but not limited to card validation codes/values, full magnetic-stripe data,
Data PINs, and PIN blocks) used to authenticate cardholders and/or authorize payment card transactions.
Separation of Duties Practice of dividing steps in a function among different individuals, so as to keep a single individual from being
able to subvert the process.
Server Computer that provides a service to other computers, such as processing communications, file storage, or
accessing a printing facility. Servers include, but are not limited to web, database, application, authentication,
DNS, mail, proxy, and NTP.
Service Code Three-digit or four-digit value in the magnetic-stripe that follows the expiration date of the payment card on the
track data. It is used for various things such as defining service attributes, differentiating between international
and national interchange, or identifying usage restrictions.
Service Provider Business entity that is not a payment brand, directly involved in the processing, storage, or transmission of
cardholder data. This also includes companies that provide services that control or could impact the security of
cardholder data. Examples include managed service providers that provide managed firewalls, IDS and other
services as well as hosting providers and other entities. Entities such as telecommunications companies that only
provide communication links without access to the application layer of the communication link are excluded.
SHA-1/SHA-2 Acronym for “Secure Hash Algorithm.” A family or set of related cryptographic hash functions including SHA-1
and SHA-2. See Strong Cryptography.
Smart Card Also referred to as “chip card” or “IC card (integrated circuit card).” A type of payment card that has integrated
circuits embedded within. The circuits, also referred to as the “chip,” contain payment card data including but not
limited to data equivalent to the magnetic-stripe data.
SNMP Acronym for “Simple Network Management Protocol.” Supports monitoring of network attached devices for any
conditions that warrant administrative attention.
Spyware Type of malicious software that when installed, intercepts or takes partial control of the user’s computer without
the user’s consent.
Acronym for “Structured Query Language.” Computer language used to create, modify, and retrieve data from
SQL relational database management systems.
SQL Injection Form of attack on database-driven web site. A malicious individual executes unauthorized SQL commands by
taking advantage of insecure code on a system connected to the Internet. SQL injection attacks are used to steal
information from a database from which the data would normally not be available and/or to gain access to an
organization’s host computers through the computer that is hosting the database.
SSH Abbreviation for “Secure Shell.” Protocol suite providing encryption for network services like remote login or
remote file transfer.
SSL Acronym for “Secure Sockets Layer.” Established industry standard that encrypts the channel between a web
browser and web server to ensure the privacy and reliability of data transmitted over this channel.
Stateful Inspection Also called “dynamic packet filtering,” it is a firewall capability that provides enhanced security by keeping track
of communications packets. Only incoming packets with a proper response (“established connections”) are
allowed through the firewall.
Strong Cryptography Cryptography based on industry-tested and accepted algorithms, along with strong key lengths and proper key-
management practices. Cryptography is a method to protect data and includes both encryption (which is
reversible) and hashing (which is not reversible, or “one way”). Examples of industry-tested and accepted
standards and algorithms for encryption include AES (128 bits and higher), TDES (minimum double-length keys),
RSA (1024 bits and higher), ECC (160 bits and higher), and ElGamal (1024 bits and higher).
See NIST Special Publication 800-57 (http://csrc.nist.gov/publications/) for more information.
SysAdmin Abbreviation for “system administrator.” Individual with elevated privileges who is responsible for managing a
computer system or network.
System Components Any network component, server, or application included in or connected to the cardholder data environment.
System-level object Anything on a system component that is required for its operation, including but not limited to application
executable and configuration files, system configuration files, static and shared libraries & DLL's, system
executables, device drivers and device configuration files, and added third-party components.
T
TACACS Acronym for “Terminal Access Controller Access Control System.” Remote authentication protocol commonly
used in networks that communicates between a remote access server and an authentication server to determine
user access rights to the network. This authentication method may be used with a token, smart card, etc., to
provide two-factor authentication.
TCP Acronym for “Transmission Control Protocol.” Basic communication language or protocol of the Internet.
TDES Acronym for “Triple Data Encryption Standard” and also known as “3DES” or “Triple DES.” Block cipher formed
from the DES cipher by using it three times. See Strong Cryptography.
TELNET Abbreviation for “telephone network protocol.” Typically used to provide user- oriented command line login
sessions to devices on a network. User credentials are transmitted in clear text.
Threat Condition or activity that has the potential to cause information or information processing resources to be
intentionally or accidentally lost, modified, exposed, made inaccessible, or otherwise affected to the detriment of
the organization
TLS Acronym for “Transport Layer Security.” Designed with goal of providing data secrecy and data integrity between
two communicating applications. TLS is successor of SSL.
Token A value provided by hardware or software that usually works with an authentication server or VPN to perform
dynamic or two-factor authentication. See RADIUS, TACACS, and VPN.
Transaction Data Data related to electronic payment card transaction.
Trojan Also referred to as “Trojan horse.” A type of malicious software that when installed, allows a user to perform a
normal function while the Trojan performs malicious functions to the computer system without the user’s
knowledge.
Truncation Method of rendering the full PAN unreadable by permanently removing a segment of PAN data. Truncation
relates to protection of PAN when stored in files, databases, etc. See Masking for protection of PAN when
displayed on screens, paper receipts, etc.
Trusted Network Network of an organization that is within the organization’s ability to control or manage.
Two-Factor Authentication Method of authenticating a user whereby two or more factors are verified. These factors include something the
user has (such as hardware or software token), something the user knows (such as a password, passphrase, or
PIN) or something the user is or does (such as fingerprints or other forms of biometrics).
U
Untrusted Network Network that is external to the networks belonging to an organization and which is out of the organization’s
ability to control or manage.
V
Virtualization Virtualization refers to the logical abstraction of computing resources from physical constraints. One common
abstraction is referred to as virtual machines or VMs, which takes the content of a physical machine and allows it
to operate on different physical hardware and/or along with other virtual machines on the same physical
hardware. In addition to VMs, virtualization can be performed on many other computing resources, including
applications, desktops, networks, and storage.
Virtual Machine Monitor The VMM is included with the hypervisor and is software that implements virtual machine hardware abstraction.
(VMM) It manages the system's processor, memory, and other resources to allocate what each guest operating system
requires.
Virtual Machine A self-contained operating environment that behaves like a separate computer. It is also known as the “Guest,”
and runs on top of a hypervisor.
Virtual Appliance (VA) A VA takes the concept of a pre-configured device for performing a specific set of functions and run this device as
a workload. Often, an existing network device is virtualized to run as a virtual appliance, such as a router, switch,
or firewall.
Virtual Switch or Router A virtual switch or router is a logical entity that presents network infrastructure level data routing and switching
functionality. A virtual switch is an integral part of a virtualized server platform such as a hypervisor driver,
module, or plug-in.
Virtual Terminal A virtual terminal is web-browser-based access to an acquirer, processor or third party service provider website
to authorize payment card transactions, where the merchant manually enters payment card data via a securely
connected web browser. Unlike physical terminals, virtual terminals do not read data directly from a payment
card. Because payment card transactions are entered manually, virtual terminals are typically used instead of
physical terminals in merchant environments with low transaction volumes.
VLAN Abbreviation for “virtual LAN” or “virtual local area network.” Logical local area network that extends beyond a
single traditional physical local area network.
VPN Acronym for “virtual private network.” A computer network in which some of connections are virtual circuits
within some larger network, such as the Internet, instead of direct connections by physical wires. The end points
of the virtual network are said to be tunneled through the larger network when this is the case. While a common
application consists of secure communications through the public Internet, a VPN may or may not have strong
security features such as authentication or content encryption.
A VPN may be used with a token, smart card, etc., to provide two-factor authentication.
Vulnerability Flaw or weakness which, if exploited, may result in an intentional or unintentional compromise of a system.
W
Acronym for “wide area network.” Computer network covering a large area, often a regional or company wide
WAN computer system.
Web Application An application that is generally accessed via a web browser or through web services. Web applications may be
available via the Internet or a private, internal network.
Web Server Computer that contains a program that accepts HTTP requests from web clients and serves the HTTP responses
(usually web pages).
WEP Acronym for “Wired Equivalent Privacy.” Weak algorithm used to encrypt wireless networks. Several serious
weaknesses have been identified by industry experts such that a WEP connection can be cracked with readily
available software within minutes. See WPA.
Wireless Access Point Network that connects computers without a physical connection to wires.
WLAN Acronym for “wireless local area network.” Local area network that links two or more computers or devices
without wires.
WPA/WPA2 Acronym for “WiFi Protected Access.” Security protocol created to secure wireless networks. WPA is the
successor to WEP.. WPA2 was also released as the next generation of WPA.
Scope Definition
Perimeter
IP address/URL Name Type Purpose Owner
Internal
IP address/URL Name Type Purpose Owner
Scope Definition
System Admin Criticality Patch level Last Scan date Scan report location
System Admin Criticality Patch level last Scan date Last scan report
Table of content Intro Chart Compliance Chart Severity Chart Priority Merchant Types
ORGANIZATION
NAME: What's your company name?
Merchant Type: D Click on B3 to select your Merchant type (A, A-EP, PE2P,B,B-IP,C, C-VT, D,S)
1 74% 38 26 10 2 0 0 32 163
2 10% 31 3 25 0 0 3 123 136
3 2% 45 1 43 0 0 1 122 128
4 18% 11 2 8 0 0 1 41 51
5 9% 11 1 8 0 0 2 46 51
6 2% 42 1 41 0 0 0 143 144
7 73% 11 1 2 7 0 1 7 31
8 5% 37 2 35 0 0 0 97 103
9 16% 45 6 36 1 0 2 102 115
10 7% 41 3 33 0 3 2 103 121
11 6% 32 1 29 1 0 1 130 134
12 9% 46 3 41 1 0 1 88 98
Total 16% 390 50 311 12 3 14 1034 1275
81%
.
PRIORITY BOARD based on PCI DSS APPROACH
#P1 #P1 #P2 #P2 #P3 #P3 #P4 #P4 #P5 #P5 #P6 #P6
in place Total in place Total in place Total in place Total in place Total in place Total
3 3 22 26 0 0 0 0 0 0 3 8
0 0 1 15 2 15 0 0 0 0 0 1
1 10 0 1 0 0 0 0 0 29 0 5
0 0 2 10 0 0 0 0 0 0 0 1
0 0 1 10 0 0 0 0 0 0 0 1
0 0 0 0 0 34 0 0 0 0 1 8
0 0 0 0 0 0 8 10 0 0 0 1
0 0 0 0 0 0 2 36 0 0 0 1
0 2 0 6 0 0 0 0 6 36 1 1
0 0 0 0 0 0 3 40 0 0 0 1
0 0 0 20 0 0 1 11 0 0 1 1
0 2 1 6 0 0 1 9 0 0 2 29
4 17 27 94 2 49 15 106 6 65 8 58
Return to table of content This sheet provides the detailed list of documentation that your organisation should
have ready for the auditor visit. Each document is detailed in terms of content and
associated PCI DSS V3 requirements. The rest of this sheet could be used to track
various parameter along the life of these documents such as version, owner, where to
find it. ORDER
The content of this sheet will be sent for a contribution of $75. Just Contact
d@dgozone.com
Techical documentation
80%
74% 73%
70%
60%
50%
40%
30%
20% 18%
16%
10% 9% 9%
10% 7%
5% 6%
2% 2%
0%
1 2 3 4 5 6 7 8 9 10 11 12
Return to Table of content Executive Summary Chart Compliance
143144
140 136 134
128 130
123 122 121
120 115
80
60
51 51
46
41
40
32 31
20
7
0
1 2 3 4 5 6 7 8 9 10 11 12
Table of content Chart Severity Chart Compliance
Priority % in place
1 24% Progress by Priority
35%
2 29%
3 4%
30% 4 14%
5 9%
6 14%
25%
20%
15%
Progress by Priority
10%
5%
0%
1 2 3 4 5 6
hart Compliance Executive Summary
Progress by Priority
Return to Table of content
Name Email Tel Function Areas of expertize
Name 1
Name 2
Name 3
Name 4
Return to Table of content
Executive Summary Merchant types
Types Description
A Card-not-present (e-commerce or mail/telephone-order) merchants, all cardholder data functions outsourced. This
would never apply to face-to-face merchants.
B Imprint-only merchants with no electronic cardholder data storage, or standalone, dial- out terminal merchants with
no electronic cardholder data storage
B Merchants who process cardholder data only via standalone, PTS-approved point-of-interaction devices with an IP
connection to the payment processor.
C-VT Merchants using only web-based virtual terminals, no electronic cardholder data storage
C Merchants with payment application systems connected to the Internet, no electronic cardholder data storage
D All other merchants not included in descriptions for SAQ types A through C above, and all service
providers defined by a payment brand as eligible to complete an SAQ.
S Service Providers
A-EP E-commerce merchants with a websites that do not themselves receive cardholder data but which do affect the
security of the payment transaction and/or the integrity of the page that accepts the consumer’s cardholder data.
PE2P Merchants using only hardware terminals as part of a validated P2PE solution listed by PCI SSC.
It's important to remember that SAQs are validation documents and whether a merchant is eligible or required to
validate to one of the SAQs, and which SAQ they should validate to, is determined by the payment brands and/or
acquirers. Also, please keep in mind that the v2.0 SAQs are still valid throughout 2014.
Return to Table of content
Compensatin #Req Constraints Objective Identified Risk
g
Control Id
# #requirement List constraints precluding Define the objective of the Identify any additional risk
s for which a compliance with the original original control; identify the posed by the lack of the
compensating requirement. objective met by the original control.
control is compensating control.
defined
1
2
3
4
5
6
7
8
9
10
11
Definition of Compensation Control Validation of Compensating Control Maintenance
Define the compensating controls and Define how the compensating controls Define process and controls
explain how they address the objectives of were validated and tested. in place to maintain
the original control and the increased risk, compensating controls
if any.
Table of content Executive Summary
1
2
3
4
5
6
7
8
9
10
11
Table of content
C1.2 Deploy an automated asset inventory discovery tool and use it to 11.1 P 0.5 No specific inventory requirements
build a preliminary asset inventory of systems connected to the 11.2 but target discovery is the first part
enterprise network. Both active tools that scan through network of the external scanning process.
address ranges and passive tools that identify hosts based on
analyzing their traffic should be employed.
C1.3 Maintain an asset inventory of all systems connected to the Scoping P 0.5 While there is no specific inventory
network and the network devices themselves, recording at least requirement, the inventory process
the network addresses, machine name(s), purpose of each system, is actually part of a scoping
an asset owner responsible for each device, and the department exercice.
associated with each device. The inventory should include every
system that has an Internet protocol (IP) address on the network,
including, but not limited to desktops, laptops, servers, network
equipment (routers, switches, firewalls,
C1.4 The asset inventory created must also include data on whether the - N 0
device is a portable device. Devices such as mobile phones, tablets,
laptops, and other portable electronic devices that store or process
data must be identified, regardless of whether or not they are
attached to the organization’s network.
C1.6 Secure the asset inventory database and related systems, ensuring - N 0
that they are included in periodic vulnerability scans and that asset
information is encrypted. Limit access to these systems to
authorized personnel only, and carefully log all such access. For
additional security, a secure copy of the asset inventory may be
kept in an off-line system air-gapped from the production network.
C2.3 The software inventory tool should also monitor for unauthorized - N 0
software installed on each machine. This unauthorized software
also includes legitimate system administration software installed
on inappropriate systems where there is no business need for it.
C2.4 Deploy application white listing technology that allows systems to - N 0
run only approved software and prevents execution of all other
software on the system. Such white listing tools must be based on
acceptable hashing algorithms for determining authorized binaries
to execute on a system.
C3.2 System images must have documented security settings that are 2.2 F 1
tested before deployment, approved by an organization change
control board, and registered with a central image library for the
organization or multiple organizations. These images should be
validated and refreshed on a regular basis (e.g., every six months)
to update their security configuration in light of recent
vulnerabilities and attack vectors.
C3.3 Standardized images should represent hardened versions of the 2.1 F 1
underlying operating system and the applications installed on the 2.2
system, such as those released by the NIST, NSA, Defense 2.2.2
Information Systems Agency (DISA), Center for Internet Security 2.2.3
(CIS), and others. This hardening would typically include removal of 2.2.4
unnecessary accounts, as well as the disabling or removal of
unnecessary services. Such hardening also involves, among other
measures, applying patches, closing open and unused network
ports, implementing intrusion detection systems and/or intrusion
prevention systems, and erecting host-based firewalls.
C3.4 Any deviations from the standard build or updates to the standard - N 0
build should be documented and approved in a change
management system.
C3.7 Run the last version of software and make sure it is fully patched. 6.1 F 1
C3.7.1 Remove outdated or older software from the system. - N 0 No specific requirements but ASV
scans must fail targetsiff the
version of the operating system is
an older version no longer
supported by the vendo
C3.9 Utilize file integrity checking tools on at least a weekly basis to 11.5 F 1
ensure that critical system files (including sensitive system and
application executables, libraries, and configurations) have not
been altered. All alterations to such files should be automatically
reported to security personnel. The reporting system should have
the ability to account for routine and expected changes,
highlighting unusual or unexpected alterations.
C4.1.1 Any vulnerability identified should be remediated in a timely 6.1 P 0.5 PCI less restrictive in terms of
manner, with critical vulnerabilities fixed within 48 hours. critical vulnerabilities fixing period
(One month)
C4.4 In order to overcome limitations of unauthenticated vulnerability - N 0 11.2 requires ASV to run
scanning, organizations should ensure that all vulnerability unauthenticated scans with the
scanning is performed in authenticated mode either with agents known limitations. PCI rules should
running locally on each end system to analyze the security align on Top 20.
configuration or with remote scanners that are given
administrative rights on the system being tested.
C4.5 Organizations should compare the results from back-to-back 6.2 F 1 For the risk approach. Nothing
vulnerability scans to verify that vulnerabilities were addressed about validation /control process
either by patching, implementing a compensating control, or
documenting and accepting a reasonable business risk. Such
acceptance of business risks for existing vulnerabilities should be
periodically reviewed to determine if newer compensating controls
or subsequent patches can address vulnerabilities that were
previously accepted, or if conditions have changed increasing the
risk.
C4.6 Vulnerability scanning tools should be tuned to compare services - N 0 Checking services and
that are listening on each machine against a list of authorized configuration as part of a scan isn't
services. The tools should be further tuned to identify changes explicitely required by PCI.
over time on systems for both authorized and unauthorized
services. Organizations should use government-approved scanning
configuration files for their scanning to ensure that minimum
standards are met.
C5.1.3 All malware detection events should be sent to enterprise anti- - N 0 PCI doesn't address the
malware administration tools and event log servers. centralization of malware event
management. The closest
requirement is 5.2 requiring
generation of audit logs
C5.2 Organizations should employ anti-malware software and signature 5.2 F 1 5.2 is the closest requirement:
auto update features or have administrators manually push (Anti-virus must be current)
updates to all machines on a daily basis.
C5.5 All attachments entering the organization’s e-mail gateway should - N 0 Should be part of 5.2 but email
be scanned and blocked if they contain malicious code. This servers could not be within the
scanning should be done before the e-mail is placed in the user’s scope.
inbox.
C6.2 At a minimum, explicit error checking should be done for all input. - N 0
Whenever a variable is created in source code, the size and type
should be determined. When input is provided by the user it
should be verified that it does not exceed the size or the data type
of the memory location in which it is stored or moved in the future.
C6.3 Organizations should test in-house-developed and third-party- 6.3.2 F 1 No mention of automated static
procured web and other application software for coding errors and 6.4.5.3 code analysis software
malware insertion, including backdoors prior to deployment using 6.6
automated static code analysis software. If source code is not
available, these organizations should test compiled code using
static binary analysis tools. In particular, input validation and
output encoding routines of application software should be
carefully reviewed and tested.
C6.4 Organizations should test in-house-developed and third-party- 11.2 F 1
procured web applications for common security weaknesses using 11.2.3
automated remote web application scanners prior to deployment, 11.3.2
whenever updates are made to the application
and on a regular recurring basis.
C6.6 Organizations should verify that security considerations are taken 6.3 F 1
into account throughout the requirements, design,
implementation, testing, and other phases of the software
development life cycle of all applications.
C6.7 Organizations should ensure that all software development 6.5 F 1 Testing procedure 6.5.a require to
personnel receive training in writing secure code for their specific verify training requirement t
development environment.
C6.9 Sample scripts, libraries, components, compilers, or any other - N 0 6.3.1 talks about account removal
unnecessary code that is not being used by an application should 6.4.4 talks about test data removal
be uninstalled or removed from the system. but no mention of scripts,
librairies,...
C7 Critical Control 7: Wireless Device Control 28.13% 4.5
C7.1 Organizations should ensure that each wireless device connected 2.1.1 P 0.5 No mention of documented
to the network matches an authorized configuration and security 4.1.1 configuration
profile, with a documented owner of the connection and a defined 11.1
business need. Organizations should deny access to those wireless
devices that do not have such a configuration and profile.
C7.2 Organizations should ensure that all wireless access points are - N 0
manageable using enterprise management tools. Access points
designed for home use often lack such enterprise management
capabilities, and should therefore be avoided in enterprise
environments.
C7.7 Where a specific business need for wireless access has been - N 0
identified, organizations should configure wireless access on client
machines to allow access only to authorized wireless networks.
C7.10 Organizations should ensure that all wireless traffic leverages at 4.1.1. F 1 PCI DSS doesn't specify an
least Advanced Encryption Standard (AES) encryption used with at encryption algorithm.
least WiFi Protected Access 2 protection.
C7.11 Organizations should ensure that wireless networks use - N 0
authentication protocols such as Extensible Authentication
Protocol-Transport Layer Security (EAP/TLS) or Protected
Extensible Authentication Protocol (PEAP), which provide
credential protection and mutual authentication.
C7.12 Organizations should ensure that wireless clients use strong, multi- - N 0
factor authentication credentials to mitigate the risk of
unauthorized access from compromised credentials.
C7.15 Wireless access points should never be directly connected to the 1.2.3 F 1
private network. They should either be placed behind a firewall or
put on a separate VLAN so all traffic can be examined and filtered.
C11.2 Automated port scans should be performed on a regular basis 11.2.1 P 0.5 Part of the discovery phasis of a
against all key servers and compared to a known effective baseline. 11.2.2 newtork scan. Although, specific
If a new port is found open, an alert should be generated and 11.2.3 reports should be built to list these
reviewed. discrepencies.
C11.3 Any server that is visible from the Internet or an untrusted network - N 0
should be verified, and if it is not required for business purposes it
should be moved to an internal VLAN and given a private address.
C11.4 Services needed for business use across the internal network 1.1.5 P 0.5 1.1.5 is the closest requirement
should be reviewed quarterly via a change control group, and related to busines justification. No
business units should re- justify the business use. Sometimes mention of regular review.
services are turned on for projects or limited engagements, and
should be turned off when they are no longer needed.
C11.5 Operate critical services on separate physical host machines, such 2.2.1 F 1
as DNS, file, mail, web, and database servers.
C11.6 Application firewalls should be placed in front of any critical 6.6 P 0.5 PCI leaves the choice between a
servers to verify and validate the traffic going to the server. Any WAF or code-review.
unauthorized services or traffic should be blocked and an alert
generated.
C12.1. and validate that each person with administrative privileges on 7.1 P 0.5 General statement. Not talk
desktops, laptops, and servers is authorized by a senior executive specifically of Admin privileges.
C12.1. and that his/her administrative password has at least 12 semi- 8.5.10 P 0.5 General requirement of at least 7
random characters, consistent with the FDCC standard. characters. No specific req for
admin
C12.3 Organizations should configure all administrative-level accounts to 8.5.9 F 1 General requirement: 90 days. No
require regular password changes on a frequent interval of no specific requirement for admin
longer than 60 days. accounts.
C12.4 Organizations should ensure all service accounts have long and - N 0 Service account passwords aren't
difficult-to- guess passwords that are changed on a periodic basis, addressed.
as is done for traditional user and administrator passwords, at a
frequent interval of no longer than 90 days.
C12.5 Passwords for all systems should be stored in a well-hashed or 8.4 F 1
encrypted format.
C12.5. Furthermore, files containing these encrypted or hashed - N 0
passwords required for systems to authenticate users should be
readable only with superuser privileges.
C12.10 Organizations should configure systems to issue a log entry and 10.2.2 P 0.5 10.2.2 is the closest requirement
alert when an account is added to or removed from a domain
administrators group.
C12.11 All administrative access, including domain administrative access, - N 0 8.3 Two-factor only required for
should use two-factor authentication. remote access.
C12.12 Access to a machine (either remotely or locally) should be blocked - N 0
for administrator-level accounts. Instead, administrators should be
required to access a system using a fully logged and
nonadministrative account. Then, once logged in to the machine
without administrative privileges, the administrator should then
transition to administrative privileges using tools such as sudo on
Linux/UNIX, Runas on Windows, and other similar facilities for
other types of systems.
C13.1. Tests can be periodically carried out by sending packets from 1.1.1 P 0.5
bogon source IP addresses into the network to verify that they are
not transmitted through network perimeters.
C13.2 Deploy network-based IDS sensors on Internet and extranet DMZ 11.4 F 1
systems and networks that look for unusual attack mechanisms
and detect compromise of these systems. These network-based
IDS sensors may detect attacks through the use of
signatures, network behavior analysis, or other mechanisms to
analyze traffic.
C13.8 All devices remotely logging into the internal network should be - N 0
managed by the enterprise, with remote control of their
configuration, installed software,
and patch levels.
C.14.2 Ensure that all systems that store logs have adequate storage - N 0
space for the logs generated on a regular basis, so that log files will
not fill up between log rotation intervals.
C14.2. The logs must be archived and digitally signed on a periodic basis. 10.5 P 0.5 No requirement for digital
10.5.3 signature
C14.2 All remote access to a network, whether to the DMZ or the internal - N 0 Not specific requirement for
network (i.e., VPN, dial-up, or other mechanism), should be logged remote access
verbosely.
C.14.3 Operating systems should be configured to log access control 10.2.1 - F 1 Resource = CC data
events associated with a user attempting to access a resource (e.g., 10.2.7
a file or directory) without the appropriate permissions. Failed 10.3.4
logon attempts must also be logged.
C.14.5 Each organization should include at least two synchronized time 10.4 P 0.5 Don't mention about # of time
sources (i.e., Network Time Protocol – NTP) from which all servers (10.4.3) synchronization sources
and network equipment retrieve time information on a regular
basis so that timestamps in logs are consistent.
C14.6 Network boundary devices, including firewalls, network-based IPS, 10.2 P 0.5 No specific mention of such
and inbound and outbound proxies, should be configured to 10.6 devices
verbosely log all traffic (both allowed and blocked) arriving at the
device.
C14.7 For all servers, organizations should ensure that logs are written to 10.5.4 F 1
write-only devices or to dedicated logging servers running on
separate machines from hosts generating the event logs, lowering
the chance that an attacker can manipulate logs stored locally on
compromised machines.
C14.8 Organizations should deploy a SEIM system tool for log aggregation - N 0 No mention of SEIM
and consolidation from multiple machines and for log correlation
and analysis. Standard government scripts for analysis of the logs
should be deployed and monitored, and customized local scripts
should also be used. Using the SEIM tool, system administrators
and security personnel should devise profiles of common events
from given systems so that they can tune detection to focus on
unusual activity, avoid false positives, more rapidly identify
anomalies, and prevent overwhelming analysts with insignificant
alerts.
C15.2 Organizations should ensure that file shares have defined controls - N 0
(such as Windows share access control lists) that specify at least
that only “authenticated users” can access the share.
C15.3 Organizations should enforce detailed audit logging for access to 7.2 P 0.5 7.2 is the closest requiremement
nonpublic data and special authentication for sensitive data.
C15.4 The network should be segmented based on the trust levels of the 1.2 P 0.5
information stored on the servers. 1.3
C15.4. Whenever information flows over a network of lower trust level, 4.1 F 1
the information should be encrypted.
C15.5 The use of portable USB drives should either be limited or data - N 0
should automatically be encrypted before it is written to a portable
drive.
C16 Critical Control 16: Account Monitoring and Control 68.18% 7.5
C16.1 Review all system accounts and disable any account that cannot be - N 0
associated with a business process and owner.
C16.2 Systems should automatically create a report on a daily basis that - N 0
includes a list of locked-out accounts, disabled accounts, accounts
with passwords that exceed the maximum password age, and
accounts with passwords that never expire. This list should be sent
to the associated system administrator in a secure fashion.
C16.3 Organizations should establish and follow a process for revoking 8.5.4 F 1
system access by disabling accounts immediately upon termination
of an employee or contractor.
C16.4 Organizations should regularly monitor the use of all accounts, 8.5.6 F 1
automatically 8.5.15
logging off users after a standard period of inactivity.
C16.5 Organizations should monitor account usage to determine 8.5.5 F 1 PCI less restrictive (90 days)
dormant accounts
that have not been used for a given period, such as 30 days,
notifying the user or user’s manager of the dormancy. After a
longer period, such as 60 days, the account should be disabled.
C16.6 When a dormant account is disabled, any files associated with that - N 0
account should be encrypted and moved to a secure file server for
analysis by security or management personnel.
C16.7 All nonadministrator accounts should be required to have a 8.5.10 P 0.5 PCI les restrictive (7 characters)
minimum length of 12 characters,
C16.7. contain letters, numbers, and special characters 8.5.11 P 0.5 PCI less restrictive (No special
characters)
C16.7. be changed at least every 90 days, have a minimal age of one day, 8.5.9 F 1 PCI is also 90 days
C1.7.3 and not be allowed to use the previous 15 passwords as a new 8.5.12 P 0.5 PCI less restrictive (the last 4)
password.
C16.8 After eight failed logon attempts within a 45-minute period, the 8.5.13 F 1 PCI more restrictive (6 attempts)
account should be locked
C16.8. for 120 minutes. 8.5.14 P 0.5 PCI less restrictive (30 minutes or
unlocked by administrator)
C16.9 On a periodic basis, such as quarterly or at least annually, 12.2 P 0.5 Partially covered through the
organizations should require that managers match active requirement for a User account
employees and contractors with each account belonging to their maintenance procedure.
managed staff. Security or system administrators should then
disable accounts that are not assigned to active employees or
contractors.
C17.2 Network monitoring tools should analyze outbound traffic looking 10.0 F 1
for a variety of anomalies, including large file transfers, long-time
persistent connections, connections at regular repeated intervals,
unusual protocols and ports in use, and possibly the presence of
certain keywords in the data traversing the network perimeter.
C17.3 Deploy an automated tool on network perimeters that monitors - N 0
for certain sensitive information (i.e., personally identifiable
information), keywords, and other document characteristics to
discover unauthorized attempts to exfiltrate data across network
boundaries and block such transfers while alerting information
security personnel.
C17.9 Use network-based DLP solutions to monitor and control the flow - N 0
of data within the network. Any anomalies that exceed the normal
traffic patterns should be noted and appropriate action taken to
address them,.
C17.1 Monitor all traffic leaving the organization and detect any - N 0
0 unauthorized use of encryption. Attackers often use an encrypted
channel to bypass network security devices. Therefore it is
essential that organizations are able to detect rogue connections,
terminate the connection, and remediate the infected system.
C18.1 12.5.3 F 1
12.9
Organizations should ensure that they have written incident
response procedures that include a definition of personnel roles
for handling incidents. The procedures should define the phases of
incident handling consistent with the NIST guidelines.
C18.2 12.9.1 F 1
Organizations should assign job titles and duties for handling
computer and network incidents to specific individuals.
C18.3 12.9.1 F 1
Organizations should define management personnel who will
support the incident handling process by acting in key decision-
making roles.
C18.4 12.9.1 F 1
C19.4 Security should be built into all phases of the software 6.3 F 1
development lifecycle, ensuring that any security issues are
addressed as early as possible.
C19.5 Organizations should segment the enterprise network into 1.3 P 0.5 Network segmentation is
multiple, separate trust zones to provide more granular control of addressed as a way to reduce the
system access and additional intranet boundary defenses. scope of the assessment.
C20 Critical Control 20: Penetration Tests and Red 35.71% 2.5
Team Exercises
C20.1 Organizations should conduct regular external and internal 11.3 F 1
penetration tests to identify vulnerabilities and attack vectors that
can be used to exploit enterprise systems successfully. Penetration
testing should occur from outside the network perimeter (i.e., the
Internet or wireless frequencies around an organization) as well as
from within its boundaries (i.e., on the internal network) to
simulate both outsider and insider attacks.
C20.3 Organizations should ensure that systemic problems discovered in 11.3b F 1 Noted exploitable vulnerabilities
penetration tests and red team exercises are fully mitigated. must be corrected
C20.4 - N 0
Personnel knows security policies and operational procedures for managing vendor defaults 2.2.5
and other security parameters
Cryptographic key custodians understand and accept their key-custodian responsibilities. 3.6.8
Security policies and operational procedures for protecting stored cardholder data are 3.7
known to all affected parties.
Security policies and operational procedures for encrypting transmissions of cardholder data 4.3
are known to all affected parties.
Security policies and operational procedures for protecting systems against malware are 5.4
known to all affected parties.
Security policies and operational procedures for developing and maintaining secure systems 6.7
and applications are known to all affected parties.
Security policies and operational procedures for restricting access to cardholder data are 7.3
known to all affected parties.
Security policies and operational procedures for identification and authentication are known 8.8
to all affected parties.
Training and other knowledge
evidences required by PCI DSS V3.0. Use this sheet to list the training evidences
Security policies and operational procedures for restricting physical access to cardholder 9.10
data are known to all affected parties.
Security policies and operational procedures for monitoring all access to network resources 10.8
and cardholder data are known to all affected parties.
Security policies and operational procedures for security monitoring and testing are known 11.6
to all affected parties.
Personnel understands the security policies, their roles and responsibilities 12.4
Return toare
Firewalls Table of content
devices Go tobetween
that control computer traffic allowed requirement 2 networks (internal) and untrusted networks (external),
an entity’s
A firewall examines all network traffic and blocks those transmissions that do not meet the specified security criteria.
Requirement
All systems must1:beInstall andfrom
protected maintain a firewall
unauthorized accessconfiguration to protect
from untrusted networks, cardholder
whether enteringdata
the system via the Internet as e-
Other system components may provide firewall functionality, provided they meet the minimum requirements for firewalls as provided
1.1 Establish firewall and router configuration Firewalls and routers are key components of the
standards that include the following: architecture that controls entry to and exit from the
network. These devices are software or hardware
devices that block unwanted access and manage
authorized access into and out of the network. Without
policies and procedures in place to document how staff
should configure firewalls and routers, a business could
easily lose its first line of defense in data-protection. The
policies and procedures will help to ensure that the
organization’s first line of defense in the protection of its
data remains strong.
Virtual environments where data flows do not transit a
physical network should be assessed to ensure
appropriate network segmentation is achieved.
1.1.1 A formal process for approving and testing all A policy and process for approving and testing all
network connections and changes to the firewall connections and changes to the firewalls and
and router configurations routers will help prevent security problems caused
by misconfiguration of the network, router, or
firewall.
Data flows between virtual machines should be
included in policy and process
1.1.2 Current network diagram that identifies all Network diagrams describe how networks are
connections between the cardholder data configured, and identify the location of all network
environment and other networks, including any devices.
wireless networks. Without current network diagrams, devices could
be overlooked and be unknowingly left out of the
security controls implemented for PCI DSS and thus
be vulnerable to compromise.
1.1.3 Current diagram that shows all cardholder Cardholder data-flow diagrams identify the location
data flows across systems and networks of all cardholder data that is stored, processed, or
transmitted within the network.
Network and cardholder data-flow diagrams help
an organization to understand and keep track of the
scope of their environment, by showing how
cardholder data flows across networks and
between individual systems and devices.
1.1.4 Requirements for a firewall at each Internet Using a firewall on every connection coming into (and
connection and between any demilitarized zone out of) the network allows the organization to monitor
(DMZ) and the internal network zone and control access in and out, and to minimize the
chances of a malicious individual’s obtaining access to
the internal network.
1.1.5 Description of groups, roles, and This description of roles and assignment of responsibility
responsibilities for logical management of ensures that someone is clearly responsible for the
network components security of all components and is aware of their
responsibility, and that no devices are left unmanaged.
1.1.6 Documentation and business justification for Compromises often happen due to unused or insecure
use of all services, protocols, and ports allowed, service and ports, since these often have known
including documentation of security features vulnerabilities—and many organizations are vulnerable
implemented for those protocols considered to be to these types of compromises because they do not
insecure. Examples of insecure services, protocols, patch security vulnerabilities for services, protocols, and
or ports include but are not limited to FTP, Telnet, ports they don't use (even though the vulnerabilities are
POP3, IMAP, and SNMP. still present). Each organization should clearly decide
which services, protocols, and ports are necessary for
their business, document them for their records, and
ensure that all other services, protocols, and ports and
disabled or removed. Also, organizations should consider
blocking all traffic and only re-opening those ports once
a need has been determined and documented.
Additionally, there are many services, protocols, or ports
that a business may need (or have enabled by default)
that are commonly used by malicious individuals to
compromise a network. If these insecure services,
protocols, or ports are necessary for business, the risk
posed by use of these protocols should be clearly
understood and accepted by the organization, the use of
the protocol should be justified, and the security
features that allow these protocols to be used securely
should be documented and implemented. If these
insecure services, protocols, or ports are not necessary
for business, they should be disabled or removed.
1.1.7 Requirement to review firewall and router This review gives the organization an opportunity
rule sets at least every six months at least every six months to clean up any
unneeded, outdated, or incorrect rules, and ensure
that all rule sets allow only authorized services and
ports that match business justifications.
It is advisable to undertake these reviews on a
more frequent basis, such as monthly, to ensure
that the rule sets are current and match the needs
of the business without opening security holes and
running unnecessary risks.
1.2 Build firewall and router configurations that It is essential to install network protection, namely a
restrict connections between untrusted networks system component with (at a minimum) stateful
and any system components in the cardholder data inspection firewall capability, between the internal,
environment. trusted network and any other untrusted network that is
external and/or out of the entity’s ability to control or
Note: An “untrusted network” is any network that is manage. Failure to implement this measure correctly
external to the networks belonging to the entity means that the entity will be vulnerable to unauthorized
under review, and/or which is out of the entity's access by malicious individuals or software.
ability to control or manage.
If firewall functionality is installed but does not have
rules that control or limit certain traffic, malicious
individuals may still be able to exploit vulnerable
protocols and ports to attack your network.
1.2.1 Restrict inbound and outbound traffic to that This requirement is intended to prevent malicious
which is necessary for the cardholder data individuals from accessing the organization's network via
environment. unauthorized IP addresses or from using services,
protocols, or ports in an unauthorized manner (for
example, to send data they've obtained from within your
network out to an untrusted server.
All firewalls should include a rule that denies all inbound
and outbound traffic not specifically needed. This will
prevent inadvertent holes that would allow other,
unintended and potentially harmful traffic in or out.
1.2.2 Secure and synchronize router configuration While running configuration files are usually
files. implemented with secure settings, the start-up files
(routers run these files only upon re-start) may not be
implemented with the same secure settings because
they only run occasionally. When a router does re-start
without the same secure settings as those in the running
configuration files, it may result in weaker rules that
allow malicious individuals into the network, because the
start-up files may not be implemented with the same
secure settings as the running configuration files.
1.2.3 Install perimeter firewalls between any The known (or unknown) implementation and
wireless networks and the cardholder data exploitation of wireless technology within a network is a
environment, and configure these firewalls to deny common path for malicious individuals to gain access to
or control (if such traffic is necessary for business the network and cardholder data. If a wireless device or
purposes) any traffic from the wireless environment network is installed without a company’s knowledge, a
into the cardholder data environment. malicious individual could easily and “invisibly” enter the
network. If firewalls do not restrict access from wireless
networks into the payment card environment, malicious
individuals that gain unauthorized access to the wireless
network can easily connect to the payment card
environment and compromise account information.
1.3 Prohibit direct public access between the A firewall's intent is to manage and control all
Internet and any system component in the connections between public systems and internal
cardholder data environment. systems (especially those that store, process or transmit
cardholder data). If direct access is allowed between
public systems and the CDE, the protections offered by
the firewall are bypassed, and system components
storing cardholder data may be exposed to compromise.
1.3.1 Implement a DMZ to limit inbound traffic to The DMZ is that part of the network that manages
only system components that provide authorized connections between the Internet (or other untrusted
publicly accessible services, protocols, and ports. networks), and internal services that an organization
needs to have available to the public (like a web server).
It is the first line of defense in isolating and separating
traffic that needs to communicate with the internal
network from traffic that does not.
This functionality is intended to prevent malicious
individuals from accessing the organization's network via
unauthorized IP addresses or from using services,
protocols, or ports in an unauthorized manner.
1.3.2 Limit inbound Internet traffic to IP Termination of IP connections at the DMZ provides
addresses within the DMZ. opportunity for inspection and restriction of
source/destination, and/or inspection / blocking of
content, thus preventing unfiltered access between
untrusted and trusted environments.
1.3.3 Do not allow any direct connections Termination of IP connections both inbound and
inbound or outbound for traffic between the outbound provides opportunity for inspection and
Internet and the cardholder data environment. restriction of source/destination, and/or inspection /
blocking of content, thus preventing unfiltered access
between untrusted and trusted environments. This helps
prevent, for example, malicious individuals from sending
data they've obtained from within your network out to
an external untrusted server in an untrusted network.
1.3.4 Implement anti-spoofing measures to Normally a packet contains the IP address of the
detect and block forged source IP addresses from computer that originally sent it so other computers in
entering the network. the network know where the packet came from.
Malicious individuals will often try to spoof (or imitate)
(For example, block traffic originating from the the sending IP address so that the target system
Internet with an internal source address.) believes the packet is from a trusted source.
Filtering packets coming into the network helps to,
among other things, ensure packets are not
“spoofed” to look like they are coming from an
organization’s own internal network.
1.3.5 Do not allow unauthorized outbound traffic All traffic outbound from inside the cardholder data
from the cardholder data environment to the environment should be evaluated to ensure that
Internet. outbound traffic follows established, authorized rules.
Connections should be inspected to restrict traffic to
only authorized communications (for example by
restricting source/destination addresses/ports, and/or
blocking of content).
Where environments have no inbound connectivity
allowed, outbound connections may be achieved via
architectures or system components that interrupt
and inspect the IP connectivity.
1.3.6 Implement stateful inspection, also known A firewall that performs stateful packet inspection
as dynamic packet filtering. (That is, only keeps "state" (or the status) for each connection to
“established” connections are allowed into the the firewall. By keeping "state," the firewall knows
network.) whether what appears to be a response to a previous
connection is truly a response (since it "remembers"
the previous connection) or is a malicious individual or
software trying to spoof or trick the firewall into
allowing the connection.
1.3.7 Place system components that store Cardholder data requires the highest level of
cardholder data (such as a database) in an information protection. If cardholder data is located
internal network zone, segregated from the DMZ within the DMZ, access to this information is easier for
and other untrusted networks. an external attacker, since there are fewer layers to
penetrate.
Note: the intent of this requirement does not include
storage in volatile memory.
1.3.8 Do not disclose private IP addresses and Restricting the broadcast of IP addresses is essential to
routing information to unauthorized parties. prevent a hacker “learning” the IP addresses of the
internal network, and using that information to access
Note: Methods to obscure IP addressing may the network.
include, but are not limited to:
Effective means to meet the intent of this requirement
- Network Address Translation (NAT) may vary depending on the specific networking
- Placing servers containing cardholder data technology being used in your environment. For
behind proxy servers/firewalls or content caches, example, the controls used to meet this requirement
- Removal or filtering of route advertisements for may be different for IPv4 networks than for IPv6
private networks that employ registered networks.
addressing,
- Internal use of RFC1918 address space instead of One technique to prevent IP address information from
registered addresses. being discovered on an IPv4 network is to implement
Network Address translation (NAT). NAT, which is
typically managed by the firewall, allows an organization
to have internal addresses that are visible only inside the
network and external address that are visible externally.
If a firewall does not “hide” or mask the IP addresses of
the internal network, a malicious individual could
discover internal IP addresses and attempt to access the
network with a spoofed IP address.
For IPv4 networks, the RFC1918 address space is
reserved for internal addressing, and should not be
routable on the Internet. As such, it is preferred for IP
addressing of internal networks. However, organizations
may have reasons to utilize non-RFC1918 address space
on the internal network. In these circumstances,
prevention of route advertisement or other techniques
should be used to prevent internal address space being
broadcast on the Internet or disclosed to unauthorized
parties.
behind proxy servers/firewalls or content caches, example, the controls used to meet this requirement
- Removal or filtering of route advertisements for may be different for IPv4 networks than for IPv6
private networks that employ registered networks.
addressing,
- Internal use of RFC1918 address space instead of One technique to prevent IP address information from
registered addresses. being discovered on an IPv4 network is to implement
Network Address translation (NAT). NAT, which is
typically managed by the firewall, allows an organization
to have internal addresses that are visible only inside the
network and external address that are visible externally.
If a firewall does not “hide” or mask the IP addresses of
the internal network, a malicious individual could
discover internal IP addresses and attempt to access the
network with a spoofed IP address.
1.4 Install personal firewall software on If a computer does not have a firewall or anti-virus
any mobile and/or employee-owned program installed, spyware, Trojans, viruses, worms and
rootkits (malware) may be downloaded and/or installed
devices that connect to the Internet unknowingly. The computer is even more vulnerable
when outside the network (for example, when directly connected to the Internet and not behind
laptops used by employees), and which the corporate firewall. Malware loaded on a computer
are also used to access the network. when not behind the corporate firewall can then
Firewall configurations include: -Specific maliciously target information within the network when
configuration settings are defined for the computer is re-connected to the corporate network.
personal firewall software.
-Personal firewall software is actively Note: The intent of this requirement applies to remote
running. access computers regardless of whether they are
-Personal firewall software is not employee owned or company owned. Systems that
alterable by users of mobile and/or cannot be managed by corporate policy introduce
employee-owned devices. weaknesses to the perimeter and provide opportunities
that malicious individuals may exploit.
1.5 Ensure that security policies and operational Personnel need to be aware of and following security
procedures for managing firewalls are policies and operational procedures to ensure
documented, in use, and known to all affected firewalls and routers are continuously managed to
parties. prevent unauthorized access to the network.
and untrusted networks (external),Executive
as well assummary
traffic into and out of more sensitive areas within an entity’s internal trusted networks. The cardholde
d security criteria.
r data
ng the system via the Internet as e-commerce, employee Internet access through desktop browsers, employee e-mail access, dedicated connection
quirements for firewalls as provided in Requirement 1. Where other system components are used within the cardholder data environment to provi
.3.6.
outers was considerably low. Just 52.5% of companies comply with 1.1.6.b.
C10.4 1.1.1.a Examine documented procedures to verify there is a formal process for
C13.1.1 testing and approval of all:
Network connections, and
Changes to firewall and router configurations.
C10.4 1.1.2.a Examine diagram(s) and observe network configurations to verify that a
current network diagram exists and that it documents all connections to cardholder
data, including any wireless networks.
1.1.2.b Interview responsible personnel to verify that the diagram is kept current.
1.1.3 Examine data-flow diagram and interview personnel to verify the diagram:
Shows all cardholder data flows across systems and networks.
Is kept current and updated as needed upon changes to the environment.
C13.5 1.1.4.a Examine the firewall configuration standards and verify that they include
requirements for a firewall at each Internet connection and between any DMZ and
the internal network zone.
1.1.4.b Verify that the current network diagram is consistent with the firewall
configuration standards.
C10.4 1.1.5 Verify that firewall and router configuration standards include a description of
groups, roles, and responsibilities for logical management of network components.
1.1.6.b Identify insecure services, protocols, and ports allowed; and verify they are
necessary and that security features are documented and implemented by
examining firewall and router configuration standards and settings for each service.
1.1.6.c Examine firewall and router configurations to verify that the documented
security features are implemented for each insecure service, protocol, and port.
C10.1 1.1.7.a Verify that firewall and router configuration standards require review of
C10.4 firewall and router rule sets at least every six months.
C10.2 1.2.1.a Examine firewall and router configurations and perform the following to verify
that connections are restricted between untrusted networks and system components
in the cardholder data environment:
1.2.1.b Examine firewall and router configurations to verify that inbound and
outbound traffic is limited to that which is necessary for the cardholder data
environment.
1.2.1.c Examine firewall and router configurations to verify that all other inbound
and outbound traffic is specifically denied, for example by using an explicit “deny
all” or an implicit deny after allow statement.
C10.1 1.2.2.a Examine router configuration files to verify they are secured from
unauthorized access.
1.2.3.b Verify that the firewalls deny or, if traffic is necessary for business purposes,
permit only authorized traffic between the wireless environment and the
cardholder data environment.
C19.1
C19.5
C19.1 1.3.1 Examine firewall and router configurations to verify that a DMZ is
implemented to limit inbound traffic to only system components that provide
authorized publicly accessible services, protocols, and ports.
C19.1 1.3.2 Examine firewall and router configurations to verify that inbound Internet
traffic is limited to IP addresses within the DMZ.
C19.1 1.3.3 Examine firewall and router configurations to verify direct connections
inbound or outbound are not allowed for traffic between the Internet and the
cardholder data environment.
C13.5 1.3.4 Examine firewall and router configurations to verify that anti-spoofing
measures are implemented, for example internal addresses cannot pass from the
Internet into the DMZ.
C10.2 1.3.5 Examine firewall and router configurations to verify that outbound traffic from
the cardholder data environment to the Internet is explicitly authorized.
NC 1.3.6 Examine firewall and router configurations to verify that the firewall performs
stateful inspection (dynamic packet filtering). (Only established connections should
be allowed in, and only if they are associated with a previously established session.)
C13.5 1.3.7 Examine firewall and router configurations to verify that system components
C13.10 that store cardholder data are on an internal network zone, segregated from the
DMZ and other untrusted networks.
NC 1.3.8.a Examine firewall and router configurations to verify that methods are in
place to prevent the disclosure of private IP addresses and routing information from
internal networks to the Internet.
1.3.8.b Interview personnel and examine documentation to verify that any
disclosure of private IP addresses and routing information to external entities is
authorized.
Personal firewall software is required for all mobile and/or employee-owned devices
that connect to the Internet (for example, laptops used by employees) when outside
the network, and which are also used to access the network.
Specific configuration settings are defined for personal firewall software.
Personal firewall software is configured to actively run.
Personal firewall software is configured to not be alterable by users of mobile and/or
employee-owned devices.
1.4.b Inspect a sample of mobile and/or employee-owned devices to verify that:
Personal firewall software is installed and configured per the organization’s specific
configuration settings.
Personal firewall software is actively running.
Personal firewall software is not alterable by users of mobile and/or employee-owned
devices.
1.5 Examine documentation and interview personnel to verify that security policies
and operational procedures for managing firewalls are:
Documented,
In use, and
Known to all affected parties
nternal trusted networks. The cardholder data environment is an example of a more sensitive area within an entity’s trusted network.
ee e-mail access, dedicated connections such as business-to-business connections, via wireless networks, or via other sources. Often, seemingly ins
e cardholder data environment to provide firewall functionality, these devices must be included within the scope and assessment of Requirement 1
Identify the document(s) reviewed to verify procedures define the formal processes 0 0 0
for:

Testing and approval of all network connections.
<Report Findings Here>
 6
Testing and approval of all changes to firewall and router configurations.
<Report Findings Here>
Identify the sample of records for network connections that were examined. 0 0 0
<Report Findings Here>
Identify the document examined to verify processes require that the network 0 0 0
diagram is kept current.
<Report Findings Here>

Identify the responsible personnel interviewed for this testing procedure.
<Report Findings Here>

For the interview, summarize the relevant details discussed to verify that the
diagram is kept current. 1
<Report Findings Here>
Identify the data-flow diagram(s) examined. 0 0 0
<Report Findings Here>
Provide the name of the assessor who attests that the current network diagram 0 1 0
identified at 1.1.2.a was compared to the firewall configuration standards identified
at 1.1.4.a to verify they are consistent with each other.
<Report Findings Here> 2
Describe how network configurations were observed to verify that, per the 0 1 0
documented configuration standards and network diagrams, a firewall is in place:

At each Internet connection.
<Report Findings Here>

Between any DMZ and the internal network zone. 2
<Report Findings Here>
For the interview, summarize the relevant details discussed to verify that roles and
responsibilities are assigned as documented for management of firewall and router
components.
<Report Findings Here>
Identify the firewall configuration standards document(s) reviewed to verify the 0 1 0
document(s) contains a list of all services, protocols and ports necessary for
business, including a business justification for each.
<Report Findings Here>
Identify whether any insecure services, protocols or ports are allowed. (yes/no) 0 1 0
<Report Findings Here>
If “yes,” complete the instructions below for EACH insecure service, protocol, and
port allowed: (add rows as needed)
Identify the documented justification.
<Report Findings Here>
2
Identify the firewall and router configuration standards reviewed to verify that
security features are documented for each insecure service/protocol/port.
<Report Findings Here>
If “yes” at 1.1.6.b, complete the following for each insecure service, protocol, 0 1 0
and/or port present (add rows as needed):

Describe how the firewall and router configurations were examined to verify that
the documented security features are implemented for each insecure service,
protocol and/or port.
<Report Findings Here> 2
Identify the firewall and router configuration standards reviewed to verify they 0 0 0
require a review of firewall rule sets at least every six months.
<Report Findings Here>
Identify the document(s) relating to rule set reviews that were examined to verify 0 0 0
that rule sets are reviewed at least every six months for firewall and router rule
sets.
<Report Findings Here>

Identify the responsible personnel interviewed who confirm that rule sets are
completed at least every six months:
 6
Identify the responsible personnel interviewed who confirm that rule sets are
reviewed at least every six months for firewall and router rule sets.
<Report Findings Here>
Left Blank by PCIco 0 1 0
Identify the firewall and router configuration standards reviewed to verify they 0 1 0
identify inbound and outbound traffic necessary for the cardholder data environment.
<Report Findings Here>
2
Describe how firewall and router configurations were examined to verify that the 0 1 0
following traffic is limited to that which is necessary for the cardholder data
environment:

Inbound traffic
<Report Findings Here>
 2
Outbound traffic
<Report Findings Here>
Describe how firewall and router configurations were examined to verify the 0 0 0
following is specifically denied:

All other inbound traffic
<Report Findings Here>

All other outbound traffic 2
<Report Findings Here>
Describe how router configuration files were examined to verify they are secured 0 0 0
from unauthorized access.
<Report Findings Here>
Describe how router configuration files were examined to verify they are 0 0 0
synchronized.
<Report Findings Here> 2
Describe how firewall and router configurations were examined to verify perimeter 0 0 0
firewalls are in place between all wireless networks and the cardholder data
environment.
<Report Findings Here>
Identify whether traffic between the wireless environment and the cardholder data 0 0 0
environment is necessary for business purposes. (yes/no)
<Report Findings Here>

If “no”:

Describe how firewall and/or router configurations were observed to verify firewalls
deny all traffic from any wireless environment into the cardholder environment.
<Report Findings Here>


If “yes”:

Describe how firewall and/or router configurations were observed to verify firewalls 2
permit only authorized traffic from any wireless environment into the cardholder
environment.
<Report Findings Here>
0 0 0
2
Describe how the firewall and router configurations were examined to verify that 0 0 0
the DMZ is implemented to limit inbound traffic to only system components that
provide authorized publicly accessible services, protocols, and ports.
<Report Findings Here>
Describe how the firewall and router configurations were examined to verify that 0 0 0
configurations limit inbound Internet traffic to IP addresses within the DMZ.
<Report Findings Here>
2
Describe how the examined firewall and router configurations were observed to 0 0 0
prevent direct connections between the Internet and the cardholder data
environment:

Inbound
<Report Findings Here>
 2
Outbound
<Report Findings Here>
Describe how observed traffic from the Internet into the DMZ confirms that internal
addresses cannot pass from the Internet into the DMZ.
<Report Findings Here>
2
Describe how firewall and router configurations were examined to verify that 0 1 0
outbound traffic from the cardholder data environment to the Internet is explicitly
authorized.
<Report Findings Here>
Describe how firewall and router configurations were examined to verify that the 0 1 0
firewall performs stateful inspection.
<Report Findings Here>

Describe how observed firewall configurations implement stateful inspection
<Report Findings Here> 2
Describe the methods in place to prevent the disclosure of private IP addresses and 0 1 0
routing information from internal networks to the Internet.
<Report Findings Here>
Describe how firewall and router configurations were examined to verify that
methods are in place to prevent the disclosure of private IP addresses and routing
information from internal networks to the Internet. 2
<Report Findings Here>
Identify the document reviewed that specifies whether any disclosure of private IP 0 1 0
addresses and routing information to external parties is permitted.
<Report Findings Here>

For each permitted disclosure, identify the responsible personnel interviewed who
confirm that the disclosure is authorized.
<Report Findings Here>
Identify whether mobile and/or employee- owned computers with direct connectivity 0 0 0
to the Internet are used to access the organization’s network. (yes/no)
<Report Findings Here>
If “no,” identify the document reviewed that explicitly prohibits mobile and/or
employee- owned computers with direct connectivity to the Internet from being used
to access the organization’s network
<Report Findings Here>
If “yes,” identify the documented policies and configuration standards that define the
following:
Personal firewall software is required for all mobile and/or employee-owned devices
that connect to the Internet when outside the network, and which are also used to
access the network.
Specific configuration settings are defined for personal firewall software. 2
Personal firewall software is configured to actively run.
Personal firewall software is configured to not be alterable by users of mobile and/or
employee-owned devices.
<Report Findings Here>
Identify the sample of mobile and/or employee-owned devices selected for this 0 0 0
testing procedure.
<Report Findings Here>

Describe how the sample of mobile and/or employee-owned devices was inspected to
verify that personal firewall software is:
Installed and configured per the organization’s specific configuration settings.
<Report Findings Here>

Actively running.
<Report Findings Here> 2
Not alterable by users of mobile and/or employee-owned devices.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 0 0 0
procedures for managing firewalls are documented.
<Report Findings Here>
Identify responsible personnel interviewed who confirm that the above documented
security policies and operational procedures for managing firewalls are:
In use 6
Known to all affected parties
<Report Findings Here>
103 0 14 0
trusted network.
r sources. Often, seemingly insignificant paths to and from untrusted networks can provide unprotected pathways into key systems. Firewalls are a
assessment of Requirement 1.
Merchant Type: D
0 0 0 0 1 1 C 0
0 0 0 0 1 1 N 1
0 0 0 0 1 1 N 1
0 1 0 0 1 1 Y 0
0 1 0 0 1 1 Y 0
0 0 0 0 1 1 C 0
0 1 0 0 1 1 N 5
0 1 0 0 1 1 N 5
0 1 0 0 1 1 N 5
0 0 0 0 1 1 N 1
0 0 0 0 1 1 N 7
0 1 0 0 1 1 N 5
0 1 0 0 1 1 Y 0
0 1 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 0 0 1 1 Y 0
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 0 0 1 1 Y 0
0 0 1 0 1 1 Y 0
0 0 1 0 1 1 Y 0
0 0 0 0 1 1 1
0 19 12 10 38 38 Y 32
N
C
NT
NA
nprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.
Name
Go to requirement 1
Return to Table of content
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Malicious individuals (external and internal to an entity) often use vendor default passwords and other vendor default settings to com
2.1 Always change vendor-supplied defaults before Malicious individuals (external and internal to a
installing a system on the network, including but not company) often use vendor default settings,
limited to passwords, simple network management account names, and passwords to compromise
protocol (SNMP) community strings, and systems. These settings are well known in hacker
elimination of unnecessary accounts. communities and leave your system highly
vulnerable to attack.
2.1.1 For wireless environments connected to the Many users install these devices without
cardholder data environment or transmitting management approval and do not change default
cardholder data, change wireless vendor defaults, settings or configure security settings. If wireless
including but not limited to default wireless networks are not implemented with sufficient
encryption keys, passwords, and SNMP security configurations (including changing default
community strings. settings), wireless sniffers can eavesdrop on the
traffic, easily capture data and passwords, and
easily enter and attack your network. In addition,
the key exchange protocol for the older version of
802.11x encryption (WEP) has been broken and can
render the encryption useless. Verify that firmware
for devices are updated to support more secure
protocols (for example, WPA2).
2.2 Develop configuration standards for all system There are known weaknesses with many operating
components. Assure that these standards address systems, databases, and enterprise applications,
all known security vulnerabilities and are consistent and there are also known ways to configure these
with industry-accepted system hardening standards. systems to fix security vulnerabilities. To help those
that are not security experts, security organizations
Sources of industry-accepted system hardening have established system-hardening
standards may include, but are not limited to: recommendations, which advise how to correct
these weaknesses. If systems are left with these
- Center for Internet Security (CIS) weaknesses—for example, weak file settings or
- International Organization for Standardization default services and protocols (for services or
(ISO) protocols that are often not needed)—an attacker
- SysAdmin Audit Network Security (SANS) Institute will be able to use multiple, known exploits to attack
- National Institute of Standards Technology (NIST) vulnerable services and protocols, and thereby gain
access to your organization's network. Source
websites where you can learn more about industry
best practices that can help you implement
configuration standards include, but are not limited
to: www.nist.gov, www.sans.org,
www.cisecurity.org, www.iso.org.
Note: Where virtualization technologies are in 1. A database, which needs to have strong security
use, implement only one primary function per measures in place, would be at risk sharing a server
virtual system component. with a web application, which needs to be open and
directly face the Internet.
2.2.3 Implement additional security features Enabling security features before new servers are
for any required services, protocols, or deployed will prevent servers being installed into
daemons that are considered to be insecure the environment with insecure configurations.
—for example, use secured technologies Ensuring that all insecure services, protocols, and
daemons are adequately secured with appropriate
such as SSH, S-FTP, SSL, or IPSec VPN to security features makes it more difficult for
protect insecure services such as NetBIOS, malicious individuals to take advantage of
file-sharing, Telnet, FTP, etc. commonly used points of compromise within a
network.
2.2.4 Configure system security parameters to This is intended to ensure your organization’s
prevent misuse. system configuration standards and related
processes specifically address security settings and
parameters that have known security implications.
2.2.5 Remove all unnecessary functionality, such The server-hardening standards must include
as scripts, drivers, features, subsystems, file processes to address unnecessary functionality with
systems, and unnecessary web servers. specific security implications (like
removing/disabling FTP or the web server if the
server will not be performing those functions).
2.3 Encrypt all non-console administrative access If remote administration is not done with secure
using strong cryptography. Use technologies such as authentication and encrypted communications,
SSH, VPN, or SSL/TLS for webbased management sensitive administrative or operational level
and other nonconsole administrative access. information (like administrator’s passwords) can be
revealed to an eavesdropper. A malicious individual
could use this information to access the network,
become administrator, and steal data.
revealed to an eavesdropper. A malicious individual
could use this information to access the network,
become administrator, and steal data.
2.4 Maintain an inventory of system Maintaining a current list of all system components
components that are in scope for PCI DSS. will enable an organization to accurately and
efficiently define the scope of their environment for
implementing PCI DSS controls. Without an
inventory, some system components could be
forgotten, and be inadvertently excluded from the
organization’s configuration standards.
2.5 Ensure that security policies and Personnel need to be aware of and following
operational procedures for managing vendor security policies and daily operational procedures to
defaults and other security parameters are ensure vendor defaults and other security
documented, in use, and known to all affected parameters are continuously managed to prevent
insecure configurations.
parties.
2.6 Shared hosting providers must protect each This is intended for hosting providers that provide
entity’s hosted environment and cardholder data. shared hosting environments for multiple clients on
These providers must meet specific requirements as the same server. When all data is on the same
detailed in Appendix A: Additional PCI DSS server and under control of a single environment,
Requirements for Shared Hosting Providers. often the settings on these shared servers are not
manageable by individual clients, allow clients to
add insecure functions and scripts that impact the
security of all other client environments; and
thereby make it easy for a malicious individual to
compromise one client's data and thereby gain
access to all other clients' data.
Go to requirement 3 Executive Summary
t system administrators and security managers have knowledge of common security parameter settings for system components.
ocols
izations document all services and protocols enabled on their system components, justify why they’re active, and verify that controls are implemen
to provide valid business justifications for the use of insecure services, daemons, and protocols, and presenting the documentation for it.
2.1.b For the sample of system components, verify that all unnecessary default
accounts (including accounts used by operating systems, security software,
applications, systems, POS terminals, SNMP, etc.) are removed or disabled.
2.1.c Interview personnel and examine supporting documentation to verify that:
2.1.1.c Examine vendor documentation and login to wireless devices, with system
admin help
2.2.b Verify that system configuration standards are updated as new vulnerability
issues are identified, as defined in Requirement 6.1.
2.2.c Examine policies and interview personnel to verify that system configuration
standards are applied when new systems are configured and verified as being in place
before a system is installed on the network.
2.2.d Verify that system configuration standards include the
following procedures for all types of system components:
Changing of all vendor- supplied defaults and elimination of
unnecessary default accounts
Implementing only one primary function per server to prevent
functions that require different security levels from co-
existing on the same server
Enabling only necessary services, protocols, daemons, etc.,
as required for the function of the system
Implementing additional security features for any required
services, protocols or daemons that are considered to be
insecure
Configuring system security parameters to prevent misuse
Removing all unnecessary functionality, such as scripts,
drivers, features, subsystems, file systems, and unnecessary
web servers
2.2.1.b If virtualization technologies are used, verify that only one primary function
is implemented per virtual system component or device.
C3.3 2.2.2.a Select a sample of system components and inspect enabled system services,
C10.1 daemons, and protocols to verify that only necessary services or protocols are
enabled.
2.2.2.b Identify any enabled insecure services, daemons, or protocols and interview
personnel to verify they are justified per documented configuration standards..
2.2.3 Inspect configuration settings to verify that security features are documented
and implemented for all insecure services, daemons, or protocols.
C3.3 2.2.4.a Interview system administrators and/or security managers to verify that
C10.6 they have knowledge of common security parameter settings for system
components.
2.2.4.b Examine the system configuration standards to verify that common security
parameter settings are included.
2.2.4.c Select a sample of system components and inspect the common security
parameters to verify that they are set appropriately and in accordance with the
configuration standards.
C3.3 2.2.5.a For a sample of system components, verify that all unnecessary functionality
(for example, scripts, drivers, features, subsystems, file systems, etc.) is removed.
2.2.5.c. Examine the documentation and security parameters to verify that only
documented functionality is present on the sampled system components.
C10.6 2.3 Select a sample of system components and verify that non- console administrative
access is encrypted by performing the following:
2.3.a Observe an administrator log on to each system to verify that a strong
encryption method is invoked before the administrator’s password is requested.
2.3.b Review services and parameter files on systems to determine that Telnet and
other insecure remote-login commands are not available for non-console access.
2.3.d Examine vendor documentation and interview personnel to verify that strong
cryptography for the technology in use is implemented according to industry best
practices and/or vendor recommendations.
2.4.a Examine system inventory to verify that a list of hardware and software
components is maintained and includes a description of function/use for each.
2.5 Examine documentation and interview personnel to verify that security policies
and operational procedures for managing vendor defaults and other security
parameters are:
Documented,
In use, and
Known to all affected parties.
NC 2.6 Perform testing procedures A.1.1 through A.1.4 detailed in Appendix A: Additional
PCI DSS Requirements for Shared Hosting Providers for PCI DSS assessments of shared
hosting providers, to verify that shared hosting providers protect their entities’
(merchants and service providers) hosted environment and data.
r communities and are easily determined via public information.
m components.
Identify the vendor manuals and sources on the Internet used to find vendor-supplied
accounts/passwords.
<Report Findings Here>
For each item in the sample, describe how attempts to log on (with system
administrator help) to the sample of devices and applications using default vendor- 2
supplied accounts and passwords were performed to verify that all default passwords
have been changed.
<Report Findings Here>
For each item in the sample of system components indicated at 2.1.a, describe how all 0 1 0
unnecessary default accounts were verified to be either:

Removed
<Report Findings Here>
Disabled 2
<Report Findings Here>
Identify responsible personnel interviewed who verify that: 0 0 0
Identify whether there are wireless environments connected to the cardholder data 0 0 0
environment or transmitting cardholder data. (yes/no)
If “no,” mark 2.1.1 as “Not Applicable” and proceed
to 2.2.
<Report Findings Here>
If “yes”:
Identify responsible personnel interviewed who verify that encryption keys are
changed:
From default at installation
Anytime anyone with knowledge of the keys leaves the company or changes
positions.
<Report Findings Here>

Identify supporting documentation examined for this testing procedure.
<Report Findings Here>
Describe how the supporting documentation was examined to verify that
encryption keys are changed:
2
From default at installation
<Report Findings Here>
Anytime anyone with knowledge of the keys leaves the company or changes
positions.

<Report Findings Here>
Identify responsible personnel interviewed who verify that: 0 0 0
Default SNMP community strings are required to be changed upon installation.
Default passwords/phrases on access points are required to be changed upon
installation.
<Report Findings Here>
Describe how wireless configuration settings were observed with examined vendor
documentation to verify other security-related wireless vendor defaults were
changed, if applicable. 2
<Report Findings Here>
Identify the documented system configuration standards for all types of system 0 1 0
components examined.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify that the 3
process is implemented.
<Report Findings Here>
For each item in the sample, describe how system configurations were inspected to
verify that only one primary function per server is implemented. 3
<Report Findings Here>
IIf “no,” describe how systems were observed to verify that no virtualization
technologies are used.
<Report Findings Here>
If “yes”:

Identify the functions for which virtualization technologies are used.
<Report Findings Here>
Identify the sample of virtual system components or devices observed.
<Report Findings Here>
For each virtual system component and device in the sample, describe how the
system configurations were inspected to verify that only one primary function is
implemented per virtual system component or device.
<Report Findings Here>
3
Identify the sample of system components selected. 0 1 0
<Report Findings Here>
For each item in the sample, describe how the enabled system services, daemons,
and protocols were inspected to verify that only necessary services or protocols are
enabled.
<Report Findings Here> 3
For each item in the sample of system components from 2.2.2.a, identify if any 0 1 0
insecure services, daemons, or protocols are enabled. (yes/no)
If “no,” mark the remainder of 2.2.2.b and 2.2.3 as “Not Applicable.”
<Report Findings Here>
IIf “yes,” identify responsible personnel interviewed who confirm that a
documented business justification was present for each insecure service, daemon, 3
or protocol
<Report Findings Here>
Describe how configuration settings were inspected to verify that security features
for all insecure services, daemons, or protocols are:

Documented
<Report Findings Here> 3
Implemented
<Report Findings Here>
Identify the system administrators and/or security managers interviewed for this 0 1 0
testing procedure.
<Report Findings Here>

For the interview, summarize the relevant details discussed to verify that they have
knowledge of common security parameter settings for system components. 3
<Report Findings Here>
For each item in the sample, describe how the common security parameters were
inspected to verify that they are set appropriately and in accordance with the
configuration standards. 3
<Report Findings Here>
Describe how the security parameters were examined with relevant documentation 0 1 0
to verify that enabled functions are:

Documented
<Report Findings Here>

Support secure configuration 3
<Report Findings Here>
Describe how the security parameters were examined with relevant documentation
to verify that only documented functionality is present on the sampled system
components from 2.2.5.a.
<Report Findings Here> 3
Identify the sample of system components selected for 2.3.a-2.3.d to verify that non- 0 1 0
console administrative access is encrypted
<Report Findings Here>
2
For each item in the sample from 2.3: 0 1 0

Describe how the administrator log on for each system was observed to verify that a
strong encryption method is invoked before the administrator’s password is
requested.
<Report Findings Here>
Describe how system configurations for each system were examined to verify that a
strong encryption method is invoked before the administrator’s password is
requested. 2
<Report Findings Here>
Identify the strong encryption method used for non-console administrative access.
<Report Findings Here>
Describe how parameter files on systems were reviewed to determine that Telnet and
other insecure remote-login commands are not available for non-console access. 2
<Report Findings Here>
Identify the vendor documentation examined to verify that strong cryptography for 0 1 0
the technology in use is implemented according to industry best practices and/or
vendor recommendations.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify that the
documented inventory is kept current.
<Report Findings Here> 2
Identify the document reviewed to verify that security policies and operational 0 0 0
procedures for managing vendor defaults and other security parameters are
documented.
<Report Findings Here>
Identify responsible personnel interviewed who confirm that the above documented
security policies and operational procedures for managing vendor defaults and other
security parameters are:
In use 6
Known to all affected parties
<Report Findings Here>
If “yes,” provide the name of the assessor who attests that Appendix A: Additional PCI
DSS Requirements for Shared Hosting Providers has been completed.
<Report Findings Here>
84 0 22 0
Merchant Type: D
0 1 1 1 1 1 Y 0
0 1 1 1 1 1 N 5
0 1 0 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 0 0 1 1 1 Y 0
0 0 0 1 1 1 N 4
0 0 0 1 1 1 N 4
0 0 0 1 1 1 N 4
0 0 0 1 1 1 N 4
0 0 0 1 1 1 Y 0
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 0 1 1 1 1 N 4
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 1 1 1 1 1 N 5
0 0 0 0 1 1 NT 5
0 0 0 0 1 1 NT 5
0 0 0 1 1 1 NT 1
0 0 0 0 0 1 N 0
0 13 21 29 31 32 Y 123
N
C
NT
NA
Stage of implementation Remediation plan
Estimated date for completion Comments Owner
Return to Table of content Go to requirement 2
Requirement 3: Protect stored cardholder data
Protection methods such as encryption, truncation, masking, and hashing are critical components of cardholder data protection. If an
needed, and not sending unprotected PANs using end-user messaging technologies, such as e-mail and instant messaging.
Please refer to the PCI DSS and PA-DSS Glossary of Terms, Abbreviations, and Acronyms for definitions of “strong cryptography” and o
3.1 Keep cardholder data storage to a minimum by A formal data retention policy identifies what data
implementing data retention and disposal policies, needs to be retained, and where that data resides
procedures and processes, as follows. so it can be securely destroyed or deleted as soon
as it is no longer needed. In order to define
appropriate retention requirements, an entity first
needs to understand their own business needs as
well as any legal or regulatory obligations that apply
to their industry, and/or that apply to the type of
data being retained.
3.2.3 Do not store the personal identification These values should be known only to the card
number (PIN) or the encrypted PIN block. owner or bank that issued the card. If this
prohibited data is stored and subsequently stolen,
malicious individuals can execute fraudulent PIN-
based debit transactions (for example, ATM
withdrawals).
3.3 Mask PAN when displayed (the first six and last The display of full PAN on items such as computer
four digits are the maximum number of digits to be screens, payment card receipts, faxes, or paper
displayed). reports can result in this data being obtained by
unauthorized individuals and used fraudulently. The
Notes: PAN can be displayed in full form on the “merchant
- This requirement does not apply to employees and copy” receipts; however the paper receipts should
other parties with a legitimate business need to see adhere to the same security requirements as
the full PAN. electronic copies and follow the guidelines of the
- This requirement does not supersede stricter PCI Data Security Standard, especially Requirement
requirements in place for displays of cardholder data 9 regarding physical security. The full PAN can also
—for example, for point-of-sale (POS) receipts. be displayed for those with a legitimate business
need to see the full PAN.
3.5 Protect any keys used to secure cardholder data Cryptographic keys must be strongly protected
against disclosure and misuse: because those who obtain access will be able to
decrypt data. Key-encrypting keys, if used, must be
Note: This requirement also applies to key- at least as strong as the data-encrypting key in
encrypting keys used to protect dataencrypting keys order to ensure proper protection of the key that
—such key-encrypting keys must be at least as encrypts the data as well as the data encrypted with
strong as the data-encrypting key. that key.
3.5.2 Store secret and private keys used to Cryptographic keys must be stored securely to
encrypt/decrypt cardholder data in one (or more) of prevent unauthorized or unnecessary access that
the following forms at all times: could result in the exposure of cardholder data.
-Encrypted with a key-encrypting key that is at least It is not intended that the key-encrypting keys be
as strong as the data-encrypting key, and that is encrypted, however they are to be protected
stored separately from the data- encrypting key against disclosure and misuse as defined in
-Within a secure cryptographic device (such as a Requirement 3.5. If key-encrypting keys are used,
host security module (HSM) or PTS-approved point- storing the key-encrypting keys in physically and/or
of-interaction device) logically separate locations from the data-
-As at least two full-length key components or key encrypting keys reduces the risk of unauthorized
shares, in accordance with an industry- accepted access to both keys.
method
3.5.3 Store cryptographic keys securely in the Cryptographic keys must be stored securely, usually
fewest possible locations and forms. encrypted with key-encrypting keys, and stored in
very few locations. It is not intended that the key-
encrypting keys be encrypted, however they are to
be protected against disclosure and misuse as
defined in Requirement 3.5. Storing key-encrypting
keys in physically and/or logically separate locations
from data-encrypting keys reduces the risk of
unauthorized access to both keys.
3.6 Fully document and implement all key- The manner in which cryptographic keys are
management processes and procedures for managed is a critical part of the continued security
cryptographic keys used for encryption of of the encryption solution. A good key management
cardholder data, including the following: process, whether it is manual or automated as part
of the encryption product, is based on industry
Note: Numerous industry standards for key standards and addresses all key elements at 3.6.1
management are available from various resources through 3.6.8.
including NIST, which can be found at
http://csrc.nist.gov.
3.6.1 Generation of strong cryptographic keys The encryption solution must generate strong keys,
as defined in the PCI DSS and PA-DSS Glossary of
Terms, Abbreviations, and Acronyms under "strong
cryptography."
3.6.2 Secure cryptographic key distribution The encryption solution must distribute keys
securely, meaning the keys are not distributed in
the clear, and only to custodians identified in 3.5.1.
3.6.3 Secure cryptographic key storage The encryption solution must store keys securely,
meaning the keys are not stored in the clear
(encrypt them with a key-encryption key).
3.6.4 Cryptographic key changes for keys that have A cryptoperiod is the time span during which a
reached the end of their cryptoperiod (for example, particular cryptographic key can be used for its
after a defined period of time has passed and/or defined purpose. Considerations for defining the
after a certain amount of ciphertext has been cryptoperiod include, but are not limited to, the
produced by a given key), as defined by the strength of the underlying algorithm, size or length
associated application vendor or key owner, and of the key, risk of key compromise, and the
based on industry best practices and guidelines (for sensitivity of the data being encrypted.
example, NIST Special Publication 800-57). Periodic changing of encryption keys when the keys
have reached the end of their cryptoperiod is
imperative to minimize the risk of someone’s
obtaining the encryption keys, and being able to
decrypt data.
If provided by encryption application vendor, follow
the vendor’s documented processes or
recommendations for periodic changing of keys.
The designated key owner or custodian can also
refer to industry best practices on cryptographic
algorithms and key management, for example NIST
Special Publication 800-57, for guidance on the
appropriate cryptoperiod for different algorithms
and key lengths.
The intent of this requirement applies to keys used
to encrypt stored cardholder data, and any
respective key-encrypting keys.
3.6.5 Retirement or replacement (for example, Old keys that are no longer used or needed should
archiving, destruction, and/or revocation) of keys be retired and destroyed to ensure that the keys
as deemed necessary when the integrity of the can no longer be used. If old keys need to be kept
key has been weakened (for example, departure (to support archived, encrypted data, for example)
of an employee with knowledge of a clear-text they should be strongly protected. (See 3.6.6
key), or keys are suspected of being below.) The encryption solution should also allow
compromised. for and facilitate a process to replace keys that are
known to be, or suspected of being, compromised.
Note: If retired or replaced cryptographic keys
need to be retained, these keys must be securely
archived (for example, by using a key encryption
key). Archived cryptographic keys should only be
used for decryption/verification purposes.
3.6.6 If manual clear-text cryptographic key Split knowledge and dual control of keys are used to
management operations are used, these operations eliminate the possibility of one person’s having
must be managed using split knowledge and dual access to the whole key. This control is applicable
control (for example, requiring two or three people, for manual key management operations, or where
each knowing only their own key component, to key management is not implemented by the
reconstruct the whole key). encryption product.
Note: Examples of manual key management
operations include, but are not limited to: key
generation, transmission, loading, storage and
destruction.
3.6.7 Prevention of unauthorized substitution of The encryption solution should not allow for or
cryptographic keys. accept substitution of keys coming from
unauthorized sources or unexpected processes.
3.6.8 Requirement for cryptographic key custodians This process will ensure individuals that act as key
to formally acknowledge that they understand and custodians commit to the key- custodian role and
accept their key-custodian responsibilities. understand the responsibilities.
3.7 Ensure that security policies and Personnel need to be aware of and following
operational procedures for protecting stored security policies and documented operational
cardholder data are documented, in use, and procedures for managing the secure storage of
known to all affected parties. cardholder data on a continuous basis.
Go to requirement 4Executive Summary
ents of cardholder data protection. If an intruder circumvents other security controls and gains access to encrypted data, without the proper crypto
-mail and instant messaging.
team, not a single one involved cardholder data “in transit” between systems. However, two-thirds of data breaches involved data “at rest.”
is rendered unreadable via hashes, truncation, strong encryption or tokenization. Just 47.5% of companies were compliant with all four validation t
NC 3.1 Obtain and examine the policies, procedures and processes for data retention and
disposal, and perform the following:
NC 3.1.1.a Verify that policies and procedures are implemented and include legal,
regulatory, and business requirements for data retention, including specific
requirements for retention of cardholder data (for example, cardholder data needs
to be held for X period for Y business reasons).
3.1.1.b Verify that policies and procedures include provisions for secure disposal of
data when no longer needed for legal, regulatory, or business reasons, including
disposal of cardholder data.
3.1.1.c Verify that policies and procedures include coverage for all storage of
cardholder data.
NA 3.2.a For issuers and/or companies that support issuing services and store sensitive
authentication data, verify there is a business justification for the storage of sensitive
authentication data, and that the data is secured.
3.2.b For issuers and/or companies that support issuing services and store sensitive
authentication data, examine data stores and system configurations to verify that the
sensitive authentication data is secured.
3.2.c For all other entities, if sensitive authentication data is received, review policies
and procedures, and examine system configurations to verify the data is not retained
after authorization.
3.2.d For all other entities, if sensitive authentication data is received, review
procedures and examine the processes for securely deleting the data to verify that the
data is unrecoverable.
NA 3.2.1 For a sample of system components, examine data sources, including but not
limited to the following, and verify that the full contents of any track from the
magnetic stripe on the back of card or equivalent data on a chip are not stored
under any circumstance:
NA 3.2.3 For a sample of system components, examine data sources, including but not
limited to the following and verify that PINs and encrypted PIN blocks are not
stored under any circumstance:
3.3.b Examine system configurations to verify that full PAN is only displayed for
users/roles with a documented business need, and that PAN is masked for all other
requests.
3.3.c Examine displays of PAN for example, on screen, on paper receipts) to verify that
PANs are masked when displaying cardholder data, and that only those with a
legitimate business need are able to see full PAN.
C17.7 3.4.a Examine documentation about the system used to protect the PAN, including the
C8.4 vendor, type of system/process, and the encryption algorithms (if applicable) to verify
that the PAN is rendered unreadable using any of the following methods:
One-way hashes based on strong cryptography,
Truncation
Index tokens and pads, with the pads being securely stored
Strong cryptography, with associated key- management processes and procedures.
3.4.b Examine several tables or files from a sample of data repositories to verify the
PAN is rendered unreadable (that is, not stored in plain-text).
3.4.c Examine a sample of removable media (for example, back-up tapes) to confirm
that the PAN is rendered unreadable.
3.4.d Examine a sample of audit logs to confirm that the PAN is rendered unreadable
or removed from the logs.
NC 3.4.1.a If disk encryption is used, verify that logical access to encrypted file systems
is implemented via a mechanism that is separate from the native operating systems
mechanism (for example, not using local user account databases).
3.4.1.b Verify that cryptographic keys are stored securely (for example, stored on
removable media that is adequately protected with strong access controls).
3.4.1.c Examine the configurations and observe the processes to verify that
cardholder data on removable media is encrypted wherever stored.
3.5.2.b Examine system configurations and key storage locations to verify that
cryptographic keys used to encrypt/decrypt cardholder data exist in one (or more) of
the following form at all times.
3.5.2.c Wherever key-encrypting keys are used, examine system configurations and
key storage locations to verify:
Key-encrypting keys are at least as strong as the data- encrypting keys they protect
Key-encrypting keys are stored separately from data- encrypting keys.
NC 3.5.3 Examine key storage locations and observe processes to verify that keys are
stored in the fewest possible locations.
NC 3.6.a Additional Procedure for service providers: If the service provider shares keys
with their customers for transmission or storage of cardholder data, examine the
documentation that the service provider provides to their customers to verify that it
includes guidance on how to securely transmit, store, and update customers’ keys, in
accordance with Requirements 3.6.1 through 3.6.8 below.
3.6.bExamine the key-management procedures and processes for keys used for
encryption of cardholder data and perform the following:
NC 3.6.1.a Verify that key- management procedures specify how to generate strong
keys.
3.6.1.b Observe the method for generating keys to verify that strong keys are
generated
NC 3.6.2.a Verify that key- management procedures specify how to securely distribute
keys.
3.6.2.b Observe the method for distributing keys to verify that keys are distributed
securely.
NC 3.6.3.a Verify that key- management procedures specify how to securely store keys.
3.6.3.b Observe the method for storing keys to verify that keys are stored securely.
NC 3.6.4.a Verify that key-management procedures are implemented to require
periodic key changes at the end of the defined cryptoperiod.
3.6.4.b Interview personnel to verify that keys are changed at the end of the
defined cryptoperiod(s).
Split knowledge of keys, such that key components are under the control
of at least two people who only have knowledge of their
own key components; AND
Dual control of keys, such that at least two people are
required to perform any key- management operations and
no one person has access to the authentication materials
(for example, passwords or keys) of another.
3.6.6 b Interview personnel and/or observe processes to verify that manual clear-
text keys are managed with:
Split knowledge, AND
Dual control
NC 3.6.8.a Verify that key- management procedures specify processes for key
custodians to acknowledge (in writing or electronically) that they understand and
accept their key-custodian responsibilities.
3.6.8.b Observe documentation or other evidence showing that key custodians have
acknowledged (in writing or electronically) that they understand and accept their
key-custodian responsibilities.
3.7 Examine documentation interview personnel to verify that security policies and
operational procedures for protecting stored cardholder data are:
Documented,
In use, and
Known to all affected parties.
pted data, without the proper cryptographic keys, the data is unreadable and unusable to that person. Other effective methods of protecting stored
For the interview, summarize the relevant details discussed that verify the following:
All locations of stored cardholder data are included in the data-retention and disposal
process.
<Report Findings Here>
The quarterly automatic or manual process is performed for all locations of cardholder
data.
<Report Findings Here>
Describe the quarterly process in place to identify and securely delete stored
cardholder data, including whether it is an automatic or manual process.
<Report Findings Here>
For each item in the sample, describe how files and system records were examined to
verify that the data stored does not exceed the requirements defined in the data-
retention policy.
<Report Findings Here>
Describe how the deletion mechanism was observed to verify data is deleted securely.
<Report Findings Here>
Identify whether the assessed entity is an issuer or supports issuing service. (yes/no) 1 0
<Report Findings Here>
If “yes,” complete the responses for 3.2.a and 3.2.b and mark 3.2.c and 3.2.d as “Not
Applicable.” If “no,” mark the remainder of 3.2.a and 3.2.b as “Not Applicable” and
proceed to 3.2.c and 3.2.d.
Identify the documentation reviewed to verify there is a documented business
justification for the storage of sensitive authentication data.
<Report Findings Here>
Identify the interviewed personnel who confirm there is a documented business
justification for the storage of sensitive authentication data.
<Report Findings Here>
For the interview, summarize the relevant details of the business justification
described.
<Report Findings Here>
If “yes” at 3.2.a, 1 0
Describe how the data stores and system configurations were examined to verify that
the sensitive authentication data is secured.
<Report Findings Here>
Describe how system configurations were examined to verify the data is not retained
after authorization.
<Report Findings Here>
Identify the document(s) reviewed to verify that it defines processes for securely 2 0
deleting the data to verify that the data is unrecoverable.
<Report Findings Here>
Describe how the processes for securely deleting the data were examined to verify
that the data is unrecoverable.
<Report Findings Here>
For each data source type below from the sample of system of components examined,
summarize the specific examples of each data source type observed to verify that the
full contents of any track from the magnetic stripe on the back of card or equivalent
data on a chip are not stored after authorization. If that type of data source is not
present, indicate that in the space.

Incoming transaction data
<Report Findings Here>
Trace files
<Report Findings Here>
Database schemas
<Report Findings Here>
Database contents
<Report Findings Here>
For each data source type below from the sample of system of components at 3.2.1, 1 0
summarize the specific examples of each data source type observed. If that type of
data source is not present, indicate that in the space.
Trace files
<Report Findings Here>
Database schemas
<Report Findings Here>
Database contents
<Report Findings Here>
A list of roles that need access to displays of full PAN is documented, together with a
legitimate business need for each role to have such access.
PAN must be masked when displayed such that only personnel with a legitimate
business need can see the full PAN.
All other roles not specifically authorized to see the full PAN must only see masked
PANs.
<Report Findings Here>
Only those with a legitimate business need are able to see full PAN.
<Report Findings Here>
Identify the documentation about the system used to protect the PAN 5 0
examined.
<Report Findings Here>
Identify which of the following methods is used to render the PAN unreadable:
One-way hashes based on strong cryptography
Truncation
Index token and pads, with the pads being
securely stored
Strong cryptography, with associated key- management processes and
procedures
<Report Findings Here>
Identify the tables or files examined for each item in the sample of data
repositories.
<Report Findings Here>
For each item in the sample, describe how the table or file was examined to
verify the PAN is rendered unreadable.
<Report Findings Here>
For each item in the sample, describe how the sample of removable media
was examined to confirm that the PAN is rendered unreadable.
<Report Findings Here>
For each item in the sample, describe how the sample of audit logs was
examined to confirm that the PAN is rendered unreadable or removed from
the logs.
<Report Findings Here>
Identify whether disk encryption is used. (yes/no) 5 0
<Report Findings Here>
For each disk encryption mechanism in use, describe how the configuration
was inspected and the authentication process observed to verify that logical
access to encrypted file systems is separate from the native operating
system’s authentication mechanism.
<Report Findings Here>
Describe how processes were observed to verify that cryptographic keys are 5 0
stored securely.
<Report Findings Here>
Identify the personnel interviewed who confirm that cryptographic keys are
stored securely.
<Report Findings
Identify the Here> examined.
configurations 5 0
<Report Findings Here>
Describe how user access lists were examined to verify that access to keys is
restricted to the fewest number of custodians necessary.
<Report Findings Here>
Provide the name of the assessor who attests that all locations where keys are 5 0
stored were identified.
<Report Findings Here>
Describe how system configurations and key storage locations were examined
to verify that cryptographic keys used to encrypt/decrypt cardholder data
must only exist in one (or more) of the following forms at all times.
Encrypted with a key-encrypting key that is at least as strong as the data-
encrypting key, and that is stored separately from the data-encrypting key.
Within a secure cryptographic device (such as a host security module (HSM) or
PTS- approved point-of-interaction device).
As key components or key shares, in accordance with an industry-accepted
method.
<Report Findings Here>
Describe how system configurations and key storage locations were examined 5 0
to verify that, wherever key-encrypting keys are used:

Key-encrypting keys are at least as strong as the data-encrypting keys they
protect
<Report Findings Here>
Identify whether the assessed entity is a service provider that shares keys with their 5 0
customers for transmission or storage of cardholder data. (yes/no)
<Report Findings Here>

If “yes,”

Identify the document that the service provider provides to their customers examined
to verify that it includes guidance on how to securely transmit, store and update
customers’ keys, in accordance with Requirements 3.6.1 through 3.6.8 below.
<Report Findings Here>
Describe how the method for generating strong keys was observedto verify that 6 0
strong keys are generated
<Report Findings Here>
Describe how the method for distributing keys was observed to verify that keys are 6 0
distributed securely.
<Report Findings Here>
Describe how the method for storing keys was observed to verify that keys are stored 6 0
securely.
<Report Findings Here>
Identify the document that defines: 5 0
Key cryptoperiod(s) for each key type in use
A process for key changes at the end of the defined cryptoperiod(s)
<Report Findings Here>
Identify personnel interviewed for this testing procedure who confirm that keys are 6 0
changed at the end of the defined cryptoperiod(s).
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify the following
processes are implemented:
Keys are retired or replaced as necessary when the integrity of the key has been
weakened, including when someone with knowledge of the key leaves the company.
<Report Findings Here>
Any keys retained after retiring or replacing are not used for encryption operations.
<Report Findings Here>
Identify the document examined to verify that manual clear-text key-management 5 0
procedures define processes for the use of the following:
Split knowledge of keys, such that key components are under the control of at least
two people who only have knowledge of their own key components; AND
Dual control of keys, such that at least two people are required to perform any key-
management operations and no one person has access to the authentication materials
of another.
<Report Findings Here>
For the interview, summarize the relevant details discussed and/or describe how
processes were observed to verify the following processes are implemented:
Split knowledge
<Report Findings Here>
Dual Control
<Report Findings Here>
For the interview, summarize the relevant details discussed and/or describe how
processes were observed to verify that unauthorized substitution of keys is prevented.
<Report Findings Here>
Identify responsible personnel interviewed who confirm that the above documented
security policies and operational procedures for protecting stored cardholder data
are:
In use 6
Known to all affected parties
<Report Findings Here>
192 0
tive methods of protecting stored data should be considered as potential risk mitigation opportunities. For example, methods for minimizing risk in
0 0 0 0 0 0 1 1 N 6
0 1 0 0 0 0 1 1 Y 0
0 1 0 0 0 0 1 1 N 6
0 1 0 0 0 0 1 1 N 6
0 0 1 0 0 1 1 1 N 6
0 0 1 0 0 1 1 1 N 6
1 0 1 1 1 1 1 1 N 6
0 0 1 1 1 1 1 1 N 5
0 0 1 1 0 1 1 1 N 6
1 1 1 1 1 1 1 1 N 6
1 0 1 1 1 1 1 1 N 6
0 1 1 1 1 1 1 1 N 2
0 0 1 1 1 1 1 1 N 2
0 0 1 1 0 1 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 NT 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 0 1 N 0
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 1
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 1
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 1
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 1
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 0 0 0 0 0 1 1 N 2
0 1 0 0 0 0 1 1 N 1
3 6 10 8 6 10 45 46 Y 122
N
C
NT
NA
methods for minimizing risk include not storing cardholder data unless absolutely necessary, truncating cardholder data if full PAN is not
Name 1
Return to Table of content Go to requirement 3
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Sensitive information must be encrypted during transmission over networks that are easily accessed by malicious individuals. Misconfi
4.1 Use strong cryptography and security protocols Sensitive information must be encrypted during
(for example, SSL/TLS, IPSEC, SSH, etc.) to safeguard transmission over public networks, because it is
sensitive cardholder data during transmission over easy and common for a malicious individual to
open, public networks, including the following: intercept and/or divert data while in transit.
-Only trusted keys and certificates are accepted. Secure transmission of cardholder data requires
-The protocol in use only supports secure versions using trusted keys/certificates, a secure protocol for
or configurations. transport, and proper encryption strength to
-The encryption strength is appropriate for the encrypt cardholder data. Connection requests from
encryption methodology in use. systems that do not support the required
encryption strength, and that would result in an
insecure connection, should not be accepted.
Note that some protocol implementations (such as
SSL v2.0, SSH v1.0 and TLS 1.0) have known
vulnerabilities that an attacker can use to gain
control of the affected system. Whichever security
protocol is used, ensure it is configured to use only
secure versions and configurations to prevent use of
an insecure connection. For example, TLS v1.1, or
later, certificates obtained from a recognized, public
certificate authority and supporting only strong
encryption, may be considered.
Verifying that certificates are trusted (for example,
have not expired and are issued from a trusted
source) helps ensure the integrity of the secure
connection.
4.1.1 Ensure wireless networks transmitting Malicious users use free and widely available
cardholder data or connected to the cardholder tools to eavesdrop on wireless communications.
data environment, use industry best practices (for Use of strong cryptography can limit disclosure of
example, IEEE 802.11i) to implement strong sensitive information across the network. Many
encryption for authentication and transmission. known compromises of cardholder data stored
only in the wired network originated when a
Note: The use of WEP as a security control was malicious user expanded access from an insecure
prohibited as of 30 June 2010. wireless network. Examples of wireless
implementations requiring strong cryptography
include but are not limited to GPRS, GSM, WIFI,
satellite, and Bluetooth.
4.2 Never send unprotected PANs by end-user E-mail, instant messaging, and chat can be easily
messaging technologies (for example, e-mail, intercepted by packet-sniffing during delivery
instant messaging, chat, etc.). traversal across internal and public networks. Do
not utilize these messaging tools to send PAN unless
they provide strong encryption.
4.3 Ensure that security policies and Personnel need to be aware of and following
operational procedures for encrypting security policies and operational procedures for
transmissions of cardholder data are managing the secure transmission of cardholder
documented, in use, and known to all affected data on a continuous basis.
parties.
Go to requirement 5 Executive Summary
etworks
cessed by malicious individuals. Misconfigured wireless networks and vulnerabilities in legacy encryption and authentication protocols continue to b
4.1.b Review documented policies and procedures to verify processes are specified for
the following:
For acceptance of only trusted keys and/or certificates
For the protocol in use to only support secure versions and configurations (that
insecure versions or configurations are not supported)
For implementation of proper encryption strength per the encryption methodology
in use
4.1.c Select and observe a sample of inbound and outbound transmissions as they
occur to verify that all cardholder data is encrypted with strong cryptography during
transit.
4.1.d Examine keys and certificates to verify that only trusted keys and/or certificates
are accepted.
4.1.e Examine system configurations to verify that the protocol is implemented to use
only secure configurations and does not support insecure versions or configurations.
4.1.f Examine system configurations to verify that the proper encryption strength is
implemented for the encryption methodology in use. (Check vendor
recommendations/best practices.)
NA 4.2.a If end-user messaging technologies are used to send cardholder data, observe
processes for sending PAN and examine a sample of outbound transmissions as they
occur to verify that PAN is rendered unreadable or secured with strong cryptography
whenever it is sent via end-user messaging technologies.
4.2.b Review written policies to verify the existence of a policy stating that
unprotected PANs are not to be sent via end-user messaging technologies.
4.3 Examine documentation interview personnel to verify that security policies and
operational procedures for encrypting transmissions of cardholder data are:
Documented,
In use, and
Known to all affected parties.
hentication protocols continue to be targets of malicious individuals who exploit these vulnerabilities to gain privileged access to cardholder data e
Identify all locations where cardholder data is transmitted or received over open, 2 ### 1
public networks.
<Report Findings Here>
Describe how the documented standards were examined and compared to system
configurations to verify the use of:
Security protocols observed in use
<Report Findings Here>
Identify the document reviewed to verify that processes are specified for the 2 ### 1
following:
For acceptance of only trusted keys and/or certificates.
For the protocol in use to only support secure versions and configurations (that
insecure versions or configurations are not supported).
For implementation of proper encryption strength per the encryption
methodology in use.
<Report Findings Here>
Describe the sample of inbound and outbound transmissions observed as they 2 ### 1
occurred.
<Report Findings Here>
Describe how the samples of inbound and outbound transmissions were observed
as they occurred to verify that all cardholder data is encrypted with strong
cryptography during transit.
<Report Findings Here>
For all instances where cardholder data is transmitted or received over open, public 2 ### 1
networks:
Describe the mechanisms used to ensure that only trusted keys and/or certificates
are accepted.
<Report Findings Here>
Describe how the mechanisms were observed to accept only trusted keys and/or
certificates.
<Report Findings Here>
For all instances where cardholder data Is transmitted or received over open, public 2 ### 1
networks, describe how system configurations were observed to verify that the
protocol is implemented:
To use only secure configurations.
<Report Findings Here>
Identify whether SSL/TLS use to encrypt cardholder date over open, public networks 2 ### 0
at all in the cardholder date environment. (yes/no)
<Report Findings Here>
If “yes,” for all instances where SSL/TLS is used to encrypt cardholder data over
open, public networks, describe how system configurations were examined to verify
that SSL/TLS is enabled whenever cardholder data is transmitted or received, as
follows:
HTTPS appears as part of the browser URL.
<Report Findings Here>
Cardholder is only requested if HTTPS appears as part of the URL.
<Report Findings Here>
identify all wireless networks transmitting cardholder data or connected to the 2 ### 0
cardholder data environment.
<Report Findings Here>
Identify whether end-user messaging technologies are used to send cardholder 2 ### 0
data. (yes/no)
<Report Findings Here>
f “no,” mark the remainder of 4.2.a as “Not Applicable” and proceed to 4.2.b. If
“yes,” complete the following:
Describe how processes for sending PAN were observed to verify that PAN is
rendered unreadable or secured with strong cryptography whenever it is sent via
end-user messaging technologies.
<Report Findings Here>
Describe the sample of outbound transmissions observed as they occurred to verify
that PAN is rendered unreadable or secured with strong cryptography whenever it
is sent via end-user messaging technologies.
<Report Findings Here>
If “no” at 4.2.a: 2 ### 1
Identify the policy document stating that unprotected PANs must not be sent via
end- user messaging technologies.
<Report Findings Here>
If “yes” at 4.2.a:
Identify the policy document that explicitly prohibits PAN from being sent via end-
user messaging technologies under any circumstance.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational ### 0
procedures for encrypting transmissions of cardholder data are documented.
<Report Findings Here>
26 0 6
ed access to cardholder data environments.
ed Merchant Type: D
0 0 1 1 1 1 1 N 5
0 0 1 1 1 1 1 Y 0
0 0 1 1 1 1 1 Y 0
0 0 1 1 1 1 1 N 5
0 0 1 1 1 1 1 N 5
0 0 0 0 1 1 1 N 5
0 0 0 0 0 1 1 N 5
0 0 1 1 1 1 1 N 5
0 1 0 0 0 1 1 N 5
1 1 1 1 1 1 1 NT 5
0 0 0 0 0 1 1 N 1
1 2 7 7 8 11 11 Y 41
N
C
NT
NA
Stage of implementation Remediation plan
Estimated date for completion Comments Owner
Return to Table of content Go to requirement 4
Requirement 5: Use and regularly update anti-virus software or programs
Malicious software, commonly referred to as “malware”—including viruses, worms, and Trojans—enters the network during many bu
5.1 Deploy anti-virus software on all systems There is a constant stream of attacks using widely
commonly affected by malicious software published exploits, often "0 day" (published and
(particularly personal computers and servers). spread throughout networks within an hour of
discovery) against otherwise secured systems.
Without anti-virus software that is updated
regularly, these new forms of malicious software
can attack and disable your network.
Malicious software may be unknowingly
downloaded and/or installed from the internet, but
computers are also vulnerable when using
removable storage devices such as CDs and DVDs,
USB memory sticks and hard drives, digital cameras,
personal digital assistants (PDAs) and other
peripheral devices. Without anti-virus software
installed, these computers may become access
points into your network, and/or maliciously target
information within the network.
5.1.2 For systems considered to be not commonly Typically, mainframes, mid-range computers
affected by malicious software, perform periodic (such as AS/400) and similar systems may not
evaluations to identify and evaluate evolving currently be commonly targeted or affected by
malware threats in order to confirm whether malware. However, industry trends for malicious
such systems continue to not require anti-virus software can change quickly, so it is important for
software. organizations to be aware of new malware that
might affect their systems—for example, by
monitoring vendor security notices and anti-virus
news groups to determine whether their systems
might be coming under threat from new and
evolving malware.
Trends in malicious software should be included
in the identification of new security
vulnerabilities, and methods to address new
trends should be incorporated into the
company's configuration standards and
protection mechanisms as needed
5.2 Ensure that all anti-virus mechanisms are Even the best anti-virus solutions are limited in
maintained as follows: effectiveness if they are not maintained and kept
Are kept current, current with the latest security updates, signature
Perform periodic scans files, or malware protections.
Audit logs provide the ability to monitor virus and
Generate audit logs which are malware activity and anti-malware reactions. Thus,
retained per PCI DSS Requirement 10.7. it is imperative that anti-malware solutions be
configured to generate audit logs and that these
logs be managed in accordance with Requirement
10.
5.3 Ensure that all anti-virus mechanisms are Anti-virus that continually runs and is unable to be
current, actively running, and generating audit logs. altered will provide persistent security against
malware.
Use of policy-based controls on all systems to
ensure anti-malware protections cannot be altered
or disabled will help prevent system weaknesses
from being exploited by malicious software.
Additional security measures may also need to be
implemented for the period of time during which
anti-virus protection is not active—for example,
disconnecting the unprotected system from the
Internet while the anti-virus protection is disabled,
and running a full scan after it is re-enabled.
5.4 Ensure that security policies and Personnel need to be aware of and following
operational procedures for protecting systems security policies and operational procedures to
against malware are documented, in use, and ensure systems are protected from malware on a
known to all affected parties. continuous basis.
Go to requirement 6 Executive Summary
ns—enters the network during many business approved activities including employee e-mail and use of the Internet, mobile computers, and storag
was 56.4%.
5.1.2 Interview personnel to verify that evolving malware threats are monitored
and evaluated for systems not currently considered to be commonly affected by
malicious software, in order to confirm whether such systems continue to not
require anti-virus software.
5.2.a Examine policies and procedures to verify that anti-virus software and
definitions are required to be kept up to date.
C5.2 5.3.a Examine anti-virus configurations, including the master installation of the
software and a sample of system components, to verify the anti-virus software is
actively running.
5.3.c Interview responsible personnel and observe processes to verify that anti-virus
software cannot be disabled or altered by users, unless specifically authorized by
management on a case-by-case basis for a limited time period.
5.4 Examine documentation and interview personnel to verify that security policies
and operational procedures for protecting systems against malware are:
Documented,
In use, and
Known to all affected parties.
net, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be used on all systems c
Identify the sample of system components observed (include all operating system 0 1 0
types commonly affected by malicious software).
For each sampled system component, describe how anti-virus software was
observed to be deployed.
<Report Findings Here>
2
Identify the vendor documentation reviewed to verify that anti-virus programs: 0 1 0
Detect all known types of malicious software,
Remove all known types of malicious software, and
Protect against all known types of malicious software.
<Report Findings Here>
Identify the documented policies and procedures examined to verify that anti-virus 0 1 0
software and definitions are required to be kept up to date.
<Report Findings Here>
2
Identify the sample of system components selected for this testing procedure. 0 1 0
<Report Findings Here>
For each item in the sample, describe how anti-virus configurations, including the
master installation of the software, were examined to verify that:
For each item in the sample from 5.3.a, describe how anti-virus configurations, 0 1 0
including the master installation of the software, were examined to verify that the
anti-virus software cannot be disabled or altered by users.
<Report Findings Here> 2
Identify the responsible personnel interviewed who confirm that anti-virus software 0 1 0
cannot be disabled or altered by users, unless specifically authorized by
management on a case-by-case basis for a limited time period.
<Report Findings Here>
Describe how the process was observed to verify that anti-virus software cannot be
disabled or altered by users, unless specifically authorized by management on a 2
case-by-case basis for a limited time period.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 0 0 0
procedures for protecting systems against malware are documented.
<Report Findings Here>
26 0 10 0
must be used on all systems commonly affected by malware to protect systems from current and evolving malicious software threats.
Merchant Type: D
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 NT 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0 1 1 1 1 N 5
0 0
1 1 1 1 Y 0
0 0 0 0 1 1 1
NT
0 0 10 10 11 11 Y 46
N
C
NT
NA
malicious software threats.
6.1 Ensure that all system components and software There are a considerable amount of attacks using
are protected from known vulnerabilities by having widely published exploits, often "0 day" (published
the latest vendor-supplied security patches within the hour) against otherwise secured systems.
installed. Install critical security patches within one Without implementing the most recent patches on
month of release. critical systems as soon as possible, a malicious
individual can use these exploits to attack and
Note: An organization may consider applying a risk- disable the network. Consider prioritizing changes
based approach to prioritize their patch installations. such that critical security patches on critical or at-
For example, by prioritizing critical infrastructure risk systems can be installed within 30 days, and
(for example, public-facing devices and systems, other less-risky changes are installed within 2-3
databases) higher than less-critical internal devices, months.
to ensure high-priority systems and devices are
addressed within one month, and addressing less
critical devices and systems within three months.
6.2 Establish a process to identify and assign a risk The intention of this requirement is that
ranking to newly discovered security vulnerabilities. organizations keep up-to-date with new
vulnerabilities that may impact their environment.
Notes:
- Risk rankings should be based on industry best While it is important to monitor vendor
practices. For example, criteria for ranking “High” announcements for news of vulnerabilities and
risk vulnerabilities may include a CVSS base score of patches related to their products, it is equally
4.0 or above, and/or a vendor-supplied patch important to monitor common industry
classified by the vendor as “critical,” and/or a vulnerability news groups and mailing lists for
vulnerability affecting a critical system component. vulnerabilities and potential workarounds that may
- The ranking of vulnerabilities as defined in 6.2.a is not yet be known or resolved by the vendor.
considered a best practice until June 30, 2012, after
which it becomes a requirement. Once an organization identifies a vulnerability that
could affect their environment, the risk that
vulnerability poses must be evaluated and ranked.
This implies that the organization has some method
in place to evaluate vulnerabilities and assign risk
rankings on a consistent basis. While each
organization will likely have different methods for
evaluating a vulnerability and assigning a risk rating
based on their unique CDE, it is possible to build
upon common industry accepted risk ranking
systems, for example CVSS. 2.0, NIST SP 800-30, etc.
6.3 Develop software applications (internal and Without the inclusion of security during the
external, and including webbased administrative requirements definition, design, analysis, and
access to applications) in accordance with PCI DSS testing phases of software development, security
(for example, secure authentication and logging), vulnerabilities can be inadvertently or maliciously
and based on industry best practices. Incorporate introduced into the production environment.
information security throughout the software
development life cycle. These processes must
include the following:
6.3.1 Removal of custom application accounts, Custom application accounts, user IDs, and
user IDs, and passwords before applications passwords should be removed from production
become active or are released to customers code before the application becomes active or
is released to customers, since these items
may give away information about the
functioning of the application. Possession of
such information could facilitate compromise
of the application and related cardholder data.
6.3.2 Review custom code prior to release to Security vulnerabilities in custom code are
production or customers in order to identify any commonly exploited by malicious individuals to gain
potential coding vulnerability (using either access to a network and compromise cardholder
manual or automated processes) to include at data.
least the following:
- Code changes are reviewed by individuals Code reviews may be performed manually, or with
other than the originating code author, and by the assistance of automated review tools.
individuals knowledgeable about code-review Automated review tools have functionality that
techniques and secure coding practices. reviews code for common coding mistakes and
- Code reviews ensure code is developed vulnerabilities. While automated review is useful, it
according to secure coding guidelines should not generally be relied upon as the sole
- Appropriate corrections are implemented prior means of code review. An individual knowledgeable
to release. and experienced in code review should be involved
-Code-review results are reviewed and approved in the review process in order to identify code
by management prior to release. issues that are difficult or even impossible for an
automated tool to identify. Assigning code reviews
to someone other than the developer of the code
allows an independent, objective review to be
performed.
6.4 Follow change control processes and procedures Without proper change controls, security features
for all changes to system components. The could be inadvertently or deliberately omitted or
processes must include the following: rendered inoperable, processing irregularities could
occur, or malicious code could be introduced.
6.4.1 Separate development/test and production Due to the constantly changing state of
environments development and test environments, they tend to
be less secure than the production environment.
Without adequate separation between
environments it may be possible for the production
environment, and cardholder data, to be
compromised due to vulnerabilities in a test or
development environment.
6.4.2 Separation of duties between Reducing the number of personnel with access to
development/test and production environments the production environment and cardholder data
minimizes risk and helps ensure that access is
limited to those individuals with a business need
to know.
6.4.3 Production data (live PANs) are not used for Security controls are usually not as stringent in the
testing or development development environment. Use of production data
provides malicious individuals with the opportunity
to gain unauthorized access to production data
(cardholder data).
Payment card brands and many acquires are able to
provide account numbers suitable for testing in the
event that you need realistic PANs to test system
functionality prior to release.
6.4.4 Removal of test data and accounts before Test data and accounts should be removed from
production systems become active production code before the application becomes
active, since these items may give away
information about the functioning of the
application. Possession of such information could
facilitate compromise of the application and
related cardholder data.
6.4.5 Change control procedures for the Without proper change controls, security features
implementation of security patches and software could be inadvertently or deliberately omitted or
modifications. Procedures must include the rendered inoperable, processing irregularities could
following: occur, or malicious code could be introduced.
Likewise, a change may negatively affect security
functionality of a system necessitating the change
to be backed out.
6.4.5.3 Functionality testing to verify that the Thorough testing should be performed to verify that
change does not adversely impact the security of the security of the environment is not reduced by
the system. implementing a change. Testing should validate that
all existing security controls remain in place, are
replaced with equally strong controls, or are
strengthened after any change to the environment.
For custom code changes, testing includes verifying
that no coding vulnerabilities have been introduced
by the change.
6.5 Address common coding vulnerabilities in The application layer is high-risk and may be
software-development processes as follows: targeted by both internal and external threats.
- Train developers in secure coding techniques, Requirements 6.5.1 through 6.5.10 are the
including how to avoid common coding minimum controls that should be in place, and
vulnerabilities, and understanding how sensitive organizations should incorporate the relevant
data is handled in memory. secure coding practices as applicable to the
- Develop applications based on secure coding particular technology in their environment.
guidelines.
Application developers should be properly trained
to identify and resolve issues related to these (and
other) common coding vulnerabilities. Having staff
knowledgeable of secure coding guidelines should
minimize the number of security vulnerabilities
introduced through poor coding practices. Training
for developers may be provided in-house or by third
parties and should be applicable for technology
used.
As industry-accepted secure coding practices
change, organizational coding practices and
developer training should likewise be updated to
address new threats—for example, memory
scraping attacks.
6.5.1 Injection flaws, particularly SQL injection. Validate input to verify user data cannot modify
Also consider OS Command Injection, LDAP and meaning of commands and queries. Injection
XPath injection flaws as well as other injection flaws, particularly SQL injection, are a commonly
flaws. used method for compromising applications.
Injection occurs when user-supplied data is sent
to an interpreter as part of a command or query.
The attacker's hostile data tricks the interpreter
into executing unintended commands or
changing data, and allows the attacker to attack
components inside the network through the
application, to initiate attacks such as buffer
overflows, or to reveal both confidential
information and server application functionality.
This is also a popular way to conduct fraudulent
transactions on commerce-enabled web sites.
Information from requests should be validated
before being sent to the application – for
example, by checking for all alpha characters, mix
of alpha and numeric characters, etc.
6.5.2 Buffer overflow Ensure that applications are not vulnerable to
buffer overflow attacks. Buffer overflows happen
when an application does not have appropriate
bounds checking on its buffer space. To exploit a
buffer overflow vulnerability, an attacker would
send an application a larger amount of
information than one of its particular buffers is
able to handle. This can cause the information in
the buffer to be pushed out of the buffer’s
memory space and into executable memory
space. When this occurs, the attacker has the
ability to insert malicious code at the end of the
buffer and then push that malicious code into
executable memory space by overflowing the
buffer. The malicious code is then executed and
often enables the attacker remote access to the
application and/or infected system.
6.5.6 All “High” vulnerabilities identified in the Any high vulnerabilities noted per Requirement
vulnerability identification process (as defined in 6.2 that could affect the application should be
PCI DSS Requirement 6.2). accounted for during the development phase. For
example, a vulnerability identified in a shared
Note: This requirement is considered a best library or in the underlying operating system
practice until June 30, 2012, after which it should be evaluated and addressed prior to the
becomes a requirement. application being released to production.
6.5.9 Cross-site request forgery (CSRF) Do not reply on authorization credentials and
tokens automatically submitted by browsers. A
CSRF attack forces a logged-on victim's browser
to send a pre- authenticated request to a
vulnerable web application, which then forces the
victim's browser to perform a hostile action to
the benefit of the attacker. CSRF can be as
powerful as the web application that it attacks.
6.5.10 Broken authentication and session Secure authentication and session management
management prevents unauthorized individuals from
compromising legitimate account credentials,
keys, or session tokens that would otherwise
enable the intruder to assume the identity of an
authorized user.
6.6 For public-facing web applications, address Attacks on web-facing applications are common and
new threats and vulnerabilities on an ongoing often successful, and are allowed by poor coding
basis and ensure these applications are protected practices. This requirement for reviewing
against known attacks by either of the following applications or installing web-application firewalls is
methods: intended to greatly reduce the number of
compromises on public-facing web applications that
- Reviewing public-facing web applications via result in breaches of cardholder data.
manual or automated application vulnerability
security assessment tools or methods, at least Manual or automated vulnerability security
annually and after any changes assessment tools or methods that review and/or
- Installing a web-application firewall in front of scan for application vulnerabilities can be used to
public-facing web applications satisfy this requirement
y of these vulnerabilities are fixed by vendor provided security patches, which must be installed by the entities that manage the systems. All critical
fficiently to determine that the patches do not conflict with existing security configurations. For in-house developed applications, numerous vulnerabi
e organizations we analyzed.
ecure coding techniques] is relatively simple to comply with, given the wealth of resources in secure coding available from major vendors such as M
that test data, accounts and user IDs are removed before the system goes live — a one-off activity that’s relatively easy to incorporate into launch
blematic areas of identifying and managing vulnerabilities and the associated changes on an ongoing basis. For example, 6.1.a (renumbered 6.2 in D
with only 49.5% compliance.
t problem areas, because they’re rarely well documented and automated.
and verification of changes. Change-management features, such as functionality testing and change impact assessment documentation, were not i
6.1.b Examine policies related to security patch installation to verify they require
installation of all critical new security patches within one month.
C4.5 6.2.a Interview responsible personnel to verify that processes are implemented to
identify new security vulnerabilities, and that a risk ranking is assigned to such
vulnerabilities. (At minimum, the most critical, highest risk vulnerabilities should be
ranked as “High.”)
6.2.b Verify that processes to identify new security vulnerabilities include using
outside sources for security vulnerability information.
C6.6 6.3.a Obtain and examine written software development processes to verify that the
C19.4 processes are based on industry standards and/or best practices.
Identify the documented policies and procedures examined to verify that the
following are defined:
Development/test environments are separate from production environments with
access control in place to enforce separation.
A separation of duties between personnel assigned to the development/test
environments and those assigned to the production environment.
Production data (live PANs) are not used for testing or development.
Test data and accounts are removed before a production system becomes active.
Change-control procedures related to implementing security patches and software
modifications are documented.
C20.7 6.4.1.a Examine network documentation and network device configurations to verify
that the development/test environments are separate from the production
environment(s)
6.4.1.b Examine access controls settings to verify that access controls are in place to
enforce separation between the development/test environments and the production
environment(s).
Identify the access control settings examined for this testing procedure.

NC 6.4.2 There is a separation of duties between personnel assigned to the
development/test environments and those assigned to the production
environment.
NC 6.4.3.a Observe testing processes and interview personnel to verify procedures are
in place to ensure production data (live PANs) are not used for testing or
development.
6.4.3.b Examine a sample of test data to verify production data (live PANs) is not
used for testing or development.
NC 6.4.4.a Observe testing processes and interview personnel to verify test data and
accounts are removed before a production system becomes active.
6.4.4.b Examine a sample of data and accounts from production systems recently
installed or updated to verify test data and accounts are removed before the
system becomes active.
C6.3 6.4.5.3.a For each sampled change, verify that functionality testing is performed to
verify that the change does not adversely impact the security of the system.
6.4.5.3.b For custom code changes, verify that all updates are tested for compliance
with PCI DSS Requirement 6.5 before being deployed into production.
NC 6.4.5.4 Verify that back-out procedures are prepared for each sampled change.
C6.7 6.5.a Examine software-development policies and procedures to verify that training in
secure coding techniques is required for developers, based on industry best practices
and guidance.
6.5.b Interview a sample of developers and obtain evidence that they are
knowledgeable in secure coding techniques.
6.5.c Examine records of training to verify that software developers received training
on secure coding techniques, including how to avoid common coding vulnerabilities,
and understanding how sensitive data is handled in memory.
6.5.d. Verify that processes are in place to protect applications from, at a minimum,
the following vulnerabilities:
C6.1 6.5.1 Injection flaws, particularly SQL injection. (Validate input to verify user data
cannot modify meaning of commands and queries, utilize parameterized queries,
etc.)
NC 6.5.2 Buffer overflow (Validate buffer boundaries and truncate input strings.)
C6.1 6.5.7 Cross-site scripting (XSS) (Validate all parameters before inclusion, utilize
context-sensitive escaping, etc.)
NC 6.5.8 Improper Access Control, such as insecure direct object references, failure to
restrict URL access, and directory traversal (Properly authenticate users and sanitize
input. Do not expose internal object references to users.)
C6.1 6.5.9 Cross-site request forgery (CSRF). (Do not reply on authorization credentials
and tokens automatically submitted by browsers.)
6.5.10 Examine software development policies and procedures and interview
responsible personnel to verify that broken authentication and session
management are addressed via coding techniques that commonly include:
-Flagging session tokens (for example cookies) as “secure”
-Not exposing session IDs in the URL
-Incorporating appropriate time-outs and rotation of session IDs after a successful
login.
C13.12 6.6 For public-facing web applications, ensure that either one of the following
C6.1 methods are in place as follows:
C6.3
C11.6 - Verify that public-facing web applications are reviewed (using either manual or
automated vulnerability security assessment tools or methods), as follows:
- At least annually
- After any changes
- By an organization that specializes in application security
- That all vulnerabilities are corrected
- That the application is re-evaluated after the corrections
- Verify that a web-application firewall is in place in front of public-facing web
applications to detect and prevent web-based attacks.
Note: “An organization that specializes in application security” can be either a third-
party company or an internal organization, as long as the reviewers specialize in
application security and can demonstrate independence from the development team.
6.7 Examine documentation and interview personnel to verify that security policies
and operational procedures for developing and maintaining secure systems and
applications are:
-Documented,
-In use, and
-Known to all affected parties.
hat manage the systems. All critical systems must have the most recently released, appropriate software patches to protect against exploitation and
d applications, numerous vulnerabilities can be avoided by using standard system development processes and secure coding techniques.
Selected Merchant Ty
ssment documentation, were not in place in about half of the organizations assessed.
Identify the sample of system components and related software selected for this 0 1
testing procedure.
<Report Findings Here>
Identify the vendor security patch list reviewed.
<Report Findings Here>
For each item in the sample, describe how the list of security patches installed on
each system was compared to the most recent vendor security-patch list to verify
that:
Applicable critical vendor-supplied security patches are installed within one month
of release.
All applicable vendor-supplied security patches are installed within an appropriate
time frame. 3
<Report Findings Here>
For the interview, summarize the relevant details discussed to verify that written
software development processes are implemented. 3
<Report Findings Here>
Identify the documented software-development processes examined to verify 0 0
processes define that pre-production and/or custom application accounts, user IDs
and/or passwords are removed before an application goes into production or is
released to customers.
<Report Findings Here>
For the interview, summarize the relevant details discussed to confirm that pre-
production and/or custom application accounts, user IDs and/or passwords are 3
removed before an application goes into production or is released to customers.
<Report Findings Here>
Identify the responsible personnel interviewed for this testing procedure who
confirm that all custom application code changes are reviewed as follows:
Code changes are reviewed by individuals other than the originating code author,
and by individuals who are knowledgeable in code-review techniques and secure
coding practices.
Code reviews ensure code is developed according to secure coding guidelines (see
PCI DSS Requirement 6.5). 3
Appropriate corrections are implemented prior to release.
Code-review results are reviewed and approved by management prior to release.
Describe how all custom application code changes must be reviewed, including
whether processes are manual or automated.
<Report Findings Here>
Identify the sample of recent custom application changes selected for this testing 0 0
procedure.
<Report Findings Here>
For each item in the sample, describe how code review processes were observed to
verify custom application code is reviewed as follows:
Code changes are reviewed by individuals other than the originating code author.
<Report Findings Here>
Identify the access control settings examined for this testing procedure. 0 0
<Report Findings Here>
Describe how the access control settings were examined to verify that access
controls are in place to enforce separation between the development/test
environments and the production environment(s). 3
<Report Findings Here>
Identify the personnel assigned to development/test environments interviewed 0 0
who confirm that separation of duties is in place between development/test
environments and the production environment.
<Report Findings Here>
Describe how processes were observed to verify that separation of duties is in place
between development/test environments and the production environment.
<Report Findings Here>
Identify the personnel interviewed who confirm that procedures are in place to 0 0
ensure production data (live PANs) are not used for testing or development.
<Report Findings Here>
Describe how testing processes were observed to verify procedures are in place to
ensure production data (live PANs) are not used for testing.
<Report Findings Here>
Describe how testing processes were observed to verify procedures are in place to 3
ensure production data (live PANs) are not used for development.
<Report Findings Here>
Describe how a sample of test data was examined to verify production data (live 0 0
PANs) is not used for testing.
<Report Findings Here>
Describe how a sample of test data was examined to verify production data (live
PANs) is not used for development. 3
<Report Findings Here>.
Identify the personnel interviewed who confirm that test data and accounts are 0 0
removed before a production system becomes active.
<Report Findings Here>
Describe how testing processes were observed to verify that test data is removed
before a production system becomes active.
<Report Findings Here>
Describe how testing processes were observed to verify that test accounts are 3
removed before a production system becomes active.
<Report Findings Here>
Describe how a sample of test data from production systems recently installed or 0 0
updated was examined to verify test data is removed before the system becomes
active.
<Report Findings Here>
Describe how a sample of test accounts from production systems recently installed
or updated was examined to verify test accounts are removed before the system 3
becomes active.
<Report Findings Here>
For each item in the sample, identify the sample of changes and the related change 6
control documentation selected for this testing procedure (through 6.4.5.4)
<Report Findings Here>
For each change from 6.4.5.b, describe how the changes were traced back to the 0 1
identified related change control documentation to verify that documentation of
impact is included in the change control documentation for each sampled change.
<Report Findings Here> 6
For each change from 6.4.5.b, describe how the changes were traced back to the 0 1
identified related change control documentation to verify that documented
approval by authorized parties is present in the change control documentation for
each sampled change. 6
<Report Findings Here>
For each change from 6.4.5.b, describe how the changes were traced back to the 0 1
identified related change control documentation to verify that the change control
documentation for each sampled change includes evidence that functionality
testing is performed to verify that the change does not adversely impact the
security of the system.
<Report Findings Here> 6
Identify the sample of system components selected for this testing procedure. 0 1
<Report Findings Here>
For each item in the sample, identify the sample of custom code changes and the
related change control documentation selected for this testing procedure.
<Report Findings Here>
Describe how the custom code changes were traced back to the identified related
change control documentation to verify that the change control documentation for
each sampled custom code change includes evidence that all updates are tested for 6
compliance with PCI DSS Requirement 6.5 before being deployed into production.
<Report Findings Here>
For each change from 6.4.5.b, describe how the changes were traced back to the 0 1
identified related change control documentation to verify that back-out procedures
are prepared for each sampled change and present in the change control
documentation for each sampled change.
<Report Findings Here> 6
Identify the document requiring that developers are trained in secure coding 0 0
techniques.
<Report Findings Here>
3
Identify the industry best practices and guidance that training is based on.
<Report Findings Here>
For the interview, summarize the relevant details discussed to verify that they are
knowledgeable in secure coding techniques. 3
<Report Findings Here>
Identify the records of training that were examined to verify that software 0 0
developers received training on secure coding techniques, including how to avoid
common coding vulnerabilities, and understanding how sensitive data is handled in
memory.
<Report Findings Here>
Identify the responsible personnel interviewed to verify that processes are in place
to protect applications from, at a minimum, the following vulnerabilities:
<Report Findings Here>
3
IFor the interviews at 6.5.d, summarize the relevant interview details that confirm 0 1
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that injection flaws are addressed by coding techniques that
include:
Validating input to verify user data cannot modify meaning of commands and
queries.
Utilizing parameterized queries.
<Report Findings Here>
3
For the interviews at 6.5.d, summarize the relevant interview details that confirm 0 1
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that buffer overflows are addressed by coding techniques that
include:
For the interviews at 6.5.d, summarize the relevant interview details that confirm 0 0
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that insecure cryptographic storage is addressed by coding
techniques that:
3
Prevent cryptographic flaws.
Use strong cryptographic algorithms and keys.
<Report Findings Here>
For the interviews at 6.5.d, summarize the relevant interview details that confirm 0 0
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that insecure communications are addressed by coding techniques
that properly:
For the interviews at 6.5.d, summarize the relevant interview details that confirm 0 0
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that applications are not vulnerable to “High” vulnerabilities, as
identified in PCI DSS Requirement 6.1.
<Report Findings Here> 3
Identify whether web applications and application interfaces are present. (yes/no) 0 1
<Report Findings Here>
For the interviews at 6.5.d, summarize the relevant interview details that confirm
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that cross-site scripting (XSS) is addressed by coding techniques
that include: 3
For the interviews at 6.5.d, summarize the relevant interview details that confirm
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that improper access control is addressed by coding techniques
that include:
Proper authentication of users.
Sanitizing input.
Not exposing internal object references to users.
User interfaces that do not permit access to unauthorized functions.
<Report Findings Here> 3
Identify whether web applications and application interfaces are present. (yes/no) 0 1
<Report Findings Here>
For the interviews at 6.5.d, summarize the relevant interview details that confirm
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that cross-site request forgery (CSRF) is addressed by coding
techniques that ensure applications do not rely on authorization credentials and 3
tokens automatically submitted by browsers.
<Report Findings Here>
Identify whether web applications and application interfaces are present. (yes/no) 0 1
<Report Findings Here>
Indicate whether this ROC is being completed prior to June 30, 2015. (yes/no)
<Report Findings Here>
If “yes” AND the assessed entity does not have this in place ahead of the
requirement’s effective date, mark the remainder of 6.5.10 as “Not Applicable.”
If “no” OR if the assessed entity has this in place ahead of the requirement’s
effective date, complete the following:
For the interviews at 6.5.d, summarize the relevant interview details that confirm
processes are in place, consistent with the software development documentation at
6.5.d, to ensure that broken authentication and session management are addressed
via coding techniques that protect credentials and session IDs, including: 3
Identify the documented processes that were examined to verify that public-facing
web applications are reviewed using the tools and/or methods indicated above, as
follows:
At least annually.
After any changes.
By an organization that specializes in application security.
That, at a minimum, all vulnerabilities in Requirement 6.5 are included in the
assessment.
That all vulnerabilities are corrected
That the application is re-evaluated after the corrections.
<Report Findings Here>
Identify the responsible personnel interviewed who confirm that public-facing web
applications are reviewed, as follows:
At least annually.
After any changes.
By an organization that specializes in application security.
That, at a minimum, all vulnerabilities in Requirement 6.5 are included in the
assessment.
That all vulnerabilities are corrected.
That the application is re-evaluated after the corrections.
<Report Findings Here>
3
3
Identify the records of application security assessments examined for this testing
procedure.
<Report Findings Here>
If an automated technical solution that detects and prevents web-based attacks (for
example, a web-application firewall) is indicated above:
Describe the automated technical solution in use that detects and prevents web-
based attacks.
Identify the responsible personnel interviewed who confirm that the above
automated technical solution in use to detect and prevent web-based attacks is in
place as follows:
Is situated in front of public-facing web applications to detect and prevent web-
based attacks.
Is actively running and up-to-date as applicable.
Is generating audit logs.
Is configured to either block web-based attacks, or generate an alert.
<Report Findings Here>
Describe how the system configuration settings were examined to verify that the
above automated technical solution is use to detect and prevent web-based attacks
is in place as follows:
150 0 17
ct against exploitation and compromise of cardholder data by malicious individuals and malicious software.
g techniques.
d Merchant Types D
0 0 1 1 1 1 1
N 4
0 0 1 1 1 1 1
N 4
0 0 1 1 1 1 1
N 4
0 0 1 1 1 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
0 0 0 0 0 1 1
N 4
N 4
0 0 0 0 0 1 1
Y 0
0 0 4 4 4 42 42 Y 143
N
C
NA
NT
Stage of implementation Remediation plan
Estimated date for completion Comments Owner
Return to Table of content Go to Req 6
Requirement 7: Restrict access to cardholder data by business need to know
To ensure critical data can only be accessed by authorized personnel, systems and processes must be in place to limit access based on
“Need to know” is when access rights are granted to only the least amount of data and privileges needed to perform a job.
7.1Limit access to system components and The more people who have access to cardholder
cardholder data to only those individuals whose job data, the more risk there is that a user’s account will
requires such access. Access limitations must be used maliciously. Limiting access to those with a
include the following: legitimate business reason for the access helps an
organization prevent mishandling of cardholder
data through inexperience or malice.
7.1.1 Define access needs for each role, including: In order to limit access to cardholder data to only
System components and data resources that each those individuals who need such access, first it is
role needs to access for their job function necessary to define access needs for each role (for
Level of privilege required (for example, user, example, system administrator, call center
administrator, etc.) for accessing resources. personnel, store clerk), the systems/devices/data
each role needs access to, and the level of privilege
each role needs to effectively perform assigned
tasks. Once roles and corresponding access needs
are defined, individuals can be granted access
accordingly.
7.1.2 Restrict access to privileged user IDs to least When assigning privileged IDs, it is important to
privileges necessary to perform job responsibilities. assign individuals only the privileges they need to
perform their job (the “least privileges”). For
example, the database administrator or backup
administrator should not be assigned the same
privileges as the overall systems administrator.
example, the database administrator or backup
administrator should not be assigned the same
privileges as the overall systems administrator.
7.1.3 Assign access based on individual Once needs are defined for user roles (per PCI DSS
personnel’s job classification and function. requirement 7.1.1), it is easy to grant individuals
access according to their job classification and
function by using the already-created roles.
7.2 Establish an access control system for systems Without a mechanism to restrict access based on
components with multiple users that restricts access user’s need to know, a user may unknowingly be
based on a user’s need to know, and is set to “deny granted access to cardholder data. Use of an
all” unless specifically allowed. automated access control system or mechanism is
This access control system must include the essential to manage multiple users. This system
following: should be established in accordance with your
organization’s access control policy and processes
(including “need to know” and “role-based access
control”), should manage access to all system
components, and should have a default “deny-all”
setting to ensure no one is granted access until and
unless a rule is established specifically granting such
access.
user’s need to know, a user may unknowingly be
granted access to cardholder data. Use of an
automated access control system or mechanism is
essential to manage multiple users. This system
should be established in accordance with your
organization’s access control policy and processes
7.2.1 Coverage of all system components (including “need to know” and “role-based access
control”), should manage access to all system
components, and should have a default “deny-all”
setting to ensure no one is granted access until and
unless a rule is established specifically granting such
access.
must be in place to limit access based on need to know and according to job responsibilities.
ges needed to perform a job.
n of automated access-control systems (7.1.4) to cover all system components (7.2.1), with “deny all” set by default (7.2.3).
C12.1.1 7.1.a Examine written policy for access control, and verify that the policy incorporates
7.1.1 through 7.1.4 as follows:
- Defining access needs and privilege assignments for each role
- Restriction of access to privileged user IDs to least privileges
necessary to perform job responsibilities
- Assignment of access based on individual personnel’s job
classification and function
- Documented approval (electronically or in writing) by
authorized parties for all access, including listing of specific privileges approved.
7.1.1 Select a sample of roles and verify access needs for each role are defined and
include:
System components and data resources that each role needs to access for their job
function
Identification of privilege necessary for each role to perform their job function.
C12.6 7.1.2.a Interview personnel responsible for assigning access to verify that access to
C12.7 privileged user IDs is:
-Assigned only to roles that specifically require such privileged access
-Restricted to least privileges necessary to perform job responsibilities.
7.1.2.b Select a sample of user IDs with privileged access and interview responsible
management personnel to verify that privileges assigned are:
Necessary for that individual’s job function
Restricted to least privileges necessary to perform job responsibilities.
NC 7.1.3 Select a sample of user IDs and interview responsible management personnel
to verify that privileges assigned are based on that individual’s job classification and
function.
NC 7.1.4 Select a sample of user IDs and compare with documented approvals to verify
that:
- Documented approval exists for the assigned privileges
- The approval was by authorized parties
-That specified privileges match the roles assigned to the individual.
C12.14 7.2 Examine system settings and vendor documentation to verify that an access
C15.3 control system is implemented as follows:
NC 7.2.1 Confirm that access control systems are in place on all system components.
C12.14 7.2.2 Confirm that access control systems are configured to enforce privileges
assigned to individuals based on job classification and function.
NC 7.2.3 Confirm that the access control systems have a default “deny-all” setting.
7.3 Examine documentation interview personnel to verify that security policies and
operational procedures for restricting access to cardholder data are:
Documented,
In use, and
Known to all affected parties.
efault (7.2.3).
Selected Merchant Ty
Identify the written policy for access control that was examined to verify the policy 4 0
incorporates 7.1.1 through 7.1.4 as follows:
Defining access needs and privilege assignments for each role.
Restriction of access to privileged user IDs to least privileges necessary to perform
job responsibilities.
Assignment of access based on individual personnel’s job classification and
function
Documented approval (electronically or in writing) by authorized parties for all
access, including listing of specific privileges approved.
<Report Findings Here>
For each role in the selected sample, describe how the role was examined to verify
access needs for each role are defined and include:
<Report Findings Here>
System components and data resources that each role needs to access for their job
function.
<Report Findings Here>
Identification of privilege necessary for each role to perform their job function.
<Report Findings Here>
For the interview, summarize the relevant details discussed to confirm that
privileges assigned to each user ID in the selected sample are:
Identify the sample of user IDs examined for this testing procedure. 4 0
<Report Findings Here>
Identify the sample of user IDs examined for this testing procedure. 4 0
<Report Findings Here>
Describe how each item in the sample of user IDs was compared with documented
approvals to verify that:
Documented approval exists for the assigned privileges.
<Report Findings Here>
Describe how system settings were examined with the vendor documentation to
verify that access control systems are in place on all system components.
<Report Findings Here>
Describe how system settings were examined with the vendor documentation at 4 0
7.2.1 to verify that access control systems are configured to enforce privileges
assigned to individuals based on job classification and function.
<Report Findings Here>
Describe how system settings were examined with vendor documentation at 7.2.1 4 0
to verify that access control systems have a default “deny-all” setting.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 0
procedures for restricting access to cardholder data are documented.
<Report Findings Here>
46 0
cted Merchant Type D
0 0 1 1 1 1 1 1 NT 3
0 0 0 0 0 1 1 1 Y 0
1 0 1 1 1 1 1 1 C 0
1 0 1 1 1 1 1 1 C 0
1 0 1 1 1 1 1 1 C 0
0 0 0 0 0 0 1 1 N 3
0 0 0 0 0 0 1 1 C 0
0 0 0 0 0 0 1 1 C 0
0 0 0 0 0 0 1 1 C 0
0 0 0 0 0 0 1 1 C 0
0 0 0 0 0 0 1 1 N 1
3 0 4 4 4 5 11 11 Y 7
N
C
NA
NT
Stage of implementation Remediation plan
Estimated date for completion Comments Owner
Return to Table of content Go to Req 7
Requirement 8: Identify and authenticate access to system components
Assigning a unique identification (ID) to each person with access ensures that each individual is uniquely accoun
Major Observations from the 2014 Verizon PCI Compliance report:
-According to our RISK team’s assessments, only 24.2% of organizations that suffered a security breach were compliant with Requirem
-Average compliance with Requirement 8: 84,1%
-Seven of the subcontrols (8.5.10.b, 8.5.12.b, 8.5.13.b, 8.5.9.b, 8.4.b, 8.5.11.b, 8.5.7) are met with over 90% compliance.
-But a mere 57.4% of organizations complied with 8.5.1, which governs the addition, deletion, and modification of IDs and credentials
-62.4% of organizations complied with 8.5.15, which specifies that idle sessions expire after no more than 15 minutes
-62.4% of organizations complied with 8.5.13.a, which requires that users are locked out after no more than six failed login attempts
-55.4% complied with both (8.5.15 and 8.5.13.a ), 13.9% with just one, and 30.7% with neither.
8.1 Define and implement policies and By ensuring each user is uniquely identified—
procedures to ensure proper user identification instead of using one ID for several employees—
management for non- consumer users and an organization can maintain individual
administrators on all system components as responsibility for actions and an effective audit
follows: trail per employee. This will help speed issue
resolution and containment when misuse or
malicious intent occurs.
8.1.3 Immediately revoke access for any terminated If an employee has left the company, and still has
users. access to the network via their user account,
unnecessary or malicious access to cardholder data
could occur. This access could happen from the
former employee or from a malicious user who
exploits the older and/or unused account. Consider
implementing a process with Human Resources for
immediate notification when an employee is
terminated so that the user account can be quickly
deactivated.
8.1.4 Remove/disable inactive user accounts at least Existence of inactive accounts allows an
every 90 days. unauthorized user exploit the unused account to
potentially access cardholder data.
8.1.5 Manage IDs used by vendors to access, Allowing vendors to have 24/7 access into your
support, or maintain system components via network in case they need to support your systems
remote access as follows: increases the chances of unauthorized access,
- Enabled only during the time period needed and either from a user in the vendor’s environment or
disabled when not in use. from a malicious individual who finds and uses this
- Monitored when in use. always-available external entry point into your
network. Enabling access only for the time periods
needed, and disabling it as soon as it is no longer
needed, helps prevent misuse of these connections.
Monitoring of vendor access provides assurance
that vendors are accessing only the systems
necessary and only during approved time frames.
8.1.6 Limit repeated access attempts by locking out Without account-lockout mechanisms in place, an
the user ID after not more than six attempts. attacker can continually attempt to guess a
password through manual or automated tools (for
example, password cracking), until they achieve
success and gain access to a user’s account.
8.1.7 Set the lockout duration to a minimum of 30 If an account is locked out due to someone
minutes or until administrator enables the user ID. continually trying to guess a password, controls to
delay reactivation of these locked accounts stops
the malicious individual from continually guessing
the password (they will have to stop for a minimum
of 30 minutes until the account is reactivated).
Additionally, if reactivation must be requested, the
admin or help desk can validate that the account
owner is the cause (from typing errors) of the
lockout.
8.1.8 If a session has been idle for more than 15 When users walk away from an open machine with
minutes, require the user to re-authenticate to re- access to critical network or cardholder data, that
activate the terminal or session. machine may be used by others in the user’s
absence, resulting in unauthorized account access
and/or account misuse.
8.2 In addition to assigning a unique ID, ensure These authentication methods, when used in
proper user-authentication management for non- addition to unique IDs, help protect users’ IDs from
consumer users and administrators on all system being compromised, since the one attempting the
components by employing at least one of the compromise needs to know both the unique ID and
following methods to authenticate all users: the password (or other authentication used). Note
-Something you know, such as a password or that a digital certificate is a valid option for
passphrase “something you have” as long as it is unique for a
-Something you have, such as a token device or particular user.
smart card Since one of the first steps a malicious individual
-Something you are, such as a biometric. will take to compromise a system is to exploit weak
or nonexistent passwords, it is important to
implement good processes for authentication
management.
8.2.1 Using strong cryptography, render all Many network devices and applications transmit the
authentication credentials (such as user ID and unencrypted password across the
passwords/phrases) unreadable during network and/or also store the passwords without
transmission and storage on all system encryption. A malicious individual can easily
intercept the unencrypted or readable user ID and
components. password during transmission using a “sniffer,” or
directly access the user IDs and unencrypted
passwords in files where they are stored, and use
this stolen data to gain unauthorized access. During
transmission, the user credentials can be encrypted
or the tunnel can be encrypted
8.2.2 Verify user identity before modifying any Many malicious individuals use "social
authentication credential—for example, engineering”—for example, calling a help desk and
performing password resets, provisioning new acting as a legitimate user—to have a password
tokens, or generating new keys. changed so they can utilize a user ID. Consider use
of a “secret question” that only the proper user can
answer to help administrators identify the user
prior to re-setting passwords. Ensure such questions
are secured properly and not shared.
8.2.3 Passwords/phrases must meet the following: Strong passwords/phrases are the first line of
-Require a minimum length of at least seven defense into a network since a malicious individual
characters. will often first try to find accounts with weak or
-Contain both numeric and alphabetic characters. non- existent passwords. If passwords are short or
simple to guess, it is relatively easy for a malicious
Alternatively, the passwords/phrases must have individual to find these weak accounts and
complexity and strength at least equivalent to the compromise a network under the guise of a valid
parameters specified above. user ID.
This requirement specifies that a minimum of seven
characters and both numeric and alphabetic
characters should be used for passwords/phrases.
For cases where this minimum cannot be met due
to technical limitations, entities can use “equivalent
strength” to evaluate their alternative. NIST SP 800-
63-1 defines “entropy” as “a measure of the
difficulty of guessing or determining a password or
key.” This document and others that discuss
“password entropy” can be referred to for more
information on applicable entropy value and for
understanding equivalent password strength
variability for passwords/phrases of different
formats.
8.2.4 Change user passwords at least every 90 Strong passwords are the first line of defense into a
days. network since a malicious individual will often first
try to find accounts with weak or non-existent
passwords. There is more time for a malicious
individual to find these weak accounts, and
compromise a network under the guise of a valid
user ID, if passwords are short, simple to guess, or
valid for a long time without a change. Strong
passwords can be enforced and maintained per
these requirements by enabling the password and
account security features that come with your
operating system (for example, Windows),
networks, databases and other platforms.
8.2.5 Do not allow an individual to submit a new If password history isn’t maintained, the
password that is the same as any of the last four effectiveness of changing passwords is reduced, as
passwords he or she has used. previous passwords can be reused over and over.
Requiring that passwords cannot be reused for a
period of time reduces the likelihood that
passwords that have been guessed or brute-forced
will be used in the future.
8.2.6 Set passwords for first-time use and resets If the same password is used for every new user set
to a unique value for each user and change up, an internal user, former employee, or malicious
immediately after the first use. individual may know or easily discover this
password, and use it to gain access to accounts.
8.3 Incorporate two-factor authentication for Two-factor authentication requires two forms of
remote network access originating from authentication for higher-risk accesses, such as
outside the network by personnel (including those originating from outside your network. For
users and administrators) and all third parties, additional security, your organization can also
consider using two-factor authentication when
(including vendor access for support or accessing networks of higher security from
maintenance). networks of lower security—for example, from
corporate desktops (lower security) to production
servers/databases with cardholder data (high
security).
This requirement is intended to apply to users that
have remote access to the network, where that
remote access could lead to access to the
cardholder data environment.
8.5 Do not use group, shared, or generic accounts If multiple users share the same authentication
and passwords, or other authentication methods. credentials (for example, user account and
password), it becomes impossible to trace system
access and activities to an individual. This in turn
prevents an entity from assigning accountability for,
or having effective logging of, an individual’s
actions, since a given action could have been
performed by anyone in the group that has
knowledge of the authentication credentials.
8.5.1 Additional requirement for service providers: To prevent the compromise of multiple customers
Service providers with remote access to customer through the use of a single set of credentials,
premises (for example, for support of POS systems vendors with remote access accounts to customer
or servers) must use a unique authentication environments should use a different authentication
credential (such as a password/phrase) for each credential for each customer.
customer. Technologies, such as two-factor mechanisms, that
provide a unique credential for each connection (for
example, via a single-use password) could also meet
the intent of this requirement.
8.6 Where other authentication mechanisms are If user authentication mechanisms such as tokens,
used (for example, physical or logical security smart cards, and certificates can be used by
tokens, smart cards, certificates, etc.), use of these multiple accounts, it may be impossible to identify
mechanisms must be assigned as follows: the individual using the authentication mechanism.
-Authentication mechanisms must be assigned to an Having physical and/or logical controls (for example,
individual account and not shared among multiple a PIN, biometric data, or a password) to uniquely
accounts. identify the user of the account will prevent
-Physical and/or logical controls must be in place to unauthorized users from gaining access through use
ensure only the intended account can use that of a shared authentication mechanism.
mechanism to gain access.
8.7 All access to any database containing cardholder Without user authentication for access to databases
data (including access by applications, and applications, the potential for unauthorized or
administrators, and all other users) is restricted as malicious access increases, and such access cannot
follows: be logged since the user has not been authenticated
- All user access to, user queries of, and user actions and is therefore not known to the system. Also,
on databases are through programmatic methods. database access should be granted through
-Only database administrators have the ability to programmatic methods only (for example, through
directly access or query databases. stored procedures), rather than via direct access to
- Application IDs for database applications can only the database by end users (except for DBAs, who
be used by the applications (and not by individual may need direct access to the database for their
users or other non-application processes). administrative duties).
on databases are through programmatic methods. database access should be granted through
-Only database administrators have the ability to programmatic methods only (for example, through
directly access or query databases. stored procedures), rather than via direct access to
- Application IDs for database applications can only the database by end users (except for DBAs, who
be used by the applications (and not by individual may need direct access to the database for their
users or other non-application processes). administrative duties).
8.8 Ensure that security policies and operational Personnel need to be aware of and following
procedures for identification and authentication are security policies and operational procedures for
documented, in use, and known to all affected managing identification and authorization on a
parties. continuous basis.
Go To Req 9 Executive Summary
each individual is uniquely accountable for his or her actions. When such accountability is in place, actions taken on critical d
8.1.1 Interview administrative personnel to confirm that all users are assigned
a unique ID for access to system components or cardholder data.
C16.9 8.1.2 For a sample of privileged user IDs and general user IDs, examine
associated authorizations and observe system settings to verify each user ID
and privileged user ID has been implemented with only the privileges specified
on the documented approval.
C16.3 8.1.3.a Select a sample of users terminated in the past six months, and review
current user access lists—for both local and remote access—to verify that
their IDs have been deactivated or removed from the access lists.
8.1.3.b Verify all physical authentication methods—such as, smart cards, tokens, etc.
—have been returned or deactivated.
C16.5 8.1.4 Observe user accounts to verify that any inactive accounts over 90 days old are
either removed or disabled.
8.1.5.a Interview personnel and observe processes for managing accounts used by
vendors to access, support, or maintain system components to verify that accounts
used by vendors for remote access are:
Disabled when not in use
Enabled only when needed by the vendor, and disabled when not in use.
8.1.5.b Interview personnel and observe processes to verify that vendor remote
access accounts are monitored while being used.
C16.8 8.1.6.a For a sample of system components, obtain and inspect system configuration
settings to verify that authentication parameters are set to require that a user’s
account be locked out after not more than six invalid logon attempts.
C16.8.1 8.1.7 For a sample of system components, obtain and inspect system configuration
settings to verify that password parameters are set to require that once a user account
is locked out, it remains locked for a minimum of 30 minutes or until a system
administrator resets the account.
C16.4 8.1.8 For a sample of system components, obtain and inspect system configuration
settings to verify that system/session idle time out features have been set to 15
minutes or less.
8.2 To verify that users are authenticated using unique ID and additional
authentication (for example, a password/phrase) for access to the cardholder data
environment, perform the following:
Examine documentation describing the authentication method(s) used.
For each type of authentication method used and for each type of system
component, observe an authentication to verify authentication is functioning
consistent with documented authentication method(s).
8.2.1.c For a sample of system components, examine data transmissions to verify that
passwords are unreadable during transmission.
8.2.1.d Additional testing procedure for service providers: Observe password files to
verify that customer passwords are unreadable during storage.
8.2.1.e Additional testing procedure for service providers: Observe data transmissions
to verify that customer passwords are unreadable during transmission.
NC 8.2.2 Examine authentication procedures for modifying authentication
credentials and observe security personnel to verify that, if a user requests a
reset of an authentication credential by phone, e-mail, web, or other non-face-
to-face method, the user’s identity is verified before the authentication
credential is modified.
8.2.3.b Additional testing procedure for service providers: Review internal processes
and customer/user documentation to verify that non-consumer user passwords are
required to meet at least the following strength/complexity:
-Require a minimum length of at least seven characters.
-Contain both numeric and alphabetic characters.
C12.3 8.2.4.a For a sample of system components, obtain and inspect system
C16.7.2 configuration settings to verify that user password parameters are set to require
users to change passwords at least every 90 days.
C12.8 8.2.5.a For a sample of system components, obtain and inspect system
C1.7.3 configuration settings to verify that password parameters are set to require that
new passwords cannot be the same as the four previously used passwords.
NC 8.2.6 Examine password procedures and observe security personnel to verify that
first-time passwords for new users, and reset passwords for existing users, are set
to a unique value for each user and changed after first use.
C10.6 8.3.a Examine system configurations for remote access servers and systems to verify
C13.7 two-factor authentication is required for:
All remote access by personnel
All third-party/vendor remote access (including access to
applications and system components for support or maintenance purposes).
8.4.c Interview a sample of users to verify that they are familiar with authentication
procedures and policies.
8.5.a For a sample of system components, examine user ID lists to verify the following:
-Generic user IDs are disabled or removed.- Shared user IDs for system administration
activities and other critical functions do not exist.
-Shared and generic user IDs are not used to administer any system components.
8.5.c Interview system administrators to verify that group and shared IDs and/or
passwords or other authentication methods are not distributed, even if requested.
8.5.1 Additional testing procedure for service providers: Examine authentication
policies and procedures and interview personnel to verify that different authentication
are used for access to each customer.
8.6.a Examine authentication policies and procedures to verify that procedures for
using authentication mechanisms such as physical security tokens, smart cards, and
certificates are defined and include:
Authentication mechanisms are assigned to an individual account and not shared
among multiple accounts.
Physical and/or logical controls are defined to ensure only the intended account can
use that mechanism to gain access.
8.7.a Review database and application configuration settings and verify that all users
are authenticated prior to access.
8.7.b Examine database and application configuration settings to verify that all user
access to, user queries of, and user actions on (for example, move, copy, delete), the
database are through programmatic methods only (for example, through stored
procedures).
8.7.c Examine database access control settings and database application configuration
settings to verify that user direct access to or queries of databases are restricted to
database administrators.
8.8 Examine documentation interview personnel to verify that security policies and
operational procedures for identification and authentication are:
-Documented,
-In use, and
-Known to all affected parties.
e, actions taken on critical data and systems are performed by, and can be traced to, known and authorized users.
Selected Merchant T
For the interview, summarize the relevant details discussed to confirm that all users
are assigned a unique ID for access to system components or cardholder data.
<Report Findings Here>
Identify the sample of privileged user IDs selected for this testing procedure. 4 0
<Report Findings Here>
Identify the sample of general user IDs selected for this testing procedure.
<Report Findings Here>
Identify the sample of users terminated in the past six months selected. 4 0
<Report Findings Here>
Describe how the current user access lists for local access were reviewed to verify
that the sampled user IDs have been deactivated or removed from the access lists.
<Report Findings Here>
Describe how the current user access lists for remote access were reviewed to verify
that the sampled user IDs have been deactivated or removed from the access lists.
<Report Findings Here>
For the sample of users terminated in the past six months at 8.1.3.a, describe how it 4 0
was determined which, if any, physical authentication methods, the terminated
users had access to prior to termination.
<Report Findings Here>
Describe how the physical authentication method(s) for the terminated employees
were verified to have been returned or deactivated.
<Report Findings Here>
Describe how user accounts were observed to verify that any inactive accounts over 4 0
90 days old are either removed or disabled.
<Report Findings Here>
Identify the personnel interviewed who confirm that accounts used by vendors for 4 0
remote access are:
Disabled when not in use.
Enabled only when needed by the vendor, and disabled when not in use.
<Report Findings Here>
Describe how processes for managing accounts used by vendors to access, support,
or maintain system components were observed to verify that accounts used by
vendors for remote access are:
Disabled when not in use.
Enabled only when needed by the vendor, and disabled when not in use.
<Report Findings Here>
Identify the personnel interviewed who confirm that accounts used by vendors for 4 0
remote access are monitored while being used.
<Report Findings Here>
Describe how processes for managing accounts used by vendors to access, support,
or maintain system components were observed to verify that vendor remote access
accounts are monitored while being used.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
inspected to verify that authentication parameters are set to require that user
accounts be locked after not more than six invalid logon attempts.
<Report Findings Here>
For service providers only, identify the documented internal processes and 4 0
customer/user documentation reviewed to verify that non-consumer user accounts
are temporarily locked-out after not more than six invalid access attempts.
<Report Findings Here>
Describe the implemented processes that were observed to verify that non-
consumer user accounts are temporarily locked-out after not more than six invalid
access attempts.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
inspected to verify that password parameters are set to require that once a user
account is locked out, it remains locked for a minimum of 30 minutes or until a
system administrator resets the account.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
inspected to verify that system/session idle time out features have been set to 15
minutes or less.
<Report Findings Here>
Identify the document describing the authentication method(s) used that was 4 0
reviewed to verify that the methods require users to be authenticated using a
unique ID and additional authentication for access to the cardholder data
environment.
<Report Findings Here>
For each type of authentication method used and for each type of system
component, describe how the authentication method was observed to be:
For each item in the sample, describe how system configuration settings were
examined to verify that passwords are protected with strong cryptography during
transmission.
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
examined to verify that passwords are protected with strong cryptography during
storage.
<Report Findings Here>
For each item in the sample at 8.2.1.a, describe how password files were examined 4 0
to verify that passwords are unreadable during storage.
<Report Findings Here>
For each item in the sample at 8.2.1.a, describe how password files were examined 4 0
to verify that passwords are unreadable during transmission.
<Report Findings Here>
Additional procedure for service providers: for each item in the sample at 8.2.1.a, 4 0
describe how password files were examined to verify that customer passwords are
unreadable during storage.
<Report Findings Here>
Additional procedure for service providers: for each item in the sample at 8.2.1.a, 4 0
describe how password files were examined to verify that customer passwords are
unreadable during transmission.
<Report Findings Here>
Identify the document examined to verify that authentication procedures for 4 0
modifying authentication credentials define that if a user requests a reset of an
authentication credential by a non-face-to-face method, the user’s identity is
verified before the authentication credential is modified.
<Report Findings Here>
Describe how security personnel were observed to verify that if a user requests a
reset of an authentication credential by a non-face-to- face method, the user’s
identity is verified before the authentication credential is modified.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
inspected to verify that user password parameters are set to require at least the
following strength/complexity:
For service providers only: Identify the documented internal processes and 4 0
customer/user documentation reviewed to verify that non-consumer user
passwords are required to meet at least the following strength/complexity:
A minimum length of at least seven characters.
Non-consumer user passwords are required to contain both numeric and
alphabetic characters.
<Report Findings Here>
Describe how internal processes were reviewed to verify that non-consumer user
passwords are required to meet at least the following strength/complexity:
For each item in the sample, describe how system configuration settings were
inspected to verify that user password parameters are set to require users to
change passwords at least every 90 days.
<Report Findings Here>
For service providers only, identify the documented internal processes and 4 0
customer/user documentation reviewed to verify that:
Non-consumer user passwords are required to change periodically; and
Non-consumer users are given guidance as to when, and under what
circumstances, passwords must change.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings were
inspected to verify that password parameters are set to require that new passwords
cannot be the same as the four previously used passwords.
<Report Findings Here>
For service providers only, identify the documented internal processes and 4 0
customer/user documentation reviewed to verify that new non-consumer user
passwords cannot be the same as the previous four passwords.
<Report Findings Here>
Describe how internal processes were reviewed to verify that new non-consumer
user passwords cannot be the same as the previous four passwords.
<Report Findings Here>
For each item in the sample, describe how two- factor authentication was observed
to be required for remote access to the network.
<Report Findings Here>
Identify the personnel interviewed who confirm that authentication procedures and
policies are distributed to all users.
<Report Findings Here>
Identify the documented authentication procedures and policies that are 4 0
distributed to users reviewed to verify they include:
Guidance on selecting strong authentication credentials.
Guidance for how users should protect their authentication credentials.
Instructions for users not to reuse previously used passwords.
That users should change passwords if there is any suspicion the password could
be compromised.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify that the
sampled users are familiar with authentication procedures and policies.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how user ID lists for the sample of system
components were examined to verify that:
Identify the system administrators interviewed who confirm that group and shared 4 0
IDs and/or passwords or other authentication methods are not distributed, even if
requested.
For service providers only, indicate whether this ROC is being completed prior to 4 0
June 30, 2015. (yes/no)
<Report Findings Here>
If “yes” AND the assessed entity does not have this in place ahead of the
requirement’s effective date, mark this as “Not Applicable.”
If “no” OR if the assessed entity has this in place ahead of the requirement’s
effective date, complete the following:
For the interview, summarize the relevant details discussed to confirm that
different authentication is used for access to each customer.
<Report Findings Here>
Identify the sample of system components selected for this testing procedure. 4 0
<Report Findings Here>
For each item in the sample, describe how system configuration settings and/or
physical controls, as applicable, were examined to verify that controls are
implemented to ensure only the intended account can use that mechanism to gain
access.
<Report Findings Here>
Describe the process observed to verify that only programmatic methods are used
for:
For each database from 8.7.a, describe how database application configuration 4 0
settings were examined to verify that the following are restricted to only database
administrators:
Describe the implemented methods for ensuring that application IDs can only be
used by the applications.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 0
procedures for identification and authentication are documented.
<Report Findings Here>
170 0
uthorized users.
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
Y 0
0 0 0 0 0 0 1 1
Y 0
1 0 0 1 0 1 1 1
N 3
1 0 0 1 0 1 1 1
N 3
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
0 0 0 0 0 0 0 1
N 0
0 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
1 0 0 0 0 0 1 1
N 3
1 0 0 1 0 1 1 1
N 3
1 0 0 1 0 1 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
1 0 0 1 0 0 1 1
N 3
1 0 0 1 0 0 1 1
N 3
1 0 0 1 0 0 1 1
N 3
0 0 0 0 0 0 0 1
N 0
1 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
1 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 1
21 0 0 7 0 4 37 44 Y 97
N
C
NT
NA
Proofs / Stage of implementation Remediation plan
Documentation links
Estimated date for completion Comments Owner
Return to Table of content Go to requriement 8
Requirement 9: Restrict physical access to cardholder data
Any physical access to data or systems that house cardholder data provides the opportunity for individuals to ac
workers, or anyone who needs to enter the facility for a short duration, usually not more than one day. “Media”
Major Obser
Five of Requirement 9’s subcontrols (9.1.3, 9.1.2, 9.3.3, 9.3.1 and 9.3.2.b) make it into our “Top 20.” These refer to restricting phy
achieve between 86.1% and 91.1% compliance,
Just 66.3% of organizations were compliant with 9.9.1 [Properly maintain inventory logs of all media and conduct media invento
organizations that do maint
But surprisingly, 74.3% of organizations were comp
9.1 Use appropriate facility entry controls to limit Without physical access controls, unauthorized
and monitor physical access to systems in the persons could potentially gain access to the building
cardholder data environment. and to sensitive information, and could alter system
configurations, introduce vulnerabilities into the
network, or destroy or steal equipment.
9.1.1 Use video cameras and/or access control When investigating physical breaches, these
mechanisms to monitor individual physical access to controls can help identify individuals that physically
sensitive areas. Review collected data and correlate access those sensitive areas storing cardholder data.
with other entries. Store for at least three months, Examples of sensitive areas include corporate
unless otherwise restricted by law. database server rooms, back-end server room of a
retail location that stores cardholder data, and
Note: “Sensitive areas” refers to any data center, storage areas for large quantities of cardholder
server room or any area that houses systems that data,
store, process, or transmit cardholder data. This
excludes the areas where only point-of-sale
terminals are present, such as the cashier areas in a
retail store.
server room or any area that houses systems that data,
store, process, or transmit cardholder data. This
excludes the areas where only point-of-sale
terminals are present, such as the cashier areas in a
retail store.
9.1.2 Implement physical and/or logical controls to Restricting access to network jacks will prevent
restrict access to publicly accessible network jacks. malicious individuals from plugging into readily
available network jacks that may allow them access
into internal network resources. Consider turning
off network jacks while not in use, and reactivating
them only while needed. In public areas such as
conference rooms, establish private networks to
allow vendors and visitors to access Internet only so
that they are not on your internal network.
9.1.3 Restrict physical access to wireless access Without security over access to wireless
points, gateways, handheld devices, components and devices, malicious users could use
networking/communications hardware, and your organization’s unattended wireless devices to
telecommunication lines. access your network resources, or even connect
their own devices to your wireless network to gain
unauthorized access. Additionally, securing
networking and communications hardware prevents
malicious users from intercepting network traffic or
physically connecting their own devices to your
wired network resources.
9.2 Develop procedures to easily distinguish Without badge systems and door controls,
between onsite personnel and visitors, especially in unauthorized and malicious users can easily gain
areas where cardholder data is accessible. access to your facility to steal, disable, disrupt, or
destroy critical systems and cardholder data. For
optimum control, consider implementing badge or
card access system in and out of work areas that
contain cardholder data.
Identifying authorized visitors so they are easily
distinguished from onsite personnel prevents
unauthorized visitors from being granted access to
areas containing cardholder data.
unauthorized visitors from being granted access to
areas containing cardholder data.
9.3 Control physical access for onsite personnel toControlling physical access to the CDE helps ensure
the sensitive areas as follows: that only authorized personnel with a legitimate
business need are granted access.
-Access must be authorized and based on individual When personnel leave the organization, all physical
job function. access mechanisms should be returned or disabled
-Access is revoked immediately upon termination, promptly (as soon as possible) upon their
and all physical access mechanisms, such as keys, departure, to ensure personnel cannot gain physical
access cards, etc., are returned or disabled. access to the CDE once their employment has
ended.
9.4 Implement procedures to identify and authorize Visitor controls are important to reduce the ability
visitors. Procedures should include the following: of unauthorized and malicious persons to gain
access to facilities (and potentially, to cardholder
data).
Visitor controls ensure visitors are identifiable as
visitors so personnel can monitor their activities,
and that their access is restricted to just the
duration of their legitimate visit.
9.6 Maintain strict control over the internal or Procedures and processes help protect cardholder
external distribution of any kind of media, including data on media distributed to internal and/or
the following: external users. Without such procedures data can
be lost or stolen and used for fraudulent purposes.
9.6.1 Classify media so the sensitivity of the data It is important that media be identified such that its
can be determined. classification status can be easily discernable. Media
not identified as confidential may not be adequately
protected or may be lost or stolen
9.6.2 Send the media by secured courier or other Media may be lost or stolen if sent via a non-
delivery method that can be accurately tracked. trackable method such as regular postal mail. Use
the services of a secure courier to deliver any media
that contains cardholder data, so that you can use
their tracking systems to maintain inventory and
location of shipments.
9.6.3 Ensure management approves any and all Without a firm process for ensuring that all media
media that is moved from a secured area (including movements are approved before the media is
when media is distributed to individuals). removed from secure areas, the media would not
be tracked or appropriately protected, and its
location would be unknown, leading to lost or
stolen media.
9.7 Maintain strict control over the storage and Without careful inventory methods and storage
accessibility of media. controls, stolen or missing media could go
unnoticed for an indefinite amount of time.
9.7.1 Properly maintain inventory logs of all media If media is not inventoried, stolen or lost media may
and conduct media inventories at least annually. not be noticed for a long time or at all.
9.8 Destroy media when it is no longer needed for If steps are not taken to destroy information
business or legal reasons as follows: contained on hard disks, portable drives, CD/DVDs,
or paper prior to disposal, malicious individuals may
be able to retrieve information from the disposed
media, leading to a data compromise. For example,
malicious individuals may use a technique known as
“dumpster diving,” where they search through trash
cans and recycle bins looking for information they
can use to launch an attack.
Examples of methods for securely destroying
electronic media include secure wiping, degaussing,
or physical destruction (such as grinding or
shredding hard disks).
or physical destruction (such as grinding or
shredding hard disks).
9.9 Protect devices that capture payment card data Criminals attempt to steal cardholder data by
via direct physical interaction with the card from stealing and/or manipulating card-reading devices
tampering and substitution. and terminals. For example, they will try to steal
devices so they can learn how to break into them,
and they often try to replace legitimate devices with
fraudulent devices that send them payment card
information every time a card is entered. Criminals
will also try to add “skimming” components to the
outside of devices, which are designed to capture
payment card details before they even enter the
device—for example, by attaching an additional
card reader on top of the legitimate card reader so
that the payment card details are captured twice:
once by the criminal’s component and then by the
device’s legitimate component. In this way,
transactions may still be completed without
interruption while the criminal is “skimming” the
payment card information during the process.
This requirement is recommended, but not
required, for manual key-entry components such as
computer keyboards and POS keypads.
Additional best practices on skimming prevention
are available on the PCI SSC website.
9.9.1 Maintain an up-to-date list of devices. The list Keeping an up-to-date list of devices helps an
should include the following: organization keep track of where devices are
supposed to be, and quickly identify if a device is
-Make, model of device missing or lost.
-Location of device (for example, the address of the The method for maintaining a list of devices may be
site or facility where the device is located) automated (for example, a device-management
-Device serial number or other method of unique system) or manual (for example, documented in
identification. electronic or paper records). For on-the-road
devices, the location may include the name of the
personnel to whom the device is assigned.
9.9.2 Periodically inspect device surfaces to detect Regular inspections of devices will help
tampering (for example, addition of card skimmers organizations to more quickly detect tampering or
to devices), or substitution (for example, by replacement of a device, and thereby minimize the
checking the serial number or other device potential impact of using fraudulent devices.
characteristics to verify it has not been swapped The type of inspection will depend on the device—
with a fraudulent device). for example, photographs of devices that are known
to be secure can be used to compare a device’s
current appearance with its original appearance to
see whether it has changed. Another option may be
to use a secure marker pen, such as a UV light
marker, to mark device surfaces and device
openings so any tampering or replacement will be
apparent. Criminals will often replace the outer
casing of a device to hide their tampering, and these
methods may help to detect such activities. Device
vendors may also be able to provide security
guidance and “how to” guides to help determine
whether the device has been tampered with.
The frequency of inspections will depend on factors
such as location of device and whether the device is
attended or unattended. For example, devices left in
public areas without supervision by the
organization’s personnel may have more frequent
inspections than devices that are kept in secure
areas or are supervised when they are accessible to
the public. The type and frequency of inspections is
determined by the merchant, as defined by their
annual risk-assessment process.
marker, to mark device surfaces and device
openings so any tampering or replacement will be
apparent. Criminals will often replace the outer
casing of a device to hide their tampering, and these
methods may help to detect such activities. Device
vendors may also be able to provide security
guidance and “how to” guides to help determine
whether the device has been tampered with.
The frequency of inspections will depend on factors
such as location of device and whether the device is
attended or unattended. For example, devices left in
public areas without supervision by the
organization’s personnel may have more frequent
inspections than devices that are kept in secure
areas or are supervised when they are accessible to
the public. The type and frequency of inspections is
determined by the merchant, as defined by their
annual risk-assessment process.
9.9.3 Provide training for personnel to be aware of Criminals will often pose as authorized maintenance
attempted tampering or replacement of devices. personnel in order to gain access to POS devices. All
Training should include the following: third parties requesting access to devices should
Verify the identity of any third-party persons always be verified before being provided access—
claiming to be repair or maintenance personnel, for example, by checking with management or
prior to granting them access to modify or phoning the POS maintenance company (such as
troubleshoot devices. the vendor or acquirer) for verification. Many
Do not install, replace, or return devices without criminals will try to fool personnel by dressing for
verification. the part (for example, carrying toolboxes and
dressed in work wear), and could also be
Be aware of suspicious behavior around devices knowledgeable about locations of devices, so it’s
(for example, attempts by unknown persons to important personnel are trained to follow
unplug or open devices). procedures at all times.
Report suspicious behavior and indications of Another trick criminals like to use is to send a “new”
device tampering or substitution to appropriate POS system with instructions for swapping it with a
personnel (for example, to a manager or security legitimate system and “returning” the legitimate
officer). system to a specified address. The criminals may
even provide return postage as they are very keen
to get their hands on these devices. Personnel
always verify with their manager or supplier that
the device is legitimate and came from a trusted
source before installing it or using it for business.
to get their hands on these devices. Personnel
always verify with their manager or supplier that
the device is legitimate and came from a trusted
source before installing it or using it for business.
9.10 Ensure that security policies and operational Personnel need to be aware of and following
procedures for restricting physical access to security policies and operational procedures for
cardholder data are documented, in use, and known restricting physical access to cardholder data
to all affected parties. and CDE systems on a continuous basis.
Go to requriement 10Executive Summary
e opportunity for individuals to access devices or data and to remove systems or hardcopies, and should be appropriately re
not more than one day. “Media”
Major refers from
Observations to allthe
paper
2014 and electronic
Verizon media
Compliance containing cardholder data
Report:
“Top 20.” These refer to restricting physical access to network hardware, and making sure all visitors are authorized (with specific controls before e
between 86.1% and 91.1% compliance, showing that organizations are generally pretty strong on controlling physical access.
of all media and conduct media inventories at least annually]. This low level of compliance could be because organizations see logging as a resourc
organizations that do maintain logs may forget about backups or USB devices containing CHD.
ingly, 74.3% of organizations were compliant with 9.8 [Destroy media when it is no longer needed for business or legal reasons].
NC 9.1.1.a Verify that video cameras and/or access control mechanisms are in place to
monitor the entry/exit points to sensitive areas.
9.1.1.b Verify that video cameras and/or access control mechanisms are protected
from tampering or disabling.
9.1.1.c Verify that video cameras and/or access control mechanisms are monitored
and that data from cameras or other mechanisms is stored for at least three months.
NC 9.1.3 Verify that physical access to wireless access points, gateways, handheld devices,
networking/communications hardware, and telecommunication lines is appropriately
restricted.
NC 9.2.a Review processes and procedures for assigning badges to onsite personnel and
visitors, and verify these processes include the following:
9.2.c Examine badges in use to verify that they clearly identify visitors and it is easy to
distinguish between onsite personnel and visitors.
9.2.d Examine identification methods (such as ID badges) in use to verify that they
clearly identify visitors and it is easy to distinguish between onsite personnel and
visitors.
NC 9.3.a For a sample of onsite personnel with physical access to the CDE, interview
responsible personnel and observe access control lists to verify that:
-Access to the CDE is authorized.
-Access is required for the individual’s job function.
9.3.b Observe personnel access the CDE to verify that all personnel are authorized
before being granted access.

9.3.c Select a sample of recently terminated employees and review access control lists
to verify the personnel do not have physical access to the CDE.
NC 9.4 Verify that visitor authorization and access controls are in place as follows:
9.4.1.a Observe procedures and interview personnel to verify that visitors must be
authorized before they are granted access to, and escorted at all times within, areas
where cardholder data is processed or maintained.
NC
9.4.1.b Observe the use of visitor badges or other identification to verify that a
physical token badge does not permit unescorted access to physical areas where
cardholder data is processed or maintained.
9.4.2.a Observe people within the facility to verify the use of visitor badges or other
identification, and that visitors are easily distinguishable from onsite personnel.
NC
9.4.3 Observe visitors leaving the facility to verify visitors are asked to surrender their
badge or other identification upon departure or expiration.
NC
9.4.4.a Verify that a visitor log is in use to record physical access to the facility as well
as computer rooms and data centers where cardholder data is stored or transmitted.
9.4.4.c Verify that the log is retained for at least three months.
C8.4 9.5 Verify that procedures for protecting cardholder data include controls for
physically securing all media (including but not limited to computers, removable
electronic media, paper receipts, paper reports, and faxes).
9.5.1.a Observe the storage location’s physical security to confirm that backup media
storage is secure.
9.5.1.b Verify that the storage location security is reviewed at least annually.
9.6 Verify that a policy exists to control distribution of media, and that the policy
covers all distributed media including that distributed to individuals.
C8.4 9.6.1 Verify that all media is classified so the sensitivity of the data can be determined.
NC 9.6.2.a Interview personnel and examine records to verify that all media sent
outside the facility is logged and sent via secured courier or other delivery
method that can be tracked.
9.6.2.b Select a recent sample of several days of offsite tracking logs for all media, and
verify tracking details are documented.
9.6.3 Select a recent sample of several days of offsite tracking logs for all media. From
examination of the logs and interviews with responsible personnel, verify proper
management authorization is obtained whenever media is moved from a secured area
(including when media is distributed to individuals).
NC 9.7 Verify that all media sent outside the facility is logged and authorized by
management and sent via secured courier or other delivery method that can be
tracked.
NC 9.7.1 Select a recent sample of several days of offsite tracking logs for all media, and
verify the presence in the logs of tracking details and proper management
authorization.
NC 9.8 Examine the periodic media destruction policy and verify that it covers all media
and defines requirements for the following:
-Hard-copy materials must be crosscut shredded, incinerated, or pulped such that
there is reasonable assurance the hard- copy materials cannot be reconstructed.
-Storage containers used for materials that are to be destroyed must be secured.
-Cardholder data on electronic media must be rendered unrecoverable via a secure
wipe program (in accordance with industry-accepted standards for secure deletion),
or by physically destroying the media.
NC 9.8.1.a Interview personnel and examine procedures to verify that hard-copy
materials are crosscut shredded, incinerated, or pulped such that there is reasonable
assurance the hard-copy materials cannot be reconstructed.
NC 9.8.2 Verify that cardholder data on electronic media is rendered unrecoverable via a
secure wipe program in accordance with industry-accepted standards for secure
deletion, or otherwise physically destroying the media).
9.9.1.b Select a sample of devices from the list and observe device locations to verify
that the list is accurate and up to date.
9.9.1.c Interview personnel to verify the list of devices is updated when devices are
added, relocated, decommissioned, etc.
9.9.3.a Review training materials for personnel at point-of-sale locations to verify they
include training in the following:
-Verifying the identity of any third-party persons claiming to be repair or maintenance
personnel, prior to granting them access to modify or troubleshoot devices
-Not to install, replace, or return devices without verification
-Being aware of suspicious behavior around devices (for example, attempts by
unknown persons to unplug or open devices)
-Reporting suspicious behavior and indications of device tampering or substitution to
appropriate personnel (for example, to a manager or security officer).
9.9.3.b Interview a sample of personnel at point-of-sale locations to verify they have
received training and are aware of the procedures for the following:
-Verifying the identity of any third-party persons claiming to be repair or maintenance
personnel, prior to granting them access to modify or troubleshoot devices
-Not to install, replace, or return devices without verification
-Being aware of suspicious behavior around devices (for example, attempts by
unknown persons to unplug or open devices)
-Reporting suspicious behavior and indications of device tampering or substitution to
appropriate personnel (for example, to a manager or security officer).
9.10 Examine documentation and interview personnel to verify that security policies
and operational procedures for restricting physical access to cardholder data are:
-Documented,
-In use, and
-Known to all affected parties.
nd should be appropriately restricted. For the purposes of Requirement 9, “onsite personnel” refers to full-time and part-ti
er data
ized (with specific controls before entering areas where CHD is processed or maintained). These
hysical access.
ganizations see logging as a resource-intensive task that adds little value — we disagree — and
or legal reasons].
Selected Merchant Ty
Identify and briefly describe all of the following with systems in the cardholder data 0
environment:
All computer rooms
All data centers
Any other physical areas
<Report Findings Here>
For each area identified (add rows as needed), complete the following:
Identify the randomly selected systems in the cardholder environment for which a
system administrator login attempt was observed. 2
<Report Findings Here>
Describe how consoles for the randomly selected systems were observed to verify
that they are “locked” when not in use to prevent unauthorized use.
<Report Findings Here>
Describe the video cameras and/or access control mechanisms observed to monitor 0
the entry/exit points to sensitive areas.
<Report Findings Here>
2
Describe how the video cameras and/or access control mechanisms were observed 0
to be protected from tampering and/or disabling.
<Report Findings Here> 2
Describe how the video cameras and/or access control mechanisms were observed 0
to be monitored.
<Report Findings Here>
Describe how data from the cameras and/or access control mechanisms was
observed to be stored for at least three months. 2
<Report Findings Here>
Identify responsible personnel interviewed who confirm that physical and/or logical 0
controls are in place to restrict access to publicly accessible network jacks.
<Report Findings Here>
Describe the physical and/or logical controls observed at the locations of publicly
accessible network jacks to verify the controls are in place restrict access.
<Report Findings Here> 2
Identify the documented processes reviewed to verify that procedures are defined 5 0
for identifying and distinguishing between onsite personnel and visitors, including
the following:
Identifying new onsite personnel or visitors (for example, assigning badges),
Changing access requirements, and
Revoking terminated onsite personnel and expired visitor identification (such as
ID badges).
<Report Findings Here>
Describe how processes for identifying and distinguishing between onsite personnel 5 0
and visitors were observed to verify that:
Visitors are clearly identified, and
It is easy to distinguish between onsite personnel and visitors.
<Report Findings Here>
Identify the document that defines that access to the identification process is 5 0
limited to authorized personnel.
<Report Findings Here>
Briefly describe the identification method in use for onsite personnel and visitors. 5 0
<Report Findings Here>
Describe how the identification methods were examined to verify that:
The identification method(s) clearly identify visitors.
It is easy to distinguish between onsite personnel and visitors.
<Report Findings Here>
Identify the sample of onsite personnel with physical access to the CDE interviewed 5 0
for this testing procedure.
<Report Findings Here>
For all items in the sample, describe how responsible personnel were interviewed
and access control lists observed to verify that:
Access to the CDE is authorized.
Access is required for the individual’s job function.
<Report Findings Here>
Describe how personnel accessing the CDE were observed to verify that all 5 0
personnel are authorized before being granted access.
<Report Findings Here>
For all items in the sample, provide the name of the assessor who attests that the
access control lists were reviewed to verify the personnel do not have physical
access to the CDE.
<Report Findings Here>
Describe how the use of visitor badges or other identification was observed to 5 0
verify that a physical token badge does not permit unescorted access to physical
areas where cardholder data is processed or maintained.
<Report Findings Here>
Describe how people within the facility were observed to use visitor badges or 5 0
other identification.
<Report Findings Here>
Describe how visitors within the facility were observed to be easily distinguishable
from onsite personnel.
<Report Findings Here>
Describe how visitors leaving the facility were observed to verify they are asked to 5 0
surrender their badge or other identification upon departure or expiration.
<Report Findings Here>
Describe how it was verified that a visitor log is in use to record physical access to: 5 0
The facility.
Computer rooms and data centers where cardholder data is stored or transmitted.
<Report Findings Here>
Provide the name of the assessor who attests that the visitor log contains: 5 0
The visitor’s name,
The firm represented, and
The onsite personnel authorizing physical access.
<Report Findings Here>
For all types of media used, describe the controls for physically securing the media
used.
<Report Findings Here>
Identify the document reviewed to verify that the storage location must be 5 0
reviewed at least annually.
<Report Findings Here>
Describe how processes were observed to verify that reviews of the security of each
storage location are performed at least annually.
<Report Findings Here>
Identify the documented policy to control distribution of media that was reviewed 5 1
to verify the policy covers all distributed media, including that distributed to
individuals.
<Report Findings Here>
Identify the documented policy reviewed to verify policy defines how media is 5 1
classified.
<Report Findings Here>
Identify the personnel interviewed who confirm that all media sent outside the 5 1
facility is logged and sent via secured courier or other delivery method that can be
tracked.
<Report Findings Here>
Describe how offsite tracking records were examined to verify that all media is
logged and sent via secured courier or other delivery method that can be tracked.
<Report Findings Here>
Identify the sample of recent offsite tracking logs for all media selected. 5 1
<Report Findings Here>
For each item in the sample, describe how the offsite tracking logs were reviewed
to verify that tracking details are documented.
<Report Findings Here>
For each item in the sample in 9.6.2.b, describe how offsite tracking logs were
examined to verify proper management authorization is obtained whenever media
is moved from a secured area (including when media is distributed to individuals).
<Report Findings Here>
Identify the documented policy for controlling storage and maintenance of all 5 1
media that was reviewed to verify that the policy defines required periodic media
inventories.
<Report Findings Here>
Describe how the media inventory logs were reviewed to verify that:
<Report Findings Here>
Identify the policy document for periodic media destruction that was examined to 5 1
verify it covers all media and defines requirements for the following:
Hard-copy materials must be crosscut shredded, incinerated, or pulped such that
there is reasonable assurance the hard- copy materials cannot be reconstructed.
Storage containers used for materials that are to be destroyed must be secured.
Cardholder data on electronic media must be rendered unrecoverable via a secure
wipe program (in accordance with industry- accepted standards for secure
deletion), or by physically destroying the media.
<Report Findings Here>
IIdentify personnel interviewed who confirm that hard-copy materials are crosscut 5 1
shredded, incinerated, or pulped such that there is reasonable assurance the hard-
copy materials cannot be reconstructed.
<Report Findings Here>
Describe how the procedures were examined to verify that hard-copy materials are
crosscut shredded, incinerated, or pulped such that there is reasonable assurance
that hardcopy materials cannot be reconstructed.
<Report Findings Here>
Describe how the storage containers used for materials to be destroyed are 1
secured. 1
<Report Findings Here>
Describe how cardholder data on electronic media is rendered unrecoverable, via 0
secure wiping of media and/or physical destruction of media.
<Report Findings Here>
Indicate whether this ROC is being completed prior to June 30, 2015. (yes/no) 0
<Report Findings Here>
If “yes” AND the assessed entity does not have this in place ahead of the
requirement’s effective date, mark 9.9 – 9.9.9.3.b as “Not Applicable.”
If not OR if the assessed entity has this in place ahead of the requirement’s effective
date, complete the following:
Identify the documented policies and procedures examined to verify they include:
Maintaining a list of devices.
Periodically inspecting devices to look for
tampering or substitution.
Training personnel to be aware of suspicious behavior and to report tampering or
substitution of POS devices.
<Report Findings Here>
5
If “yes” at 9.9 AND the assessed entity does not have this in place ahead of the 0
requirement’s effective date, mark 9.9.1.a - 9.9.1.c as “Not Applicable.”
If not OR if the assessed entity has this in place ahead of the requirement’s effective
date, complete the following:
Identify the sample of devices from the list selected for this testing procedure. 0
<Report Findings Here>
For all items in the sample, describe how the device locations for the sample of
devices was observed to verify that the list is accurate and up-to-date.
<Report Findings Here> 5
If “yes” at 9.9 AND the assessed entity does not have this in place ahead of the 5 0
requirement’s effective date, mark 9.9.2.a - 9.9.2.b as “Not Applicable.”
If not OR if the assessed entity has this in place ahead of the requirement’s effective
date, complete the following:
Identify the documented procedures examined to verify that processes are defined
to include the following:
Procedures for inspecting devices.
Frequency of inspections.
<Report Findings Here>
Identify responsible personnel interviewed who confirm that: 5 0
Personnel are aware of procedures for inspecting devices.
All devices are periodically inspected for evidence of tampering and substitution.
<Report Findings Here>
If “yes” at 9.9 AND the assessed entity does not have this in place ahead of the 5 0
requirement’s effective date, mark 9.9.3.a - 9.9.3.b as “Not Applicable.”
If not OR if the assessed entity has this in place ahead of the requirement’s effective
date, complete the following:
Identify the training materials for personnel at point-of-sale locations that were
reviewed to verify the materials include training in the following:
Verifying the identity of any third-party persons claiming to be repair or
maintenance personnel, prior to granting them access to modify or troubleshoot
devices.
Not to install, replace, or return devices without verification.
Being aware of suspicious behavior around devices (for example, attempts by
unknown persons to unplug or open devices).
Reporting all suspicious behavior to appropriate personnel (for example, a
manager or security officer).
Reporting tampering or substitution of devices.
<Report Findings Here>
Identify the sample of personnel at point-of- sale locations interviewed to verify 5 0
they have received training.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify interviewees
are aware of the procedures for the following:
Verifying the identity of any third-party persons claiming to be repair or
maintenance personnel, prior to granting them access to modify or troubleshoot
devices.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 6 0
procedures for restricting physical access to cardholder data are documented.
<Report Findings Here>
In use
Known to all affected parties
<Report Findings Here>
200 11
rs to full-time and part-time employees, temporary employees, contractors and consultants who are physically present on t
1 0 0 0 0 0 1 1
N 5
0 0 0 0 0 0 1 1
N 5
0 0 0 0 0 0 1 1
N 5
0 0 0 0 0 0 1 1
N 5
0 0 0 1 0 1 1 1
N 5
0 0 0 0 0 0 1 1
N 5
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
0 0 0 0 0 0 1 1
N 2
1 1 1 1 1 1 1 1
N 2
0 0 1 1 0 0 1 1
N 2
0 0 1 1 0 0 1 1
N 2
1 0 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 2
0 0 1 0 1 1 1 1
N 2
1 1 1 1 1 1 1 1
N 2
1 1 1 1 1 1 1 1
N 2
1 0 1 1 1 1 1 1
N 6
0 0 0 0 0 1 1 1
N 6
0 1 1 1 0 1 1 1
NT 2
0 1 1 1 0 1 1 1
NT 2
0 1 1 1 0 1 1 1
Y 0
0 1 1 1 0 1 1 1
Y 0
0 1 1 1 0 1 1 1
C 0
0 1 1 1 0 1 1 1
Y 0
0 1 1 1 0 1 1 1
Y 0
0 1 1 1 0 1 1 1
Y 0
0 1 0 0 0 0 1 1
Y 0
11 12 21 21 11 21 45 45 Y 102
N
C
NT
NA
nsultants who are physically present on the entity’s premises. A “visitor” refers to a vendor, guest of any onsite personnel, s
Major Observa
Organizations generally find enterprise log management hard, in terms of generating logs (covered in controls 10.1 and 10.2), protecti
one can have a knock-on effect on compliance with several others. But
One of the most challenging parts of Requirement 10 appears to be control 10.4. This specifies that access to time data is restricted,
with all
10.1 Implement audit trails to link all access to It is critical to have a process or system that links
system components to each individual user. user access to system components accessed. This
system generates audit logs and provides the
ability to trace back suspicious activity to a
specific user.
10.2 Implement automated audit trails for all Generating audit trails of suspect activities alerts
system components to reconstruct the following the system administrator, sends data to other
events: monitoring mechanisms (like intrusion detection
systems), and provides a history trail for post-
incident follow-up. Logging of the following
events enables an organization to identify and
trace potentially malicious activities.
10.2.1 All individual accesses to cardholder data Malicious individuals could obtain knowledge of a
user account with access to systems in the CDE,
or they could create a new, unauthorized account
in order to access cardholder data. A record of all
individual accesses to cardholder data can
identify which accounts may have been
compromised or misused.
10.2.2 All actions taken by any individual with Accounts with increased privileges, such as the
root or administrative privileges “administrator” or “root” account, have the
potential to greatly impact the security or
operational functionality of a system. Without a
log of the activities performed, an organization is
unable to trace any issues resulting from an
administrative mistake or misuse of privilege back
to the specific action and individual.
10.2.3 Access to all audit trails Malicious users often attempt to alter audit logs
to hide their actions, and a record of access
allows an organization to trace any
inconsistencies or potential tampering of the logs
to an individual account,
10.2.4 Invalid logical access attempts Malicious individuals will often perform multiple
access attempts on targeted systems. Multiple
invalid login attempts may be an indication of an
unauthorized user’s attempts to “brute force” or
guess a password.
10.2.5 Use of identification and authentication Without knowing who was logged on at the time
mechanisms —including but not limited to of an incident, it is impossible to identify the
creation of new accounts and elevation of accounts which may be used. Additionally,
privileges—and all changes, additions, or malicious users may attempt to manipulate the
deletions to accounts with root or administrative authentication controls with the intent of
privileges bypassing them or impersonating a valid account.
Activities including, but not limited to, escalation
of privilege or changes to access permissions may
indicate unauthorized use of a system’s
authentication mechanisms.
10.2.6 Initialization of the audit logs Turning the audit logs off prior to performing
illicit activities is a common goal for malicious
users wishing to avoid detection. Initialization of
audit logs could indicate that the log function was
disabled by a user to hide their actions.
10.2.7 Creation and deletion of system-level Malicious software, such as malware, often
objects creates or replaces system level objects on the
target system in order to control a particular
function or operation on that system.
Please refer to the PCI DSS and PA-DSS Glossary
of Terms, Abbreviations, and Acronyms for
definitions of “system-level objects”.
10.3 Record at least the following audit trail entries By recording these details for the auditable
for all system components for each event: events at 10.2, a potential compromise can be
quickly identified, and with sufficient detail to
know who, what, where, when, and how.
10.5.1 Limit viewing of audit trails to those with a Adequate protection of the audit logs includes
job-related need. strong access control (limit access to logs based
on “need to know” only) and use of internal
segregation (to make the logs harder to find and
modify). By writing logs from external-facing
technologies such as wireless, firewalls, DNS, and
mail servers, the risk of those logs being lost or
altered is lowered, as they are more secure
within the internal network.
10.5.5 Use file-integrity monitoring or change- File-integrity monitoring systems check for
detection software on logs to ensure that existing changes to critical files, and notify when such
log data cannot be changed without generating changes are noted. For file-integrity monitoring
alerts (although new data being added purposes, an entity usually monitors files that
should not cause an alert). don’t regularly change, but when changed
indicate a possible compromise. For log files
(which do change frequently) what should be
monitored are, for example, when a log file is
deleted, suddenly grows or shrinks significantly,
and any other indicators that a malicious
individual has tampered with a log file. There are
both off-the-shelf and open source tools available
for file-integrity monitoring.
10.6 Review logs for all system components at least Many breaches occur over days or months before
daily. Log reviews must include those servers that being detected. Checking logs daily minimizes the
perform security functions like intrusion-detection amount of time and exposure of a potential
system (IDS) and authentication, authorization, and breach.
accounting protocol (AAA) servers (for example, Regular log reviews by personnel or automated
RADIUS). means can identify and proactively address
unauthorized access to the cardholder data
Note: Log harvesting, parsing, and alerting tools environment.
may be used to meet compliance with Requirement The log review process does not have to be
10.6. manual. The use of log harvesting, parsing, and
alerting tools can help facilitate the process by
identifying log events that need to be reviewed.
10.6.1 Review the following at least daily: Many breaches occur over days or months before
All security events being detected. Checking logs daily minimizes the
Logs of all system components that store, amount of time and exposure of a potential
process, or transmit CHD and/or SAD, or that breach.
could impact the security of CHD and/or SAD Daily review of security events—for example,
notifications or alerts that identify suspicious or
Logs of all critical system components anomalous activities—as well as logs from critical
Logs of all servers and system components that system components, and logs from systems that
perform security functions (for example, perform security functions, such as firewalls,
firewalls, intrusion-detection systems/intrusion- IDS/IPS, file-integrity monitoring (FIM) systems,
prevention systems (IDS/IPS), authentication etc. is necessary to identify potential issues. Note
servers, e-commerce redirection servers, etc.). that the determination of “security event” will
vary for each organization and may include
consideration for the type of technology,
location, and function of the device.
Organizations may also wish to maintain a
baseline of “normal” traffic to help identify
anomalous behavior.
etc. is necessary to identify potential issues. Note
servers, e-commerce redirection servers, etc.). that the determination of “security event” will
vary for each organization and may include
consideration for the type of technology,
location, and function of the device.
Organizations may also wish to maintain a
baseline of “normal” traffic to help identify
anomalous behavior.
10.6.2 Review logs of all other system Logs for all other system components should also
components periodically based on the be periodically reviewed to identify indications of
organization’s policies and risk management potential issues or attempts to gain access to
strategy, as determined by the organization’s sensitive systems via less-sensitive systems. The
annual risk assessment. frequency of the reviews should be determined
by an entity’s annual risk assessment.
10.6.3 Follow up exceptions and anomalies If exceptions and anomalies identified during the
identified during the review process. log-review process are not investigated, the entity
may be unaware of unauthorized and potentially
malicious activities that are occurring within their
own network.
10.7 Retain audit trail history for at least one year, Retaining logs for at least a year allows for the
with a minimum of three months immediately fact that it often takes a while to notice that a
available for analysis (for example, online, archived, compromise has occurred or is occurring, and
or restorable from back-up). allows investigators sufficient log history to better
determine the length of time of a potential
breach and potential system(s) impacted. By
having three months of logs immediately
available, an entity can quickly identify and
minimize impact of a data breach. Storing back-
up tapes off-site may result in longer time frames
to restore data, perform analysis, and identify
impacted systems or data.
10.8 Ensure that security policies and operational Personnel need to be aware of and following
procedures for monitoring all access to network security policies and daily operational procedures
resources and cardholder data are documented, in for monitoring all access to network resources
use, and known to all affected parties. and cardholder data on a continuous basis.
Go to requirement 11 Executive Summary
older data
or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when som
C17.2 10.1 Verify, through observation and interviewing the system administrator, that:
-Audit trails are enabled and active for system components.
-Access to system components is linked to individual users.
C14.1 10.2 Through interviews, examination of audit logs, and examination of audit log
C14.6 settings, perform the following:
C12.9 10.2.2 Verify actions taken by any individual with root or administrative privileges are
C12.10 logged.
10.2.5.c Verify all changes, additions, or deletions to any account with root or
administrative privileges are logged.
C.14.3 10.2.7 Verify creation and deletion of system level objects are logged.
C14.1 10.3 Through interviews and observation, for each auditable event (from 10.2),
perform the following:
C.14.5 10.4 Examine configuration standards and processes to verify that time-
synchronization technology is implemented and kept current per PCI DSS
Requirements 6.1 and 6.2.
C6.5 10.4.1.a Examine the process for acquiring, distributing and storing the correct time
within the organization to verify that:
-Only the designated central time server(s) receives time signals from external
sources, and time signals from external sources are based on International Atomic
Time or UTC.
-Where there is more than one designated time server, the time servers peer with one
another to keep accurate time,
- Systems receive time information only from designated central time server(s).
10.4.1.b Observe the time-related system-parameter settings for a sample of system
components to verify:
-Only the designated central time server(s) receives time signals from external
sources, and time signals from external sources are based on International Atomic
Time or UTC.
-Where there is more than one designated time server, the designated central time
server(s) peer with one another to keep accurate time.
- Systems receive time only from designated central time server(s).
C14.5 10.4.3 Examine systems configurations to verify that the time server(s) accept time
updates from specific, industry-accepted external sources (to prevent a malicious
individual from changing the clock). Optionally, those updates can be encrypted with a
symmetric key, and access control lists can be created that specify the IP addresses of
client machines that will be provided with the time updates (to prevent unauthorized
use of internal time servers).
C14.2.1 10.5 Interview system administrator and examine permissions to verify that audit
C14.7 trails are secured so that they cannot be altered as follows:
NC 10.5.1 Verify that only individuals who have a job-related need can view audit trail
files.
C14.7 10.5.2 Verify that current audit trail files are protected from unauthorized
modifications via access control mechanisms, physical segregation, and/or network
segregation.
C14.2.1 10.5.3 Verify that current audit trail files are promptly backed up to a centralized log
server or media that is difficult to alter.
C14.7 10.5.4 Verify that logs for external-facing technologies (for example, wireless,
firewalls, DNS, mail) are offloaded or copied onto a secure centralized internal log
server or media.
NC 10.5.5 Examine system settings, monitored files, and results from monitoring activities
to verify the use of file-integrity monitoring or change-detection software on logs.
10.6.1.a Examine security policies and procedures to verify that procedures are
defined for reviewing the following at least daily, either manually or via log tools:
-All security events
-Logs of all system components that store, process, or transmit CHD and/or SAD, or
that could impact the security of CHD and/or SAD
-Logs of all critical system components
-Logs of all servers and system components that perform security functions (for
example, firewalls, intrusion-detection systems/intrusion-prevention systems
(IDS/IPS), authentication servers, e-commerce redirection servers, etc.)
10.6.1.b Observe processes and interview personnel to verify that the following are
reviewed at least daily:
-All security events
-Logs of all system components that store, process, or transmit CHD and/or SAD, or
that could impact the security of CHD and/or SAD
-Logs of all critical system components
-Logs of all servers and system components that perform security functions (for
example, firewalls, intrusion-detection systems/intrusion-prevention systems
(IDS/IPS), authentication servers, e-commerce redirection servers, etc.).
10.6.2.a Examine security policies and procedures to verify that procedures are
defined for reviewing logs of all other system components periodically—either
manually or via log tools—based on the organization’s policies and risk management
strategy.
NC 10.7.a Examine security policies and procedures to verify that they define the
following:
-Audit log retention policies
- Procedures for retaining audit logs for at least one year, with a minimum of three
months immediately available online.
10.7.b Interview personnel and examine audit logs to verify that audit logs are
available for at least one year.
10.7.c Interview personnel and observe processes to verify that at least the last three
months’ logs can be immediately restored for analysis.
10.8 Examine documentation interview personnel to verify that security policies and
operational procedures for monitoring all access to network resources and cardholder
data are:
-Documented,
- In use, and
-Known to all affected parties.
ing, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult, if not impossible, without system
ermore, many of the controls within Requirement 10 are interdependent, and failing to comply with
of organizations were fully compliant.
s are logged, monitored, and reviewed. We found that just 49.5% of organizations were compliant
Identify the sample of audit logs observed to verify the following from 10.2.1-10.2.7
are logged:
All individual access to cardholder data.
All actions taken by any individual with root or administrative privileges.
Access to all audit trails.
All actions taken by any individual with root or administrative privileges. 4
Use of identification and authentication mechanisms.
All elevation of privileges.
All changes, additions, or deletions to any
account with root or administrative privileges.
Initialization of audit logs.
Stopping or pausing of audit logs.
Creation and deletion of system level objects.
<Report Findings Here>
For all items in the sample at 10.2, describe how configuration settings were 0 0
observed to verify all individual access to cardholder data is logged.
<Report Findings Here>
For all items in the sample at 10.2, describe how configuration settings were 0 1
observed to verify all actions taken by any individual with root or administrative
privileges are logged.
<Report Findings Here>
For all items in the sample at 10.2, describe how configuration settings were 0 0
observed to verify access to all audit trails is logged.
<Report Findings Here> 4
For all items in the sample at 10.2, describe how configuration settings were 0 1
observed to verify invalid logical access attempts are logged.
<Report Findings Here>
4
For all items in the sample at 10.2, describe how configuration settings were 0 1
observed to verify use of identification and authentication mechanisms is logged.
<Report Findings Here> 4
For all items in the sample at 10.2, describe how configuration settings were 0 1
observed to verify all elevation of privileges is logged.
<Report Findings Here>
4
For all items in the sample at 10.2, describe how configuration settings were 0 1
observed to verify all changes, additions, or deletions to any account with root or
administrative privileges are logged.
<Report Findings Here> 4
For all items in the sample at 10.2, describe how configuration settings were 0 0
observed to verify initialization of audit logs is logged.
<Report Findings Here>
4
For all items in the sample at 10.2, describe how configuration settings were 0 0
observed to verify creation and deletion of system level objects are logged.
<Report Findings Here>
Identify the responsible personnel interviewed who confirm that for each auditable 0 1
event from 10.2.1-10.2.7, the following are included in log entries:
User identification
Type of event
Date and time
Success or failure indication
Origination of event
<Report Findings Here>
Identify the sample of audit logs from 10.2.1- 10.2.7 observed to verify the 4
following are included in log entries:
<Report Findings Here>
For all logs in the sample at 10.3, describe how the audit logs were observed to 0 1
verify user identification is included in log entries.
<Report Findings Here> 4
For all logs in the sample at 10.3, describe how the audit logs were observed to 0 1
verify type of event is included in log entries.
<Report Findings Here> 4
For all logs in the sample at 10.3, describe how the audit logs were observed to 0 1
verify date and time stamp is included in log entries.
<Report Findings Here>
4
For all logs in the sample at 10.3, describe how the audit logs were observed to 0 1
verify success or failure indication is included in log entries.
<Report Findings Here> 4
For all logs in the sample at 10.3, describe how event is included in log entries. the 0 1
audit logs were observed to verify origination of event is included in log entries.
<Report Findings Here> 4
For all logs in the sample at 10.3, describe how the audit logs were observed to 0 1
verify the identity or name of affected data, system component, or resource is
included in log entries.
<Report Findings Here> 4
Identify the time synchronization technologies in use. (If NTP, include version) 0 0
<Report Findings Here>
Identify the documented process for acquiring, distributing, and storing the correct 0 0
time within the organization examined to verify that the process defines the
following:
Only the designated central time server(s) receive time signals from external
sources, and time signals from external sources are based on International Atomic
Time or UTC.
Where there is more than one designated time server, the time servers peer with 4
one another to keep accurate time.
Systems receive time information only from designated central time server(s).
<Report Findings Here>
Identify the sample of system components selected for 10.4.1.b-10.4.2.b 0 0
<Report Findings Here>
For all items in the sample, describe how the time-related system-parameter
settings for the sample of system components were observed to verify:
Only the designated central time server(s) receive time signals from external
sources, and time signals from external sources are based on International Atomic
Time or UTC.
<Report Findings Here>
Where there is more than one designated time server, the designated central time
server(s) peer with one another to keep accurate time. 4
<Report Findings Here>
Identify the authorized personnel interviewed who confirm that personnel with
access to time data have a business need to access time data.
<Report Findings Here>
4
For all items in the sample from 10.4.1, describe how configuration settings were
examined to restrict access to time data to only personnel with a documented
need.
<Report Findings Here>
Identify the documented time-synchronization procedures examined to verify 0 0
procedures define that changes to time settings on critical systems must be:
Logged
Monitored
Reviewed
<Report Findings Here>
For all items in the sample from 10.4.1, describe how configuration settings on the
sampled system components were examined to log any changes to time settings on
critical systems.
<Report Findings Here>
For all items in the sample from 10.4.1, describe how logs were examined to log any
changes to time settings on critical systems.
<Report Findings Here>
For all items in the sample, describe how configuration settings were examined to
verify either of the following:
<Report Findings Here>
That the time servers receive time updates from specific, industry-accepted
external sources. OR
<Report Findings Here>
That time updates are encrypted with a symmetric key, and access control lists 4
specify the IP addresses of client machines.
<Report Findings Here>
Identify the industry-accepted time source indicated (if applicable).
<Report Findings Here>
Identify the system administrators interviewed who confirm that audit trails are 0 0
secured so that they cannot be altered as follows (from 10.5.1- 10.5.5):
Only individuals who have a job-related need can view audit trail files.
Current audit trail files are protected from unauthorized modifications via access
control mechanisms, physical segregation, and/or network segregation.
Current audit trail files are promptly backed up to a centralized log server or media
that is difficult to alter, including:
That current audit trail files are promptly backed up to the centralized log server or
media
The frequency that audit trail files are backed up
That the centralized log server or media is difficult to alter
Logs for external-facing technologies (for example, wireless, firewalls, DNS, mail)
are written onto a secure, centralized, internal log server or media.
Use file-integrity monitoring or change- detection software on logs to ensure that
existing log data cannot be changed without generating alerts. 4
<Report Findings Here>
Identify the sample of system components selected for this testing procedure from
10.5.1- 10.5.5.
<Report Findings Here>
For each item in the sample at 10.5, describe how system configurations and 0 0
permissions were examined to verify they restrict viewing of audit trail files to only
individuals who have a documented job-related need.
<Report Findings Here>
4
For each item in the sample at 10.5, describe how system configurations and 0 0
permissions were examined to verify that current audit trail files are protected from
unauthorized modifications. (e.g., via access control mechanisms, physical
segregation, and/or network segregation).
<Report Findings Here> 4
For each item in the sample at 10.5, describe how system configurations and 0 0
permissions were examined to verify that current audit trail files are promptly
backed up to a centralized log server or media that is difficult to alter.
<Report Findings Here>
The centralized log server or media to which audit trail files are backed up.
<Report Findings Here>
How frequently the audit trail files are backed up, and how the frequency is
appropriate. 4
<Report Findings Here>
Describe how logs for external-facing technologies are written onto a secure
centralized internal log server or media 4
<Report Findings Here>.
For each item in the sample at 10.5, describe how the following were examined to 0 0
verify the use of file-integrity monitoring or change-detection software on logs:
System settings
Monitored files
Results from monitoring activities
Identify the file-integrity monitoring (FIM) or change-detection software verified to
be in use.
<Report Findings Here>
4
Identify the documented security policies and procedures examined to verify that 0 0
procedures define reviewing the following at least daily, either manually or via log
tools:
All security events.
Logs of all system components that store, process, or transmit CHD and/or SAD, or
that could impact the security of CHD and/or SAD.
Logs of all critical system components.
Logs of all servers and system components that perform security functions. 4
<Report Findings Here>
Describe the manual or log tools used for daily review of logs.
<Report Findings Here>
Identify the personnel interviewed who confirm that the following are reviewed at 0 1
least daily:
All security events.
Logs of all system components that store, process, or transmit CHD and/or SAD, or
that could impact the security of CHD and/or SAD.
Logs of all critical system components.
Logs of all servers and system components that perform security functions.
<Report Findings Here>
Describe how processes were observed to verify that the following are reviewed at
least daily:
Logs of all system components that store, process, or transmit CHD and/or SAD, or
that could impact the security of CHD and/or SAD.
<Report Findings Here>
4
Logs of all critical system components.
<Report Findings Here>
Logs of all servers and system components that perform security functions.
<Report Findings Here>
Identify the documented security policies and procedures examined to verify that 0 0
procedures define reviewing logs of all other system components periodically—
either manually or via log tools—based on the organization’s policies and risk
management strategy.
<Report Findings Here>
Describe the manual or log tools defined for periodic review of logs of all other 4
system components.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify that reviews
are performed in accordance with the organization’s policies and risk management 4
strategy.
<Report Findings Here>
Identify the documented security policies and procedures examined to verify that 0 0
procedures define following up on exceptions and anomalies identified during the
review process.
<Report Findings Here>
Describe how processes were observed to verify that follow-up to exceptions and 0 0
anomalies is performed.
<Report Findings Here>
Identify the personnel interviewed who confirm that follow-up to exceptions and
anomalies is performed.
<Report Findings Here> 4
Identify the documented security policies and procedures examined to verify that 0 0
procedures define the following:
Audit log retention policies.
Procedures for retaining audit logs for at least one year, with a minimum of three
months immediately available online.
<Report Findings Here> 4
Identify the personnel interviewed who confirm that audit logs are available for at 0 1
least one year.
<Report Findings Here>
Describe how the audit logs were examined to verify that audit logs are available for
at least one year. 4
<Report Findings Here>
Identify the personnel interviewed who confirm that at least the last three months’ 0 1
logs can be immediately restored for analysis.
<Report Findings Here>
Describe the processes observed to verify that at least the last three months’ logs
can be immediately restored for analysis. 4
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 0 0
procedures for monitoring all access to network resources and cardholder data are
documented.
<Report Findings Here>
166 0 19
ot impossible, without system activity logs.
ed Merchant Type D
0 0 0 0 0 1 1
NA 0
0 0 0 0 1 1 1
NA 0
0 0 0 0 0 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 0 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
Y 0
0 0 0 0 1 1 1
Y 0
0 0 0 0 1 1 1
Y 0
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
NT 3
0 0 0 0 1 1 1
NA 0
0 0 0 0 0 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 1 0 1 0 1 1
NT 1
0 1 0 1 22 41 41 Y 103
N
C
NT
NA
Stage of implementation Remediation plan
Estimated date for completion Comments Owner
Return to Table of content Go to requriement 10
Requirement 11: Regularly test security systems and processes.
Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. Syste
Major observations from the 2014 Verizon PCI Compliance Report:
Requirement 11 was the least complied-with requirement in our study. Just 23.8% of companies met all the controls between 2011 an
Controls and subcontrols where we saw the lowest compliance between 2011 and 2013 were:
• 11.3.a[Examinetheresultsfromthemostrecentpenetrationtesttoverifythatpenetration
testing is performed at least annually], 39.6%
• 11.3.b[Verifythatnotedexploitablevulnerabilitieswerecorrectedandtestingrepeated],43.6% • 11.2.1.a[Reviewthescanreportsandverif
the most recent 12-month period], 45.5%
11.1 Implement processes to test for the presence Implementation and/or exploitation of wireless
of wireless access points (802.11), and detect and technology within a network is one of the most
identify all authorized and unauthorized wireless common paths for malicious users to gain access to
access points on a quarterly basis. the network and cardholder data. If a wireless
device or network is installed without a company’s
Note: Methods that may be used in the process knowledge, it can allow an attacker to easily and
include but are not limited to wireless network “invisibly” enter the network.
scans, physical/logical inspections of system
components and infrastructure, network access Unauthorized wireless devices may be hidden
control (NAC), or wireless IDS/IPS. Whichever within or attached to a computer or other system
methods are used, they must be sufficient to detect component, or be attached directly to a network
and identify any unauthorized devices. port or network device, such as a switch or router.
Any such unauthorized device could result in an
unauthorized access point into the environment.
Due to the ease with which a wireless access point
can be attached to a network, the difficulty in
detecting their presence, and the increased risk
presented by unauthorized wireless devices, these
processes must be performed even when a policy
exists prohibiting the use of wireless technology.
11.2 Run internal and external network vulnerability A vulnerability scan is an automated tool run against
scans at least quarterly and after any significant external and internal network devices and servers,
change in the network (such as new system designed to expose potential vulnerabilities in
component installations, changes in network networks that could be found and exploited by
11.2.1 Perform quarterly internal vulnerability An established process for identifying vulnerabilities
scans. on internal systems within the CDE requires that
vulnerability scans be conducted quarterly.
Identifying and addressing vulnerabilities in a timely
manner reduces the likelihood of a vulnerability
being exploited and potential compromise of a
system component or cardholder data.
11.2.2 Perform quarterly external vulnerability As external networks are at greater risk of compromise, quarterly external vulne
scans via an Approved Scanning Vendor (ASV),
approved by the Payment Card Industry Security
Standards Council (PCI SSC).
Note: Quarterly external vulnerability scans must
be performed by an Approved Scanning Vendor
(ASV), approved by the Payment Card Industry
Security Standards Council (PCI SSC). Scans
conducted after
network changes may be performed by internal
staff.
11.2.3 Perform internal and external scans after Scanning an environment after any significant
any significant change. changes are made ensures that changes were
completed appropriately such that the security of
Note: Scans conducted after changes may be the environment was not compromised as a result
performed by internal staff. of the change. It may not be necessary to scan the
entire environment after a change. However, all
system components affected by the change will
need to be scanned.
11.3 Implement a methodology for penetration The intent of a penetration test is to simulate a real-
testing that includes the following: world attack situation with a goal of identifying how
far an attacker would be able to penetrate into an
-Is based on industry-accepted penetration testing environment. This allows an entity to gain a better
approaches (for example, NIST SP800-115) understanding of their potential exposure and
-Includes coverage for the entire CDE perimeter and develop a strategy to defend against attacks.
critical systems A penetration test differs from a vulnerability scan,
-Includes testing from both inside and outside the as a penetration test is an active process that may
network include exploiting identified vulnerabilities.
-Includes testing to validate any segmentation and Conducting a vulnerability scan may be one of the
scope-reduction controls first steps a penetration tester will perform in order
-Defines application-layer penetration tests to to plan the testing strategy, although it is not the
include, at a minimum, the vulnerabilities listed in only step. Even if a vulnerability scan does not
Requirement 6.5 detect known vulnerabilities, the penetration tester
-Defines network-layer penetration tests to include will often gain enough knowledge about the system
components that support network functions as well to identify possible security gaps.
as operating systems Penetration testing is generally a highly manual
-Includes review and consideration of threats and process. While some automated tools may be used,
vulnerabilities experienced in the last 12 months the tester uses their knowledge of systems to
-Specifies retention of penetration testing results penetrate into an environment. Often the tester will
and remediation activities results. chain several types of exploits together with a goal
of breaking through layers of defenses. For
example, if the tester finds a means to gain access
to an application server, they will then use the
compromised server as a point to stage a new
attack based on the resources the server has access
to. In this way, a tester is able to simulate the
methods performed by an attacker to identify areas
of potential weakness in the environment.
11.3.1 Perform external penetration testing at Penetration testing conducted on a regular basis
least annually and after any significant and after significant changes to the environment is a
infrastructure or application upgrade or proactive security measure that helps minimize
modification (such as an operating system potential access to the CDE by malicious individuals.
upgrade, a sub-network added to the The determination of what constitutes a significant
environment, or a web server added to the upgrade or modification is highly dependent on the
environment). configuration of a given environment. If an upgrade
or modification could allow access to cardholder
data or affect the security of the cardholder data
environment, then it could be considered
significant. Performing penetration tests after
network upgrades and modifications provides
assurance that the controls assumed to be in place
are still working effectively after the upgrade or
modification.
11.3.2 Perform internal penetration testing at
least annually and after any significant
infrastructure or application upgrade or
modification (such as an operating system
upgrade, a sub-network added to the
environment, or a web server added to the
environment).
11.3.3 Exploitable vulnerabilities found during
penetration testing are corrected and testing is
repeated to verify the corrections.
11.3.4 If segmentation is used to isolate the CDE Penetration testing is an important tool to confirm
from other networks, perform penetration tests that any segmentation in place to isolate the CDE
at least annually and after any changes to from other networks is effective. The penetration
segmentation controls/methods to verify that the testing should focus on the segmentation controls,
segmentation methods are operational and both from outside the entity’s network and from
effective, and isolate all out-of-scope systems inside the network but outside of the CDE, to
from in-scope systems. confirm that they are not able to get through the
segmentation controls to access the CDE. For
example, network testing and/or scanning for open
ports, to verify no connectivity between in-scope
and out-of-scope networks.
11.4 Use intrusion-detection systems, and/or Intrusion detection and/or intrusion prevention
intrusion-prevention systems to monitor all traffic at systems (IDS/IPS) compare the traffic coming into
the perimeter of the cardholder data environment the network with known “signatures” and/or
as well as at critical points inside of the cardholder behaviors of thousands of compromise types
data environment, and alert personnel to suspected (hacker tools, Trojans and other malware), and send
compromises. alerts and/or stop the attempt as it happens.
Without a proactive approach to unauthorized
Keep all intrusion-detection and prevention activity detection via these tools, attacks on (or
engines, baselines, and signatures up-to-date. misuse of) computer resources could go unnoticed
in real time. Security alerts generated by these tools
should be monitored, so that the attempted
intrusions can be stopped.
being introduced by new software. System components, processes, and custom software should be tested frequently to ensure security controls co
11.2.1.a[Reviewthescanreportsandverifythatfourquarterlyinternalscanswereperformedin
11.1.b Verify that the methodology is adequate to detect and identify any
unauthorized wireless access points, including at least the following:
11.1.2.b Interview responsible personnel and/or inspect recent wireless scans and
related responses to verify action is taken when unauthorized wireless access points
are found.
C1.2 11.2 Examine scan reports and supporting documentation to verify that internal and
C13.9 external vulnerability scans are performed as follows:
C6.4
C4.1
C4.1 11.2.1.a Review the scan reports and verify that four quarterly internal scans occurred
C11.2 in the most recent 12-month period.
11.2.1.b Review the scan reports and verify that the scan process includes rescans
until passing results are obtained, or all “High” vulnerabilities as defined in PCI DSS
Requirement 6.2 are resolved.
11.2.1.c Interview personnel to verify that the scan was performed by a qualified
internal resource(s) or qualified external third party, and if applicable, organizational
independence of the tester exists (not required to be a QSA or ASV).
C4.1 11.2.2.a Review output from the four most recent quarters of external vulnerability
scans and verify that four quarterly scans occurred in the most recent 12-month
period.
11.2.2.b Review the results of each quarterly scan to ensure that they satisfy the ASV
Program Guide requirements (for example, no vulnerabilities rated higher than a 4.0
by the CVSS and no automatic failures).
For each of the four internal quarterly scans indicated at 11.2.2.a, identify whether a
rescan was necessary. (yes/no)
If “yes,” describe how the results of the rescan were reviewed to verify that the ASV
Program Guide requirements for a passing scan have been met.
If “yes,” describe how the results of the rescan were reviewed to verify that the ASV
Program Guide requirements for a passing scan have been met.
11.2.2.c Review the scan reports to verify that the scans were completed by a PCI SSC
Approved Scanning Vendor (ASV).
C6.4 11.2.3.a Inspect and correlate change control documentation and scan reports to
C4.1 verify that system components subject to any significant change were scanned.
C11.2
11.2.3.b Review scan reports and verify that the scan process includes rescans until:
For external scans, no vulnerabilities exist that are scored 4.0 or higher by the CVSS.
For internal scans, all “high- risk” vulnerabilities as defined in PCI DSS Requirement
6.1 are resolved.
11.2.3.c Validate that the scan was performed by a qualified internal resource(s) or
qualified
external third party, and if applicable, organizational independence of the tester exists
(not required to be a QSA or ASV).
11.3 Examine penetration- testing methodology and interview responsible personnel
to verify a methodology is implemented and includes at least the following:
Is based on industry- accepted penetration testing approaches.
Includes coverage for the entire CDE perimeter and critical systems.
Includes testing from both inside and outside the network.
Includes testing to validate any segmentation and scope reduction controls.
Defines application-layer penetration tests to include, at a minimum, the
vulnerabilities listed in Requirement 6.5.
Defines network-layer penetration tests to include components that support network
functions as well as operating systems.
Includes review and consideration of threats and vulnerabilities experienced in the
last 12 months.
Specifies retention of penetration testing results and remediation activities results.
C13.9 11.3.1.a Examine the scope of work and results from the most recent external
C20.1 penetration test to verify that penetration testing is performed as follows:
Per the defined methodology
At least annually
After any significant changes to the environment.
11.3.1.b Verify that the test was performed by a qualified internal resource or
qualified external third party, and if applicable, organizational independence
of the tester exists (not required to be a QSA or ASV).
11.3.2.a Examine the scope of work and results from the most recent internal
penetration test to verify that penetration testing is performed at least annually and
after any significant changes to the environment.
Per the defined methodology
At least annually
After any significant changes
to the environment
11.3.2.b Verify that the test was performed by a qualified internal resource or
qualified external third party, and if applicable, organizational independence of the
tester exists (not required to be a QSA or ASV).
C13.2 11.4.a Examine system configurations and network diagrams to verify that techniques
C13.3 (such as intrusion-detection systems and/or intrusion-prevention systems) are in place
C5.1.2 to monitor all traffic:
-At the perimeter of the cardholder data environment
-At critical points in the cardholder data environment.
C3.9 11.5.a Verify the use of a change-detection mechanism within the cardholder data
environment by observing system settings and monitored files, as well as reviewing
results from monitoring activities.
Examples of files that should be monitored:
System executables
Application executables
Configuration and parameter files
Centrally stored, historical or archived, log and audit files
Additional critical files determined by entity (for example, through risk assessment
or other means).
11.5.1 Interview personnel to verify that all alerts are investigated and resolved.
11.6 Examine documentation interview personnel to verify that security policies and
operational procedures for security monitoring and testing are:
-Documented,
- In use, and
-Known to all affected parties.
ntly to ensure security controls continue to reflect a changing environment
Identify the documented policies and procedures examined to verify processes are 4 0 0
defined for detection and identification of authorized and unauthorized wireless
access points on a quarterly basis.
<Report Findings Here>
Identify/describe the output from recent wireless scans examined to verify that: 4 0 0
Authorized wireless access points are identified.
Unauthorized wireless access points are identified.
The scan is performed at least quarterly.
The scan covers all system components.
The scan covers all facilities.
<Report Findings Here>
Identify whether automated monitoring is utilized. (yes/no) 4 0 0
<Report Findings Here>
If “no,” mark the remainder of 11.1.d as “Not Applicable.” If “yes,” complete the
following:
<Report Findings Here>
Identify and describe any automated monitoring technologies in use.
<Report Findings Here>
For each monitoring technology in use, describe how the technology generates
alerts to personnel.
<Report Findings Here>
Identify the Incident Response Plan document examined that defines and requires 4 0 0
response in the event that an unauthorized wireless access point is detected.
<Report Findings Here>
For the interview, summarize the relevant details discussed that verify that action is
taken when unauthorized wireless access points are found.
<Report Findings Here>
And/or:
Identify the recent wireless scans inspected for this testing procedure.
<Report Findings Here>
Describe how the recent wireless scans and related responses were inspected to
verify that action is taken when unauthorized wireless access points are found.
<Report Findings Here>
Provide the name of the assessor who attests that four quarterly internal scans
were verified to have occurred in the most recent 12-month period. 2
<Report Findings Here>
Identify the documented process for quarterly internal scanning to verify the 0 0
process defines performing rescans as part of the quarterly internal scan process.
<Report Findings Here>
For each of the four internal quarterly scans indicated at 11.2.1.a, identify
whether a rescan was required. (yes/no)
<Report Findings Here>

If “yes,” describe how rescans were verified to be performed until either:
<Report Findings Here>
Passing results are obtained, or 2
<Report Findings Here>
All “High” vulnerabilities as defined in PCI DSS Requirement 6.1 are resolved.
<Report Findings Here>
Describe how the personnel who perform the scans demonstrated they are
qualified to perform the scans. 2
<Report Findings Here>
Provide the name of the assessor who attests that four quarterly external
vulnerability scans were verified to have occurred in the most recent 12-month 2
period.
<Report Findings Here>
Describe how the results of each quarterly scan were reviewed to verify that the 0 1
ASV Program Guide requirements for a passing scan have been met.
<Report Findings Here>
For each of the four internal quarterly scans indicated at 11.2.2.a, identify
whether a rescan was necessary. (yes/no)
<Report Findings Here>
2
Provide the name of the assessor who attests that the external scan reports were 0 1
reviewed and verified to have been completed by a PCI SSC-Approved Scanning
Vendor (ASV). 2
<Report Findings Here>
Identify the document reviewed to verify processes are defined for performing 0 1
internal and external scans after any significant change.
<Report Findings Here>
dentify the change control documentation and scan reports reviewed for this
testing procedure.
<Report Findings Here>
Describe how the change control documentation and scan reports were inspected 2
and correlated to verify that all system components subject to significant change
were scanned after the change.
<Report Findings Here>
For all scans reviewed in 11.2.3.a, identify whether a rescan was required. (yes/no) 0 1
<Report Findings Here>
If “yes” – for external scans, describe how rescans were performed until no
vulnerabilities with a CVSS score greater than 4.0 exist.
<Report Findings Here>
If “yes” – for internal scans, describe how rescans were performed until either 2
passing results were obtained or all “high-risk” vulnerabilities as defined in PCI DSS
Requirement 6.1 were resolved.
<Report Findings Here>
Describe how it was validated that the scan was performed by a qualified internal 0 1
resource(s) or qualified external third party.
<Report Findings Here>
Describe how the personnel who perform the scans demonstrated they are
qualified to perform the scans. 2
<Report Findings Here>
Describe how the penetration-testing methodology was examined to verify that the
implemented methodology includes at least the following:
Testing from both inside the network, and from outside of the network attempting
to get in. 2
<Report Findings Here>
Identify the documented external penetration test results reviewed to verify that 0 1
external penetration testing is performed:
Per the defined methodology
At least annually
<Report Findings Here>
Describe how the scope of work was reviewed to verify that external penetration
testing is performed:
Per the defined methodology
At least annually
<Report Findings Here>
Identify the documented internal penetration test results reviewed to verify that 0 0
internal penetration tests are performed after significant internal infrastructure or
application upgrade.
<Report Findings Here>
Describe how the scope of work was reviewed to verify that internal penetration
testing is performed:
Per the defined methodology
At least annually
<Report Findings Here>
Describe how the personnel who perform the scans demonstrated they are
qualified to perform the scans 2
<Report Findings Here>
Identify the documented penetration testing results examined to verify that noted 0 1
exploitable vulnerabilities were corrected and that repeated testing confirmed the
vulnerability was corrected.
<Report Findings Here> 2
Identify whether segmentation is used to isolate the CDE from other networks. 0 1
(yes/no)
<Report Findings Here>
Identify the network diagrams examined to verify that techniques are in place to 0 0
monitor all traffic:
At the perimeter of the cardholder data environment.
At critical points in the cardholder data environment.
<Report Findings Here>
Describe how system configurations were examined to verify that techniques are in
place to monitor all traffic:
<Report Findings Here>
At the perimeter of the cardholder data environment.
<Report Findings Here> 2
Describe how it was verified that the change-detection mechanism is configured to: 4 0 1
Alert personnel to unauthorized modification of critical files.
<Report Findings Here>
For the interview, summarize details of the interview that verify that all alerts are
investigated and resolved.
<Report Findings Here>
Identify the document reviewed to verify that security policies and operational 6 0 0
procedures for security monitoring and testing are documented.
<Report Findings Here>
90 0 15
ed Merchant Type D
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 1 0 1 1 1
N 5
0 0 1 0 1 1 1
N 5
0 0 1 0 1 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 0 0 0 1 1
N 5
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 1 1 1
N 5
0 0 0 0 1 1 1
NT 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 0 1 1
N 5
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
N 3
0 0 0 0 1 1 1
C 0
0 1 0 1 0 1 1
Y 0
0 1 3 1 22 32 32 Y 130
N
C
NT
NA
Proofs / Stage of implementation Remediation plan
Documentation links
Estimated date for Comments Owner
completion
Return to Table of content Go to Requirement 11
Requirement 12: Maintain a policy that addresses information security for all personnel.
A strong security policy sets the security tone for the whole entity and informs personnel what is expected of them. All personnel shou
Major Observ
Organizations found control 12.4 [Ensure that the security policy and procedures clearly defin
79.2% and 74.3% of organizations respectively were compliant with all the subcontrols of 12.7 [Screen potential personnel prior
Only 53.5% of organizations complie
And only 55.4% of organizations complied with 12.9.4 [Regularly train staff with security responsibilities]. Clearly,
12.1 Establish, publish, maintain, and disseminate a A company's information security policy creates the
security policy. roadmap for implementing security measures to
protect its most valuable assets. A strong security
policy sets the security tone for the whole company,
and lets personnel know what is expected of them.
All personnel should be aware of the sensitivity of
data and their responsibilities for protecting it.
12.1.1 Review the security policy at least annually Security threats and protection methods evolve
and updates when the environment changes. rapidly throughout the year. Without updating the
security policy to reflect relevant changes, new
protection measures to fight against these threats
are not addressed.
12.3 Develop usage policies for critical technologies Personnel usage policies can either prohibit use of
(for example, remote- access technologies, wireless certain devices and other technologies if that is
technologies, removable electronic media, laptops, company policy, or provide guidance for personnel
tablets, personal data/digital assistants (PDAs), e- as to correct usage and implementation. If usage
mail usage and Internet usage) and define proper policies are not in place, personnel may use the
use of these technologies. Ensure these usage technologies in violation of company policy, thereby
policies require the following: allowing malicious individuals to gain access to
critical systems and cardholder data. An example
can be unknowingly setting up wireless networks
with no security. To ensure that company standards
are followed and only approved technologies are
implemented, consider confining implementation to
operations teams only and not allowing
unspecialized/general personnel install these
technologies.
12.3.1 Explicit approval by authorized parties Without requiring proper approval for
implementation of these technologies, individual
personnel may innocently implement a solution to a
perceived business need, but also open a huge hole
that subjects critical systems and data to malicious
individuals.
12.3.2 Authentication for use of the technology If technology is implemented without proper
authentication (user IDs and passwords, tokens,
VPNs, etc.), malicious individuals may easily use this
unprotected technology to access critical systems
and cardholder data.
12.3.3 A list of all such devices and personnel Malicious individuals may breach physical security
with access and place their own devices on the network as a
“back door.” Personnel may also bypass procedures
and install devices. An accurate inventory with
proper device labeling allows for quick identification
of non-approved installations.
12.3.4 A method to accurately and readily Malicious individuals may breach physical security
determine owner, contact information, and and place their own devices on the network as a
purpose (for example, labeling, coding, and/or “back door.” Personnel may also bypass procedures
inventorying of devices) and install devices. An accurate inventory with
proper device labeling allows for quick identification
of non-approved installations. Consider establishing
an official naming convention for devices, and log all
devices with established inventory controls. Logical
labeling may be employed with information such as
codes that can correlate the device to its owner,
contact information, and purpose.
12.3.5 Acceptable uses of the technology By defining acceptable business use and location of
company-approved devices and technology, the
company is better able to manage and control gaps
in configurations and operational controls, to
ensure a “back door” is not opened for a malicious
individual to gain access to critical systems and
12.3.6 Acceptable network locations for the cardholder data.
technologies
12.3.8 Automatic disconnect of sessions for Remote-access technologies are frequent "back
remote-access technologies after a specific period doors" to critical resources and cardholder data. By
of inactivity disconnecting remote-access technologies when not
in use (for example, those used to support your
systems by your POS vendor, other vendors, or
business partner), access and risk to networks is
minimized. Consider using controls to disconnect
devices after 15 minutes of inactivity. Please also
see Requirement 8.5.6 for more on this topic.
12.3.9 Activation of remote-access technologies
for vendors and business partners only when
needed by vendors and business partners, with
immediate deactivation after use
12.3.10 For personnel accessing cardholder data To ensure all personnel are aware of their
via remote-access technologies, prohibit copy, responsibilities to not store or copy cardholder data
move, and storage of cardholder data onto local onto their local personal computer or other media,
hard drives and removable electronic media, your policy should clearly prohibit such activities
unless explicitly authorized for a defined business except for personnel that have been explicitly
need. authorized to do so. Any such authorized personnel
are responsible for ensuring that cardholder data in
their possession is handled in accordance with all
PCI DSS requirements, as that remote personnel’s
environment is now considered a part of the
organization’s cardholder data environment.
12.4 Ensure that the security policy and procedures Without clearly defined security roles and
clearly define information security responsibilities responsibilities assigned, there could be
for all personnel. inconsistent interaction with the security group,
leading to unsecured implementation of
technologies or use of outdated or unsecured
technologies.
12.5 Assign to an individual or team the following Each person or team with responsibilities for
information security management responsibilities: information security management should be clearly
aware of their responsibilities and related tasks,
through specific policy. Without this accountability,
gaps in processes may open access into critical
resources or cardholder data.
12.6 Implement a formal security awareness If personnel are not educated about their security
program to make all personnel aware of the responsibilities, security safeguards and processes
importance of cardholder data security. that have been implemented may become
ineffective through errors or intentional actions.
12.6.1 Educate personnel upon hire and at least If the security awareness program does not include
annually. periodic refresher sessions, key security processes
and procedures may be forgotten or bypassed,
Note: Methods can vary depending on the role of resulting in exposed critical resources and
the personnel and their level of access to the cardholder data. The focus and depth of the initial
cardholder data. and refresher training can vary depending on the
role of the personnel, and should be tailored as
appropriate for the particular audience. For
example, sessions for database administrators may
be focused on specific technical controls and
processes, while training for retail cashiers may
focus on secure transaction procedures
12.7 Screen potential personnel prior to hire to Performing thorough background investigations
minimize the risk of attacks from internal sources. prior to hiring potential personnel who are
(Examples of background checks include previous expected to be given access to cardholder data
employment history, criminal record, credit history, reduces the risk of unauthorized use of PANs and
and reference checks.) other cardholder data by individuals with
questionable or criminal backgrounds. It is expected
Note: For those potential personnel to be hired for that a company would have a policy and process for
certain positions such as store cashiers who only background checks, including their own decision
have access to one card number at a time when process for which background check results would
facilitating a transaction, this requirement is a have an impact on their hiring decisions (and what
recommendation only. that impact would be).
12.8.1 Maintain a list of service providers. Keeping track of all service providers identifies
where potential risk extends to outside of the
organization.
12.8.4 Maintain a program to monitor service Knowing your service providers’ PCI DSS compliance
providers’ PCI DSS compliance status at least status provides assurance that they comply with the
annually. same requirements that your organization is subject
to.
If the service provider offers a variety of services,
this requirement applies only to those services
12.8.5 Maintain information about which PCI DSS actually delivered to the client, and only those
requirements are managed by each service services in scope for the client’s PCI DSS
provider, and which are managed by the entity. assessment. For example, if a provider offers
firewall/IDS and ISP services, a client who utilizes
only the firewall/IDS service would only include that
service in the scope of their PCI DSS assessment.
12.9 Additional requirement for service providers: This requirement applies when the entity being
Service providers acknowledge in writing to assessed is a service provider. In conjunction with
customers that they are responsible for the security Requirement 12.8.2, this requirement is intended to
of cardholder data the service provider possesses or promote a consistent level of understanding
otherwise stores, processes, or transmits on behalf between service providers and their customers
of the customer, or to the extent that they could about their applicable PCI DSS responsibilities. The
impact the security of the customer’s cardholder acknowledgement of the service providers
data environment. evidences their commitment to maintaining proper
security of cardholder data that it obtains from its
clients.
The method by which the service provider provides
written acknowledgment should be agreed between
the provider and their customers.
12.10 Implement an incident response plan. Be Without a thorough security incident response plan
prepared to respond immediately to a system that is properly disseminated, read, and understood
breach. by the parties responsible, confusion and lack of a
unified response could create further downtime for
the business, unnecessary public media exposure,
as well as new legal liabilities.
12.10.1 Create the incident response plan to be The incident response plan should be thorough and
implemented in the event of system breach. contain all the key elements to allow your company
Ensure the plan addresses the following, at a to respond effectively in the event of a breach that
minimum: could impact cardholder data.
12.10.2 Test the plan at least annually. Without proper testing, key steps may be missed
which could result in increased exposure during an
incident.
If within the last year the incident response plan
was activated in its entirety, covering all
components of the plan, a detailed review of the
actual incident and its response may be sufficient to
12.10.3 Designate specific personnel to be Without proper testing, key steps may be missed
available on a 24/7 basis to respond to alerts. which could result in increased exposure during an
incident.
If within the last year the incident response plan
was activated in its entirety, covering all
components of the plan, a detailed review of the
actual incident and its response may be sufficient to
provide a suitable test. If only some components of
the plan were recently activated, the remaining
components would still need to be tested. If no
components of the plan were activated in the last
12 months, the annual test would need to
encompass all components of the plan.
12.10.5 Include alerts from intrusion- detection, These monitoring systems are designed to focus on
intrusion-prevention, and file- integrity potential risk to data, are critical in taking quick
monitoring systems. action to prevent a breach, and must be included in
the incident-response processes.
12.10.6 Develop a process to modify and evolve Incorporating “lessons learned” into the incident
the incident response plan according to lessons response plan after an incident helps keep the plan
learned and to incorporate industry current and able to react to emerging threats and
developments. security trends.
Go to requirement 1 Executive Summary
t is expected of them. All personnel should be aware of the sensitivity of data and their responsibilities for protecting it. For the purposes of Require
NC 12.1.1 Verify that the information security policy is reviewed at least annually and
updated as needed to reflect changes to business objectives or the risk environment.
NC 12.2.a Verify that an annual risk assessment process is documented that identifies
threats, vulnerabilities, and results in a formal risk assessment.
12.2.b Review risk assessment documentation to verify that the risk assessment
process is performed at least annually.
NC 12.3 Examine the usage policies for critical technologies and interview responsible
personnel to verify the following policies are implemented and followed:
NC 12.3.1 Verify that the usage policies require explicit approval from authorized parties
to use the technologies.
NC 12.3.2 Verify that the usage policies require that all technology use be authenticated
with user ID and password or other authentication item (for example, token).
NC 12.3.3 Verify that the usage policies require a list of all devices and personnel
authorized to use the devices.
NC 12.3.4 Verify that the usage policies define a method to accurately and readily
determine owner, contact information, and purpose (for example, labeling, coding,
and/or inventorying of devices).
NC 12.3.5 Verify that the usage policies require acceptable uses for the technology.
NC 12.3.6 Verify that the usage policies require acceptable network locations for the
technology.
NC 12.3.7 Verify that the usage policies require a list of company- approved products.
NC 12.3.8 Verify that the usage policies require automatic disconnect of sessions for
remote-access technologies after a specific period of inactivity.
12.3.8.b Examine configurations for remote access technologies to verify that remote
access sessions will be automatically disconnected after a specific period of inactivity.
NC 12.3.9 Verify that the usage policies require activation of remote- access technologies
used by vendors and business partners only when needed by vendors and business
partners, with immediate deactivation after use.
NC 12.3.10.a Verify that the usage policies prohibit copying, moving, or storing of
cardholder data onto local hard drives and removable electronic media when
accessing such data via remote-access technologies.
12.3.10.b For personnel with proper authorization, verify that usage policies require
the protection of cardholder data in accordance with PCI DSS Requirements.
NC 12.4.a Verify that information security policy and procedures clearly define
information security responsibilities for all personnel.
NC 12.5 Verify the formal assignment of information security to a Chief Security Officer or
other security-knowledgeable member of management.
Obtain and examine information security policies and procedures to verify that the
following information security responsibilities are specifically and formally assigned:
NC 12.5.1 Verify that responsibility for creating and distributing security policies and
procedures is formally assigned.
NC 12.5.2 Verify that responsibility for monitoring and analyzing security alerts and
distributing information to appropriate information security and business unit
management personnel is formally assigned.
C18.1 12.5.3 Verify that responsibility for creating and distributing security incident response
and escalation procedures is formally assigned.
NC 12.5.4 Verify that responsibility for administering user account and authentication
management is formally assigned.
NC 12.5.5 Verify that responsibility for monitoring and controlling all access to data is
formally assigned.
C9.1 12.6.a Verify the existence of a formal security awareness program for all personnel.
C9.2
NC 12.6.1.a Verify that the security awareness program provides multiple methods of
communicating awareness and educating personnel (for example, posters, letters,
memos, web based training, meetings, and promotions).
NC 12.6.1.b Verify that personnel attend awareness training upon hire and at least
annually.
12.6.1.c Interview a sample of personnel to verify they have completed awareness
training and are aware of the importance of cardholder data security.
NC 12.6.2 Verify that the security awareness program requires personnel to acknowledge,
in writing or electronically, at least annually that they have read and understand the
information security policy.
NC 12.7 Inquire with Human Resource department management and verify that
background checks are conducted (within the constraints of local laws) on potential
personnel prior to hire who will have access to cardholder data or the cardholder data
environment.
12.8 Through observation, review of policies and procedures, and review of
supporting documentation, verify that processes are implemented to manage service
providers with whom cardholder data is shared, or that could affect the security of
cardholder data (for example, backup tape storage facilities, managed service
providers such as web-hosting companies or security service providers, those that
receive data for fraud modeling purposes, etc.), as follows:
C12.13 12.8.2 Observe written agreements and confirm they include an acknowledgement by
service providers that they are responsible for the security of cardholder data the
service providers possess or otherwise store, process or transmit on behalf of the
customer, or to the extent that they could impact the security of the customer’s
cardholder data environment.
NC 12.8.3 Verify that policies and procedures are documented and were followed
including proper due diligence prior to engaging any service provider.
NA 12.8.4 Verify that the entity maintains a program to monitor its service providers’ PCI
DSS compliance status at least annually.
12.8.5 Verify the entity maintains information about which PCI DSS requirements are
managed by each service provider, and which are managed by the entity.
12.9 Additional testing procedure for service providers: Review service provider’s
policies and procedures and observe written agreement templates to confirm the
service provider acknowledges in writing to customers that the service provider will
maintain all applicable PCI DSS requirements to the extent the service provider
handles, has access to, or otherwise stores, processes or transmits the customer’s
cardholder data or sensitive authentication data, or manages the customer's
cardholder data environment on behalf of a customer.
C18.1 12.10 Examine the incident response plan and related procedures to verify entity is
prepared to respond immediately to a system breach by performing the following:
C18.2 12.10.1.a Verify that the incident response plan includes:
C18.4
- Roles, responsibilities, and communication strategies in the event of a compromise
including notification of the payment brands, at a minimum:
- Specific incident response procedures
- Business recovery and continuity procedures
- Data back-up processes
- Analysis of legal requirements for reporting compromises (for example, California Bill
1386 which requires notification of affected consumers in the event of an actual or
suspected compromise for any business with California residents in their database)
- Coverage and responses for all critical system components
- Reference or inclusion of incident response procedures from the payment brands
C18.5 12.10.4 Verify through observation and review of policies that staff with
C18.6 responsibilities for security breach response are periodically trained.
NC 12.1.5 Verify through observation and review of processes that monitoring and
responding to alerts from security systems including detection of unauthorized
wireless access points are covered in the Incident Response Plan.
NC 12.10.6 Verify through observation and review of policies that there is a process to
modify and evolve the incident response plan according to lessons learned and to
incorporate industry developments.
ting it. For the purposes of Requirement 12, “personnel” refers to full-time and part-time employees, temporary employees, contractors and consu
Selected Merchant Ty
Describe how the information security policy was examined to verify that it is
published and disseminated to:
Identify the document reviewed to verify that the information security policy is 6 0
reviewed at least annually and updated as needed to reflect changes to business
objectives or the risk environment.
<Report Findings Here>
Describe how it was verified that an annual risk process is documented and: 1 0
Identifies assets, threats and vulnerabilities.
Identify the usage policies for all identified critical technologies reviewed to verify the
following policies (12.3.1-12.3.10) are defined:
Explicit approval from authorized parties to use the technologies.
All technology use to be authenticated with user ID and password or other
authentication item.
A list of all devices and personnel authorized to use the devices.
A method to accurately and readily determine owner, contact information, and
purpose.
Acceptable uses for the technology.
Acceptable network locations for the
technology.
A list of company-approved products.
Automatic disconnect of sessions for remote-access technologies after a specific
period of inactivity.
Activation of remote-access technologies used by vendors and business partners only
when needed by vendors and business partners, with immediate deactivation after
use.
Prohibit copying, moving, or storing of cardholder data onto local hard drives and
removable electronic media when accessing such data via remote-access technologies.
<Report Findings Here>
Identify the responsible personnel interviewed who confirm usage policies for all
identified critical technologies are implemented and followed (for 12.3.1–12.3.10): see
above.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
include processes for explicit approval from authorized parties to use the
technologies.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
include processes s for all technology used to be authenticated with user ID and
password or other authentication item.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
include processes define a list of all devices and personnel authorized to use the
devices.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
define a method to accurately and readily determine:
Owner
Contact Information
Purpose
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
define acceptable uses for the technology.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
define acceptable network locations for the technology.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
include a list of company-approved products.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
require automatic disconnect of sessions for remote- access technologies after a
specific period of inactivity.
<Report Findings Here>
Describe how configurations for remote access technologies were examined to verify 6 0
that remote access sessions will be automatically disconnected after a specific period
of inactivity.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
prohibit copying, moving or storing of cardholder data onto local hard drives and
removable electronic media when accessing such data via remote- access
technologies.
<Report Findings Here>
Provide the name of the assessor who attests that the usage policies were verified to 6 0
require, for personnel with proper authorization, the protection of cardholder data in
accordance with PCI DSS Requirements.
<Report Findings Here>
Identify the information security policy and procedures reviewed to verify that they 6 0
clearly define information security responsibilities for all personnel.
<Report Findings Here>
Identify the responsible personnel interviewed for this testing procedure who confirm 6 0
they understand the security policy.
<Report Findings Here>
dentify the information security policies reviewed to verify the specific and formal 6 0
assignment of the following (including 12.5.1- 12.5.5):
Information security to a Chief Security Officer or other security-knowledgeable
member of management.
Responsibility for establishing, documenting and distributing security policies and
procedures.
Monitoring and analyzing security alerts and distributing information to appropriate
information security and business unit management personnel.
Establishing, documenting, and distributing security incident response and escalation
procedures.
Administering user account and authentication management.
Monitoring and controlling all access to data.
<Report Findings Here>
Provide the name of the assessor who attests that responsibilities were verified to be 6 0
formally assigned for:
Establishing security policies and procedures.
Documenting security policies and procedures.
Distributing security policies and procedures.
<Report Findings Here>
Provide the name of the assessor who attests that responsibilities were verified to be 6 0
formally assigned for:
Monitoring and analyzing security alerts.
Distributing information to appropriate information security and business unit
management personnel.
<Report Findings Here>
Provide the name of the assessor who attests that responsibilities were verified to be 0
formally assigned for:
Establishing security incident response and escalation procedures.
Documenting security incident response and escalation procedures.
Distributing security incident response and escalation procedures. 4
<Report Findings Here>
Provide the name of the assessor who attests that responsibilities were verified to be 6 0
formally assigned for administering user account and authentication management.
<Report Findings Here>
Provide the name of the assessor who attests that responsibilities were verified to be 6 0
formally assigned for:
Monitoring all access to data
Controlling all access to data
<Report Findings Here>
Describe how it was observed that all personnel attend security awareness training: 6 0
Upon hire
<Report Findings Here>
At least annually
<Report Findings Here>
Identifythesampleofpersonnelinterviewed who confirm they have completed security 6 0
awareness training.
<Report Findings Here>
For the interview, summarize details of the interview that verify their awareness of
the importance of cardholder data security.
<Report Findings Here>
Describe how it was verified that, per the security awareness program, all personnel: 6 0
Acknowledge that they have read and understand the information security policy
(including whether this is in writing or electronic).
<Report Findings Here>
Identify the documented policy reviewed to verify requirement for background checks 6 0
to be conducted:
On potential personnel who will have access to cardholder data or the cardholder data
environment.
Prior to hiring the personnel.
<Report Findings Here>
Identify the Human Resources personnel interviewed who confirm background checks
are conducted:
On potential personnel who will have access to cardholder data or the cardholder data
environment.
Prior to hiring the personnel.
<Report Findings Here>
Describe how it was verified that background checks are conducted (within the
constraints of local laws):
<Report Findings Here>
On potential personnel who will have access to cardholder data or the cardholder data
environment.
<Report Findings Here>
Describe how the documented list of service providers was observed to be maintained 1
(kept up-to-date).
<Report Findings Here> 2
Describe how written agreements for each service provider were observed to confirm 1
they include an acknowledgement by service providers that they will maintain all
applicable PCI DSS requirements to the extent the service provider handles, has access
to, or otherwise stores, processes, or transmits the customer’s cardholder data or
sensitive authentication data, or manages the customer's cardholder data 2
environment on behalf of a customer.
<Report Findings Here>
Describe how it was verified that the procedures for proper due diligence prior to 1
engaging a service provider are implemented, as documented in the policies and
procedures at 12.8.
<Report Findings Here>
2
Describe how it was verified that the entity maintains a program to monitor its service 1
providers’ PCI DSS compliance status at least annually.
<Report Findings Here> 2
Describe how it was observed that the entity maintains information about which PCI 1
DSS requirements are managed by each service provider, and which are managed by
the entity.
<Report Findings Here>
2
Identify whether the assessed entity is a service provider. (yes/no) 0
If “no,” mark the remainder of 12.9 as “Not Applicable.”
If “yes”:
Indicate whether this ROC is being completed prior to June 30, 2015. (yes/no)
<Report Findings Here>
If “yes” AND the assessed entity does not have this in place ahead of the
requirement’s effective date, mark the remainder of 12.9 as “Not Applicable.”
If “no” OR if the assessed entity has this in place ahead of the requirement’s effective
date:
<Report Findings Here>
Identify the service provider’s policies and procedures reviewed to verify that the
service provider acknowledges in writing to customers that the service provider will
maintain all applicable PCI DSS requirements to the extent the service provider
handles, has access to, or otherwise stores, processes, or transmits the customer’s
cardholder data or sensitive authentication data, or manages the customer's
cardholder data environment on behalf of a customer. 2
<Report Findings Here>
Describe how written agreement templates were observed to verify that the service
provider acknowledges in writing to customers that the service provider will maintain
all applicable PCI DSS requirements to the extent the service provider handles, has
access to, or otherwise stores, processes, or transmits the customer’s cardholder data
or sensitive authentication data, or manages the customer's cardholder data
environment on behalf of a customer.
<Report Findings Here>
Identify the documented incident response plan and related procedures examined to 0
verify the entity is prepared to respond immediately to a system breach, with defined
processes as follows from 12.10.1–12.10.6:
Create the incident response plan to be implemented in the event of system breach.
Test the plan at least annually.
Designate specific personnel to be available on a 24/7 basis to respond to alerts:
- 24/7incidentmonitoring
- 24/7incidentresponse
Provide appropriate training to staff with security breach response responsibilities.
Include alerts from security monitoring systems, including but not limited to intrusion- 4
detection, intrusion-prevention, firewalls, and file-integrity monitoring systems.
Develop a process to modify and evolve the incident response plan according to
lessons learned and to incorporate industry developments.
<Report Findings Here>
Provide the name of the assessor who attests that the incident response plan was 0
verified to include:
Roles and responsibilities.
Communication strategies.
Requirement for notification of the payment brands.
Specific incident response procedures.
Business recovery and continuity
procedures.
Data back-up processes.
Analysis of legal requirements for reporting compromises. 4
Coverage for all critical system components.
Responses for all critical system components.
Reference or inclusion of incident response procedures from the payment brands.
<Report Findings Here>
Identify the sample of personnel interviewed who confirm that the documented 0
incident response plan and procedures are followed.
<Report Findings Here>
Identify the sample of previously reported incidents or alerts reviewed for this testing
procedure.
<Report Findings Here>
For each item in the sample, describe how documentation was reviewed to confirm 4
that the documented incident response plan and procedures are followed.
<Report Findings Here>
Describe how it was observed that the incident response plan is tested at least 0
annually.
<Report Findings Here> 4
Identify the document requiring 24/7 incident response and monitoring coverage for: 0
Any evidence of unauthorized activity.
Detection of unauthorized wireless access
points.
Critical IDS alerts.
Reports of unauthorized critical system or content file changes.
<Report Findings Here>
Identify the sample of responsible personnel interviewed who confirm 24/7 incident
response and monitoring coverage for:
Any evidence of unauthorized activity.
Detection of unauthorized wireless access
points.
Critical IDS alerts.
Reports of unauthorized critical system or content file changes.
<Report Findings Here>
Describe how it was observed that designated personnel are available for 24/7
incident response and monitoring coverage
<Report Findings Here>
4
Any evidence of unauthorized activity.
<Report Findings Here>
Identify the sample of responsible personnel interviewed who confirm that staff with 0
responsibilities for security breach response are periodically trained.
<Report Findings Here>
Identify the documented policy reviewed that defines that staff with responsibilities
for security breach response are periodically trained. 4
<Report Findings Here>
Describe how it was observed that staff with responsibilities for security breach
response are periodically trained.
<Report Findings Here>
Describe how processes were reviewed to verify that monitoring alerts from security 0
monitoring systems, including detection of unauthorized wireless access points, are
covered in the Incident Response Plan.
<Report Findings Here>
Describe how processes were reviewed to verify that responding to alerts from
security monitoring systems, including detection of unauthorized wireless access
points, are covered in the Incident Response Plan. 4
<Report Findings Here>
Identify the documented policy reviewed to verify that processes are defined to 0
modify and evolve the incident response plan:
According to lessons learned.
To incorporate industry developments.
<Report Findings Here>
Identify the sample of responsible personnel interviewed who confirm that processes
are implemented to modify and evolve the incident response plan:
According to lessons learned.
To incorporate industry developments.
<Report Findings Here>
Describe how it was observed that processes are implemented to modify and evolve
the incident response plan:
<Report Findings Here>
4
According to lessons learned.
<Report Findings Here>
226 6
oyees, contractors and consultants who are “resident” on the entity’s site or otherwise have access to the cardholder data environment.
1 1 1 1 1 1 1 1
N 1
1 1 1 1 1 1 1 1
N 1
0 0 0 0 0 0 1 1
N 6
0 0 0 0 0 0 1 1
N 6
0 0 0 1 0 0 1 1
N 1
0 0 1 0 1 1 1 1
N 1
0 0 0 0 0 1 1 1
N 1
0 0 1 1 1 1 1 1
N 1
0 0 0 0 0 0 1 1
N 1
0 0 1 1 1 1 1 1
N 1
0 0 0 0 0 1 1 1
N 1
0 0 0 0 0 0 1 1
N 1
0 0 0 0 0 1 1 1
N 1
0 0 0 0 0 1 1 1
C 0
0 0 0 1 0 1 1 1
N 1
0 0 0 0 0 0 1 1
N 1
0 0 0 0 0 0 1 1
N 1
1 1 1 1 1 1 1 1
N 1
1 1 1 1 1 1 1 1
NT 1
1 1 1 1 1 1 1 1
N 1
0 0 0 0 0 0 1 1
N 1
0 0 0 0 0 0 1 1
N 1
0 1 1 1 1 1 1 1
N 3
1 0 0 0 0 0 1 1
N 1
0 0 0 0 0 0 1 1
N 1
1 1 1 1 1 1 1 1
N 1
1 1 0 1 0 0 1 1
N 1
0 1 0 0 0 0 1 1
N 1
0 1 0 0 0 0 1 1
N 1
0 1 0 0 0 0 1 1
Y 0
0 0 0 0 0 0 1 1
N 1
0 0 0 0 0 0 1 1
N 1
1 0 1 1 1 1 1 1
N 5
1 1 1 1 1 1 1 1
N 5
1 1 1 1 1 1 1 1
N 5
1 1 1 1 1 1 1 1
N 5
1 1 1 1 1 1 1 1
N 5
1 1 0 1 0 1 1 1
Y 0
0 0 0 0 0 0 0 1
Y 0
0 0 0 0 0 0 1 1
N 3
1 1 0 1 0 1 1 1
N 3
1 0 0 1 0 1 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
N 3
0 0 0 0 0 0 1 1
Y 0
16 17 15 20 15 23 46 47 Y 88
N
C
NT
NA
er data environment.
Criticality
High
Medium
Low