> **Payment Card Industry**
Data Security Standard
> **Requirements and Testing Procedures**
>
> **Version 4.0**
#### March 2022
+--------+-------+----------------------------------------------------+
| ** | > * | **Description** |
| Date** | *Vers | |
| | ion** | |
+========+=======+====================================================+
| > O | 1.2 | To introduce PCI DSS v1.2 as "PCI DSS Requirements |
| ctober | | and Security Assessment Procedures," eliminating |
| > 2008 | | redundancy between documents, and making both |
| | | general and specific changes from PCI DSS Security |
| | | Audit Procedures v1.1. For complete information, |
| | | see PCI Data Security Standard Summary of Changes |
| | | from PCI DSS Version 1.1 to 1.2. |
+--------+-------+----------------------------------------------------+
| > July | 1.2.1 | Add sentence that was incorrectly deleted between |
| > 2009 | | PCI DSS v1.1 and v1.2. |
+--------+-------+----------------------------------------------------+
| | | Correct "then" to "than" in testing procedures |
| | | 6.3.7.a and 6.3.7.b. |
+--------+-------+----------------------------------------------------+
| | | Remove grayed-out marking for "in place" and "not |
| | | in place" columns in testing procedure 6.5.b. |
+--------+-------+----------------------------------------------------+
| | | For Compensating Controls Worksheet -- Completed |
| | | Example, correct wording at top of page to say, |
| | | "Use this worksheet to define compensating |
| | | controls for any requirement noted as "in place" |
| | | via compensating controls." |
+--------+-------+----------------------------------------------------+
| > O | 2.0 | Update and implemented changes from v1.2.1. See |
| ctober | | PCI DSS -- Summary of Changes from PCI DSS Version |
| > 2010 | | 1.2.1 to 2.0. |
+--------+-------+----------------------------------------------------+
| > No | 3.0 | Update from v2.0. See PCI DSS -- Summary of |
| vember | | Changes from PCI DSS Version 2.0 to 3.0. |
| > 2013 | | |
+--------+-------+----------------------------------------------------+
| > | 3.1 | Update from PCI DSS v3.0. See PCI DSS -- Summary |
| April | | of Changes from PCI DSS Version 3.0 to 3.1 for |
| > 2015 | | details of changes. |
+--------+-------+----------------------------------------------------+
| > | 3.2 | Update from PCI DSS v3.1. See PCI DSS -- Summary |
| April | | of Changes from PCI DSS Version 3.1 to 3.2 for |
| > 2016 | | details of changes. |
+--------+-------+----------------------------------------------------+
| > May | 3.2.1 | Update from PCI DSS v3.2. See PCI DSS -- Summary |
| > 2018 | | of Changes from PCI DSS Version 3.2 to 3.2.1 for |
| | | details of changes. |
+--------+-------+----------------------------------------------------+
| > | 4.0 | Rename document title to "Payment Card Industry |
| March | | Data Security Standard: Requirements and Testing |
| > 2022 | | Procedures." |
| | | |
| | | Update from PCI DSS v3.2.1. See PCI DSS -- Summary |
| | | of Changes from PCI DSS Version 3.2.1 to 4.0 for |
| | | details of changes. |
+--------+-------+----------------------------------------------------+
1. [[#Introduction and PCI Data Security Standard Overview]]
2. [[#PCI DSS Applicability Information]]
3. [[#Relationship between PCI DSS and PCI SSC Software Standards]]
4. [[#Scope of PCI DSS Requirements]]
5. [[#Best Practices for Implementing PCI DSS into Business-as-Usual Processes]]
6. [[#For Assessors Sampling for PCI DSS Assessments]]
7. [[#Description of Timeframes Used in PCI DSS Requirements]]
8. [[#Approaches for Implementing and Validating PCI DSS]]
9. [[#Protecting Information About an Entity's Security Posture]]
10. [[#Testing Methods for PCI DSS Requirements]]
11. [[#Instructions and Content for Report on Compliance]]
12. [PCI DSS Assessment Process 34](#pci-dss-assessment-process)
13. [Additional References 35](#additional-references)
14. [PCI DSS Versions 36](#pci-dss-versions)
15. [[#Detailed PCI DSS Requirements and Testing Procedures]]
[[#Build and Maintain a Secure Network and Systems]]
{width="7.274998906386702in"
height="0.11166557305336833in"}[Protect Account Data
73](#protect-account-data)
{width="7.274998906386702in"
height="0.138332239720035in"}[Maintain a Vulnerability Management
Program 111](#maintain-a-vulnerability-management-program)
[Implement Strong Access Control Measures
149](#implement-strong-access-control-measures)
> {width="0.9499989063867017in"
> height="0.13499890638670167in"}{width="7.274998906386702in"
> height="0.138332239720035in"}[Regularly Monitor and Test Networks
> 212](#regularly-monitor-and-test-networks)
>
> {width="8.374998906386702in"
> height="0.138332239720035in"}[Maintain an Information Security Policy
> 259](#maintain-an-information-security-policy)
>
> [**Appendix A Additional PCI DSS Requirements
> 298**](#appendix-a-additional-pci-dss-requirements)
>
> [Appendix A1: Additional PCI DSS Requirements for Multi-Tenant Service
> Providers
> 298](#appendix-a1-additional-pci-dss-requirements-for-multi-tenant-service-providers)
>
> [Appendix A2: Additional PCI DSS Requirements for Entities Using
> SSL/Early TLS for Card-Present POS POI Terminal Connections
> 304](#appendix-a2-additional-pci-dss-requirements-for-entities-using-sslearly-tls-for-card--present-pos-poi-terminal-connections)
>
> [Appendix A3: Designated Entities Supplemental Validation (DESV)
> 308](#appendix-a3-designated-entities-supplemental-validation-desv)
>
> [**Appendix B Compensating Controls
> 330**](#appendix-b-compensating-controls)
>
> [**Appendix C Compensating Controls Worksheet
> 332**](#appendix-c-compensating-controls-worksheet)
>
> [**Appendix D Customized Approach
> 333**](#appendix-d-customized-approach)
>
> [**Appendix E Sample Templates to Support Customized Approach
> 335**](#appendix-e-sample-templates-to-support-customized-approach)
>
> [**Appendix F Leveraging the PCI Software Security Framework to
> Support Requirement 6
> 341**](#appendix-f-leveraging-the-pci-software-security-framework-to-support-requirement-6)
>
> [**Appendix G PCI DSS Glossary of Terms, Abbreviations, and Acronyms
> 344**](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)
# Introduction and PCI Data Security Standard Overview
The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment card account data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment card account data, PCI DSS can also be used to protect against threats and secure other elements in the payment ecosystem.
[Table 1](#table-1.-principal-pci-dss-requirements) shows the 12 principal PCI DSS requirements.
##### Table 1. Principal PCI DSS Requirements {#table-1.-principal-pci-dss-requirements .unnumbered}
+------------------------------+---------------------------------------+
| **PCI Data Security Standard | |
| -- High Level Overview** | |
+==============================+=======================================+
| | |
+------------------------------+---------------------------------------+
| > **Build and Maintain a | 1. Install and Maintain Network |
| > Secure Network and | Security Controls. |
| > Systems** | |
| | 2. Apply Secure Configurations to |
| | All System Components. |
+------------------------------+---------------------------------------+
| > **Protect Account Data** | 3. Protect Stored Account Data. |
| | |
| | 4. Protect Cardholder Data with |
| | Strong Cryptography During |
| | Transmission Over Open, Public |
| | Networks. |
+------------------------------+---------------------------------------+
| > **Maintain a Vulnerability | 5. Protect All Systems and Networks |
| > Management Program** | from Malicious Software. |
| | |
| | 6. Develop and Maintain Secure |
| | Systems and Software. |
+------------------------------+---------------------------------------+
| > **Implement Strong Access | 7. Restrict Access to System |
| > Control Measures** | Components and Cardholder Data by |
| | Business Need to Know. |
| | |
| | 8. Identify Users and Authenticate |
| | Access to System Components. |
| | |
| | 9. Restrict Physical Access to |
| | Cardholder Data. |
+------------------------------+---------------------------------------+
| > **Regularly Monitor and | 10. Log and Monitor All Access to |
| > Test Networks** | System Components and Cardholder |
| | Data. |
| | |
| | 11. Test Security of Systems and |
| | Networks Regularly. |
+------------------------------+---------------------------------------+
| > **Maintain an Information | > **12.** Support Information |
| > Security Policy** | > Security with Organizational |
| | > Policies and Programs. |
+------------------------------+---------------------------------------+
> This document, the Payment Card Industry Data Security Standard
> Requirements and Testing Procedures, consists of the 12 PCI DSS
> principal requirements, detailed security requirements, corresponding
> testing procedures, and other information pertinent to each
> requirement. The following sections provide detailed guidelines and
> best practices to assist entities to prepare for, conduct, and report
> the results of a PCI DSS assessment. The PCI DSS requirements and
> testing procedures begin on page 43.
>
> PCI DSS comprises a minimum set of requirements for protecting account
> data and may be enhanced by additional controls and practices to
> further mitigate risks, and to incorporate local, regional, and sector
> laws and regulations. Additionally, legislation or regulatory
> requirements may require specific protection of personal information
> or other data elements (for example, cardholder name).
### *Limitations* {#limitations .unnumbered}
> If any of the requirements contained in this standard conflict with
> country, state, or local laws, the country, state, or local law will
> apply.
>
> **PCI DSS Resources**
>
> The PCI Security Standards Council (PCI SSC) website
> ([www.pcisecuritystandards.org](https://www.pcisecuritystandards.org/))
> provides the following additional resources to assist organizations
> with their PCI DSS assessments and validations:
- Document Library, including:
- PCI DSS Summary of Changes
- PCI DSS Quick Reference Guide
- Information Supplements and Guidelines
- Prioritized Approach for PCI DSS
- Report on Compliance (ROC) Reporting Template and Reporting
Instructions
- Self-Assessment Questionnaires (SAQs) and SAQ Instructions and
Guidelines
- Attestations of Compliance *(*AOCs*)*
- Frequently Asked Questions (FAQs)
- PCI for Small Merchants website
- PCI training courses and informational webinars
- List of Qualified Security Assessors (QSAs) and Approved Scanning
Vendors (ASVs)
- Lists of PCI approved devices, applications, and solutions
> There are over 60 guidance documents and information supplements
> available on the PCI SSC website that provide specific guidance and
> considerations for PCI DSS. Examples include:
- Guidance for PCI DSS Scoping and Network Segmentation
> ***Note:** Information Supplements complement PCI DSS and identify
> additional considerations and recommendations for meeting PCI DSS
> requirements. Information Supplements do not supersede, replace, or
> extend PCI DSS or any of its requirements.*
- PCI SSC Cloud Computing Guidelines
- Multi-Factor Authentication Guidance
- Third-Party Security Assurance
- Effective Daily Log Monitoring
- Penetration Testing Guidance
- Best Practices for Implementing a Security Awareness Program
- Best Practices for Maintaining PCI DSS Compliance
- PCI DSS for Large Organizations
- Use of SSL/Early TLS and Impact on ASV Scans
- Use of SSL/Early TLS for POS POI Terminal Connections
- Tokenization Product Security Guidelines
- Protecting Telephone-Based Payment Card Data
> Refer to the Document Library at
> [www.pcisecuritystandards.org](https://www.pcisecuritystandards.org/)
> for information about these and other resources. In addition, refer to
> *[Appendix
> G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)*
> for definitions of PCI DSS terms.
# PCI DSS Applicability Information
> PCI DSS is intended for all entities that store, process, or transmit
> cardholder data (CHD) and/or []{#_bookmark3 .anchor}sensitive
> authentication data (SAD) or could impact the security of the
> cardholder data environment (CDE). This includes all entities involved
> in payment card account processing --- including merchants,
> processors, acquirers, issuers, and other service providers.
>
> Whether any entity is required to comply with or validate their
> compliance to PCI DSS is at the discretion of those organizations that
> manage compliance programs (such as payment brands and acquirers).
> Contact the organizations of interest for any additional criteria.
>
> **Defining Account Data, Cardholder Data, and Sensitive Authentication
> Data**
>
> Cardholder data and sensitive authentication data are considered
> account data and are defined as follows:
##### Table 2. Account Data {#table-2.-account-data .unnumbered}
+------------------------------+---------------------------------------+
| **Account Data** | |
+==============================+=======================================+
| > **Cardholder Data | > **Sensitive Authentication Data |
| > includes:** | > includes:** |
+------------------------------+---------------------------------------+
| - Primary Account Number | - Full track data (magnetic-stripe |
| (PAN) | data or equivalent on a chip) |
| | |
| - Cardholder Name | - Card verification code |
| | |
| - Expiration Date | - PINs/PIN blocks |
| | |
| - Service Code | |
+------------------------------+---------------------------------------+
> PCI DSS requirements apply to entities with environments where account
> data (cardholder data and/or sensitive authentication data) is stored,
> processed, or transmitted, and entities with environments that can
> impact the security of the CDE. Some PCI DSS requirements may also
> apply to entities with environments that do not store, process, or
> transmit account data -- for example, entities that outsource payment
> operations or management of their CDE [1](#_bookmark3). Entities that
> outsource their payment environments or payment operations to third
> parties remain responsible for ensuring that the account data is
> protected by the third party per applicable PCI DSS requirements.
>
> The primary account number (PAN) is the defining factor for cardholder
> data. The term account data therefore covers the following: the full
> PAN, any other elements of cardholder data that are present with the
> PAN, and any elements of sensitive authentication data.
>
> 1 In accordance with those organizations that manage compliance
> programs (such as payment brands and acquirers); entities should
> contact the organizations of interest for more details.
>
> If cardholder name, service code, and/or expiration date are stored,
> processed, or transmitted with the PAN, or are otherwise present in
> the CDE, they must be protected in accordance with the PCI DSS
> requirements applicable to cardholder data.
>
> If an entity stores, processes, or transmits PAN, then a CDE exists to
> which PCI DSS requirements will apply. Some requirements may not be
> applicable, for example if the entity does not store PAN, then the
> requirements relating to the protection of stored PAN in Requirement 3
> will not be applicable to the entity.
>
> Even if an entity does not store, process, or transmit PAN, some PCI
> DSS requirements may still apply. Consider the following:
- If the entity stores SAD, requirements specifically related to SAD
storage in Requirement 3 will be applicable.
- If the entity engages third-party service providers to store,
process or transmit PAN on its behalf, requirements related to the
management of service providers in Requirement 12 will be
applicable.
- If the entity can impact the security of a CDE because the security
of an entity's infrastructure can affect how cardholder data is
processed (for example, via a web server that controls the
generation of a payment form or page) some requirements will be
applicable.
- If cardholder data is only present on physical media (for example
paper), requirements relating to the security and disposal of
physical media in Requirement 9 will be applicable.
- Requirements related to an incident response plan are applicable to
all entities, to ensure that there are procedures to follow in the
event of a suspected or actual breach of the confidentiality of
cardholder data*.*
### *Use of Account Data, Sensitive Authentication Data, Cardholder Data, and Primary Account Number in PCI DSS* {#use-of-account-data-sensitive-authentication-data-cardholder-data-and-primary-account-number-in-pci-dss .unnumbered}
> PCI DSS includes requirements that specifically refer to account data,
> cardholder data, and sensitive authentication data. It is important to
> note that each of these types of data are different and the terms are
> not interchangeable. Specific references within requirements to
> account data, cardholder data, or sensitive authentication data are
> purposeful, and the requirements apply specifically to the type of
> data that is referenced.
### *Elements of Account Data and Storage Requirements* {#elements-of-account-data-and-storage-requirements .unnumbered}
> Table 3 identifies the elements of cardholder and sensitive
> authentication data, whether []{#_bookmark4 .anchor}st[]{#_bookmark5
> .anchor}orage of each data element is permitted or prohibited, and
> whether each data element must be rendered unreadable---for example,
> with strong cryptography---when stored. This table is not exhaustive
> and is presented to illustrate only how the stated requirements apply
> to the different data elements.
##### Table 3. Account Data Element Storage Requirements {#table-3.-account-data-element-storage-requirements .unnumbered}
+---+--------+------------------+------------------+-----------------+
| | | **Data | > **Storage | > **Required to |
| | | Elements** | > Restrictions** | > Render Stored |
| | | | | > Data |
| | | | | > Unreadable** |
+===+========+==================+==================+=================+
| > | > | Primary Account | Storage is kept | > Yes, as |
| | **Card | Number (PAN) | to a minimum as | > defined in |
| * | holder | | defined in | > Requirement |
| * | > | | Requirement 3.2 | > 3.5 |
| A | Data** | | | |
| c | | | | |
| c | | | | |
| o | | | | |
| u | | | | |
| n | | | | |
| t | | | | |
| > | | | | |
| | | | | |
| D | | | | |
| a | | | | |
| t | | | | |
| a | | | | |
| * | | | | |
| * | | | | |
+---+--------+------------------+------------------+-----------------+
| | | Cardholder Name | Storage is kept | No |
| | | | to a minimum as | |
| | | | defined in | |
| | | | Requirement 3.2 | |
| | | | [2](#_bookmark4) | |
+---+--------+------------------+------------------+-----------------+
| | | Service Code | | |
+---+--------+------------------+------------------+-----------------+
| | | Expiration Date | | |
+---+--------+------------------+------------------+-----------------+
| | **Sen | Full Track Data | > Cannot be | Yes, data |
| | sitive | | > stored after | stored until |
| | Au | | > authorization | authorization |
| | thenti | | > as defined in | is complete |
| | cation | | > Requirement | must be |
| | Data** | | > 3.3.1 | protected with |
| | | | > | strong |
| | | | [3](#_bookmark5) | cryptography as |
| | | | | defined in |
| | | | | Requirement |
| | | | | 3.3.2 |
+---+--------+------------------+------------------+-----------------+
| | | Card | | |
| | | verification | | |
| | | code | | |
+---+--------+------------------+------------------+-----------------+
| | | PIN/PIN Block | | |
+---+--------+------------------+------------------+-----------------+
> If PAN is stored with other elements of cardholder data, only the PAN
> must be rendered unreadable according to PCI DSS Requirement 3.5.1.
>
> Sensitive authentication data must not be stored after authorization,
> even if encrypted. This applies even for environments where there is
> no PAN present.
>
> 2 Where data exists in the same environment as PAN.
>
> 3 Except as permitted for issuers and companies that support issuing
> services. Requirements for issuers and issuing services are separately
> defined in Requirement 3.3.3.
# Relationship between PCI DSS and PCI SSC Software Standards
> PCI SSC supports the use of secure payment software within cardholder
> data environments (CDE) via the Payment Application Data Security
> Standard (PA-DSS) and the Software Security Framework (SSF), which
> consists of the Secure Software Standard and the Secure Software
> Lifecycle (Secure SLC) Standard. Software that is PCI SSC validated
> and listed provides assurance that the software has been developed
> using secure practices and has met a defined set of software security
> requirements.
>
> The PCI SSC secure software programs include listings of payment
> software and software vendors that have been validated as meeting the
> applicable PCI SSC Software Standards.
>
> ***Note:** PA-DSS and the related program will be retired in October
> 2022. Refer to the PCI SSC List of Validated Payment Applications for
> expiry dates for PA-DSS validated applications. After the expiry date,
> applications are listed as "Acceptable only for Pre-Existing
> Deployments." Whether an entity can continue to use a PA-DSS
> application with an expired listing is at the discretion of
> organizations that manage compliance programs (such as payment brands
> and acquirers); entities should contact the organizations of interest
> for more details.*
- **Validated Software**: Payment software listed on the PCI SSC
website as a Validated Payment Application (PA-DSS) or Validated
Payment Software (the Secure Software Standard) has been evaluated
by a qualified assessor to confirm the software meets the security
requirements within that standard. The security requirements in
these standards are focused on protecting the integrity and
confidentiality of payment transactions and account data.
- **Validated Software Vendors**: The Secure SLC Standard defines
security requirements for software vendors to integrate secure
software development practices throughout the entire software
lifecycle. Software vendors that have been validated as meeting the
Secure SLC Standard are listed on the PCI SSC website as a Secure
SLC Qualified Vendor.
> For more information about the SSF or PA-DSS, refer to the respective
> Program Guides at
> [www.pcisecuritystandards.org.](http://www.pcisecuritystandards.org/)
>
> All software that stores, processes, or transmits account data, or
> that could impact the security of account data or a CDE, is in scope
> for an entity's PCI DSS assessment. While the use of validated payment
> software supports the security of an entity's CDE, the use of such
> software does not by itself make an entity PCI DSS compliant. The
> entity's PCI DSS assessment should include verification that the
> software is properly configured and securely implemented to support
> applicable PCI DSS requirements. Additionally, if PCI-listed payment
> software has been customized, a more in-depth review will be required
> during the PCI DSS assessment because the software may no longer be
> representative of the version that was originally validated.
>
> Because security threats are constantly evolving, software that is no
> longer supported by the vendor (for example, identified by the vendor
> as "end of life") may not offer the same level of security as
> supported versions. Entities are strongly encouraged to keep their
> software current and updated to the latest software versions
> available.
>
> Entities that develop their own software are encouraged to refer to
> PCI SSC's software security standards and consider the requirements
> therein as best practices to use in their development environments.
> Secure payment software implemented in a PCI DSS compliant environment
> will help minimize the potential for security breaches leading to
> compromises of account data and fraud. See *[Bespoke
> and](#_bookmark7)* [*Custom Software*.](#_bookmark7)
>
> **Applicability of PCI DSS to Payment Software Vendors**
>
> PCI DSS may apply to a payment software vendor if the vendor is also a
> service provider that stores, processes, or transmits account data, or
> has access to their customers' account data---for example, in the role
> of a payment service provider or via remote access to a customer
> environment. Software vendors to which PCI DSS may be applicable
> include those offering payment services, as well as cloud service
> providers offering payment terminals in the cloud, software as a
> service (SaaS), e-commerce in the cloud, and other cloud payment
> services.
>
> []{#_bookmark7 .anchor}**Bespoke and Custom Software**
>
> ***Note:** PCI DSS Requirement 6 fully applies to bespoke and custom
> software that has not been developed and maintained in accordance with
> one of PCI SSC's Software Security Framework standards. Entities that
> use software vendors to develop bespoke or custom software that could
> impact the security of account data or their CDE are responsible for
> ensuring those software vendors develop the software according to PCI
> DSS Requirement 6.*
>
> All bespoke and custom software that stores, processes, or transmits
> account data, or that could impact the security of account data or a
> CDE, is in scope for an entity's PCI DSS assessment.
>
> Bespoke and custom software that has been developed and maintained in
> accordance with one of PCI SSC's Software Security Framework standards
> (the Secure Software Standard or the Secure SLC standard) will support
> an entity in meeting PCI DSS Requirement 6.
>
> See *[Appendix
> F](#appendix-f-leveraging-the-pci-software-security-framework-to-support-requirement-6)*
> for more details.
# Scope of PCI DSS Requirements
> PCI DSS requirements apply to:
- The cardholder data environment (CDE), which is comprised of:
- System components, people, and processes that store, process,
and transmit cardholder []{#_bookmark9 .anchor}data and/or
sensitive authentication data, and,
- System components that may not store, process, or transmit
CHD/SAD but have unrestricted connectivity to system components
that store, process, or transmit CHD/SAD.
> AND
- System components, people, and processes that could impact the
security of the CDE. [4](#_bookmark9)
> "System components" include network devices, servers, computing
> devices, virtual components, cloud components, and software. Examples
> of system components include but are not limited to:
- Systems that store, process, or transmit account data (for example,
payment terminals, authorization systems, clearing systems, payment
middleware systems, payment back-office systems, shopping cart and
store front systems, payment gateway/switch systems, fraud
monitoring systems).
- Systems that provide security services (for example, authentication
servers, access control servers, security information and event
management (SIEM) systems, physical security systems (for example,
badge access or CCTV), multi-factor authentication systems,
anti-malware systems).
- Systems that facilitate segmentation (for example, internal network
security controls).
- Systems that could impact the security of account data or the CDE
(for example, name resolution, or e-commerce (web) redirection
servers).
- Virtualization components such as virtual machines, virtual
switches/routers, virtual appliances, virtual applications/desktops,
and hypervisors.
- Cloud infrastructure and components, both external and on premises,
and including instantiations of containers or images, virtual
private clouds, cloud-based identity and access management, CDEs
residing on premises or in the cloud, service meshes with
containerized applications, and container orchestration tools.
> 4 For additional guidance, refer to *Information Supplement: Guidance
> for PCI DSS Scoping and Network Segmentation* on the PCI SSC website.
- Network components, including but not limited to network security
controls, switches, routers, VoIP network devices, wireless access
points, network appliances, and other security appliances.
- Server types, including but not limited to web, application,
database, authentication, mail, proxy, Network Time Protocol (NTP),
and Domain Name System (DNS).
- End-user devices, such as computers, laptops, workstations,
administrative workstations, tablets, and mobile devices.
- Printers, and multi-function devices that scan, print, and fax.
- Storage of account data in any format (for example, paper, data
files, audio files, images, and video recordings).
- Applications, software, and software components, serverless
applications, including all purchased, subscribed (for example,
Software- as-a-Service), bespoke and custom software, including
internal and external (for example, Internet) applications.
- Tools, code repositories, and systems that implement software
configuration management or for deployment of objects to the CDE or
to systems that can impact the CDE.
> [Figure 1](#figure-1.-understanding-pci-dss-scoping) shows
> considerations for scoping system components for PCI DSS.
##### Figure 1. Understanding PCI DSS Scoping {#figure-1.-understanding-pci-dss-scoping .unnumbered}
{width="5.186370297462817in"
height="5.543541119860017in"}
> **Annual PCI DSS Scope Confirmation**
>
> The first step in preparing for a PCI DSS assessment is for the entity
> to accurately determine the scope of the review. The assessed entity
> must confirm the accuracy of their PCI DSS scope according to PCI DSS
> Requirement 12.5.2 by identifying all locations and flows of account
> data, and identifying all systems that are connected to or, if
> compromised, could impact the CDE (for example, authentication
> servers, remote access servers, logging servers) to ensure they are
> included in the PCI DSS scope. All types of systems and locations
> should be considered during the scoping process, including
> backup/recovery sites and fail-over systems.
>
> The minimum steps for an entity to confirm the accuracy of their PCI
> DSS scope are specified in PCI DSS Requirement 12.5.2. The entity is
> expected to retain documentation to show how PCI DSS scope was
> determined. The documentation is retained for assessor review and for
> reference during the entity's next PCI DSS scope confirmation
> activity. For each PCI DSS assessment, the assessor validates that the
> entity accurately defined and documented the scope of the assessment.
>
> ***Note**: This annual confirmation of PCI DSS scope is defined at PCI
> DSS Requirement at 12.5.2 and is an activity expected to be performed
> by the entity. This activity is not the same, nor is it intended to be
> replaced by, the scoping confirmation performed by the entity's
> assessor during the assessment.*
>
> **Segmentation**
>
> Segmentation (or isolation) of the CDE from the remainder of an
> entity's network is not a PCI DSS requirement. However, it is strongly
> recommended as a method that may reduce the:
- Scope of the PCI DSS assessment
- Cost of the PCI DSS assessment
- Cost and difficulty of implementing and maintaining PCI DSS controls
- Risk to an organization relative to payment card account data
(reduced by consolidating that data into fewer, more controlled
locations)
> Without adequate segmentation (sometimes called a \"flat network\"),
> the entire network is in scope for the PCI DSS assessment.
> Segmentation can be achieved using a number of physical or logical
> methods, such as properly configured internal network security
> controls, routers with strong access control lists, or other
> technologies that restrict access to a particular segment of a
> network. To be considered out of scope for PCI DSS, a system component
> must be properly segmented (isolated) from the CDE, such that the
> out-of-scope system component could not impact the security of the
> CDE, even if that component was compromised.
>
> An important prerequisite to reduce the scope of the CDE is a clear
> understanding of business needs and processes related to the storage,
> processing, and transmission of account data. Restricting account data
> to as few locations as possible by eliminating unnecessary data and
> consolidating necessary data may require reengineering of
> long-standing business practices.
>
> Documenting account data flows via a data-flow diagram helps an entity
> fully understand how account data comes into an organization, where it
> resides within the organization, and how it traverses through various
> systems within the organization. Data-flow diagrams also illustrate
> all locations where account data is stored, processed, and
> transmitted. This information supports an entity implementing
> segmentation and can also support confirming that segmentation is
> being used to isolate the CDE from out-of-scope networks.
>
> If segmentation is used to reduce the scope of the PCI DSS assessment,
> the assessor must verify that the segmentation is adequate to reduce
> the scope of the assessment, as illustrated in [Figure
> 2.](#figure-2.-segmentation-and-impact-to-pci-dss-scope) At a high
> level, adequate segmentation isolates systems that store, process, or
> transmit account data from those that do not. However, the adequacy of
> a specific segmentation implementation is highly variable and depends
> on several factors such as a given network\'s configuration, the
> technologies deployed, and other controls that may be implemented.
##### Figure 2. Segmentation and Impact to PCI DSS Scope {#figure-2.-segmentation-and-impact-to-pci-dss-scope .unnumbered}
{width="6.928837489063867in"
height="4.049374453193351in"}
> **Wireless**
>
> If wireless technology is used to store, process, or transmit account
> data (for example, wireless point-of-sale devices), or if a wireless
> local area network (WLAN) is part of or connected to the CDE, the PCI
> DSS requirements and testing procedures for securing wireless
> environments apply and must be performed.
>
> Rogue wireless detection must be performed per PCI DSS Requirement
> 11.2.1 even when wireless is not used within the CDE and the entity
> has a policy that prohibits the use of wireless technology within its
> environment. This is because of the ease with which a wireless access
> point can be attached to a network, the difficulty in detecting its
> presence, and the increased risk presented by unauthorized wireless
> devices.
>
> Before wireless technology is implemented, an entity should carefully
> evaluate the need for the technology against the risk. Consider
> deploying wireless technology only for non-sensitive data
> transmission.
>
> **Encrypted Cardholder Data and Impact on PCI DSS Scope**
>
> Encryption of cardholder data with strong cryptography is an
> acceptable method of rendering the data unreadable according to PCI
> DSS Requirement 3.5. However, encryption alone is generally
> insufficient to render the cardholder data out of scope for PCI DSS
> and does not remove the need for PCI DSS in that environment. The
> entity's environment is still in scope for PCI DSS due to the presence
> of cardholder data. For example, for a merchant card-present
> environment, there is physical access to the payment cards to complete
> a transaction and there may also be paper reports or receipts with
> cardholder data. Similarly, in merchant card-not-present environments,
> such as mail- order/telephone-order and e-commerce, payment card
> details are provided via channels that need to be evaluated and
> protected according to PCI DSS.
>
> The following are each in scope for PCI DSS:
- Systems performing encryption and/or decryption of cardholder data,
and systems performing key management functions,
- Encrypted cardholder data that is not isolated from the encryption
and decryption and key management processes,
- Encrypted cardholder data that is present on a system or media that
also contains the decryption key,
- Encrypted cardholder data that is present in the same environment as
the decryption key,
- Encrypted cardholder data that is accessible to an entity that also
has access to the decryption key.
> ***Note**: A PCI-listed P2PE solution can significantly reduce the
> number of PCI DSS requirements applicable to a merchant's cardholder
> data environment. However, it does not completely remove the
> applicability of PCI DSS in the merchant environment.*
>
> **Encrypted Cardholder Data and Impact to PCI DSS Scope for
> Third-Party Service Providers**
>
> Where a third-party service provider (TPSP) receives and/or stores
> only data encrypted by another entity, and where they do not have the
> ability to decrypt the data, the TPSP may be able to consider the
> encrypted data out of scope if certain conditions are met. This is
> because responsibility for the data generally remains with the entity,
> or entities, with the ability to decrypt the data or impact the
> security of the encrypted data. Determining which party is responsible
> for specific PCI DSS controls will depend on several factors,
> including who has access to the decryption keys, the role performed by
> each party, and the agreement between parties. Responsibilities should
> be clearly defined and documented to ensure both the TPSP and the
> entity providing the encrypted data understand which entity is
> responsible for which security controls.
>
> As an example, a TPSP providing storage services receives and stores
> encrypted cardholder data provided by customers for back-up purposes.
> This TPSP does not have access to the encryption or decryption keys,
> nor does it perform any key management for its customers. The TPSP can
> exclude any such encrypted data when determining its PCI DSS scope.
> However, the TPSP does maintain responsibility for controlling access
> to the encrypted data storage as part of its service agreements with
> its customers.
>
> Responsibility for ensuring that the encrypted data and the
> cryptographic keys are protected according to applicable PCI DSS
> requirements is often shared between entities. In the above example,
> the customer determines which of their personnel are authorized to
> access the storage media, and the storage facility is responsible for
> managing the physical and/or logical access controls to ensure that
> only persons authorized by the customer are granted access to the
> storage media. The specific PCI DSS requirements applicable to a TPSP
> will depend on the services provided and the agreement between the two
> parties. In the example of a TPSP providing storage services, the
> physical and logical access controls provided by the TPSP will need to
> be reviewed at least annually. This review could be performed as part
> of the merchant's PCI DSS assessment or, alternatively, the review
> could be performed, and controls validated, by the TPSP with
> appropriate evidence provided to the merchant. For information about
> "appropriate evidence," see *[Options for TPSPs to Validate PCI DSS
> Compliance for TPSP
> Services](#options-for-tpsps-to-validate-pci-dss-compliance-for-tpsp-services-that-meet-customers-pci-dss-requirements)
> [that Meet Customers' PCI DSS
> Requirements.](#options-for-tpsps-to-validate-pci-dss-compliance-for-tpsp-services-that-meet-customers-pci-dss-requirements)*
>
> As another example, a TPSP that receives only encrypted cardholder
> data for the purposes of routing to other entities, and that does not
> have access to the data or cryptographic keys, may not have any PCI
> DSS responsibility for that encrypted data. In this scenario, where
> the TPSP is not providing any security services or access controls,
> they may be considered the same as a public or untrusted network, and
> it would be the responsibility of the entity(s) sending/receiving
> account data through the TPSP's network to ensure PCI DSS controls are
> applied to protect the data being transmitted.
>
> []{#_bookmark12 .anchor}**Use of Third-Party Service Providers**
>
> An entity (referred to as the "customer" in this section) might choose
> to use a third-party service provider (TPSP) to store, process, or
> transmit account data or to manage in-scope system components on the
> customer's behalf. Use of a TPSP may have an impact on the security of
> a customer's CDE.
>
> ***Note**: Use of a PCI DSS compliant TPSP does not make a customer
> PCI DSS compliant, nor does it remove the customer's responsibility
> for its own PCI DSS compliance. Even if a customer uses a TPSP to meet
> all account data functions, that customer remains responsible for
> confirming its own compliance as requested by organizations that
> manage compliance programs (for example, payment brands and
> acquirers). Customers should contact the organizations of interest for
> any requirements.*
### *Using TPSPs and the Impact on Customers Meeting PCI DSS Requirement 12.8* {#using-tpsps-and-the-impact-on-customers-meeting-pci-dss-requirement-12.8 .unnumbered}
> There are many different scenarios where a customer might use one or
> more TPSPs for functions within or related to the customer's CDE. In
> all scenarios where a TPSP is used, the customer must manage and
> oversee the PCI DSS compliance status of all their TPSPs in accordance
> with Requirement 12.8, including TPSPs that:
- Have access to the customer's CDE,
- Manage in-scope system components on the customer's behalf, and/or
- Can impact the security of the customer's CDE.
> Managing TPSPs in accordance with Requirement 12.8 includes performing
> due diligence, having appropriate agreements in place, identifying
> which requirements apply to the customer and which apply to the TPSP,
> and monitoring the compliance status of TPSPs at least annually.
>
> Requirement 12.8 does not specify that the customer's TPSPs must be
> PCI DSS compliant, only that the customer monitor their compliance
> status as specified in the requirement. Therefore, a TPSP does not
> need to be PCI DSS compliant for its customer to meet Requirement
> 12.8.
### *Impact of Using TPSPs for Services that Meet Customers' PCI DSS Requirements* {#impact-of-using-tpsps-for-services-that-meet-customers-pci-dss-requirements .unnumbered}
> When the TPSP provides a service that meets a PCI DSS requirement(s)
> on the customer's behalf or where that service may impact the security
> of the customer's CDE, then those requirements are in scope for the
> customer's assessment and the compliance of that service will impact
> the customer's PCI DSS compliance. The TPSP must demonstrate it meets
> applicable PCI DSS requirements for those requirements to be in place
> for its customers. For example, if an entity engages a TPSP to manage
> its network security controls, and the TPSP does not provide evidence
> that it meets the applicable requirements in PCI DSS Requirement 1,
> then those requirements are not in place for the customer's
> assessment. As another example, TPSPs that store backups of cardholder
> data on behalf of customers
>
> would need to meet the applicable requirements related to access
> controls, physical security, etc., for their customers to consider
> those requirements in place for their assessments.
### *Importance of Understanding Responsibilities Between TPSP Customers and TPSPs* {#importance-of-understanding-responsibilities-between-tpsp-customers-and-tpsps .unnumbered}
> Customers and TPSPs should clearly identify and understand the
> following:
- The services and system components included in the scope of the
TPSP's PCI DSS assessment,
- The specific PCI DSS requirements and sub-requirements covered by
the TPSP's PCI DSS assessment,
- Any requirements that are the responsibility of the TPSP's customers
to include in their own PCI DSS assessments, and
- Any PCI DSS requirements for which the responsibility is shared
between the TPSP and its customers.
> For example, a cloud provider should clearly define which of its IP
> addresses are scanned as part of its quarterly vulnerability scan
> process and which IP addresses are their customers' responsibility to
> scan.
>
> Per Requirement 12.9.2, TPSPs are required to support their customers'
> requests for information about the TPSP's PCI DSS compliance status
> related to the services provided to customers, and about which PCI DSS
> requirements are the responsibility of the TPSP, which are the
> responsibility of the customer, and any responsibilities between the
> customer and the TPSP. Refer to *Tips and Tools for Understanding PCI
> DSS v4.0* for a responsibility matrix template that may be used for
> documenting and clarifying how responsibilities are shared between
> TPSPs and customers.
### *Options for TPSPs to Validate PCI DSS Compliance for TPSP Services that Meet Customers' PCI DSS* Requirements {#options-for-tpsps-to-validate-pci-dss-compliance-for-tpsp-services-that-meet-customers-pci-dss-requirements .unnumbered}
> TPSPs are responsible for demonstrating their PCI DSS compliance as
> requested by organizations that manage compliance programs (for
> example, payment brands and acquirers). TPSPs should contact the
> organizations of interest for any requirements.
>
> When a TPSP provides services that are intended to meet or facilitate
> meeting a customer's PCI DSS requirements or that may impact the
> security of a customer's CDE, these requirements are in scope for the
> customer's PCI DSS assessments. There are two options for TPSPs to
> validate compliance in this scenario:
- **Annual assessment**: TPSP undergoes an annual PCI DSS
assessment(s) and provides evidence to its customers to show the
TPSP meets the applicable PCI DSS requirements; or
- **Multiple, on-demand assessments**: If a TPSP does not undergo an
annual PCI DSS assessment, it must undergo assessments upon request
of their customers and/or participate in each of its customers' PCI
DSS assessments, with the results of each review provided to the
respective customer(s).
> If the TPSP undergoes its own PCI DSS assessment, it is expected to
> provide sufficient evidence to its customers to verify that the scope
> of the TPSP's PCI DSS assessment covered the services applicable to
> the customer, and that the relevant PCI DSS requirements were examined
> and determined to be in place. If the provider has an PCI DSS
> Attestation of Compliance (AOC), it is expected that the TPSP provides
> the AOC to customers upon request. The customer may also request
> relevant sections of the TPSP's PCI DSS Report on Compliance (ROC).
> The ROC may be redacted to protect any confidential information.
>
> If the TPSP does not undergo its own PCI DSS assessment and therefore
> does not have an AOC, the TPSP is expected to provide specific
> evidence related to the applicable PCI DSS requirements, so that the
> customer (or its assessor) is able to confirm the TPSP is meeting
> those PCI DSS requirements.
### *TPSPs Presence on a Payment Brand List(s) of PCI DSS Compliant Service Providers* {#tpsps-presence-on-a-payment-brand-lists-of-pci-dss-compliant-service-providers .unnumbered}
> For a customer that is monitoring a TPSP's compliance status in
> accordance with Requirement 12.8, the TPSP's presence on a payment
> brand's list of PCI DSS compliant service providers ***may be
> sufficient evidence*** of the TPSP's compliance status if it is clear
> from the list that the services applicable to the customer were
> covered by the TPSP's PCI DSS assessment. If it is not clear from the
> list, the customer should obtain other written confirmation that
> addresses the TPSP's PCI DSS compliance status.
>
> For a customer that is looking for evidence of PCI DSS compliance for
> requirements that a TPSP meets on a customer's behalf or where the
> service provided can impact the security of the customer's CDE, the
> TPSP's presence on a payment brand's list of PCI DSS compliant service
> providers ***is not sufficient evidence*** that the applicable PCI DSS
> requirements for that TPSP were included in the assessment. If the
> TPSP has an PCI DSS AOC, it is expected to provide it to customers
> upon request.
# Best Practices for Implementing PCI DSS into Business-as-Usual Processes
> An entity that implements business-as-usual processes, otherwise known
> as BAU, as part of their overall security strategy is taking measures
> to ensure that security controls that have been implemented to secure
> data and an environment continue to be implemented correctly and
> functioning properly as normal course of business.
>
> Some PCI DSS requirements are intended to act as BAU processes by
> monitoring security controls to ensure their effectiveness on an
> ongoing basis. This oversight by the entity assists with providing
> reasonable assurance that the compliance of its environment is
> preserved between PCI DSS assessments. While there are currently some
> BAU requirements defined within the standard, an entity should adopt
> additional BAU processes specific to their organization and
> environment when possible. BAU processes are a way to verify that
> automated and manual controls are performing as expected. Regardless
> of whether a PCI DSS requirement is automated or manual, it is
> important for BAU processes to detect anomalies, and alert and report
> so that responsible individuals address the situation in a timely
> manner.
>
> Examples of how PCI DSS should be incorporated into BAU activities
> include but are not limited to:
- Assigning overall responsibility and accountability for PCI DSS
compliance to an individual or team. This can include a charter
defined by executive management for a specific PCI DSS compliance
program and communication to executive management.
- Developing performance metrics to measure the effectiveness of
security initiatives and continuous monitoring of security controls,
including those that are heavily relied upon, such as network
security controls, intrusion-detection systems/intrusion-prevention
systems (IDS/IPS), change-detection mechanisms, anti-malware
solutions, and access controls, to ensure they are operating
effectively and as intended.
- Reviewing logged data more frequently to gain insights to trends or
behaviors that may not be obvious with only monitoring.
- Ensuring that all failures in security controls are detected and
responded to promptly. Processes to respond to security control
failures should include:
- Restoring the security control.
- Identifying the cause of failure.
- Identifying and addressing any security issues that arose during
the failure of the security control.
- Implementing mitigation, such as process or technical controls,
to prevent the cause of the failure from recurring.
- Resuming monitoring of the security control, perhaps with
enhanced monitoring for a period of time, to verify the control
is operating effectively.
- Reviewing changes that could introduce security risks to the
environment (for example, addition of new systems, changes in system
or network configurations) prior to completing the change, and
including the following:
- Perform a risk assessment to determine the potential impact to
PCI DSS scope (for example, a new network security control rule
that permits connectivity between a system in the CDE and
another system could bring additional systems or networks into
scope for PCI DSS).
- Identify PCI DSS requirements applicable to systems and networks
affected by the changes (for example, if a new system is in
scope for PCI DSS, it would need to be configured per system
configuration standards, including change-detection mechanisms,
anti-malware software, patches, and audit logging. These new
systems and networks would need to be added to the inventory of
in- scope system components and to the quarterly vulnerability
scan schedule).
- Update PCI DSS scope and implement security controls as
appropriate.
- Update documentation to reflect implemented changes.
- Reviewing the impact to PCI DSS scope and requirements upon changes
to organizational structure (for example, a company merger or
acquisition).
- Reviewing external connections and third-party access periodically.
- For entities that use third parties for software development,
periodically confirming that those software development activities
continue to comply with software development requirements in
Requirement 6.
- Performing periodic reviews to confirm that PCI DSS requirements
continue to be in place and personnel follow established processes.
Periodic reviews should cover all facilities and locations,
including retail outlets and data centers, whether self-managed or
if a TPSP is used. For example, periodic reviews can be used to
confirm that configuration standards have been applied to applicable
systems, default vendor accounts and passwords are removed or
disabled, patches and anti-malware solutions are up to date, audit
logs are being reviewed, and so on. The frequency of periodic
reviews should be determined by the entity as appropriate for the
size and complexity of their environment, if not otherwise stated in
PCI DSS.
> These reviews can also be used to verify that required evidence for a
> PCI DSS assessment is being maintained. For example, evidence of audit
> logs, vulnerability scan reports, and reviews of network security
> control rulesets are necessary to assist the entity in preparing for
> its next PCI DSS assessment.
- Establishing communication with all impacted parties, both external
and internal, about newly identified threats and changes to the
organization structure. Communication materials should help
recipients understand the impact of threats, mitigating steps, and
contact points for further information or escalation.
- Reviewing hardware and software technologies at least once every 12
months to confirm that they continue to be supported by the vendor
and can meet the entity's security requirements, including PCI DSS.
If technologies are no longer supported by the vendor or cannot meet
the entity's security needs, the entity should prepare a remediation
plan, including replacement of the technology, as necessary.
> ***Note**: Some best practices in this section are also included as
> PCI DSS requirements for certain entities. For example, those
> undergoing a full PCI DSS assessment, service providers validating to
> the additional "service provider only" requirements, and designated
> entities that are required to validate according to Appendix A3:
> Designated Entities Supplemental Validation.*
>
> *Each entity should consider implementing these best practices into
> their environment, even if the entity is not required to validate to
> them (for example, merchants undergoing self-assessment).*
>
> Refer to *Best Practices for Maintaining PCI DSS Compliance* in the
> Document Library on the PCI SSC website for additional guidance.
# For Assessors: Sampling for PCI DSS Assessments
> Sampling is an option for assessors conducting PCI DSS assessments to
> facilitate the assessment process when there are large numbers of
> items in a population being tested.
>
> While it is acceptable for an assessor to sample from similar items in
> a population being tested as part of its review of an entity's PCI DSS
> compliance, it is not acceptable for an entity to apply PCI DSS
> requirements to only a sample of its environment (for example,
> requirements for quarterly vulnerability scans apply to all system
> components). Similarly, it is not acceptable for an assessor to review
> only a sample of PCI DSS requirements for compliance.
>
> While sampling allows assessors to test less than 100% of a given
> sampling population, assessors should always strive for the most
> complete review possible. Assessors are encouraged to use automated
> processes or other mechanisms if the complete population, regardless
> of size, can be tested quickly and efficiently with minimal impact on
> the resources of the entity being assessed. Where automated processes
> are not available to test 100% of a population, sampling is an equally
> acceptable approach.
>
> After considering the overall scope, complexity, and consistency of
> the environment being assessed, and the nature (automated or manual)
> of the processes used by an entity to meet a requirement, the assessor
> may independently select representative samples from the populations
> being reviewed in order to assess the entity's compliance with PCI DSS
> requirements. Samples must be a representative selection of all
> variants of the population and must be sufficiently large to provide
> the assessor with assurance that controls are implemented as expected
> across the entire population. Where testing the periodic performance
> of a requirement (for example, weekly or quarterly, or periodically),
> the assessor should attempt to select a sample that represents the
> entire period covered by the assessment so that the assessor may make
> a reasonable judgment that the requirement was met throughout the
> assessment period. Testing the same sample of items year after year
> could allow unknown variations in the non-sampled items to remain
> undetected. Assessors must revalidate the sampling rationale for each
> assessment and consider previous sample sets. Different samples must
> be selected for each assessment.
>
> Appropriate selection of the sample depends on what is being
> considered in examining the sample members. For example, determining
> the presence of anti-malware on servers known to be affected by
> malicious software may lead to determining the population to be all
> servers in the environment, or all servers in the environment that are
> running a particular operating system, or all servers that are not
> mainframes, etc. Selection of an appropriate sample would then include
> representatives of ALL members of the identified population, including
> all servers running the identified operating system including all
> versions, as well as servers within the population that are used for
> different functions (web server, application servers, database
> servers, etc.).
>
> In the case that a specific configuration item is being considered,
> the population might be appropriately divided, and separate sample
> groups identified. For example, a sample of all servers may not be
> appropriate when reviewing an operating system configuration setting,
> where different operating systems are present within the environment.
> In this case, samples from each operating system type would be
> appropriate in identifying that the configuration has been
> appropriately set for each operating system. Each sample set should
> include servers that are representative of each operating system type,
> including version, as well as representative functions.
>
> Other examples of sampling include selections of personnel with
> similar or varied roles, based on the requirement being assessed, for
> example, a sample of administrators vs. a sample of all employees.
>
> The assessor is required to use professional judgment in the planning,
> performance, and evaluation of the sample to support their conclusion
> about whether and how the entity has met a requirement. The assessor's
> goal in sampling is to obtain enough evidence to have a reasonable
> basis for their opinion. When independently selecting samples,
> assessors should consider the following:
- The assessor must select the sample from the complete population
without influence from the assessed entity.
- If the entity has standardized processes and controls in place that
ensure consistency and which is applied to each item in the
population, the sample can be smaller than if the entity has no
standardized processes/controls in place. The sample must be large
enough to provide the assessor with reasonable assurance that items
in the population adhere to the standardized processes that are
applied to each item in the population. The assessor must verify
that the standardized controls are implemented and working
effectively.
- If the entity has more than one type of standardized process in
place (for example, for different types of business
facilities/system components), the sample must include items subject
to each type of process. For example, populations could be divided
into sub- populations based on characteristics that may impact the
consistency of the assessed requirements, such as the use of
different processes or tools. Samples would then be selected from
each sub-population.
- If the entity has no standardized PCI DSS processes/controls in
place and each item in the population is managed through non-
standardized processes, the sample must be larger for the assessor
to be assured that the PCI DSS requirements are appropriately
applied to each item in the population.
- Samples of system components must include every type and combination
being used. When an entity has more than one CDE, samples must
include populations across all in-scope system components. For
example, where applications are sampled, the sample must include all
versions and platforms for each type of application.
- Sample sizes must always be greater than one unless there is only
one item in the given population, or an automated control is used
where the assessor has confirmed the control is functioning as
programmed for each assessed sample population.
- If the assessor relies on standardized processes and controls being
in place as a basis for selecting a sample, but then finds out
during testing that standardized processes and controls are not in
place or not operating effectively, the assessor should then
increase the sample size to attempt to gain assurance that PCI DSS
requirements are being met.
> For each instance where sampling is used, the assessor must:
- Document the rationale behind the sampling technique and sample
size.
- Validate and document the standardized processes and controls used
to determine sample size.
- Explain how the sample is appropriate and representative of the
overall population.
> [Figure 3](#figure-3.-pci-dss-sampling-considerations) shows
> considerations for determining sample size.
##### Figure 3. PCI DSS Sampling Considerations {#figure-3.-pci-dss-sampling-considerations .unnumbered}
{width="5.108024934383202in"
height="4.586666666666667in"}
> ***Note**: In PCI DSS v4.0, specific references to sampling have been
> removed from all testing procedures. These references were removed
> because calling out sampling only in some testing procedures may have
> implied that sampling was mandatory for those testing procedures
> (which it was not) or that sampling was only allowable where it was
> specifically mentioned. Assessors should select samples when it is
> appropriate to the population being tested, and, per above, render
> those decisions after considering the overall scope and complexity of
> an environment.*
# Description of Timeframes Used in PCI DSS Requirements
> Certain PCI DSS requirements have been established with specific
> timeframes for activities that need to be performed consistently via a
> regularly scheduled and repeatable process. The intent is that the
> activity is performed at an interval as close to that timeframe as
> possible without exceeding it. The entity has the discretion to
> perform an activity more often than specified (for example, performing
> an activity monthly where the PCI DSS requirement specifies it be
> performed every three months).
>
> [Table 4](#table-4.-pci-dss-requirement-timeframes) outlines the
> frequency for the different time periods used in PCI DSS Requirements.
##### Table 4. PCI DSS Requirement Timeframes {#table-4.-pci-dss-requirement-timeframes .unnumbered}
+-------------+--------------------------------------------------------+
| > * | **Descriptions and Examples** |
| *Timeframes | |
| > in PCI | |
| > DSS | |
| > Req | |
| uirements** | |
+=============+========================================================+
| > Daily | Every day of the year (not only on business days). |
+-------------+--------------------------------------------------------+
| > Weekly | At least once every seven days. |
+-------------+--------------------------------------------------------+
| > Monthly | At least once every 30 to 31 days, or on the nth day |
| | of the month. |
+-------------+--------------------------------------------------------+
| > Every | At least once every 90 to 92 days, or on the nth day |
| > three | of each third month. |
| > months | |
| > (" | |
| quarterly") | |
+-------------+--------------------------------------------------------+
| > Every six | At least once every 180 to 184 days, or on the nth day |
| > months | of each sixth month. |
+-------------+--------------------------------------------------------+
| > Every 12 | At least once every 365 (or 366 for leap years) days |
| > months | or on the same date every year. |
| > ( | |
| "annually") | |
+-------------+--------------------------------------------------------+
| > P | Frequency of occurrence is at the entity's discretion |
| eriodically | and is documented and supported by the entity's risk |
| | analysis. The entity must demonstrate that the |
| | frequency is appropriate for the activity to be |
| | effective and to meet the intent of the requirement. |
+-------------+--------------------------------------------------------+
| > | Without delay. In real time or near real time. |
| Immediately | |
+-------------+--------------------------------------------------------+
| > Promptly | As soon as reasonably possible. |
+-------------+--------------------------------------------------------+
+------------+---------------------------------------------------------+
| > ** | **Descriptions and Examples** |
| Timeframes | |
| > in PCI | |
| > DSS | |
| > Requ | |
| irements** | |
+============+=========================================================+
| S | There are certain requirements for which performance is |
| ignificant | specified upon a significant change in an entity's |
| change | environment. While what constitutes a significant |
| | change is highly dependent on the configuration of a |
| | given environment, each of the following activities, at |
| | a minimum, has potential impacts on the security of the |
| | CDE and must be considered as a significant change in |
| | the context of related PCI DSS requirements: |
| | |
| | - New hardware, software, or networking equipment |
| | added to the CDE. |
| | |
| | - Any replacement or major upgrades of hardware and |
| | software in the CDE. |
| | |
| | - Any changes in the flow or storage of account data. |
| | |
| | - Any changes to the boundary of the CDE and/or to |
| | the scope of the PCI DSS assessment. |
| | |
| | - Any changes to the underlying supporting |
| | infrastructure of the CDE (including, but not |
| | limited to, changes to directory services, time |
| | servers, logging, and monitoring). |
| | |
| | - Any changes to third party vendors/service |
| | providers (or services provided) that support the |
| | CDE or meet PCI DSS requirements on behalf of the |
| | entity. |
+------------+---------------------------------------------------------+
> For other PCI DSS requirements, where the standard does not define a
> minimum frequency for recurring activities but instead allows for the
> requirement to be met "periodically," the entity is expected to define
> the frequency as appropriate for its business. The frequency defined
> by the entity must be supported by the entity's security policy and
> the risk analysis conducted according to PCI DSS Requirement 12.3.1.
> The entity must also be able to demonstrate that the frequency it has
> defined is appropriate for the activity to be effective and to meet
> the intent of the requirement.
>
> In both cases, where PCI DSS specifies a required frequency and where
> PCI DSS allows for "periodic" performance, the entity is expected to
> have documented and implemented processes to ensure that activities
> are performed within a reasonable timeframe, including at least the
> following:
- The entity is promptly notified any time an activity is not
performed per its defined schedule,
- The entity determines the events that led to missing a scheduled
activity,
- The entity performs the activity as soon as possible after it is
missed and either gets back on schedule or establishes a new
schedule,
- The entity produces documentation that shows the above elements
occurred.
> When an entity has the above processes in place to detect and address
> when a scheduled activity is missed, a reasonable approach is
> allowable, meaning that if an activity is required to be performed at
> least once every three months, the entity is not automatically non-
> compliant if the activity is performed late where the entity's
> documented and implemented process (per above) was followed. However,
> where no such process is in place and/or the activity was not
> performed according to schedule due to oversight, mismanagement, or
> lack of monitoring, the entity has not met the requirement. In such
> cases, the requirement will only be in place when the entity 1)
> documents (or
>
> reconfirms) the process per above to ensure the scheduled activity
> occurs on time, 2) re-establishes the schedule, and 3) provides
> evidence that the entity has performed the scheduled activity at least
> once per their schedule.
>
> ***Note**: For an initial PCI DSS assessment (meaning an entity has
> never undergone a prior assessment), where a requirement has a defined
> timeframe within which an activity is to occur, it is not required
> that the activity has been performed for every such timeframe during
> the previous year, if the assessor verifies:*
- *The activity was performed in accordance with the applicable
requirement within the most recent timeframe (for example, the most
recent three-month or six-month period), and*
- *The entity has documented policies and procedures for continuing to
perform the activity within the defined timeframe.*
> *For subsequent years after the initial assessment, the activity must
> have been performed at least once within each required timeframe. For
> example, an activity required every three months must have been
> performed at least four times during the previous year at an interval
> that does not exceed 90-92 days.*
# Approaches for Implementing and Validating PCI DSS
> To support flexibility in how security objectives are met, there are
> two approaches for implementing and validating to PCI DSS. Entities
> should identify the approach best suited to their security
> implementation and use that approach to validate the controls.
+------------+---------------------------------------------------------+
| **Defined | > Follows the traditional method for implementing and |
| Approach** | > validating PCI DSS and uses the Requirements and |
| | > Testing Procedures defined within the standard. In |
| | > the defined approach, the entity implements security |
| | > controls to meet the stated requirements, and the |
| | > assessor follows the defined testing procedures to |
| | > verify that requirements have been met. |
| | > |
| | > The defined approach supports entities with controls |
| | > in place that meet PCI DSS requirements as stated. |
| | > This approach may also suit entities that want more |
| | > direction about how to meet security objectives, as |
| | > well as entities new to information security or PCI |
| | > DSS. |
| | > |
| | > **Compensating Controls** |
| | > |
| | > As part of the defined approach, entities that cannot |
| | > meet a PCI DSS ***Note:** For more details, see* |
| | > requirement explicitly as stated due to a legitimate |
| | > and documented technical *[Appendix |
| | > B:](#appendix-b-compensating-controls) |
| | > [Compensating](#appendix-b-compensating-controls)* or |
| | > business constraint may implement other, or |
| | > *compensating, controls*, that |
| | > *[Controls](#appendix-b-compensating-controls) and |
| | > [Appendix |
| | > C:](#appendix-c-compensating-controls-worksheet)* |
| | > sufficiently mitigate the risk associated with the |
| | > requirement. On an annual *[Compensating |
| | > |
| | Controls](#appendix-c-compensating-controls-worksheet)* |
| | > basis, any compensating controls must be documented |
| | > by the entity and |
| | > [*Wo |
| | rksheet.*](#appendix-c-compensating-controls-worksheet) |
| | > |
| | > reviewed and validated by the assessor and included |
| | > with the Report on |
| | > |
| | > Compliance submission. |
+============+=========================================================+
| ** | > Focuses on the Objective of each PCI DSS requirement |
| Customized | > (if applicable), |
| Approach** | > |
| | > allowing entities to implement controls to meet the |
| | > requirement's stated ***Note:** For more details, |
| | > see* Customized Approach Objective in a way that does |
| | > not strictly follow the *[Appendix |
| | > D:](#appendix-d-customized-approach) |
| | > [Customized](#appendix-d-customized-approach)* |
| | > defined requirement. Because each customized |
| | > implementation will be |
| | > *[Approach](#appendix-d-customized-approach) and |
| | > [Appendix |
| | > E:](#appen |
| | dix-e-sample-templates-to-support-customized-approach)* |
| | > different, there are no defined testing procedures; |
| | > the assessor is required to *[Sample Templates |
| | > to](#appen |
| | dix-e-sample-templates-to-support-customized-approach)* |
| | > derive testing procedures that are appropriate to the |
| | > specific implementation to *[Support |
| | > Customized](#appen |
| | dix-e-sample-templates-to-support-customized-approach)* |
| | > validate that the implemented controls meet the |
| | > stated Objective. |
| | > [*Approach.*](#appe |
| | ndix-e-sample-templates-to-support-customized-approach) |
| | > |
| | > The customized approach supports innovation in |
| | > security practices, allowing entities greater |
| | > flexibility to show how their current security |
| | > controls meet PCI DSS objectives. This approach is |
| | > intended for risk-mature entities that demonstrate a |
| | > robust risk-management approach to security, |
| | > including, but not limited to, a dedicated risk- |
| | > |
| | > management department or an organization-wide risk |
| | > management approach. |
+------------+---------------------------------------------------------+
> The controls implemented and validated using the customized approach
> are expected to meet or exceed the security provided by the
> requirement in the defined approach. The level of documentation and
> effort required to validate customized implementations will also be
> greater than for the defined approach
>
> Most PCI DSS requirements can be met using either the defined or
> customized approach. However, several requirements do not have a
> stated Customized Approach Objective; the customized approach is not
> an option for these requirements.
>
> Entities can use both the defined and customized approaches within
> their environment. This means an entity could use the defined approach
> to meet some requirements and use the customized approach to meet
> other requirements. This also means that an entity could use the
> defined approach to meet a given PCI DSS requirement for one system
> component or within one environment and use the customized approach to
> meet that same PCI DSS requirement for a different system component or
> within a different environment. In this way, a PCI DSS assessment
> could include both defined and customized testing procedures.
>
> [Figure 4](#figure-4.-pci-dss-validation-approaches) shows the two
> validation options for PCI DSS v4.0.
##### Figure 4. PCI DSS Validation Approaches {#figure-4.-pci-dss-validation-approaches .unnumbered}
{width="5.367317366579178in"
height="4.649374453193351in"}
# Protecting Information About an Entity's Security Posture
> The processes related to becoming and maintaining a PCI DSS compliant
> environment results in many artifacts that an entity may consider
> sensitive and may want to protect as such, including such items as the
> following:
- The Report on Compliance or Self-Assessment Questionnaire (the
associated Attestation of Compliance is not considered sensitive and
third-party service providers (TPSPs) are expected to share their
AOC with customers).
- Network diagrams and account data-flow diagrams, and security
configurations and rules.
- System configuration standards.
- Cryptography and key management methods and protocols.
> Entities should review all the artifacts related to PCI DSS controls
> or the assessment and protect them in accordance with the entity's
> security policies for this type of information.
>
> TPSPs are required (PCI DSS Requirement 12.9) to support their
> customers with the following:
- Information needed for customers to monitor the TPSPs' PCI DSS
compliance status (to enable the customer to comply with Requirement
12.8), and
- Evidence that the TPSP is meeting applicable PCI DSS requirements
where the TPSP's services are intended to meet or facilitate meeting
a customer's PCI DSS requirements, or where those services may
impact the security of a customer's CDE.
> This section does not impact or negate a TPSP's obligation to support
> and provide information to their customers per Requirement 12.9. For
> more details about expectations for TPSPs and relationships between
> TPSPs and customers, see [*Use of Third-Party Service
> Providers*.](#_bookmark12)
### *Protection of Confidential and Sensitive Information by Qualified Security Assessor Companies* {#protection-of-confidential-and-sensitive-information-by-qualified-security-assessor-companies .unnumbered}
> Each Qualified Security Assessor (QSA) Company signs an agreement with
> PCI SSC that they will adhere to the Qualification Requirements for
> QSAs. The *Protection of Confidential and Sensitive Information*
> section of that document includes the following:
>
> "The QSA company must have and adhere to a documented process for
> protection of confidential and sensitive information. This must
> include adequate physical, electronic, and procedural safeguards
> consistent with industry-accepted practices to protect confidential
> and sensitive information against any threats or unauthorized access
> during storage, processing, and/or communicating of this information.
>
> The QSA Company must maintain the privacy and confidentiality of
> information obtained in the course of performing its duties and
> obligations as a QSA Company, unless (and to the extent) disclosure is
> required by legal authority."
# Testing Methods for PCI DSS Requirements
> The testing methods identified in the Testing Procedures for each
> requirement describe the expected activities to be performed by the
> assessor to determine whether the entity has met the requirement. The
> intent behind each testing method is described as follows:
- Examine: The assessor critically evaluates data evidence. Common
examples include documents (electronic or physical), screenshots,
configuration files, audit logs, and data files.
- Observe: The assessor watches an action or views something in the
environment. Examples of observation subjects include personnel
performing a task or process, system components performing a
function or responding to input, environmental conditions, and
physical controls.
- Interview: The assessor converses with individual personnel.
Interview objectives may include confirmation of whether an activity
is performed, descriptions of how an activity is performed, and
whether personnel have particular knowledge or understanding.
> The testing methods are intended to allow the assessed entity to
> demonstrate how they have met a requirement. They also provide the
> assessed entity and the assessor with a common understanding of the
> assessment activities to be performed. The specific items to be
> examined or observed and personnel to be interviewed should be
> appropriate for both the requirement being assessed and each entity's
> particular implementation. When documenting the assessment results,
> the assessor identifies the testing activities performed and the
> result of each activity.
# Instructions and Content for Report on Compliance
> Instructions and content for the Report on Compliance (ROC) are
> provided in the *PCI DSS Report on Compliance (ROC) Template*. The PCI
> DSS Report on Compliance (ROC) Template must be used as the template
> for creating a PCI DSS Report on Compliance.
>
> Whether any entity is required to comply with or validate their
> compliance to PCI DSS is at the discretion of those organizations that
> manage compliance programs (such as payment brands and acquirers).
> Entities should contact the organizations of interest to determine any
> reporting requirements and instructions.
# PCI DSS Assessment Process
> The PCI DSS assessment process includes the following high-level
> steps: [5](#_bookmark25)
1. Confirm the scope of the PCI DSS assessment.
2. Perform the PCI DSS assessment of the environment.
3. Complete the applicable report for the assessment according to PCI
DSS guidance and i[]{#_bookmark25 .anchor}nstructions.
4. Complete the Attestation of Compliance for Service Providers or
Merchants, as applicable, in its entirety. Official Attestations of
Compliance are only available on the PCI SSC website.
5. Submit the applicable PCI SSC documentation and the Attestation of
Compliance, along with any other requested documentation---such as
ASV scan reports---to the requesting organization (those that manage
compliance programs such as payment brands and acquirers (for
merchants), or other requesters (for service providers)).
6. If required, perform remediation to address requirements that are
not in place and provide an updated report.
> ***Note:** PCI DSS requirements are not considered to be in place if
> controls are not yet implemented or are scheduled to be completed at a
> future date. After any open or not-in-place items are addressed by the
> entity, the assessor will reassess to validate that the remediation is
> completed and that all requirements are satisfied. Refer to the
> following resources (available on the PCI SSC website) to document the
> PCI DSS assessment:*
- *For instructions about completing reports on compliance (ROC),
refer to the PCI DSS Report on Compliance (ROC) Template.*
- *For instructions about completing self-assessment questionnaires
(SAQ), refer to the PCI DSS SAQ Instructions and Guidelines.*
- *For instructions about submitting PCI DSS compliance validation
reports, refer to the PCI DSS Attestation of Compliance.*
> 5 The PCI DSS assessment process, and the roles and responsibilities
> for completion of each step, vary depending on the type of assessment
> and on compliance programs, which are managed by payment brands and
> acquirers.
# Additional References
> [Table
> 5](#table-5.-external-organizations-referenced-in-pci-dss-requirements)
> lists external organizations referenced within PCI DSS requirements or
> related guidance. These external organizations and their references
> are provided as information only and do not replace or extend any PCI
> DSS requirement.
##### Table 5. External Organizations Referenced in PCI DSS Requirements {#table-5.-external-organizations-referenced-in-pci-dss-requirements .unnumbered}
+-------------+----------------------------------------+--------------+
| > ** | **Full Name** | **Source** |
| Reference** | | |
+=============+========================================+==============+
| ANSI | American National Standards Institute | [www.ansi.or |
| | | g](http://ww |
| | | w.ansi.org/) |
+-------------+----------------------------------------+--------------+
| CIS | Center for Internet Security | [www.cisecur |
| | | ity.org](htt |
| | | p://www.cise |
| | | curity.org/) |
+-------------+----------------------------------------+--------------+
| CSA | Cloud Security Alliance | [www.csa.o |
| | | rg](http://w |
| | | ww.csa.org/) |
+-------------+----------------------------------------+--------------+
| ENISA | European Union Agency for | [w |
| | Cybersecurity | ww.enisa.eur |
| | | opa.eu](http |
| | (formerly European Network and | ://www.enisa |
| | Information Security Agency) | .europa.eu/) |
+-------------+----------------------------------------+--------------+
| FIDO | The FIDO Alliance | [www |
| Alliance | | .fidoallianc |
| | | e.org](http: |
| | | //www.fidoal |
| | | liance.org/) |
+-------------+----------------------------------------+--------------+
| ISO | International Organization for | [www.iso.o |
| | Standardization | rg](http://w |
| | | ww.iso.org/) |
+-------------+----------------------------------------+--------------+
| NCSC | The UK National Cyber Security Centre | [www.n |
| | | csc.gov.uk]( |
| | | http://www.n |
| | | csc.gov.uk/) |
+-------------+----------------------------------------+--------------+
| NIST | National Institute of Standards and | [www.nist.go |
| | Technology | v](http://ww |
| | | w.nist.gov/) |
+-------------+----------------------------------------+--------------+
| OWASP | Open Web Application Security Project | [w |
| | | ww.owasp.org |
| | | ](http://www |
| | | .owasp.org/) |
+-------------+----------------------------------------+--------------+
| SAFEcode | Software Assurance Forum for | [www.saf |
| | Excellence in Code | ecode.org](h |
| | | ttp://www.sa |
| | | fecode.org/) |
+-------------+----------------------------------------+--------------+
# PCI DSS Versions
> As of the published date of this document, PCI DSS v3.2.1 is valid
> through 31 March 2024, after w[]{#_bookmark29 .anchor}hich it is
> retired. All PCI DSS validations after this date must be to PCI DSS
> 4.0 or later.
>
> Either PCI DSS version 3.2.1 or 4.0 can be used for assessments
> between March 2022 and 31 March 2024. [Table
> 6](#table-6.-pci-dss-versions) summarizes PCI DSS versions and their
> relevant dates. [6](#_bookmark29)
##### Table 6. PCI DSS Versions {#table-6.-pci-dss-versions .unnumbered}
-----------------------------------------------------------------------
**Version** **Published** **Retired**
------------------- ------------------------- -------------------------
PCI DSS v4.0 (this March 2022 To be determined
document)
PCI DSS v3.2.1 May 2018 31 March 2024
-----------------------------------------------------------------------
> 6 Subject to change upon release of a new version of PCI DSS.
# Detailed PCI DSS Requirements and Testing Procedures
> [Figure 5](#figure-5.-understanding-the-parts-of-the-requirements)
> describes the column headings and content for the PCI DSS
> requirements.
##### Figure 5. Understanding the Parts of the Requirements {#figure-5.-understanding-the-parts-of-the-requirements .unnumbered}
The **Requirement Description** at the X.X level organizes and describes
the requirements that fall under it.
**Definitions** Terms that may help understand the requirement.
**Applicability Notes** apply to both the Defined and Customized
Approach. Includes information that affects how the requirement is
interpreted in the context of the entity or in scoping.
These notes are an integral part of PCI DSS and must be fully considered
during an assessment.
> **Further Information** includes references to relevant external
> documentation.
>
> **Examples** describe ways a requirement could be met.
>
> For each new PCI DSS v4.0 requirement with an extended implementation
> period.
>
> A **Good Practice** can be considered by the entity when meeting a
> requirement.
>
> The **Customized Approach Objective** is the intended goal or outcome
> for the requirement. It must be met by entities using a Customized
> Approach. Most PCI DSS requirements have this Objective.
>
> Appendix D describes expectations for entities and assessors when the
> Customized Approach is used.
>
> Entities following the Defined Approach can refer to the **Customized
> Approach Objective** as guidance, but the objective does not replace
> or supersede the Defined Approach Requirement.
>
> **Purpose** describes the goal, benefit, or threat to be avoided; why
> the requirement exists.
>
> The **Defined Approach Requirements and Testing Procedures** describes
> the traditional method for implementing and validating PCI DSS using
> the Requirements and Testing Procedures defined in the standard.
>
> **Guidance** provides information to understand how to meet a
> requirement. Guidance is not required to be followed -- it does not
> replace or extend any PCI DSS requirement.
>
> Not every **Guidance** section described here is present for each
> requirement.
>
> Not every section will be present for each requirement.
### *Additional Requirements for Service Providers Only* {#additional-requirements-for-service-providers-only .unnumbered}
> Some requirements apply only when the entity being assessed is a
> service provider. These are identified within the requirement as
> "*Additional requirement for service providers only"* and apply in
> addition to all other applicable requirements. Where the entity being
> assessed is both a merchant and a service provider, requirements noted
> as "*Additional requirement for service providers only"* apply to the
> service provider portion of the entity's business. Requirements
> identified with "*Additional requirement for service providers only"*
> are also recommended as best practices for consideration by all
> entities.
### *Appendices with Additional PCI DSS Requirements for Different Types of Entities* {#appendices-with-additional-pci-dss-requirements-for-different-types-of-entities .unnumbered}
> In addition to the 12 principal requirements, PCI DSS Appendix A
> contains additional PCI DSS requirements for different types of
> entities. The sections within Appendix A include:
- Appendix A1: Additional PCI DSS Requirements for Multi-Tenant
Service Providers.
- Appendix A2: Additional PCI DSS Requirements for Entities using
SSL/Early TLS for Card-Present POS POI Terminal Connections.
- Appendix A3: Designated Entities Supplemental Validation (DESV).
## Build and Maintain a Secure Network and Systems
### *Requirement 1: Install and Maintain Network Security Controls* {#requirement-1-install-and-maintain-network-security-controls .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for installing and maintaining network |
| security controls are defined and understood. |
| |
| 2. Network security controls (NSCs) are configured and maintained. |
| |
| 3. Network access to and from the cardholder data environment is |
| restricted. |
| |
| 4. Network connections between trusted and untrusted networks are |
| controlled. |
| |
| 5. Risks to the CDE from computing devices that are able to connect |
| to both untrusted networks and the CDE are mitigated. |
+-----------------------------------------------------------------------+
+-----------------------------------------------------------------------+
| **Overview** |
+=======================================================================+
| > Network security controls (NSCs), such as firewalls and other |
| > network security technologies, are network policy enforcement |
| > points that typically control network traffic between two or more |
| > logical or physical network segments (or subnets) based on |
| > pre-defined *policies* or *rules*. |
| > |
| > NSCs examine all network traffic entering (ingress) and leaving |
| > (egress) a segment and decide, based on the policies defined, |
| > whether the network traffic is allowed to pass or whether it should |
| > be rejected. Typically, NSCs are placed between environments with |
| > different security needs or levels of trust, however in some |
| > environments NSCs control the traffic to individual devices |
| > irrespective of trust boundaries. Policy enforcement generally |
| > occurs at layer 3 of the OSI model, but data present in higher |
| > layers is also frequently used to determine policy decisions. |
| > |
| > Traditionally this function has been provided by physical |
| > firewalls; however, now this functionality may be provided by |
| > virtual devices, cloud access controls, virtualization/container |
| > systems, and other software-defined networking technology. |
| > |
| > NSCs are used to control traffic within an entity's own |
| > networks---for example, between highly sensitive and less sensitive |
| > areas---and also to protect the entity's resources from exposure to |
| > untrusted networks. The cardholder data environment (CDE) is an |
| > example of a more sensitive area within an entity's network. Often, |
| > seemingly insignificant paths to and from untrusted networks can |
| > provide unprotected pathways into sensitive systems. NSCs provide a |
| > key protection mechanism for any computer network. |
| > |
| > Common examples of untrusted networks include the Internet, |
| > dedicated connections such as business-to-business communication |
| > channels, wireless networks, carrier networks (such as cellular), |
| > third-party networks, and other sources outside the entity's |
| > ability to control. Furthermore, untrusted networks also include |
| > corporate networks that are considered out-of-scope for PCI DSS, |
| > because they are not assessed, and therefore must be treated as |
| > untrusted because the existence of security controls has not been |
| > verified. While an entity may consider an internal network to be |
| > trusted from an infrastructure perspective, if a network is out of |
| > scope for PCI DSS, that network must be considered untrusted for |
| > PCI DSS. |
| > |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| installing and | | |
| maintaining | | |
| network security | | |
| controls are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 1.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 1. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 1, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For these reasons, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **1.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 1 | operational | |
| are: | procedures identified | |
| | in Requirement 1 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 1 are | | |
| defined, understood, | | |
| and adhered to by | | |
| affected personnel. | | |
| All supporting | | |
| activities are | | |
| repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **1.1.2** Roles and | **1.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 1 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 1 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **1.1.2.b** Interview | |
| | personnel responsible | |
| | for performing | |
| | activities in | |
| | Requirement 1 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 1 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **1.2** Network | | |
| security controls | | |
| (NSCs) are configured | | |
| and maintained. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The implementation |
| | | of these |
| | | configuration |
| | | standards results in |
| | | the NSC being |
| | | configured and |
| | | managed to properly |
| | | perform their |
| | | security function |
| | | (often referred to |
| | | as the ruleset). |
| | | |
| | | **Good Practice** |
| | | |
| | | These standards |
| | | often define the |
| | | requirements for |
| | | acceptable |
| | | protocols, ports |
| | | that are permitted |
| | | to be used, and |
| | | specific |
| | | configuration |
| | | requirements that |
| | | are acceptable. |
| | | Configuration |
| | | standards may also |
| | | outline what the |
| | | entity considers not |
| | | acceptable or not |
| | | permitted within its |
| | | network. |
| | | |
| | | **Definitions** |
| | | |
| | | NSCs are key |
| | | components of a |
| | | network |
| | | architecture. Most |
| | | commonly, NSCs are |
| | | used at the |
| | | boundaries of the |
| | | CDE to control |
| | | network traffic |
| | | flowing inbound and |
| | | outbound from the |
| | | CDE. |
| | | |
| | | Configuration |
| | | standards outline an |
| | | entity's minimum |
| | | requirements for the |
| | | configuration of its |
| | | NSCs |
| | | |
| | | **Examples** |
| | | |
| | | Examples of NSCs |
| | | covered by these |
| | | configuration |
| | | standards include, |
| | | but are not limited |
| | | to, firewalls, |
| | | routers configured |
| | | with access control |
| | | lists, and cloud |
| | | virtual networks. |
+-----------------------+-----------------------+----------------------+
| 1. Configuration | **1.2.1.a** Examine | |
| standards for NSC | the configuration | |
| rulesets are: | standards for NSC | |
| | rulesets to verify | |
| - Defined. | the standards are in | |
| | accordance with all | |
| - Implemented. | elements specified in | |
| | this requirement. | |
| - Maintained. | | |
+-----------------------+-----------------------+----------------------+
| | **1.2.1.b** Examine | |
| | configuration | |
| | settings for NSC | |
| | rulesets to verify | |
| | that rulesets are | |
| | implemented according | |
| | to the configuration | |
| | standards. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The way that NSCs are | | |
| configured and | | |
| operate are defined | | |
| and consistently | | |
| applied. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Good Practice** |
| Requirements** | Testing Procedures** | |
| | | Changes should be |
| | | approved by |
| | | individuals with the |
| | | appropriate |
| | | authority and |
| | | knowledge to |
| | | understand the |
| | | impact of the |
| | | change. Verification |
| | | should provide |
| | | reasonable assurance |
| | | that the change did |
| | | not adversely impact |
| | | the security of the |
| | | network and that the |
| | | change performs as |
| | | expected. |
| | | |
| | | To avoid having to |
| | | address security |
| | | issues introduced by |
| | | a change, all |
| | | changes should be |
| | | approved prior to |
| | | being implemented |
| | | and verified after |
| | | the change is |
| | | implemented. Once |
| | | approved and |
| | | verified, network |
| | | documentation should |
| | | be updated to |
| | | include the changes |
| | | to prevent |
| | | inconsistencies |
| | | between network |
| | | documentation and |
| | | the actual |
| | | configuration. |
+-----------------------+-----------------------+----------------------+
| **1.2.2** All changes | **1.2.2.a** Examine | |
| to network | documented procedures | |
| connections and to | to verify that | |
| configurations of | changes to network | |
| NSCs are approved and | connections and | |
| managed in accordance | configurations of | |
| with the change | NSCs are included in | |
| control process | the formal change | |
| defined at | control process in | |
| Requirement 6.5.1. | accordance with | |
| | Requirement 6.5.1. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.2.b** Examine | |
| | network configuration | |
| | settings to identify | |
| | changes made to | |
| | network connections. | |
| | Interview responsible | |
| | personnel and examine | |
| | change control | |
| | records to verify | |
| | that identified | |
| | changes to network | |
| | connections were | |
| | approved and managed | |
| | in accordance with | |
| | Requirement 6.5.1. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.2.c** Examine | |
| | network configuration | |
| | settings to identify | |
| | changes made to | |
| | configurations of | |
| | NSCs. Interview | |
| | responsible personnel | |
| | and examine change | |
| | control records to | |
| | verify that | |
| | identified changes to | |
| | configurations of | |
| | NSCs were approved | |
| | and managed in | |
| | accordance with | |
| | Requirement 6.5.1. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Changes to network | | |
| connections and NSCs | | |
| cannot result in | | |
| misconfiguration, | | |
| implementation of | | |
| insecure services, or | | |
| unauthorized network | | |
| connections. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Changes to network | | |
| connections include | | |
| the addition, | | |
| removal, or | | |
| modification of a | | |
| connection. | | |
| | | |
| Changes to NSC | | |
| configurations | | |
| include those related | | |
| to the component | | |
| itself as well as | | |
| those affecting how | | |
| it performs its | | |
| security function. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Maintaining an |
| | | accurate and |
| | | up-to-date network |
| | | diagram(s) prevents |
| | | network connections |
| | | and devices from |
| | | being overlooked and |
| | | unknowingly left |
| | | unsecured and |
| | | vulnerable to |
| | | compromise. |
| | | |
| | | A properly |
| | | maintained network |
| | | diagram(s) helps an |
| | | organization verify |
| | | its PCI DSS scope by |
| | | identifying systems |
| | | connecting to and |
| | | from the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | All connections to |
| | | and from the CDE |
| | | should be |
| | | identified, |
| | | including systems |
| | | providing security, |
| | | management, or |
| | | maintenance services |
| | | to CDE system |
| | | components. Entities |
| | | should consider |
| | | including the |
| | | following in their |
| | | network diagrams: |
| | | |
| | | - All locations, |
| | | including retail |
| | | locations, data |
| | | centers, |
| | | corporate |
| | | locations, cloud |
| | | providers, etc. |
| | | |
| | | - Clear labeling |
| | | of all network |
| | | segments. |
| | | |
| | | - All security |
| | | controls |
| | | providing |
| | | segmentation, |
| | | including unique |
| | | identifiers for |
| | | each control |
| | | (for example, |
| | | name of control, |
| | | make, model, and |
| | | version). |
| | | |
| | | - All in-scope |
| | | system |
| | | components, |
| | | including NSCs, |
| | | web app |
| | | firewalls, |
| | | anti-malware |
| | | solutions, |
| | | change |
| | | management |
| | | solutions, |
| | | IDS/IPS, log |
| | | aggregation |
| | | systems, payment |
| | | terminals, |
| | | payment |
| | | applications, |
| | | HSMs, etc. |
| | | |
| | | - Clear labeling |
| | | of any |
| | | out-of-scope |
| | | areas on the |
| | | diagram via a |
| | | shaded box or |
| | | other mechanism. |
| | | |
| | | - Date of last |
| | | update, and |
| | | names of people |
| | | that made and |
| | | approved the |
| | | updates. |
| | | |
| | | - A legend or key |
| | | to explain the |
| | | diagram. |
| | | |
| | | Diagrams should be |
| | | updated by |
| | | authorized personnel |
| | | to ensure diagrams |
| | | continue to provide |
| | | an accurate |
| | | description of the |
| | | network. |
+-----------------------+-----------------------+----------------------+
| **1.2.3** An accurate | **1.2.3.a** Examine | |
| network diagram(s) is | diagram(s) and | |
| maintained that shows | network | |
| all connections | configurations to | |
| between the CDE and | verify that an | |
| other networks, | accurate network | |
| including any | diagram(s) exists in | |
| wireless networks. | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.3.b** Examine | |
| | documentation and | |
| | interview responsible | |
| | personnel to verify | |
| | that the network | |
| | diagram(s) is | |
| | accurate and updated | |
| | when there are | |
| | changes to the | |
| | environment. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A representation of | | |
| the boundaries | | |
| between the CDE, all | | |
| trusted networks, and | | |
| all untrusted | | |
| networks, is | | |
| maintained and | | |
| available. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| A current network | | |
| diagram(s) or other | | |
| technical or | | |
| topological solution | | |
| that identifies | | |
| network connections | | |
| and devices can be | | |
| used to meet this | | |
| requirement. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An up-to-date, |
| | | readily available |
| | | data-flow diagram |
| | | helps an |
| | | organization |
| | | understand and keep |
| | | track of the scope |
| | | of its environment |
| | | by showing how |
| | | account data flows |
| | | across networks and |
| | | between individual |
| | | systems and devices. |
| | | |
| | | Maintaining an |
| | | up-to-date data-flow |
| | | diagram(s) prevents |
| | | account data from |
| | | being overlooked and |
| | | unknowingly left |
| | | unsecured. |
| | | |
| | | **Good Practice** |
| | | |
| | | The data-flow |
| | | diagram should |
| | | include all |
| | | connection points |
| | | where account data |
| | | is received into and |
| | | sent out of the |
| | | network, including |
| | | connections to open, |
| | | public networks, |
| | | application |
| | | processing flows, |
| | | storage, |
| | | transmissions |
| | | between systems and |
| | | networks, and file |
| | | backups. |
| | | |
| | | The data-flow |
| | | diagram is meant to |
| | | be in addition to |
| | | the network diagram |
| | | and should reconcile |
| | | with and augment the |
| | | network diagram. As |
| | | a best practice, |
| | | entities can |
| | | consider including |
| | | the following in |
| | | their data-flow |
| | | diagrams: |
| | | |
| | | - All processing |
| | | flows of account |
| | | data, including |
| | | authorization, |
| | | capture, |
| | | settlement, |
| | | chargeback, and |
| | | refunds. |
| | | |
| | | - All distinct |
| | | acceptance |
| | | channels, |
| | | including |
| | | card-present, |
| | | |
| | | card-not-present, |
| | | and e- commerce. |
| | | |
| | | - All types of |
| | | data receipt or |
| | | transmission, |
| | | including any |
| | | involving hard |
| | | copy/paper |
| | | media. |
| | | |
| | | - The flow of |
| | | account data |
| | | from the point |
| | | where it enters |
| | | the environment, |
| | | to its final |
| | | disposition. |
| | | |
| | | - Where account |
| | | data is |
| | | transmitted and |
| | | processed, where |
| | | it is stored, |
| | | and whether |
| | | storage is short |
| | | term or long |
| | | term. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **1.2.4** An accurate | **1.2.4.a** Examine | |
| data-flow diagram(s) | data-flow diagram(s) | |
| is maintained that | and interview | |
| meets the following: | personnel to verify | |
| | the diagram(s) show | |
| - Shows all account | all account data | |
| data flows across | flows in accordance | |
| systems and | with all elements | |
| networks. | specified in this | |
| | requirement. | |
| - Updated as needed | | |
| upon changes to | | |
| the environment. | | |
+-----------------------+-----------------------+----------------------+
| | **1.2.4.b** Examine | |
| | documentation and | |
| | interview responsible | |
| | personnel to verify | |
| | that the data-flow | |
| | diagram(s) is | |
| | accurate and updated | |
| | when there are | |
| | changes to the | |
| | environment. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A representation of | | |
| all transmissions of | | |
| account data between | | |
| system components and | | |
| across network | | |
| segments is | | |
| maintained and | | |
| available. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| A data-flow | | |
| diagram(s) or other | | |
| technical or | | |
| topological solution | | |
| that identifies flows | | |
| of account data | | |
| across systems and | | |
| networks can be used | | |
| to meet this | | |
| requirement. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | - The source of |
| | | all account data |
| | | received (for |
| | | example, |
| | | customers, third |
| | | party, etc.), |
| | | and any entities |
| | | with which |
| | | account data is |
| | | shared. |
| | | |
| | | - Date of last |
| | | update, and |
| | | names of people |
| | | that made and |
| | | approved the |
| | | updates. |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Compromises often |
| | | happen due to unused |
| | | or insecure services |
| | | (for example, telnet |
| | | and FTP), protocols, |
| | | and ports, since |
| | | these can lead to |
| | | unnecessary points |
| | | of access being |
| | | opened into the CDE. |
| | | Additionally, |
| | | services, protocols, |
| | | and ports that are |
| | | enabled but not in |
| | | use are often |
| | | overlooked and left |
| | | unsecured and |
| | | unpatched. By |
| | | identifying the |
| | | services, protocols, |
| | | and ports necessary |
| | | for business, |
| | | entities can ensure |
| | | that all other |
| | | services, protocols, |
| | | and ports are |
| | | disabled or removed. |
| | | |
| | | **Good Practice** |
| | | |
| | | The security risk |
| | | associated with each |
| | | service, protocol, |
| | | and port allowed |
| | | should be |
| | | understood. |
| | | Approvals should be |
| | | granted by personnel |
| | | independent of those |
| | | managing the |
| | | configuration. |
| | | Approving personnel |
| | | should possess |
| | | knowledge and |
| | | accountability |
| | | appropriate for |
| | | making approval |
| | | decisions. |
+-----------------------+-----------------------+----------------------+
| **1.2.5** All | **1.2.5.a** Examine | |
| services, protocols, | documentation to | |
| and ports allowed are | verify that a list | |
| identified, approved, | exists of all allowed | |
| and have a defined | services, protocols, | |
| business need. | and ports, including | |
| | business | |
| | justification and | |
| | approval for each. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.5.b** Examine | |
| | configuration | |
| | settings for NSCs to | |
| | verify that only | |
| | approved services, | |
| | protocols, and ports | |
| | are in use. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized network | | |
| traffic (services, | | |
| protocols, or packets | | |
| destined for specific | | |
| ports) cannot enter | | |
| or leave the network. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Compromises take |
| | | advantage of |
| | | insecure network |
| | | configurations. |
| | | |
| | | **Good Practice** |
| | | |
| | | If insecure |
| | | services, protocols, |
| | | or ports are |
| | | necessary for |
| | | business, the risk |
| | | posed by these |
| | | services, protocols, |
| | | and ports should be |
| | | clearly understood |
| | | and accepted by the |
| | | organization, the |
| | | use of the service, |
| | | protocol, or port |
| | | should be justified, |
| | | and the security |
| | | features that |
| | | mitigate the risk of |
| | | using these |
| | | services, protocols, |
| | | and ports should be |
| | | defined and |
| | | implemented by the |
| | | entity. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For guidance on |
| | | services, protocols, |
| | | or ports considered |
| | | to be insecure, |
| | | refer to industry |
| | | standards and |
| | | guidance (for |
| | | example, from NIST, |
| | | ENISA, OWASP). |
+-----------------------+-----------------------+----------------------+
| **1.2.6** Security | **1.2.6.a** Examine | |
| features are defined | documentation that | |
| and implemented for | identifies all | |
| all services, | insecure services, | |
| protocols, and ports | protocols, and ports | |
| that are in use and | in use to verify that | |
| considered to be | for each, security | |
| insecure, such that | features are defined | |
| the risk is | to mitigate the risk. | |
| mitigated. | | |
+-----------------------+-----------------------+----------------------+
| | **1.2.6.b** Examine | |
| | configuration | |
| | settings for NSCs to | |
| | verify that the | |
| | defined security | |
| | features are | |
| | implemented for each | |
| | identified insecure | |
| | service, protocol, | |
| | and port. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The specific risks | | |
| associated with the | | |
| use of insecure | | |
| services, protocols, | | |
| and ports are | | |
| understood, assessed, | | |
| and appropriately | | |
| mitigated. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Such a review gives |
| | | the organization an |
| | | opportunity to clean |
| | | up any unneeded, |
| | | outdated, or |
| | | incorrect rules and |
| | | configurations which |
| | | could be utilized by |
| | | an unauthorized |
| | | person. |
| | | |
| | | Furthermore, it |
| | | ensures that all |
| | | rules and |
| | | configurations allow |
| | | only authorized |
| | | services, protocols, |
| | | and ports that match |
| | | the documented |
| | | business |
| | | justifications. |
| | | |
| | | **Good Practice** |
| | | |
| | | This review, which |
| | | can be implemented |
| | | using manual, |
| | | automated, or |
| | | system-based |
| | | methods, is intended |
| | | to confirm that the |
| | | settings that manage |
| | | traffic rules, what |
| | | is allowed in and |
| | | out of the network, |
| | | match the approved |
| | | configurations. |
| | | |
| | | The review should |
| | | provide confirmation |
| | | that all permitted |
| | | access has a |
| | | justified business |
| | | reason. Any |
| | | discrepancies or |
| | | uncertainties about |
| | | a rule or |
| | | configuration should |
| | | be escalated for |
| | | resolution. |
| | | |
| | | While this |
| | | requirement |
| | | specifies that this |
| | | review occur at |
| | | least once every six |
| | | months, |
| | | organizations with a |
| | | high volume of |
| | | changes to their |
| | | network |
| | | configurations may |
| | | wish to consider |
| | | performing reviews |
| | | more frequently to |
| | | ensure that the |
| | | configurations |
| | | continue to meet the |
| | | needs of the |
| | | business. |
+-----------------------+-----------------------+----------------------+
| **1.2.7** | **1.2.7.a** Examine | |
| Configurations of | documentation to | |
| NSCs are reviewed at | verify procedures are | |
| least once every six | defined for reviewing | |
| months to confirm | configurations of | |
| they are relevant and | NSCs at least once | |
| effective. | every six months. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.7.b** Examine | |
| | documentation of | |
| | reviews of | |
| | configurations for | |
| | NSCs and interview | |
| | responsible personnel | |
| | to verify that | |
| | reviews occur at | |
| | least once every six | |
| | months. | |
+-----------------------+-----------------------+----------------------+
| | **1.2.7.c** Examine | |
| | configurations for | |
| | NSCs to verify that | |
| | configurations | |
| | identified as no | |
| | longer being | |
| | supported by a | |
| | business | |
| | justification are | |
| | removed or updated. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| NSC configurations | | |
| that allow or | | |
| restrict access to | | |
| trusted networks are | | |
| verified periodically | | |
| to ensure that only | | |
| authorized | | |
| connections with a | | |
| current business | | |
| justification are | | |
| permitted. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | To prevent |
| | | unauthorized |
| | | configurations from |
| | | being applied to the |
| | | network, stored |
| | | files with |
| | | configurations for |
| | | network controls |
| | | need to be kept up |
| | | to date and secured |
| | | against unauthorized |
| | | changes. |
| | | |
| | | Keeping |
| | | configuration |
| | | information current |
| | | and secure ensures |
| | | that the correct |
| | | settings for NSCs |
| | | are applied whenever |
| | | the configuration is |
| | | run. |
| | | |
| | | **Examples** |
| | | |
| | | If the secure |
| | | configuration for a |
| | | router is stored in |
| | | non-volatile memory, |
| | | when that router is |
| | | restarted or |
| | | rebooted, these |
| | | controls should |
| | | ensure that its |
| | | secure configuration |
| | | is reinstated. |
+-----------------------+-----------------------+----------------------+
| **1.2.8** | **1.2.8** Examine | |
| Configuration files | configuration files | |
| for NSCs are: | for NSCs to verify | |
| | they are in | |
| - Secured from | accordance with all | |
| unauthorized | elements specified in | |
| access. | this requirement. | |
| | | |
| - Kept consistent | | |
| with active | | |
| network | | |
| configurations. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| NSCs cannot be | | |
| defined or modified | | |
| using untrusted | | |
| configuration objects | | |
| (including files). | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Any file or setting | | |
| used to configure or | | |
| synchronize NSCs is | | |
| considered to be a | | |
| "configuration file." | | |
| This includes files, | | |
| automated and | | |
| system-based | | |
| controls, scripts, | | |
| settings, | | |
| infrastructure as | | |
| code, or other | | |
| parameters that are | | |
| backed up, archived, | | |
| or stored remotely. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **1.3** Network | | |
| access to and from | | |
| the cardholder data | | |
| environment is | | |
| restricted. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | This requirement |
| | | aims to prevent |
| | | malicious |
| | | individuals from |
| | | accessing the |
| | | entity's network via |
| | | unauthorized IP |
| | | addresses or from |
| | | using services, |
| | | protocols, or ports |
| | | in an unauthorized |
| | | manner. |
| | | |
| | | **Good Practice** |
| | | |
| | | All traffic inbound |
| | | to the CDE, |
| | | regardless of where |
| | | it originates, |
| | | should be evaluated |
| | | to ensure it follows |
| | | established, |
| | | authorized rules. |
| | | Connections should |
| | | be inspected to |
| | | ensure traffic is |
| | | restricted to only |
| | | authorized |
| | | communications---for |
| | | example, by |
| | | restricting |
| | | source/destination |
| | | addresses and ports, |
| | | and blocking of |
| | | content. |
| | | |
| | | **Examples** |
| | | |
| | | Implementing a rule |
| | | that denies all |
| | | inbound and outbound |
| | | traffic that is not |
| | | specifically |
| | | needed--- for |
| | | example, by using an |
| | | explicit "deny all" |
| | | or implicit deny |
| | | after allow |
| | | statement---helps to |
| | | prevent inadvertent |
| | | holes that would |
| | | allow unintended and |
| | | potentially harmful |
| | | traffic. |
+-----------------------+-----------------------+----------------------+
| 1. Inbound traffic | **1.3.1.a** Examine | |
| to the CDE is | configuration | |
| restricted as | standards for NSCs to | |
| follows: | verify that they | |
| | define restricting | |
| - To only | inbound traffic to | |
| traffic that | the CDE is in | |
| is necessary. | accordance with all | |
| | elements specified in | |
| - All other | this requirement. | |
| traffic is | | |
| specifically | | |
| denied. | | |
+-----------------------+-----------------------+----------------------+
| | **1.3.1.b** Examine | |
| | configurations of | |
| | NSCs to verify that | |
| | inbound traffic to | |
| | the CDE is restricted | |
| | in accordance with | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized traffic | | |
| cannot enter the CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | This requirement |
| | | aims to prevent |
| | | malicious |
| | | individuals and |
| | | compromised system |
| | | components within |
| | | the entity's network |
| | | from communicating |
| | | with an untrusted |
| | | external host. |
| | | |
| | | **Good Practice** |
| | | |
| | | All traffic outbound |
| | | from the CDE, |
| | | regardless of the |
| | | destination, should |
| | | be evaluated to |
| | | ensure it follows |
| | | established, |
| | | authorized rules. |
| | | Connections should |
| | | be inspected to |
| | | restrict traffic to |
| | | only authorized |
| | | communications---for |
| | | example, by |
| | | restricting |
| | | source/destination |
| | | addresses and ports, |
| | | and blocking of |
| | | content. |
| | | |
| | | **Examples** |
| | | |
| | | Implementing a rule |
| | | that denies all |
| | | inbound and outbound |
| | | traffic that is not |
| | | specifically |
| | | needed--- for |
| | | example, by using an |
| | | explicit "deny all" |
| | | or implicit deny |
| | | after allow |
| | | statement---helps to |
| | | prevent inadvertent |
| | | holes that would |
| | | allow unintended and |
| | | potentially harmful |
| | | traffic. |
+-----------------------+-----------------------+----------------------+
| **1.3.2** Outbound | **1.3.2.a** Examine | |
| traffic from the CDE | configuration | |
| is restricted as | standards for NSCs to | |
| follows: | verify that they | |
| | define restricting | |
| - To only traffic | outbound traffic from | |
| that is | the CDE in accordance | |
| necessary. | with all elements | |
| | specified in this | |
| - All other traffic | requirement. | |
| is specifically | | |
| denied. | | |
+-----------------------+-----------------------+----------------------+
| | **1.3.2.b** Examine | |
| | configurations of | |
| | NSCs to verify that | |
| | outbound traffic from | |
| | the CDE is restricted | |
| | in accordance with | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized traffic | | |
| cannot leave the CDE. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The known (or |
| | | unknown) |
| | | implementation and |
| | | exploitation of |
| | | wireless technology |
| | | within a network is |
| | | a common path for |
| | | malicious |
| | | individuals to gain |
| | | access to the |
| | | network and account |
| | | data. If a wireless |
| | | device or network is |
| | | installed without |
| | | the entity's |
| | | knowledge, a |
| | | malicious individual |
| | | could easily and |
| | | "invisibly" enter |
| | | the network. If NSCs |
| | | do not restrict |
| | | access from wireless |
| | | networks into the |
| | | CDE, malicious |
| | | individuals that |
| | | gain unauthorized |
| | | access to the |
| | | wireless network can |
| | | easily connect to |
| | | the CDE and |
| | | compromise account |
| | | information. |
+-----------------------+-----------------------+----------------------+
| **1.3.3** NSCs are | **1.3.3** Examine | |
| installed between all | configuration | |
| wireless networks and | settings and network | |
| the CDE, regardless | diagrams to verify | |
| of whether the | that NSCs are | |
| wireless network is a | implemented between | |
| CDE, such that: | all wireless networks | |
| | and the CDE, in | |
| - All wireless | accordance with all | |
| traffic from | elements specified in | |
| wireless networks | this requirement. | |
| into the CDE is | | |
| denied by | | |
| default. | | |
| | | |
| - Only wireless | | |
| traffic with an | | |
| authorized | | |
| business purpose | | |
| is allowed into | | |
| the CDE. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized traffic | | |
| cannot traverse | | |
| network boundaries | | |
| between any wireless | | |
| networks and wired | | |
| environments in the | | |
| CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **1.4** Network | | |
| connections between | | |
| trusted and untrusted | | |
| networks are | | |
| controlled. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Implementing NSCs at |
| | | every connection |
| | | coming into and out |
| | | of trusted networks |
| | | allows the entity to |
| | | monitor and control |
| | | access and minimizes |
| | | the chances of a |
| | | malicious individual |
| | | obtaining access to |
| | | the internal network |
| | | via an unprotected |
| | | connection. |
| | | |
| | | **Examples** |
| | | |
| | | An entity could |
| | | implement a DMZ, |
| | | which is a part of |
| | | the network that |
| | | manages connections |
| | | between an untrusted |
| | | network (for |
| | | examples of |
| | | untrusted networks |
| | | refer to the |
| | | Requirement 1 |
| | | Overview) and |
| | | services that an |
| | | organization needs |
| | | to have available to |
| | | the public, such as |
| | | a web server. Please |
| | | note that if an |
| | | entity's DMZ |
| | | processes or |
| | | transmits account |
| | | data (for example, |
| | | e-commerce website), |
| | | it is also |
| | | considered a CDE. |
+-----------------------+-----------------------+----------------------+
| **1.4.1** NSCs are | **1.4.1.a** Examine | |
| implemented between | configuration | |
| trusted and untrusted | standards and network | |
| networks. | diagrams to verify | |
| | that NSCs are defined | |
| | between trusted and | |
| | untrusted networks. | |
+-----------------------+-----------------------+----------------------+
| | **1.4.1.b** Examine | |
| | network | |
| | configurations to | |
| | verify that NSCs are | |
| | in place between | |
| | trusted and untrusted | |
| | networks, in | |
| | accordance with the | |
| | documented | |
| | configuration | |
| | standards and network | |
| | diagrams. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized traffic | | |
| cannot traverse | | |
| network boundaries | | |
| between trusted and | | |
| untrusted networks. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Ensuring that public |
| | | access to a system |
| | | component is |
| | | specifically |
| | | authorized reduces |
| | | the risk of system |
| | | components being |
| | | unnecessarily |
| | | exposed to untrusted |
| | | networks. |
| | | |
| | | **Good Practice** |
| | | |
| | | System components |
| | | that provide |
| | | publicly accessible |
| | | services, such as |
| | | email, web, and DNS |
| | | servers, are the |
| | | most vulnerable to |
| | | threats originating |
| | | from untrusted |
| | | networks. |
| | | |
| | | Ideally, such |
| | | systems are placed |
| | | within a dedicated |
| | | trusted network that |
| | | is public facing |
| | | (for example, a DMZ) |
| | | but that is |
| | | separated via NSCs |
| | | from more sensitive |
| | | internal systems, |
| | | which helps protect |
| | | the rest of the |
| | | network in the event |
| | | these externally |
| | | accessible systems |
| | | are compromised. |
| | | This functionality |
| | | is intended to |
| | | prevent malicious |
| | | actors from |
| | | accessing the |
| | | organization\'s |
| | | internal network |
| | | from the Internet, |
| | | or from using |
| | | services, protocols, |
| | | or ports in an |
| | | unauthorized manner. |
| | | |
| | | Where this |
| | | functionality is |
| | | provided as a |
| | | built-in feature of |
| | | an NSC, the entity |
| | | should ensure that |
| | | its configurations |
| | | do not result in the |
| | | functionality being |
| | | disabled or |
| | | bypassed. |
| | | |
| | | **Definitions** |
| | | |
| | | Maintaining the |
| | | \"state\" (or |
| | | status) for each |
| | | connection into a |
| | | network means the |
| | | NSC "knows" whether |
| | | an apparent response |
| | | to a previous |
| | | connection is a |
| | | valid, authorized |
| | | response (since the |
| | | NSC retains each |
| | | connection's status) |
| | | or whether it is |
| | | malicious traffic |
| | | trying to fool the |
| | | NSC into allowing |
| | | the connection. |
+-----------------------+-----------------------+----------------------+
| **1.4.2** Inbound | **1.4.2** Examine | |
| traffic from | vendor documentation | |
| untrusted networks to | and configurations of | |
| trusted networks is | NSCs to verify that | |
| restricted to: | inbound traffic from | |
| | untrusted networks to | |
| - Communications | trusted networks is | |
| with system | restricted in | |
| components that | accordance with all | |
| are authorized to | elements specified in | |
| provide publicly | this requirement. | |
| accessible | | |
| services, | | |
| protocols, and | | |
| ports. | | |
| | | |
| - Stateful | | |
| responses to | | |
| communications | | |
| initiated by | | |
| system components | | |
| in a trusted | | |
| network. | | |
| | | |
| - All other traffic | | |
| is denied. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Only traffic that is | | |
| authorized or that is | | |
| a response to a | | |
| system component in | | |
| the trusted network | | |
| can enter a trusted | | |
| network from an | | |
| untrusted network. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The intent of this | | |
| requirement is to | | |
| address communication | | |
| sessions between | | |
| trusted and untrusted | | |
| networks, rather than | | |
| the specifics of | | |
| protocols. | | |
| | | |
| This requirement does | | |
| not limit the use of | | |
| UDP or other | | |
| connectionless | | |
| network protocols if | | |
| state is maintained | | |
| by the NSC. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Filtering packets |
| | | coming into the |
| | | trusted network |
| | | helps to, among |
| | | other things, ensure |
| | | packets are not |
| | | "spoofed" to appear |
| | | as if they are |
| | | coming from an |
| | | organization's own |
| | | internal network. |
| | | For example, |
| | | anti-spoofing |
| | | measures prevent |
| | | internal addresses |
| | | originating from the |
| | | Internet from |
| | | passing into the |
| | | DMZ. |
| | | |
| | | **Good Practice** |
| | | |
| | | Products usually |
| | | come with |
| | | anti-spoofing set as |
| | | a default and may |
| | | not be configurable. |
| | | Entities should |
| | | consult the |
| | | vendor\'s |
| | | documentation for |
| | | more information. |
| | | |
| | | **Examples** |
| | | |
| | | Normally, a packet |
| | | contains the IP |
| | | address of the |
| | | computer that |
| | | originally sent it |
| | | so other computers |
| | | in the network know |
| | | where the packet |
| | | originated. |
| | | |
| | | Malicious |
| | | individuals will |
| | | often try to spoof |
| | | (or imitate) the |
| | | sending IP address |
| | | to fool the target |
| | | system into |
| | | believing the packet |
| | | is from a trusted |
| | | source. |
+-----------------------+-----------------------+----------------------+
| **1.4.3** | **1.4.3** Examine | |
| Anti-spoofing | vendor documentation | |
| measures are | and configurations | |
| implemented to detect | for NSCs to verify | |
| and block forged | that anti-spoofing | |
| source IP addresses | measures are | |
| from entering the | implemented to detect | |
| trusted network. | and block forged | |
| | source IP addresses | |
| | from entering the | |
| | trusted network. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Packets with forged | | |
| IP source addresses | | |
| cannot enter a | | |
| trusted network. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Cardholder data that |
| | | is directly |
| | | accessible from an |
| | | untrusted network, |
| | | for example, because |
| | | it is stored on a |
| | | system within the |
| | | DMZ or in a cloud |
| | | database service, is |
| | | easier for an |
| | | external attacker to |
| | | access because there |
| | | are fewer defensive |
| | | layers to penetrate. |
| | | Using NSCs to ensure |
| | | that system |
| | | components that |
| | | store cardholder |
| | | data (such as a |
| | | database or a file) |
| | | can only be directly |
| | | accessed from |
| | | trusted networks can |
| | | prevent unauthorized |
| | | network traffic from |
| | | reaching the system |
| | | component. |
+-----------------------+-----------------------+----------------------+
| **1.4.4** System | **1.4.4.a** Examine | |
| components that store | the data-flow diagram | |
| cardholder data are | and network diagram | |
| not directly | to verify that it is | |
| accessible from | documented that | |
| untrusted networks. | system components | |
| | storing cardholder | |
| | data are not directly | |
| | accessible from the | |
| | untrusted networks. | |
+-----------------------+-----------------------+----------------------+
| | **1.4.4.b** Examine | |
| | configurations of | |
| | NSCs to verify that | |
| | controls are | |
| | implemented such that | |
| | system components | |
| | storing cardholder | |
| | data are not directly | |
| | accessible from | |
| | untrusted networks. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Stored cardholder | | |
| data cannot be | | |
| accessed from | | |
| untrusted networks. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to storage of account | | |
| data in volatile | | |
| memory but does apply | | |
| where memory is being | | |
| treated as persistent | | |
| storage (for example, | | |
| RAM disk). Account | | |
| data can only be | | |
| stored in volatile | | |
| memory during the | | |
| time necessary to | | |
| support the | | |
| associated business | | |
| process (for example, | | |
| until completion of | | |
| the related payment | | |
| card transaction). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Restricting the |
| | | disclosure of |
| | | internal, private, |
| | | and local IP |
| | | addresses is useful |
| | | to prevent a hacker |
| | | from obtaining |
| | | knowledge of these |
| | | IP addresses and |
| | | using that |
| | | information to |
| | | access the network. |
| | | |
| | | **Good Practice** |
| | | |
| | | Methods used to meet |
| | | the intent of this |
| | | requirement may |
| | | vary, depending on |
| | | the specific |
| | | networking |
| | | technology being |
| | | used. For example, |
| | | the controls used to |
| | | meet this |
| | | requirement may be |
| | | different for IPv4 |
| | | networks than for |
| | | IPv6 networks. |
| | | |
| | | **Examples** |
| | | |
| | | Methods to obscure |
| | | IP addressing may |
| | | include, but are not |
| | | limited to: |
| | | |
| | | - IPv4 Network |
| | | Address |
| | | Translation |
| | | (NAT). |
| | | |
| | | - Placing system |
| | | components |
| | | behind proxy |
| | | servers/NSCs. |
| | | |
| | | - Removal or |
| | | filtering of |
| | | route |
| | | advertisements |
| | | for internal |
| | | networks that |
| | | use registered |
| | | addressing. |
| | | |
| | | - Internal use of |
| | | RFC 1918 (IPv4) |
| | | or use IPv6 |
| | | privacy |
| | | extension |
| | | (RFC 4941) when |
| | | initiating |
| | | outgoing |
| | | sessions to the |
| | | internet. |
+-----------------------+-----------------------+----------------------+
| **1.4.5** The | **1.4.5.a** Examine | |
| disclosure of | configurations of | |
| internal IP addresses | NSCs to verify that | |
| and routing | the disclosure of | |
| information is | internal IP addresses | |
| limited to only | and routing | |
| authorized parties. | information is | |
| | limited to only | |
| | authorized parties. | |
+-----------------------+-----------------------+----------------------+
| | **1.4.5.b** Interview | |
| | personnel and examine | |
| | documentation to | |
| | verify that controls | |
| | are implemented such | |
| | that any disclosure | |
| | of internal IP | |
| | addresses and routing | |
| | information is | |
| | limited to only | |
| | authorized parties. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Internal network | | |
| information is | | |
| protected from | | |
| unauthorized | | |
| disclosure. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **1.5** Risks to the | | |
| CDE from computing | | |
| devices that are able | | |
| to connect to both | | |
| untrusted networks | | |
| and the CDE are | | |
| mitigated. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Computing devices |
| | | that are allowed to |
| | | connect to the |
| | | Internet from |
| | | outside the |
| | | corporate |
| | | environment---for |
| | | example, desktops, |
| | | laptops, tablets, |
| | | smartphones, and |
| | | other mobile |
| | | computing devices |
| | | used by |
| | | employees---are more |
| | | vulnerable to |
| | | Internet-based |
| | | threats. |
| | | |
| | | Use of security |
| | | controls such as |
| | | host-based controls |
| | | (for example, |
| | | personal firewall |
| | | software or |
| | | end-point protection |
| | | solutions), |
| | | network-based |
| | | security controls |
| | | (for example, |
| | | firewalls, network- |
| | | based heuristics |
| | | inspection, and |
| | | malware simulation), |
| | | or hardware, helps |
| | | to protect devices |
| | | from Internet-based |
| | | attacks, which could |
| | | use the device to |
| | | gain access to the |
| | | organization's |
| | | systems and data |
| | | when the device |
| | | reconnects to the |
| | | network. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. Security controls | **1.5.1.a** Examine | |
| are implemented | policies and | |
| on any computing | configuration | |
| devices, | standards and | |
| including | interview personnel | |
| company- and | to verify security | |
| employee-owned | controls for | |
| devices, that | computing devices | |
| connect to both | that connect to both | |
| untrusted | untrusted networks, | |
| networks | and the CDE, are | |
| (including the | implemented in | |
| Internet) and the | accordance with all | |
| CDE as follows: | elements specified in | |
| | this requirement. | |
| - Specific | | |
| configuration | | |
| settings are | | |
| defined to | | |
| prevent | | |
| threats being | | |
| introduced | | |
| into the | | |
| entity's | | |
| network. | | |
| | | |
| - Security | | |
| controls are | | |
| actively | | |
| running. | | |
| | | |
| - Security | | |
| controls are | | |
| not alterable | | |
| by users of | | |
| the computing | | |
| devices | | |
| unless | | |
| specifically | | |
| documented | | |
| and | | |
| authorized by | | |
| management on | | |
| a | | |
| case-by-case | | |
| basis for a | | |
| limited | | |
| period. | | |
+-----------------------+-----------------------+----------------------+
| | **1.5.1.b** Examine | |
| | configuration | |
| | settings on computing | |
| | devices that connect | |
| | to both untrusted | |
| | networks and the CDE | |
| | to verify settings | |
| | are implemented in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Devices that connect | | |
| to untrusted | | |
| environments and also | | |
| connect to the CDE | | |
| cannot introduce | | |
| threats to the | | |
| entity's CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | **Good Practice** |
| Notes** | | |
| | | The specific |
| | | configuration |
| | | settings are |
| | | determined by the |
| | | entity and should be |
| | | consistent with its |
| | | network security |
| | | policies and |
| | | procedures. |
| | | |
| | | Where there is a |
| | | legitimate need to |
| | | temporarily disable |
| | | security controls on |
| | | a company-owned or |
| | | employee-owned |
| | | device that connects |
| | | to both an untrusted |
| | | network and the |
| | | CDE---for example, |
| | | to support a |
| | | specific maintenance |
| | | activity or |
| | | investigation of a |
| | | technical |
| | | problem---the reason |
| | | for taking such |
| | | action is understood |
| | | and approved by an |
| | | appropriate |
| | | management |
| | | representative. |
| | | |
| | | Any disabling or |
| | | altering of these |
| | | security controls, |
| | | including on |
| | | administrators' own |
| | | devices, is |
| | | performed by |
| | | authorized |
| | | personnel. |
| | | |
| | | It is recognized |
| | | that administrators |
| | | have privileges that |
| | | may allow them to |
| | | disable security |
| | | controls on their |
| | | own computers, but |
| | | there should be |
| | | alerting mechanisms |
| | | in place when such |
| | | controls are |
| | | disabled and follow |
| | | up that occurs to |
| | | ensure processes |
| | | were followed. |
| | | |
| | | **Examples** |
| | | |
| | | Practices include |
| | | forbidding |
| | | split-tunneling of |
| | | VPNs for |
| | | employee-owned or |
| | | corporate-owned |
| | | mobile devices and |
| | | requiring that such |
| | | devices boot up into |
| | | a VPN. |
+-----------------------+-----------------------+----------------------+
| These security | | |
| controls may be | | |
| temporarily disabled | | |
| only if there is | | |
| legitimate technical | | |
| need, as authorized | | |
| by management on a | | |
| case-by-case basis. | | |
| If these security | | |
| controls need to be | | |
| disabled for a | | |
| specific purpose, it | | |
| must be formally | | |
| authorized. | | |
| Additional security | | |
| measures may also | | |
| need to be | | |
| implemented for the | | |
| period during which | | |
| these security | | |
| controls are not | | |
| active. | | |
| | | |
| This requirement | | |
| applies to | | |
| employee-owned and | | |
| company-owned | | |
| computing devices. | | |
| Systems that cannot | | |
| be managed by | | |
| corporate policy | | |
| introduce weaknesses | | |
| and provide | | |
| opportunities that | | |
| malicious individuals | | |
| may exploit. | | |
+-----------------------+-----------------------+----------------------+
### *Requirement 2: Apply Secure Configurations to All System Components* {#requirement-2-apply-secure-configurations-to-all-system-components .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for applying secure configurations to |
| all system components are defined and understood. |
| |
| 2. System components are configured and managed securely. |
| |
| 3. Wireless environments are configured and managed securely. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Malicious individuals, both external and internal to an entity, |
| > often use default passwords and other vendor default settings to |
| > compromise systems. These passwords and settings are well known and |
| > are easily determined via public information. |
| > |
| > Applying secure configurations to system components reduces the |
| > means available to an attacker to compromise the system. Changing |
| > default passwords, removing unnecessary software, functions, and |
| > accounts, and disabling or removing unnecessary services all help |
| > to reduce the potential attack surface. |
| |
| Refer to *[Appendix |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| applying secure | | |
| configurations to | | |
| all system | | |
| components are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 2.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 2. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 2, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **2.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 2 | operational | |
| are: | procedures identified | |
| | in Requirement 2 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 2 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **2.1.2** Roles and | **2.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 2 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 2 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **2.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 2 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 2 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **2.2** System | | |
| components are | | |
| configured and | | |
| managed securely. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | There are known |
| | | weaknesses with many |
| | | operating systems, |
| | | databases, network |
| | | devices, software, |
| | | applications, |
| | | container images, |
| | | and other devices |
| | | used by an entity or |
| | | within an entity's |
| | | environment. There |
| | | are also known ways |
| | | to configure these |
| | | system components to |
| | | fix security |
| | | vulnerabilities. |
| | | Fixing security |
| | | vulnerabilities |
| | | reduces the |
| | | opportunities |
| | | available to an |
| | | attacker. |
| | | |
| | | By developing |
| | | standards, entities |
| | | ensure their system |
| | | components will be |
| | | configured |
| | | consistently and |
| | | securely, and |
| | | address the |
| | | protection of |
| | | devices for which |
| | | full hardening may |
| | | be more difficult. |
| | | |
| | | **Good Practice** |
| | | |
| | | Keeping up to date |
| | | with current |
| | | industry guidance |
| | | will help the entity |
| | | maintain secure |
| | | configurations. |
| | | |
| | | The specific |
| | | controls to be |
| | | applied to a system |
| | | will vary and should |
| | | be appropriate for |
| | | the type and |
| | | function of the |
| | | system. |
| | | |
| | | Numerous security |
| | | organizations have |
| | | established |
| | | system-hardening |
| | | guidelines and |
| | | recommendations, |
| | | which advise how to |
| | | correct common, |
| | | known weaknesses. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Sources for guidance |
| | | on configuration |
| | | standards include |
| | | but are not limited |
| | | to: Center for |
| | | Internet Security |
| | | (CIS), International |
| | | Organization for |
| | | Standardization |
| | | (ISO), National |
| | | Institute of |
| | | Standards and |
| | | Technology (NIST), |
| | | Cloud Security |
| | | Alliance, and |
| | | product vendors. |
+-----------------------+-----------------------+----------------------+
| 1. Configuration | > **2.2.1.a** Examine | |
| standards are | > system | |
| developed, | > configuration | |
| implemented, and | > standards to verify | |
| maintained to: | > they define | |
| | > processes that | |
| - Cover all | > include all | |
| system | > elements specified | |
| components. | > in this | |
| | > requirement. | |
| - Address all | | |
| known | | |
| security | | |
| | | |
| vulnerabilities. | | |
| | | |
| - Be consistent | | |
| with | | |
| | | |
| industry-accepted | | |
| system | | |
| hardening | | |
| standards or | | |
| vendor | | |
| hardening | | |
| | | |
| recommendations. | | |
| | | |
| - Be updated as | | |
| new | | |
| vulnerability | | |
| issues are | | |
| identified, | | |
| as defined in | | |
| Requirement | | |
| 6.3.1. | | |
| | | |
| - Be applied | | |
| when new | | |
| systems are | | |
| configured | | |
| and verified | | |
| as in place | | |
| before or | | |
| immediately | | |
| after a | | |
| system | | |
| component is | | |
| connected to | | |
| a production | | |
| environment. | | |
+-----------------------+-----------------------+----------------------+
| | > **2.2.1.b** Examine | |
| | > policies and | |
| | > procedures and | |
| | > interview personnel | |
| | > to verify that | |
| | > system | |
| | > configuration | |
| | > standards are | |
| | > updated as new | |
| | > vulnerability | |
| | > issues are | |
| | > identified, as | |
| | > defined in | |
| | > Requirement 6.3.1. | |
+-----------------------+-----------------------+----------------------+
| | > **2.2.1.c** Examine | |
| | > configuration | |
| | > settings and | |
| | > interview personnel | |
| | > to verify that | |
| | > system | |
| | > configuration | |
| | > standards are | |
| | > applied when new | |
| | > systems are | |
| | > configured and | |
| | > verified as being | |
| | > in place before or | |
| | > immediately after a | |
| | > system component is | |
| | > connected to a | |
| | > production | |
| | > environment. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All system components | | |
| are configured | | |
| securely and | | |
| consistently and in | | |
| accordance with | | |
| industry- accepted | | |
| hardening standards | | |
| or vendor | | |
| recommendations. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Malicious |
| | | individuals often |
| | | use vendor default |
| | | account names and |
| | | passwords to |
| | | compromise operating |
| | | systems, |
| | | applications, and |
| | | the systems on which |
| | | they are installed. |
| | | Because these |
| | | default settings are |
| | | often published and |
| | | are well known, |
| | | changing these |
| | | settings will make |
| | | systems less |
| | | vulnerable to |
| | | attack. |
| | | |
| | | **Good Practice** |
| | | |
| | | All vendor default |
| | | accounts should be |
| | | identified, and |
| | | their purpose and |
| | | use understood. It |
| | | is important to |
| | | establish controls |
| | | for application and |
| | | system accounts, |
| | | including those used |
| | | to deploy and |
| | | maintain cloud |
| | | services so that |
| | | they do not use |
| | | default passwords |
| | | and are not usable |
| | | by unauthorized |
| | | individuals. |
| | | |
| | | Where a default |
| | | account is not |
| | | intended to be used, |
| | | changing the default |
| | | password to a unique |
| | | password that meets |
| | | PCI DSS Requirement |
| | | 8.3.6, removing any |
| | | access to the |
| | | default account, and |
| | | then disabling the |
| | | account, will |
| | | prevent a malicious |
| | | individual from |
| | | re-enabling the |
| | | account and gaining |
| | | access with the |
| | | default password. |
| | | |
| | | Using an isolated |
| | | staging network to |
| | | install and |
| | | configure new |
| | | systems is |
| | | recommended and can |
| | | also be used to |
| | | confirm that default |
| | | credentials have not |
| | | been introduced into |
| | | production |
| | | environments. |
| | | |
| | | **Examples** |
| | | |
| | | Defaults to be |
| | | considered include |
| | | user IDs, passwords, |
| | | and other |
| | | authentication |
| | | credentials commonly |
| | | used by vendors in |
| | | their products. |
+-----------------------+-----------------------+----------------------+
| **2.2.2** Vendor | **2.2.2.a** Examine | |
| default accounts are | system configuration | |
| managed as follows: | standards to verify | |
| | they include managing | |
| - If the vendor | vendor default | |
| default | accounts in | |
| account(s) will | accordance with all | |
| be used, the | elements specified in | |
| default password | this requirement. | |
| is changed per | | |
| Requirement | | |
| 8.3.6. | | |
| | | |
| - If the vendor | | |
| default | | |
| account(s) will | | |
| not be used, the | | |
| account is | | |
| removed or | | |
| disabled. | | |
+-----------------------+-----------------------+----------------------+
| | **2.2.2.b** Examine | |
| | vendor documentation | |
| | and observe a system | |
| | administrator logging | |
| | on using vendor | |
| | default accounts to | |
| | verify accounts are | |
| | implemented in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.2.c** Examine | |
| | configuration files | |
| | and interview | |
| | personnel to verify | |
| | that all vendor | |
| | default accounts that | |
| | will not be used are | |
| | removed or disabled. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| cannot be accessed | | |
| using default | | |
| passwords. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This applies to ALL | | |
| vendor default | | |
| accounts and | | |
| passwords, including, | | |
| but not limited to, | | |
| those used by | | |
| operating systems, | | |
| software that | | |
| provides security | | |
| services, application | | |
| and system accounts, | | |
| point-of-sale (POS) | | |
| terminals, payment | | |
| applications, and | | |
| Simple Network | | |
| Management Protocol | | |
| (SNMP) defaults. | | |
| | | |
| This requirement also | | |
| applies where a | | |
| system component is | | |
| not installed within | | |
| an entity's | | |
| environment, for | | |
| example, software and | | |
| applications that are | | |
| part of the CDE and | | |
| are accessed via a | | |
| cloud subscription | | |
| service. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Systems containing a |
| | | combination of |
| | | services, protocols, |
| | | and daemons for |
| | | their primary |
| | | function will have a |
| | | security profile |
| | | appropriate to allow |
| | | that function to |
| | | operate effectively. |
| | | For example, systems |
| | | that need to be |
| | | directly connected |
| | | to the Internet |
| | | would have a |
| | | particular profile, |
| | | like a DNS server, |
| | | web server, or an |
| | | e-commerce server. |
| | | Conversely, other |
| | | system components |
| | | may operate a |
| | | primary function |
| | | comprising a |
| | | different set of |
| | | services, protocols, |
| | | and daemons that |
| | | performs functions |
| | | that an entity does |
| | | not want exposed to |
| | | the Internet. This |
| | | requirement aims to |
| | | ensure that |
| | | different functions |
| | | do not impact the |
| | | security profiles of |
| | | other services in a |
| | | way which may cause |
| | | them to operate at a |
| | | higher or lower |
| | | security level. |
| | | |
| | | **Good Practice** |
| | | |
| | | Ideally, each |
| | | function should be |
| | | placed on different |
| | | system components. |
| | | This can be achieved |
| | | by implementing only |
| | | one primary function |
| | | on each system |
| | | component. Another |
| | | option is to isolate |
| | | primary functions on |
| | | the same system |
| | | component that have |
| | | different security |
| | | levels, for example, |
| | | isolating web |
| | | servers (which need |
| | | to be directly |
| | | connected to the |
| | | Internet) from |
| | | application and |
| | | database servers. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **2.2.3** Primary | **2.2.3.a** Examine | |
| functions requiring | system configuration | |
| different security | standards to verify | |
| levels are managed as | they include managing | |
| follows: | primary functions | |
| | requiring different | |
| - Only one primary | security levels as | |
| function exists | specified in this | |
| on a system | requirement. | |
| component, | | |
| | | |
| > **OR** | | |
| | | |
| - Primary functions | | |
| with differing | | |
| security levels | | |
| that exist on the | | |
| same system | | |
| component are | | |
| isolated from | | |
| each other, | | |
| | | |
| **OR** | | |
| | | |
| - Primary functions | | |
| with differing | | |
| security levels | | |
| on the same | | |
| system component | | |
| are all secured | | |
| to the level | | |
| required by the | | |
| function with the | | |
| highest security | | |
| need. | | |
+-----------------------+-----------------------+----------------------+
| | **2.2.3.b** Examine | |
| | system configurations | |
| | to verify that | |
| | primary functions | |
| | requiring different | |
| | security levels are | |
| | managed per one of | |
| | the ways specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.3.c** Where | |
| | virtualization | |
| | technologies are | |
| | used, examine the | |
| | system configurations | |
| | to verify that system | |
| | functions requiring | |
| | different security | |
| | levels are managed in | |
| | one of the following | |
| | ways: | |
| | | |
| | - Functions with | |
| | differing | |
| | security needs do | |
| | not co-exist on | |
| | the same system | |
| | component. | |
| | | |
| | - Functions with | |
| | differing | |
| | security needs | |
| | that exist on the | |
| | same system | |
| | component are | |
| | isolated from | |
| | each other. | |
| | | |
| | - Functions with | |
| | differing | |
| | security needs on | |
| | the same system | |
| | component are all | |
| | secured to the | |
| | level required by | |
| | the function with | |
| | the highest | |
| | security need. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Primary functions | | |
| with lower security | | |
| needs cannot affect | | |
| the security of | | |
| primary functions | | |
| with higher security | | |
| needs on the same | | |
| system component. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| | | If a system |
| | | component contains |
| | | primary functions |
| | | that need different |
| | | security levels, a |
| | | third option is to |
| | | implement additional |
| | | controls to ensure |
| | | that the resultant |
| | | security level of |
| | | the primary |
| | | function(s) with |
| | | higher security |
| | | needs is not reduced |
| | | by the presence of |
| | | the lower security |
| | | primary functions. |
| | | Additionally, the |
| | | functions with a |
| | | lower security level |
| | | should be isolated |
| | | and/or secured to |
| | | ensure they cannot |
| | | access or affect the |
| | | resources of another |
| | | system function, and |
| | | do not introduce |
| | | security weaknesses |
| | | to other functions |
| | | on the same server. |
| | | |
| | | Functions of |
| | | differing security |
| | | levels may be |
| | | isolated by either |
| | | physical or logical |
| | | controls. For |
| | | example, a database |
| | | system should not |
| | | also be hosting web |
| | | services unless |
| | | using controls like |
| | | virtualization |
| | | technologies to |
| | | isolate and contain |
| | | the functions into |
| | | separate |
| | | sub-systems. Another |
| | | example is using |
| | | virtual instances or |
| | | providing dedicated |
| | | memory access by |
| | | system function. |
| | | |
| | | Where virtualization |
| | | technologies are |
| | | used, the security |
| | | levels should be |
| | | identified and |
| | | managed for each |
| | | virtual component. |
| | | Examples of |
| | | considerations for |
| | | virtualized |
| | | environments |
| | | include: |
| | | |
| | | - The function of |
| | | each |
| | | application, |
| | | container, or |
| | | virtual server |
| | | instance. |
| | | |
| | | - How virtual |
| | | machines (VMs) |
| | | or containers |
| | | are stored and |
| | | secured. |
+-----------------------+----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Unnecessary services |
| | | and functions can |
| | | provide additional |
| | | opportunities for |
| | | malicious |
| | | individuals to gain |
| | | access to a system. |
| | | By removing or |
| | | disabling all |
| | | unnecessary |
| | | services, protocols, |
| | | daemons, and |
| | | functions, |
| | | organizations can |
| | | focus on securing |
| | | the functions that |
| | | are required and |
| | | reduce the risk that |
| | | unknown or |
| | | unnecessary |
| | | functions will be |
| | | exploited. |
| | | |
| | | **Good Practice** |
| | | |
| | | There are many |
| | | protocols that could |
| | | be enabled by |
| | | default that are |
| | | commonly used by |
| | | malicious |
| | | individuals to |
| | | compromise a |
| | | network. Disabling |
| | | or removing all |
| | | services, functions, |
| | | and protocols that |
| | | are not used |
| | | minimizes the |
| | | potential attack |
| | | surface---for |
| | | example, by removing |
| | | or disabling an |
| | | unused FTP or web |
| | | server. |
| | | |
| | | **Examples** |
| | | |
| | | Unnecessary |
| | | functionality may |
| | | include, but is not |
| | | limited to scripts, |
| | | drivers, features, |
| | | subsystems, file |
| | | systems, interfaces |
| | | (USB and Bluetooth), |
| | | and unnecessary web |
| | | servers. |
+-----------------------+-----------------------+----------------------+
| **2.2.4** Only | **2.2.4.a** Examine | |
| necessary services, | system configuration | |
| protocols, daemons, | standards to verify | |
| and functions are | necessary system | |
| enabled, and all | services, protocols, | |
| unnecessary | and daemons are | |
| functionality is | identified and | |
| removed or disabled. | documented. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.4.b** Examine | |
| | system configurations | |
| | to verify the | |
| | following: | |
| | | |
| | - All unnecessary | |
| | functionality is | |
| | removed or | |
| | disabled. | |
| | | |
| | - Only required | |
| | functionality, as | |
| | documented in the | |
| | configuration | |
| | standards, is | |
| | enabled. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| cannot be compromised | | |
| by exploiting | | |
| unnecessary | | |
| functionality present | | |
| in the system | | |
| component. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Ensuring that all |
| | | insecure services, |
| | | protocols, and |
| | | daemons are |
| | | adequately secured |
| | | with appropriate |
| | | security features |
| | | makes it more |
| | | difficult for |
| | | malicious |
| | | individuals to |
| | | exploit common |
| | | points of compromise |
| | | within a network. |
| | | |
| | | **Good Practice** |
| | | |
| | | Enabling security |
| | | features before new |
| | | system components |
| | | are deployed will |
| | | prevent insecure |
| | | configurations from |
| | | being introduced |
| | | into the |
| | | environment. Some |
| | | vendor solutions may |
| | | provide additional |
| | | security functions |
| | | to assist with |
| | | securing an insecure |
| | | process. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For guidance on |
| | | services, protocols, |
| | | or daemons |
| | | considered to be |
| | | insecure, refer to |
| | | industry standards |
| | | and guidance (for |
| | | example, as |
| | | published by NIST, |
| | | ENISA, and OWASP). |
+-----------------------+-----------------------+----------------------+
| **2.2.5** If any | **2.2.5.a** If any | |
| insecure services, | insecure services, | |
| protocols, or daemons | protocols, or daemons | |
| are present: | are present, examine | |
| | system configuration | |
| - Business | standards and | |
| justification is | interview personnel | |
| documented. | to verify they are | |
| | managed and | |
| - Additional | implemented in | |
| security features | accordance with all | |
| are documented | elements specified in | |
| and implemented | this requirement. | |
| that reduce the | | |
| risk of using | | |
| insecure | | |
| services, | | |
| protocols, or | | |
| daemons. | | |
+-----------------------+-----------------------+----------------------+
| | **2.2.5.b** If any | |
| | insecure services, | |
| | protocols, or | |
| | daemons, are present, | |
| | examine configuration | |
| | settings to verify | |
| | that additional | |
| | security features are | |
| | implemented to reduce | |
| | the risk of using | |
| | insecure services, | |
| | daemons, and | |
| | protocols. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| cannot be compromised | | |
| by exploiting | | |
| insecure services, | | |
| protocols, or | | |
| daemons. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Correctly |
| | | configuring security |
| | | parameters provided |
| | | in system components |
| | | takes advantage of |
| | | the capabilities of |
| | | the system component |
| | | to defeat malicious |
| | | attacks. |
| | | |
| | | **Good Practice** |
| | | |
| | | System configuration |
| | | standards and |
| | | related processes |
| | | should specifically |
| | | address security |
| | | settings and |
| | | parameters that have |
| | | known security |
| | | implications for |
| | | each type of system |
| | | in use. |
| | | |
| | | For systems to be |
| | | configured securely, |
| | | personnel |
| | | responsible for |
| | | configuration and/or |
| | | administering |
| | | systems should be |
| | | knowledgeable in the |
| | | specific security |
| | | parameters and |
| | | settings that apply |
| | | to the system. |
| | | Considerations |
| | | should also include |
| | | secure settings for |
| | | parameters used to |
| | | access cloud |
| | | portals. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to vendor |
| | | documentation and |
| | | industry references |
| | | noted in Requirement |
| | | 2.2.1 for |
| | | information about |
| | | applicable security |
| | | parameters for each |
| | | type of system. |
+-----------------------+-----------------------+----------------------+
| **2.2.6** System | **2.2.6.a** Examine | |
| security parameters | system configuration | |
| are configured to | standards to verify | |
| prevent misuse. | they include | |
| | configuring system | |
| | security parameters | |
| | to prevent misuse. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.6.b** Interview | |
| | system administrators | |
| | and/or security | |
| | managers to verify | |
| | they have knowledge | |
| | of common security | |
| | parameter settings | |
| | for system | |
| | components. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.6.c** Examine | |
| | system configurations | |
| | to verify that common | |
| | security parameters | |
| | are set appropriately | |
| | and in accordance | |
| | with the system | |
| | configuration | |
| | standards. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| cannot be compromised | | |
| because of incorrect | | |
| security parameter | | |
| configuration. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If non-console |
| | | (including remote) |
| | | administration does |
| | | not use encrypted |
| | | communications, |
| | | administrative |
| | | authorization |
| | | factors (such as IDs |
| | | and passwords) can |
| | | be revealed to an |
| | | eavesdropper. A |
| | | malicious individual |
| | | could use this |
| | | information to |
| | | access the network, |
| | | become |
| | | administrator, and |
| | | steal data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Whichever security |
| | | protocol is used, it |
| | | should be configured |
| | | to use only secure |
| | | versions and |
| | | configurations to |
| | | prevent use of an |
| | | insecure |
| | | connection---for |
| | | example, by using |
| | | only trusted |
| | | certificates, |
| | | supporting only |
| | | strong encryption, |
| | | and not supporting |
| | | fallback to weaker, |
| | | insecure protocols |
| | | or methods. |
| | | |
| | | **Examples** |
| | | |
| | | Cleartext protocols |
| | | (such as HTTP, |
| | | telnet, etc.) do not |
| | | encrypt traffic or |
| | | logon details, |
| | | making it easy for |
| | | an eavesdropper to |
| | | intercept this |
| | | information. |
| | | Non-console access |
| | | may be facilitated |
| | | by technologies that |
| | | provide alternative |
| | | access to systems, |
| | | including but not |
| | | limited to, |
| | | out-of-band (OOB), |
| | | lights-out |
| | | management (LOM), |
| | | Intelligent Platform |
| | | Management Interface |
| | | (IPMI), and |
| | | keyboard, video, |
| | | mouse (KVM) switches |
| | | with remote |
| | | capabilities. These |
| | | and other |
| | | non-console access |
| | | technologies and |
| | | methods must be |
| | | secured with strong |
| | | cryptography. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to industry |
| | | standards and best |
| | | practices such as |
| | | *NIST SP 800-52 and |
| | | SP 800-57*. |
+-----------------------+-----------------------+----------------------+
| **2.2.7** All | **2.2.7.a** Examine | |
| non-console | system configuration | |
| administrative access | standards to verify | |
| is encrypted using | they include | |
| strong cryptography. | encrypting all | |
| | non-console | |
| | administrative access | |
| | using strong | |
| | cryptography. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.7.b** Observe | |
| | an administrator log | |
| | on to system | |
| | components and | |
| | examine system | |
| | configurations to | |
| | verify that | |
| | non-console | |
| | administrative access | |
| | is managed in | |
| | accordance with this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.7.c** Examine | |
| | settings for system | |
| | components and | |
| | authentication | |
| | services to verify | |
| | that insecure remote | |
| | login services are | |
| | not available for | |
| | non- console | |
| | administrative | |
| | access. | |
+-----------------------+-----------------------+----------------------+
| | **2.2.7.d** Examine | |
| | vendor documentation | |
| | and interview | |
| | personnel to verify | |
| | that strong | |
| | cryptography for the | |
| | technology in use is | |
| | implemented according | |
| | to industry best | |
| | practices and/or | |
| | vendor | |
| | recommendations. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext | | |
| administrative | | |
| authorization factors | | |
| cannot be read or | | |
| intercepted from any | | |
| network | | |
| transmissions. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This includes | | |
| administrative access | | |
| via browser- based | | |
| interfaces and | | |
| application | | |
| programming | | |
| interfaces (APIs). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **2.3** Wireless | | |
| environments are | | |
| configured and | | |
| managed securely. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If wireless networks |
| | | are not implemented |
| | | with sufficient |
| | | security |
| | | configurations |
| | | (including changing |
| | | default settings), |
| | | wireless sniffers |
| | | can eavesdrop on the |
| | | traffic, easily |
| | | capture data and |
| | | passwords, and |
| | | easily enter and |
| | | attack the network. |
| | | |
| | | **Good Practice** |
| | | |
| | | Wireless passwords |
| | | should be |
| | | constructed so that |
| | | they are resistant |
| | | to offline brute |
| | | force attacks. |
+-----------------------+-----------------------+----------------------+
| 1. For wireless | **2.3.1.a** Examine | |
| environments | policies and | |
| connected to the | procedures and | |
| CDE or | interview responsible | |
| transmitting | personnel to verify | |
| account data, all | that processes are | |
| wireless vendor | defined for wireless | |
| defaults are | vendor defaults to | |
| changed at | either change them | |
| installation or | upon installation or | |
| are confirmed to | to confirm them to be | |
| be secure, | secure in accordance | |
| including but not | with all elements of | |
| limited to: | this requirement. | |
| | | |
| - Default | | |
| wireless | | |
| encryption | | |
| keys. | | |
| | | |
| - Passwords on | | |
| wireless | | |
| access | | |
| points. | | |
| | | |
| - SNMP | | |
| defaults. | | |
| | | |
| - Any other | | |
| | | |
| security-related | | |
| wireless | | |
| vendor | | |
| defaults. | | |
+-----------------------+-----------------------+----------------------+
| | **2.3.1.b** Examine | |
| | vendor documentation | |
| | and observe a system | |
| | administrator logging | |
| | into wireless devices | |
| | to verify: | |
| | | |
| | - SNMP defaults are | |
| | not used. | |
| | | |
| | - Default | |
| | | |
| | passwords/passphrases | |
| | on wireless | |
| | access points are | |
| | not used. | |
+-----------------------+-----------------------+----------------------+
| | **2.3.1.c** Examine | |
| | vendor documentation | |
| | and wireless | |
| | configuration | |
| | settings to verify | |
| | other | |
| | security-related | |
| | wireless vendor | |
| | defaults were | |
| | changed, if | |
| | applicable. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Wireless networks | | |
| cannot be accessed | | |
| using vendor default | | |
| passwords or default | | |
| configurations. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This includes, but is | | |
| not limited to, | | |
| default wireless | | |
| encryption keys, | | |
| passwords on wireless | | |
| access points, SNMP | | |
| defaults, and any | | |
| other security- | | |
| related wireless | | |
| vendor defaults. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Changing wireless |
| | | encryption keys |
| | | whenever someone |
| | | with knowledge of |
| | | the key leaves the |
| | | organization or |
| | | moves to a role that |
| | | no longer requires |
| | | knowledge of the |
| | | key, helps keep |
| | | knowledge of keys |
| | | limited to only |
| | | those with a |
| | | business need to |
| | | know. |
| | | |
| | | Also, changing |
| | | wireless encryption |
| | | keys whenever a key |
| | | is suspected or |
| | | known to be |
| | | comprised makes a |
| | | wireless network |
| | | more resistant to |
| | | compromise. |
| | | |
| | | **Good Practice** |
| | | |
| | | This goal can be |
| | | accomplished in |
| | | multiple ways, |
| | | including periodic |
| | | changes of keys, |
| | | changing keys via a |
| | | defined |
| | | "joi |
| | | ners-movers-leavers" |
| | | (JML) process, |
| | | implementing |
| | | additional technical |
| | | controls, and not |
| | | using fixed |
| | | pre-shared keys. |
| | | |
| | | In addition, any |
| | | keys that are known |
| | | to be, or suspected |
| | | of being, |
| | | compromised should |
| | | be managed in |
| | | accordance with the |
| | | entity's incident |
| | | response plan at |
| | | Requirement 12.10.1. |
+-----------------------+-----------------------+----------------------+
| **2.3.2** For | **2.3.2** Interview | |
| wireless environments | responsible personnel | |
| connected to the CDE | and examine | |
| or transmitting | key-management | |
| account data, | documentation to | |
| wireless encryption | verify that wireless | |
| keys are changed as | encryption keys are | |
| follows: | changed in accordance | |
| | with all elements | |
| - Whenever | specified in this | |
| personnel with | requirement. | |
| knowledge of the | | |
| key leave the | | |
| company or the | | |
| role for which | | |
| the knowledge was | | |
| necessary. | | |
| | | |
| - Whenever a key is | | |
| suspected of or | | |
| known to be | | |
| compromised. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Knowledge of wireless | | |
| encryption keys | | |
| cannot allow | | |
| unauthorized access | | |
| to wireless networks. | | |
+-----------------------+-----------------------+----------------------+
## Protect Account Data {#protect-account-data .unnumbered}
### *Requirement 3: Protect Stored Account Data* {#requirement-3-protect-stored-account-data .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for protecting stored account data are |
| defined and understood. |
| |
| 2. Storage of account data is kept to a minimum. |
| |
| 3. Sensitive authentication data (SAD) is not stored after |
| authorization. |
| |
| 4. Access to displays of full PAN and ability to copy cardholder |
| data are restricted. |
| |
| 5. Primary account number (PAN) is secured wherever it is stored. |
| |
| 6. Cryptographic keys used to protect stored account data are |
| secured. |
| |
| 7. Where cryptography is used to protect stored account data, key |
| management processes and procedures covering all aspects of the |
| key lifecycle are defined and implemented. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Protection methods such as encryption, truncation, masking, and |
| > hashing are critical components of account data protection. If an |
| > intruder circumvents other security controls and gains access to |
| > encrypted account data, the data is unreadable without the proper |
| > cryptographic keys and is unusable to that intruder. Other |
| > effective methods of protecting stored data should also be |
| > considered as potential risk-mitigation opportunities. For example, |
| > methods for minimizing risk include not storing account data unless |
| > necessary, truncating cardholder data if full PAN is not needed, |
| > and not sending unprotected PANs using end-user messaging |
| > technologies such as e-mail and instant messaging. |
| > |
| > If account data is present in non-persistent memory (for example, |
| > RAM, volatile memory), encryption of account data is not required. |
| > However, proper controls must be in place to ensure that memory |
| > maintains a non-persistent state. Data should be removed from |
| > volatile memory once the business purpose (for example, the |
| > associated transaction) is complete. In the case that data storage |
| > becomes persistent, all applicable PCI DSS Requirements will apply |
| > including encryption of stored data. |
| > |
| > Requirement 3 applies to protection of stored account data unless |
| > specifically called out in an individual requirement. Refer to |
| > *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of "strong cryptography" and other PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| protecting stored | | |
| account data are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 3.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 3. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 3, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **3.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 3 | operational | |
| are: | procedures identified | |
| | in Requirement 3 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 3 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities, |
| | | and critical |
| | | activities may not |
| | | occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **3.1.2** Roles and | **3.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 3 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | performing activities | |
| | in Requirement 3 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **3.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 3 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 3 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.2** Storage of | | |
| account data is kept | | |
| to a minimum. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A formal data |
| | | retention policy |
| | | identifies what data |
| | | needs to be |
| | | retained, for how |
| | | long, and where that |
| | | data resides so it |
| | | can be securely |
| | | destroyed or deleted |
| | | as soon as it is no |
| | | longer needed. The |
| | | only account data |
| | | that may be stored |
| | | after authorization |
| | | is the primary |
| | | account number or |
| | | PAN (rendered |
| | | unreadable), |
| | | expiration date, |
| | | cardholder name, and |
| | | service code. |
| | | |
| | | The storage of SAD |
| | | data prior to the |
| | | completion of the |
| | | authorization |
| | | process is also |
| | | included in the data |
| | | retention and |
| | | disposal policy so |
| | | that storage of this |
| | | sensitive data is |
| | | kept to minimum, and |
| | | only retained for |
| | | the defined amount |
| | | of time. |
| | | |
| | | **Good Practice** |
| | | |
| | | When identifying |
| | | locations of stored |
| | | account data, |
| | | consider all |
| | | processes and |
| | | personnel with |
| | | access to the data, |
| | | as data could have |
| | | been moved and |
| | | stored in different |
| | | locations than |
| | | originally defined. |
| | | Storage locations |
| | | that are often |
| | | overlooked include |
| | | backup and archive |
| | | systems, removable |
| | | data storage |
| | | devices, paper-based |
| | | media, and audio |
| | | recordings. |
| | | |
| | | To define |
| | | appropriate |
| | | retention |
| | | requirements, an |
| | | entity first needs |
| | | to understand its |
| | | own business needs |
| | | as well as any legal |
| | | or regulatory |
| | | obligations that |
| | | apply to its |
| | | industry or to the |
| | | type of data being |
| | | retained. |
| | | Implementing an |
| | | automated process to |
| | | ensure data is |
| | | automatically and |
| | | securely deleted |
| | | upon its defined |
| | | retention limit can |
| | | help ensure that |
| | | account data is not |
| | | retained beyond what |
| | | is necessary for |
| | | business, legal, or |
| | | regulatory purposes. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. Account data | **3.2.1.a** Examine | |
| storage is kept | the data retention | |
| to a minimum | and disposal | |
| through | policies, procedures, | |
| implementation of | and processes and | |
| data retention | interview personnel | |
| and disposal | to verify processes | |
| policies, | are defined to | |
| procedures, and | include all elements | |
| processes that | specified in this | |
| include at least | requirement. | |
| the following: | | |
| | | |
| - Coverage for | | |
| all locations | | |
| of stored | | |
| account data. | | |
| | | |
| - Coverage for | | |
| any sensitive | | |
| | | |
| authentication | | |
| data (SAD) | | |
| stored prior | | |
| to completion | | |
| of | | |
| | | |
| authorization. | | |
| *This bullet | | |
| is a best | | |
| practice | | |
| until its | | |
| effective | | |
| date; refer | | |
| to | | |
| Applicability | | |
| Notes below | | |
| for details.* | | |
| | | |
| - Limiting data | | |
| storage | | |
| amount and | | |
| retention | | |
| time to that | | |
| which is | | |
| required for | | |
| legal or | | |
| regulatory, | | |
| and/or | | |
| business | | |
| requirements. | | |
| | | |
| - Specific | | |
| retention | | |
| requirements | | |
| for stored | | |
| account data | | |
| that defines | | |
| length of | | |
| retention | | |
| period and | | |
| includes a | | |
| documented | | |
| business | | |
| | | |
| justification. | | |
| | | |
| - Processes for | | |
| secure | | |
| deletion or | | |
| rendering | | |
| account data | | |
| unrecoverable | | |
| when no | | |
| longer needed | | |
| per the | | |
| retention | | |
| policy. | | |
| | | |
| - A process for | | |
| verifying, at | | |
| least once | | |
| every three | | |
| months, that | | |
| stored | | |
| account data | | |
| exceeding the | | |
| defined | | |
| retention | | |
| period has | | |
| been securely | | |
| deleted or | | |
| rendered | | |
| | | |
| unrecoverable. | | |
+-----------------------+-----------------------+----------------------+
| | **3.2.1.b** Examine | |
| | files and system | |
| | records on system | |
| | components where | |
| | account data is | |
| | stored to verify that | |
| | the data storage | |
| | amount and retention | |
| | time does not exceed | |
| | the requirements | |
| | defined in the data | |
| | retention policy. | |
+-----------------------+-----------------------+----------------------+
| | **3.2.1.c** Observe | |
| | the mechanisms used | |
| | to render account | |
| | data unrecoverable to | |
| | verify data cannot be | |
| | recovered. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Account data is | | |
| retained only where | | |
| necessary and for the | | |
| least amount of time | | |
| needed and is | | |
| securely deleted or | | |
| rendered | | |
| unrecoverable when no | | |
| longer needed. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | Methods of |
| Notes** | | eliminating data |
| | | when it exceeds the |
| | | retention period |
| | | include secure |
| | | deletion to complete |
| | | removal of the data |
| | | or rendering it |
| | | unrecoverable and |
| | | unable to be |
| | | reconstructed. |
| | | Identifying and |
| | | securely eliminating |
| | | stored data that has |
| | | exceeded its |
| | | specified retention |
| | | period prevents |
| | | unnecessary |
| | | retention of data |
| | | that is no longer |
| | | needed. This process |
| | | may be automated, |
| | | manual, or a |
| | | combination of both. |
| | | |
| | | The deletion |
| | | function in most |
| | | operating systems is |
| | | not "secure |
| | | deletion" as it |
| | | allows deleted data |
| | | to be recovered, so |
| | | instead, a dedicated |
| | | secure deletion |
| | | function or |
| | | application must be |
| | | used to make data |
| | | unrecoverable. |
| | | |
| | | *Remember, if you |
| | | don\'t need it, |
| | | don\'t store it!* |
| | | |
| | | **Examples** |
| | | |
| | | An automated, |
| | | programmatic |
| | | procedure could be |
| | | run to locate and |
| | | remove data, or a |
| | | manual review of |
| | | data storage areas |
| | | could be performed. |
| | | Whichever method is |
| | | used, it is a good |
| | | idea to monitor the |
| | | process to ensure it |
| | | is completed |
| | | successfully, and |
| | | that the results are |
| | | recorded and |
| | | validated as being |
| | | complete. |
| | | Implementing secure |
| | | deletion methods |
| | | ensures that the |
| | | data cannot be |
| | | retrieved when it is |
| | | no longer needed. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See *NIST SP 800-88 |
| | | Rev. 1, Guidelines |
| | | for Media |
| | | Sanitization*. |
+-----------------------+-----------------------+----------------------+
| Where account data is | | |
| stored by a TPSP (for | | |
| example, in a cloud | | |
| environment), | | |
| entities are | | |
| responsible for | | |
| working with their | | |
| service providers to | | |
| understand how the | | |
| TPSP meets this | | |
| requirement for the | | |
| entity. | | |
| Considerations | | |
| include ensuring that | | |
| all geographic | | |
| instances of a data | | |
| element are securely | | |
| deleted. | | |
| | | |
| *The bullet above | | |
| (for coverage of SAD | | |
| stored prior to | | |
| completion of | | |
| authorization) is a | | |
| best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required as part of | | |
| Requirement 3.2.1 and | | |
| must be fully | | |
| considered during a | | |
| PCI DSS assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.3** Sensitive | | |
| authentication data | | |
| (SAD) is not stored | | |
| after authorization. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | SAD is very valuable |
| | | to malicious |
| | | individuals as it |
| | | allows them to |
| | | generate counterfeit |
| | | payment cards and |
| | | create fraudulent |
| | | transactions. |
| | | |
| | | Therefore, the |
| | | storage of SAD upon |
| | | completion of the |
| | | authorization |
| | | process is |
| | | prohibited. |
| | | |
| | | **Definitions** |
| | | |
| | | The authorization |
| | | process completes |
| | | when a merchant |
| | | receives a |
| | | transaction response |
| | | (for example, an |
| | | approval or |
| | | decline). |
+-----------------------+-----------------------+----------------------+
| **3.3.1** SAD is not | **3.3.1.a** If SAD is | |
| retained after | received, examine | |
| authorization, even | documented policies, | |
| if encrypted. All | procedures, and | |
| sensitive | system configurations | |
| authentication data | to verify the data is | |
| received is rendered | not retained after | |
| unrecoverable upon | authorization. | |
| completion of the | | |
| authorization | | |
| process. | | |
+-----------------------+-----------------------+----------------------+
| | **3.3.1.b** If SAD is | |
| | received, examine the | |
| | documented procedures | |
| | and observe the | |
| | secure data deletion | |
| | processes to verify | |
| | the data is rendered | |
| | unrecoverable upon | |
| | completion of the | |
| | authorization | |
| | process. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement does | | |
| not apply to issuers | | |
| and companies that | | |
| support issuing | | |
| services (where SAD | | |
| is needed for a | | |
| legitimate issuing | | |
| business need) and | | |
| have a business | | |
| justification to | | |
| store the sensitive | | |
| authentication data. | | |
| | | |
| Refer to Requirement | | |
| 3.3.3 for additional | | |
| requirements | | |
| specifically for | | |
| issuers. | | |
| | | |
| Sensitive | | |
| authentication data | | |
| includes the data | | |
| cited in Requirements | | |
| 3.3.1.1 through | | |
| 3.3.1.3. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If full contents of |
| | | any track (from the |
| | | magnetic stripe on |
| | | the back of a card |
| | | if present, |
| | | equivalent data |
| | | contained on a chip, |
| | | or elsewhere) is |
| | | stored, malicious |
| | | individuals who |
| | | obtain that data can |
| | | use it to reproduce |
| | | payment cards and |
| | | complete fraudulent |
| | | transactions. |
| | | |
| | | **Definitions** |
| | | |
| | | Full track data is |
| | | alternatively called |
| | | full track, track, |
| | | track 1, track 2, |
| | | and magnetic-stripe |
| | | data. Each track |
| | | contains a number of |
| | | data elements, and |
| | | this requirement |
| | | specifies only those |
| | | that may be retained |
| | | post-authorization. |
| | | |
| | | **Examples** |
| | | |
| | | Data sources to |
| | | review to ensure |
| | | that the full |
| | | contents of any |
| | | track are not |
| | | retained upon |
| | | completion of the |
| | | authorization |
| | | process include, but |
| | | are not limited to: |
| | | |
| | | - Incoming |
| | | transaction |
| | | data. |
| | | |
| | | - All logs (for |
| | | example, |
| | | transaction, |
| | | history, |
| | | debugging, |
| | | error). |
| | | |
| | | - History files. |
| | | |
| | | - Trace files. |
| | | |
| | | - Database |
| | | schemas. |
| | | |
| | | - Contents of |
| | | databases, and |
| | | on-premise and |
| | | cloud data |
| | | stores. |
| | | |
| | | - Any existing |
| | | memory/crash |
| | | dump files. |
+-----------------------+-----------------------+----------------------+
| **3.3.1.1** The full | **3.3.1.1** Examine | |
| contents of any track | data sources to | |
| are not retained upon | verify that the full | |
| completion of the | contents of any track | |
| authorization | are not stored upon | |
| process. | completion of the | |
| | authorization | |
| | process. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| In the normal course | | |
| of business, the | | |
| following data | | |
| elements from the | | |
| track may need to be | | |
| retained: | | |
| | | |
| - Cardholder name. | | |
| | | |
| - Primary account | | |
| number (PAN). | | |
| | | |
| - Expiration date. | | |
| | | |
| - Service code. | | |
| | | |
| To minimize risk, | | |
| store securely only | | |
| these data elements | | |
| as needed for | | |
| business. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If card verification |
| | | code data is stolen, |
| | | malicious |
| | | individuals can |
| | | execute fraudulent |
| | | Internet and |
| | | mail-o |
| | | rder/telephone-order |
| | | (MO/TO) |
| | | transactions. Not |
| | | storing this data |
| | | reduces the |
| | | probability of it |
| | | being compromised. |
| | | |
| | | **Examples** |
| | | |
| | | If card verification |
| | | codes are stored on |
| | | paper media prior to |
| | | completion of |
| | | authorization, a |
| | | method of erasing or |
| | | covering the codes |
| | | should prevent them |
| | | from being read |
| | | after authorization |
| | | is complete. Example |
| | | methods of rendering |
| | | the codes unreadable |
| | | include removing the |
| | | code with scissors |
| | | and applying a |
| | | suitably opaque and |
| | | un- removable marker |
| | | over the code. |
| | | |
| | | Data sources to |
| | | review to ensure |
| | | that the card |
| | | verification code is |
| | | not retained upon |
| | | completion of the |
| | | authorization |
| | | process include, but |
| | | are not limited to: |
| | | |
| | | - Incoming |
| | | transaction |
| | | data. |
| | | |
| | | - All logs (for |
| | | example, |
| | | transaction, |
| | | history, |
| | | debugging, |
| | | error). |
| | | |
| | | - History files. |
| | | |
| | | - Trace files. |
| | | |
| | | - Database |
| | | schemas. |
| | | |
| | | - Contents of |
| | | databases, and |
| | | on-premise and |
| | | cloud data |
| | | stores. |
| | | |
| | | - Any existing |
| | | memory/crash |
| | | dump files. |
+-----------------------+-----------------------+----------------------+
| **3.3.1.2** The card | **3.3.1.2** Examine | |
| verification code is | data sources, to | |
| not retained upon | verify that the card | |
| completion of the | verification code is | |
| authorization | not stored upon | |
| process. | completion of the | |
| | authorization | |
| | process. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The card verification | | |
| code is the three- or | | |
| four-digit number | | |
| printed on the front | | |
| or back of a payment | | |
| card used to verify | | |
| card-not-present | | |
| transactions. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | PIN and PIN blocks |
| | | should be known only |
| | | to the card owner or |
| | | entity that issued |
| | | the card. If this |
| | | data is stolen, |
| | | malicious |
| | | individuals can |
| | | execute fraudulent |
| | | PIN-based |
| | | transactions (for |
| | | example, in-store |
| | | purchases and ATM |
| | | withdrawals). Not |
| | | storing this data |
| | | reduces the |
| | | probability of it |
| | | being compromised. |
| | | |
| | | **Examples** |
| | | |
| | | Data sources to |
| | | review to ensure |
| | | that PIN and PIN |
| | | blocks are not |
| | | retained upon |
| | | completion of the |
| | | authorization |
| | | process include, but |
| | | are not limited to: |
| | | |
| | | - Incoming |
| | | transaction |
| | | data. |
| | | |
| | | - All logs (for |
| | | example, |
| | | transaction, |
| | | history, |
| | | debugging, |
| | | error). |
| | | |
| | | - History files. |
| | | |
| | | - Trace files. |
| | | |
| | | - Database |
| | | schemas. |
| | | |
| | | - Contents of |
| | | databases, and |
| | | on-premise and |
| | | cloud data |
| | | stores. |
| | | |
| | | - Any existing |
| | | memory/crash |
| | | dump files. |
+-----------------------+-----------------------+----------------------+
| **3.3.1.3** The | **3.3.1.3** Examine | |
| personal | data sources, to | |
| identification number | verify that PINs and | |
| (PIN) and the PIN | PIN blocks are not | |
| block are not | stored upon | |
| retained upon | completion of the | |
| completion of the | authorization | |
| authorization | process. | |
| process. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| PIN blocks are | | |
| encrypted during the | | |
| natural course of | | |
| transaction | | |
| processes, but even | | |
| if an entity encrypts | | |
| the PIN block again, | | |
| it is still not | | |
| allowed to be stored | | |
| after the completion | | |
| of the authorization | | |
| process. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | SAD can be used by |
| | | malicious |
| | | individuals to |
| | | increase the |
| | | probability of |
| | | successfully |
| | | generating |
| | | counterfeit payment |
| | | cards and creating |
| | | fraudulent |
| | | transactions. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | consider encrypting |
| | | SAD with a different |
| | | cryptographic key |
| | | than is used to |
| | | encrypt PAN. Note |
| | | that this does not |
| | | mean that PAN |
| | | present in SAD (as |
| | | part of track data) |
| | | would need to be |
| | | separately |
| | | encrypted. |
| | | |
| | | **Definitions** |
| | | |
| | | The authorization |
| | | process is completed |
| | | as soon as the |
| | | response to an |
| | | authorization |
| | | request |
| | | response---that is, |
| | | an approval or |
| | | decline---is |
| | | received. |
+-----------------------+-----------------------+----------------------+
| **3.3.2** SAD that is | **3.3.2** Examine | |
| stored electronically | data stores, system | |
| prior to completion | configurations, | |
| of authorization is | and/or vendor | |
| encrypted using | documentation to | |
| strong cryptography. | verify that all SAD | |
| | that is stored | |
| | electronically prior | |
| | to completion of | |
| | authorization is | |
| | encrypted using | |
| | strong cryptography. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Whether SAD is | | |
| permitted to be | | |
| stored prior to | | |
| authorization is | | |
| determined by the | | |
| organizations that | | |
| manage compliance | | |
| programs (for | | |
| example, payment | | |
| brands and | | |
| acquirers). Contact | | |
| the organizations of | | |
| interest for any | | |
| additional criteria. | | |
| | | |
| This requirement | | |
| applies to all | | |
| storage of SAD, even | | |
| if no PAN is present | | |
| in the environment. | | |
| | | |
| Refer to Requirement | | |
| 3.2.1 for an | | |
| additional | | |
| requirement that | | |
| applies if SAD is | | |
| stored prior to | | |
| completion of | | |
| authorization. | | |
| | | |
| This requirement does | | |
| not apply to issuers | | |
| and companies that | | |
| support issuing | | |
| services where there | | |
| is a legitimate | | |
| issuing business | | |
| justification to | | |
| store SAD). | | |
| | | |
| Refer to Requirement | | |
| 3.3.3 for | | |
| requirements | | |
| specifically for | | |
| issuers. | | |
| | | |
| This requirement does | | |
| not replace how PIN | | |
| blocks are required | | |
| to be managed, nor | | |
| does it mean that a | | |
| properly encrypted | | |
| PIN block needs to be | | |
| encrypted again. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | SAD can be used by |
| | | malicious |
| | | individuals to |
| | | increase the |
| | | probability of |
| | | successfully |
| | | generating |
| | | counterfeit payment |
| | | cards and creating |
| | | fraudulent |
| | | transactions**.** |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | consider encrypting |
| | | SAD with a different |
| | | cryptographic key |
| | | than is used to |
| | | encrypt PAN. Note |
| | | that this does not |
| | | mean that PAN |
| | | present in SAD (as |
| | | part of track data) |
| | | would need to be |
| | | separately |
| | | encrypted. |
| | | |
| | | **Definitions** |
| | | |
| | | Legitimate issuing |
| | | business need means |
| | | that the data is |
| | | needed to facilitate |
| | | the issuing business |
| | | process. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to *ISO/DIS |
| | | 9564-5 Financial |
| | | services --- |
| | | Personal |
| | | Identification |
| | | Number (PIN)* |
+-----------------------+-----------------------+----------------------+
| **3.3.3 *Additional | **3.3.3.a *Additional | |
| requirement for | testing procedure for | |
| issuers and companies | issuers and companies | |
| that support issuing | that support issuing | |
| services and store | services and store | |
| sensitive | sensitive | |
| authentication data: | authentication data: | |
| ***Any storage of | ***Examine documented | |
| sensitive | policies and | |
| authentication data | interview personnel | |
| is: | to verify there is a | |
| | documented business | |
| - Limited to that | justification for the | |
| which is needed | storage of sensitive | |
| for a legitimate | authentication data. | |
| issuing business | | |
| need and is | | |
| secured. | | |
| | | |
| - Encrypted using | | |
| strong | | |
| cryptography. | | |
| *This bullet is a | | |
| best practice | | |
| until its | | |
| effective date; | | |
| refer to | | |
| Applicability | | |
| Notes below for | | |
| details.* | | |
+-----------------------+-----------------------+----------------------+
| | **3.3.3.b *Additional | |
| | testing procedure for | |
| | issuers and companies | |
| | that support issuing | |
| | services and store | |
| | sensitive | |
| | authentication data: | |
| | ***Examine data | |
| | stores and system | |
| | configurations to | |
| | verify that the | |
| | sensitive | |
| | authentication data | |
| | is stored securely. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Sensitive | | |
| authentication data | | |
| is retained only as | | |
| required to support | | |
| issuing functions and | | |
| is secured from | | |
| unauthorized access. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| This requirement | | *management and |
| applies only to | | security --- Part 5: |
| issuers and companies | | Methods for the |
| that support issuing | | generation, change, |
| services and store | | and verification of |
| sensitive | | PINs and card |
| authentication data. | | security data using |
| | | the advanced |
| Entities that issue | | encryption |
| payment cards or that | | standard.* |
| perform or support | | |
| issuing services will | | |
| often create and | | |
| control sensitive | | |
| authentication data | | |
| as part of the | | |
| issuing function. It | | |
| is allowable for | | |
| companies that | | |
| perform, facilitate, | | |
| or support issuing | | |
| services to store | | |
| sensitive | | |
| authentication data | | |
| ONLY IF they have a | | |
| legitimate business | | |
| need to store such | | |
| data. | | |
| | | |
| PCI DSS requirements | | |
| are intended for all | | |
| entities that store, | | |
| process, or transmit | | |
| account data, | | |
| including issuers. | | |
| The only exception | | |
| for issuers and | | |
| issuer processors is | | |
| that sensitive | | |
| authentication data | | |
| may be retained if | | |
| there is a legitimate | | |
| reason to do so. Any | | |
| such data must be | | |
| stored securely and | | |
| in accordance with | | |
| all PCI DSS and | | |
| specific payment | | |
| brand requirements. | | |
| | | |
| *The bullet above | | |
| (for encrypting | | |
| stored SAD with | | |
| strong cryptography) | | |
| is a best practice | | |
| until 31 March 2025, | | |
| after which it will | | |
| be required as part | | |
| of Requirement 3.3.3 | | |
| and must be fully | | |
| considered during a | | |
| PCI DSS assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.4** Access to | | |
| displays of full PAN | | |
| and ability to copy | | |
| PAN is restricted. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The display of full |
| | | PAN on computer |
| | | screens, payment |
| | | card receipts, paper |
| | | reports, etc. can |
| | | result in this data |
| | | being obtained by |
| | | unauthorized |
| | | individuals and used |
| | | fraudulently. |
| | | Ensuring that the |
| | | full PAN is |
| | | displayed only for |
| | | those with a |
| | | legitimate business |
| | | need minimizes the |
| | | risk of unauthorized |
| | | persons gaining |
| | | access to PAN data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Applying access |
| | | controls according |
| | | to defined roles is |
| | | one way to limit |
| | | access to viewing |
| | | full PAN to only |
| | | those individuals |
| | | with a defined |
| | | business need. |
| | | |
| | | The masking approach |
| | | should always |
| | | display only the |
| | | number of digits |
| | | needed to perform a |
| | | specific business |
| | | function. For |
| | | example, if only the |
| | | last four digits are |
| | | needed to perform a |
| | | business function, |
| | | PAN should be masked |
| | | to only show the |
| | | last four digits. As |
| | | another example, if |
| | | a function needs to |
| | | view to the bank |
| | | identification |
| | | number (BIN) for |
| | | routing purposes, |
| | | unmask only the BIN |
| | | digits for that |
| | | function. |
| | | |
| | | **Definitions** |
| | | |
| | | Masking is not |
| | | synonymous with |
| | | truncation and these |
| | | terms cannot be used |
| | | interchangeably. |
| | | Masking refers to |
| | | the concealment of |
| | | certain digits |
| | | during display or |
| | | printing, even when |
| | | the entire PAN is |
| | | stored on a system. |
| | | This is different |
| | | from truncation, in |
| | | which the truncated |
| | | digits are removed |
| | | and cannot be |
| | | retrieved within the |
| | | system. Masked PAN |
| | | could be "unmasked", |
| | | but there is no |
| | | \"un-truncation\" |
| | | without recreating |
| | | the PAN from another |
| | | source. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For more information |
| | | about masking and |
| | | truncation, see PCI |
| | | SSC's FAQs on these |
| | | topics*.* |
+-----------------------+-----------------------+----------------------+
| **3.4.1** PAN is | **3.4.1.a** Examine | |
| masked when displayed | documented policies | |
| (the BIN and last | and procedures for | |
| four digits **are the | masking the display | |
| maximum number** of | of PANs to verify: | |
| digits to be | | |
| displayed), such that | - A list of roles | |
| only personnel with a | that need access | |
| legitimate business | to more than the | |
| need can see **more | BIN and last four | |
| than** the BIN and | digits of the PAN | |
| last four digits of | (includes full | |
| the PAN. | PAN) is | |
| | documented, | |
| **Customized Approach | together with a | |
| Objective** | legitimate | |
| | business need for | |
| PAN displays are | each role to have | |
| restricted to the | such access. | |
| minimum number of | | |
| digits necessary to | - PAN is masked | |
| meet a defined | when displayed | |
| business need. | such that only | |
| | personnel with a | |
| | legitimate | |
| | business need can | |
| | see more than the | |
| | BIN and last four | |
| | digits of the | |
| | PAN. | |
| | | |
| | - All roles not | |
| | specifically | |
| | authorized to see | |
| | the full PAN must | |
| | only see masked | |
| | PANs. | |
+-----------------------+-----------------------+----------------------+
| **Applicability | **3.4.1.b** Examine | |
| Notes** | system configurations | |
| | to verify that full | |
| | PAN is only displayed | |
| | for roles with a | |
| | documented business | |
| | need, and that PAN is | |
| | masked for all other | |
| | requests. | |
+-----------------------+-----------------------+----------------------+
| This requirement does | | |
| not supersede | | |
| stricter requirements | | |
| in place for displays | | |
| of cardholder | | |
| data---for example, | | |
| legal or payment | | |
| brand requirements | | |
| for point-of-sale | | |
| (POS) receipts. | | |
| | | |
| This requirement | | |
| relates to protection | | |
| of PAN where it is | | |
| displayed on screens, | | |
| paper receipts, | | |
| printouts, etc., and | | |
| is not to be confused | | |
| with Requirement | | |
| | | |
| 3.5.1 for protection | | |
| of PAN when stored, | | |
| processed, or | | |
| transmitted. | | |
+-----------------------+-----------------------+----------------------+
| | **3.4.1.c** Examine | |
| | displays of PAN (for | |
| | example, on screen, | |
| | on paper receipts) to | |
| | verify that PANs are | |
| | masked when | |
| | displayed, and that | |
| | only those with a | |
| | legitimate business | |
| | need are able to see | |
| | more than the BIN | |
| | and/or last four | |
| | digits of the PAN. | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Relocation of PAN to |
| | | unauthorized storage |
| | | devices is a common |
| | | way for this data to |
| | | be obtained and used |
| | | fraudulently. |
| | | |
| | | Methods to ensure |
| | | that only those with |
| | | explicit |
| | | authorization and a |
| | | legitimate business |
| | | reason can copy or |
| | | relocate PAN |
| | | minimizes the risk |
| | | of unauthorized |
| | | persons gaining |
| | | access to PAN. |
| | | |
| | | **Good Practice** |
| | | |
| | | Copying and |
| | | relocation of PAN |
| | | should only be done |
| | | to storage devices |
| | | that are permissible |
| | | and authorized for |
| | | that individual. |
| | | |
| | | **Definitions** |
| | | |
| | | A virtual desktop is |
| | | an example of a |
| | | remote- access |
| | | technology. |
| | | |
| | | Storage devices |
| | | include, but are not |
| | | limited to, local |
| | | hard drives, virtual |
| | | drives, removable |
| | | electronic media, |
| | | network drives, and |
| | | cloud storage. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Vendor documentation |
| | | for the |
| | | remote-access |
| | | technology in use |
| | | will provide |
| | | information about |
| | | the system settings |
| | | needed to implement |
| | | this requirement. |
+-----------------------+-----------------------+----------------------+
| **3.4.2** When using | **3.4.2.a** Examine | |
| remote-access | documented policies | |
| technologies, | and procedures and | |
| technical controls | documented evidence | |
| prevent copy and/or | for technical | |
| relocation of PAN for | controls that prevent | |
| all personnel, except | copy and/or | |
| for those with | relocation of PAN | |
| documented, explicit | when using | |
| authorization and a | remote-access | |
| legitimate, defined | technologies onto | |
| business need. | local hard drives or | |
| | removable electronic | |
| | media to verify the | |
| | following: | |
| | | |
| | - Technical | |
| | controls prevent | |
| | all personnel not | |
| | specifically | |
| | authorized from | |
| | copying and/or | |
| | relocating PAN. | |
| | | |
| | - A list of | |
| | personnel with | |
| | permission to | |
| | copy and/or | |
| | relocate PAN is | |
| | maintained, | |
| | together with the | |
| | documented, | |
| | explicit | |
| | authorization and | |
| | legitimate, | |
| | defined business | |
| | need. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| PAN cannot be copied | | |
| or relocated by | | |
| unauthorized | | |
| personnel using | | |
| remote-access | | |
| technologies. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | **3.4.2.b** Examine | |
| Notes** | configurations for | |
| | remote-access | |
| | technologies to | |
| | verify that technical | |
| | controls to prevent | |
| | copy and/or | |
| | relocation of PAN for | |
| | all personnel, unless | |
| | explicitly | |
| | authorized. | |
+-----------------------+-----------------------+----------------------+
| Storing or relocating | | |
| PAN onto local hard | | |
| drives, removable | | |
| electronic media, and | | |
| other storage devices | | |
| brings these devices | | |
| into scope for PCI | | |
| DSS. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
| | **3.4.2.c** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify that only | |
| | personnel with | |
| | documented, explicit | |
| | authorization and a | |
| | legitimate, defined | |
| | business need have | |
| | permission to copy | |
| | and/or relocate PAN | |
| | when using remote- | |
| | access technologies. | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.5** Primary | | |
| account number (PAN) | | |
| is secured wherever | | |
| it is stored. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The removal of |
| | | cleartext stored PAN |
| | | is a defense in |
| | | depth control |
| | | designed to protect |
| | | the data if an |
| | | unauthorized |
| | | individual gains |
| | | access to stored |
| | | data by taking |
| | | advantage of a |
| | | vulnerability or |
| | | misconfiguration of |
| | | an entity's primary |
| | | access control. |
| | | |
| | | Secondary |
| | | independent control |
| | | systems (for example |
| | | governing access to, |
| | | and use of, |
| | | cryptography and |
| | | decryption keys) |
| | | prevent the failure |
| | | of a primary access |
| | | control system |
| | | leading to a breach |
| | | of confidentiality |
| | | of stored PAN. If |
| | | hashing is used to |
| | | remove stored |
| | | cleartext PAN, by |
| | | correlating hashed |
| | | and truncated |
| | | versions of a given |
| | | PAN, a malicious |
| | | individual can |
| | | easily derive the |
| | | original PAN value. |
| | | Controls that |
| | | prevent the |
| | | correlation of this |
| | | data will help |
| | | ensure that the |
| | | original PAN remains |
| | | unreadable. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For information |
| | | about truncation |
| | | formats and |
| | | truncation in |
| | | general, see PCI |
| | | SSC's FAQs on the |
| | | topic. |
| | | |
| | | Sources for |
| | | information about |
| | | index tokens |
| | | include: |
| | | |
| | | - PCI SSC's |
| | | Tokenization |
| | | Product Security |
| | | Guidelines |
| | | |
| | | (*[https://www.pcise |
| | | curitystandards.org/ |
| | | docume](https://www. |
| | | pcisecuritystandards |
| | | .org/documents/Token |
| | | ization_Product_Secu |
| | | rity_Guidelines.pdf) |
| | | |
| | | [nts/Tokenization_Pr |
| | | oduct_Security_Guide |
| | | lines](https://www.p |
| | | cisecuritystandards. |
| | | org/documents/Tokeni |
| | | zation_Product_Secur |
| | | ity_Guidelines.pdf)* |
| | | |
| | | > [* |
| | | .pdf*](https://www.p |
| | | cisecuritystandards. |
| | | org/documents/Tokeni |
| | | zation_Product_Secur |
| | | ity_Guidelines.pdf)) |
| | | |
| | | - *ANSI |
| | | X9.119-2-2017: |
| | | Retail Financial |
| | | Services* |
| | | |
| | | > *- Requirements |
| | | > For Protection Of |
| | | > Sensitive Payment |
| | | > Card Data - Part |
| | | > 2: Implementing |
| | | > Post-Authorization |
| | | > Tokenization |
| | | > Systems* |
+-----------------------+-----------------------+----------------------+
| 1. PAN is rendered | **3.5.1.a** Examine | |
| unreadable | documentation about | |
| anywhere it is | the system used to | |
| stored by using | render PAN | |
| any of the | unreadable, including | |
| following | the vendor, type of | |
| approaches: | system/process, and | |
| | the encryption | |
| - One-way | algorithms (if | |
| hashes based | applicable) to verify | |
| on strong | that the PAN is | |
| cryptography | rendered unreadable | |
| of the entire | using any of the | |
| PAN. | methods specified in | |
| | this requirement. | |
| - Truncation | | |
| (hashing | | |
| cannot be | | |
| used to | | |
| replace the | | |
| truncated | | |
| segment of | | |
| PAN). | | |
| | | |
| > -- If hashed and | | |
| > truncated versions | | |
| > of the same PAN, or | | |
| > different | | |
| > truncation formats | | |
| > of the same PAN, | | |
| > are present in an | | |
| > environment, | | |
| > additional controls | | |
| > are in place such | | |
| > that the different | | |
| > versions cannot be | | |
| > correlated to | | |
| > reconstruct the | | |
| > original PAN. | | |
| | | |
| - Index tokens. | | |
| | | |
| - Strong | | |
| cryptography with | | |
| associated key- | | |
| management | | |
| processes and | | |
| procedures. | | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.b** Examine | |
| | data repositories and | |
| | audit logs, including | |
| | payment application | |
| | logs, to verify the | |
| | PAN is rendered | |
| | unreadable using any | |
| | of the methods | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.c** If hashed | |
| | and truncated | |
| | versions of the same | |
| | PAN are present in | |
| | the environment, | |
| | examine implemented | |
| | controls to verify | |
| | that the hashed and | |
| | truncated versions | |
| | cannot be correlated | |
| | to reconstruct the | |
| | original PAN. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext PAN cannot | | |
| be read from storage | | |
| media. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| It is a relatively | | |
| trivial effort for a | | |
| malicious individual | | |
| to reconstruct | | |
| original PAN data if | | |
| they have access to | | |
| both the truncated | | |
| and hashed version of | | |
| a PAN. | | |
| | | |
| This requirement | | |
| applies to PANs | | |
| stored in primary | | |
| storage (databases, | | |
| or flat files such as | | |
| text files | | |
| spreadsheets) as well | | |
| as non-primary | | |
| storage (backup, | | |
| audit logs, | | |
| exception, or | | |
| troubleshooting logs) | | |
| must all be | | |
| protected. | | |
| | | |
| This requirement does | | |
| not preclude the use | | |
| of temporary files | | |
| containing cleartext | | |
| PAN while encrypting | | |
| and decrypting PAN. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The removal of |
| | | cleartext stored PAN |
| | | is a defense in |
| | | depth control |
| | | designed to protect |
| | | the data if an |
| | | unauthorized |
| | | individual gains |
| | | access to stored |
| | | data by taking |
| | | advantage of a |
| | | vulnerability or |
| | | misconfiguration of |
| | | an entity's primary |
| | | access control. |
| | | |
| | | Secondary |
| | | independent control |
| | | systems (for example |
| | | governing access to, |
| | | and use of, |
| | | cryptography and |
| | | decryption keys) |
| | | prevent the failure |
| | | of a primary access |
| | | control system |
| | | leading to a breach |
| | | of confidentiality |
| | | of stored PAN. |
| | | |
| | | **Good Practice** |
| | | |
| | | A hashing function |
| | | that incorporates a |
| | | randomly generated |
| | | secret key provides |
| | | brute force attack |
| | | resistance and |
| | | secret |
| | | authentication |
| | | integrity. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Appropriate keyed |
| | | cryptographic |
| | | hashing algorithms |
| | | include but are not |
| | | limited to: HMAC, |
| | | CMAC, and GMAC, with |
| | | an effective |
| | | cryptographic |
| | | strength of at least |
| | | 128-bits (*NIST SP |
| | | 800-131Ar2)*. |
| | | |
| | | Refer to the |
| | | following for more |
| | | information about |
| | | HMAC, CMAC, and |
| | | GMAC, respectively: |
| | | *NIST SP 800-107r1, |
| | | NIST SP 800-38B, and |
| | | NIST SP 800-38D).* |
| | | |
| | | See *NIST SP 800-107 |
| | | (Revision 1): |
| | | Recommendation for |
| | | Applications Using |
| | | Approved Hash |
| | | Algorithms* §5.3. |
+-----------------------+-----------------------+----------------------+
| **3.5.1.1** Hashes | **3.5.1.1.a** Examine | |
| used to render PAN | documentation about | |
| unreadable (per the | the hashing method | |
| first bullet of | used to render PAN | |
| Requirement 3.5.1) | unreadable, including | |
| are keyed | the vendor, type of | |
| cryptographic hashes | system/process, and | |
| of the entire PAN, | the encryption | |
| with associated | algorithms (as | |
| key-management | applicable) to verify | |
| processes and | that the hashing | |
| procedures in | method results in | |
| accordance with | keyed cryptographic | |
| Requirements 3.6 and | hashes of the entire | |
| 3.7. | PAN, with associated | |
| | key management | |
| | processes and | |
| | procedures. | |
+-----------------------+-----------------------+----------------------+
| **Applicability | **3.5.1.1.b** Examine | |
| Notes** | documentation about | |
| | the key management | |
| | procedures and | |
| | processes associated | |
| | with the keyed | |
| | cryptographic hashes | |
| | to verify keys are | |
| | managed in accordance | |
| | with Requirements 3.6 | |
| | and 3.7. | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to PANs | | |
| stored in primary | | |
| storage (databases, | | |
| or flat files such as | | |
| text files | | |
| spreadsheets) as well | | |
| as non-primary | | |
| storage (backup, | | |
| audit logs, | | |
| exception, or | | |
| troubleshooting logs) | | |
| must all be | | |
| protected. | | |
| | | |
| This requirement does | | |
| not preclude the use | | |
| of temporary files | | |
| containing cleartext | | |
| PAN while encrypting | | |
| and decrypting PAN. | | |
| | | |
| *This requirement is | | |
| considered a best | | |
| practice until 31 | | |
| March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.1.c** Examine | |
| | data repositories to | |
| | verify the PAN is | |
| | rendered unreadable. | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.1.d** Examine | |
| | audit logs, including | |
| | payment application | |
| | logs, to verify the | |
| | PAN is rendered | |
| | unreadable. | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Disk-level and |
| | | partition-level |
| | | encryption typically |
| | | encrypts the entire |
| | | disk or partition |
| | | using the same key, |
| | | with all data |
| | | automatically |
| | | decrypted when the |
| | | system runs or when |
| | | an authorized user |
| | | requests it. For |
| | | this reason, |
| | | disk-level |
| | | encryption is not |
| | | appropriate to |
| | | protect stored PAN |
| | | on computers, |
| | | laptops, servers, |
| | | storage arrays, or |
| | | any other system |
| | | that provides |
| | | transparent |
| | | decryption upon user |
| | | authentication. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Where available, |
| | | following vendors' |
| | | hardening and |
| | | industry best |
| | | practice guidelines |
| | | can assist in |
| | | securing PAN on |
| | | these devices. |
+-----------------------+-----------------------+----------------------+
| **3.5.1.2** If | **3.5.1.2.a** Examine | |
| disk-level or | encryption processes | |
| partition-level | to verify that, if | |
| encryption (rather | disk-level or | |
| than file-, column-, | partition-level | |
| or field-level | encryption is used to | |
| database encryption) | render PAN | |
| is used to render PAN | unreadable, it is | |
| unreadable, it is | implemented only as | |
| implemented only as | follows: | |
| follows: | | |
| | - On removable | |
| - On removable | electronic media, | |
| electronic media | | |
| | > **OR** | |
| > **OR** | | |
| | - If used for | |
| - If used for | non-removable | |
| non-removable | electronic media, | |
| electronic media, | examine | |
| PAN is also | encryption | |
| rendered | processes used to | |
| unreadable via | verify that PAN | |
| another mechanism | is also rendered | |
| that meets | unreadable via | |
| Requirement | another method | |
| 3.5.1. | that meets | |
| | Requirement | |
| | 3.5.1. | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.2.b** Examine | |
| | configurations and/or | |
| | vendor documentation | |
| | and observe | |
| | encryption processes | |
| | to verify the system | |
| | is configured | |
| | according to vendor | |
| | documentation the | |
| | result is that the | |
| | disk or the partition | |
| | is rendered | |
| | unreadable. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
| | | |
| *(continued on next | | |
| page)* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| While disk encryption | | |
| may still be present | | |
| on these types of | | |
| devices, it cannot be | | |
| the only mechanism | | |
| used to protect PAN | | |
| stored on those | | |
| systems. Any stored | | |
| PAN must also be | | |
| rendered unreadable | | |
| per Requirement | | |
| 3.5.1---for example, | | |
| through truncation or | | |
| a data-level | | |
| encryption mechanism. | | |
| Full disk encryption | | |
| helps to protect data | | |
| in the event of | | |
| physical loss of a | | |
| disk and therefore | | |
| its use is | | |
| appropriate only for | | |
| removable electronic | | |
| media storage | | |
| devices. | | |
| | | |
| Media that is part of | | |
| a data center | | |
| architecture (for | | |
| example, | | |
| hot-swappable drives, | | |
| bulk tape-backups) is | | |
| considered | | |
| non-removable | | |
| electronic media to | | |
| which Requirement | | |
| 3.5.1 applies. | | |
| | | |
| Disk or partition | | |
| encryption | | |
| implementations must | | |
| also meet all other | | |
| PCI DSS encryption | | |
| and key- management | | |
| requirements. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Disk-level |
| | | encryption typically |
| | | encrypts the entire |
| | | disk or partition |
| | | using the same key, |
| | | with all data |
| | | automatically |
| | | decrypted when the |
| | | system runs or when |
| | | an authorized user |
| | | requests it. Many |
| | | disk- encryption |
| | | solutions intercept |
| | | operating system |
| | | read/write |
| | | operations and |
| | | perform the |
| | | appropriate |
| | | cryptographic |
| | | transformations |
| | | without any special |
| | | action by the user |
| | | other than supplying |
| | | a password or |
| | | passphrase at system |
| | | start-up or at the |
| | | beginning of a |
| | | session. This |
| | | provides no |
| | | protection from a |
| | | malicious individual |
| | | that has already |
| | | managed to gain |
| | | access to a valid |
| | | user account. |
| | | |
| | | **Good Practice** |
| | | |
| | | Full disk encryption |
| | | helps to protect |
| | | data in the event of |
| | | physical loss of a |
| | | disk and therefore |
| | | its use is best |
| | | limited only to |
| | | removable electronic |
| | | media storage |
| | | devices. |
+-----------------------+-----------------------+----------------------+
| **3.5.1.3** If | **3.5.1.3.a** If | |
| disk-level or | disk-level or | |
| partition-level | partition-level | |
| encryption is used | encryption is used to | |
| (rather than file-, | render PAN | |
| column-, or | unreadable, examine | |
| field\--level | the system | |
| database encryption) | configuration and | |
| to render PAN | observe the | |
| unreadable, it is | authentication | |
| managed as follows: | process to verify | |
| | that logical access | |
| - Logical access is | is implemented in | |
| managed | accordance with all | |
| separately and | elements specified in | |
| independently of | this requirement. | |
| native operating | | |
| system | | |
| authentication | | |
| and access | | |
| control | | |
| mechanisms. | | |
| | | |
| - Decryption keys | | |
| are not | | |
| associated with | | |
| user accounts. | | |
| | | |
| - Authentication | | |
| factors | | |
| (passwords, | | |
| passphrases, or | | |
| cryptographic | | |
| keys) that allow | | |
| access to | | |
| unencrypted data | | |
| are stored | | |
| securely. | | |
+-----------------------+-----------------------+----------------------+
| | **3.5.1.3.b** Examine | |
| | files containing | |
| | authentication | |
| | factors (passwords, | |
| | passphrases, or | |
| | cryptographic keys) | |
| | and interview | |
| | personnel to verify | |
| | that authentication | |
| | factors that allow | |
| | access to unencrypted | |
| | data are stored | |
| | securely and are | |
| | independent from the | |
| | native operating | |
| | system's | |
| | authentication and | |
| | access control | |
| | methods. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Disk encryption | | |
| implementations are | | |
| configured to require | | |
| independent | | |
| authentication and | | |
| logical access | | |
| controls for | | |
| decryption. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Disk or partition | | |
| encryption | | |
| implementations must | | |
| also meet all other | | |
| PCI DSS encryption | | |
| and key- management | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.6** Cryptographic | | |
| keys used to protect | | |
| stored account data | | |
| are secured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Cryptographic keys |
| | | must be strongly |
| | | protected because |
| | | those who obtain |
| | | access will be able |
| | | to decrypt data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Having a centralized |
| | | key management |
| | | system based on |
| | | industry standards |
| | | is recommended for |
| | | managing |
| | | cryptographic keys. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | The entity's key |
| | | management |
| | | procedures will |
| | | benefit through |
| | | alignment with |
| | | industry |
| | | requirements, |
| | | Sources for |
| | | information on |
| | | cryptographic key |
| | | management life |
| | | cycles include: |
| | | |
| | | - *ISO 11568-1 |
| | | Banking --- Key |
| | | management |
| | | (retail) --- |
| | | Part 1*: |
| | | Principles |
| | | (specifically |
| | | Chapter 10 and |
| | | the referenced |
| | | Parts 2 & 4) |
| | | |
| | | - *NIST SP 800-57 |
| | | Part 1 Revision |
| | | 5--- |
| | | Recommendation |
| | | for Key |
| | | Management, Part |
| | | 1: General*. |
+-----------------------+-----------------------+----------------------+
| 1. Procedures are | **3.6.1** Examine | |
| defined and | documented | |
| implemented to | key-management | |
| protect | policies and | |
| cryptographic | procedures to verify | |
| keys used to | that processes to | |
| protect stored | protect cryptographic | |
| account data | keys used to protect | |
| against | stored account data | |
| disclosure and | against disclosure | |
| misuse that | and misuse are | |
| include: | defined to include | |
| | all elements | |
| - Access to | specified in this | |
| keys is | requirement. | |
| restricted to | | |
| the fewest | | |
| number of | | |
| custodians | | |
| necessary. | | |
| | | |
| | | |
| - Key-encrypting | | |
| keys are at | | |
| least as | | |
| strong as the | | |
| | | |
| data-encrypting | | |
| keys they | | |
| protect. | | |
| | | |
| | | |
| - Key-encrypting | | |
| keys are | | |
| stored | | |
| separately | | |
| from | | |
| | | |
| data-encrypting | | |
| keys. | | |
| | | |
| - Keys are | | |
| stored | | |
| securely in | | |
| the fewest | | |
| possible | | |
| locations and | | |
| forms. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Processes that | | |
| protect cryptographic | | |
| keys used to protect | | |
| stored account data | | |
| against disclosure | | |
| and misuse are | | |
| defined and | | |
| implemented. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to keys used | | |
| to encrypt stored | | |
| account data and to | | |
| key-encrypting keys | | |
| used to protect | | |
| data-encrypting keys. | | |
| | | |
| The requirement to | | |
| protect keys used to | | |
| protect stored | | |
| account data from | | |
| disclosure and misuse | | |
| applies to both | | |
| data-encrypting keys | | |
| and key- encrypting | | |
| keys. Because one | | |
| key-encrypting key | | |
| may grant access to | | |
| many data-encrypting | | |
| keys, the | | |
| key-encrypting keys | | |
| require strong | | |
| protection measures. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Maintaining current |
| | | documentation of the |
| | | cryptographic |
| | | architecture enables |
| | | an entity to |
| | | understand the |
| | | algorithms, |
| | | protocols, and |
| | | cryptographic keys |
| | | used to protect |
| | | stored account data, |
| | | as well as the |
| | | devices that |
| | | generate, use, and |
| | | protect the keys. |
| | | This allows an |
| | | entity to keep pace |
| | | with evolving |
| | | threats to its |
| | | architecture and |
| | | plan for updates as |
| | | the assurance level |
| | | provided by |
| | | different algorithms |
| | | and key strengths |
| | | changes. Maintaining |
| | | such documentation |
| | | also allows an |
| | | entity to detect |
| | | lost or missing keys |
| | | or key-management |
| | | devices and identify |
| | | unauthorized |
| | | additions to its |
| | | cryptographic |
| | | architecture. |
| | | |
| | | The use of the same |
| | | cryptographic keys |
| | | in both production |
| | | and test |
| | | environments |
| | | introduces a risk of |
| | | exposing the key if |
| | | the test environment |
| | | is not at the same |
| | | security level as |
| | | the production |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Having an automated |
| | | reporting mechanism |
| | | can assist with |
| | | maintenance of the |
| | | cryptographic |
| | | attributes. |
+-----------------------+-----------------------+----------------------+
| 1. ***Additional | **3.6.1.1 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only:*** A | assessments only: | |
| documented | ***Interview | |
| description of | responsible personnel | |
| the cryptographic | and examine | |
| architecture is | documentation to | |
| maintained that | verify that a | |
| includes: | document exists to | |
| | describe the | |
| - Details of | cryptographic | |
| all | architecture that | |
| algorithms, | includes all elements | |
| protocols, | specified in this | |
| and keys used | requirement. | |
| for the | | |
| protection of | | |
| stored | | |
| account data, | | |
| including key | | |
| strength and | | |
| expiry date. | | |
| | | |
| - Preventing | | |
| the use of | | |
| the same | | |
| cryptographic | | |
| keys in | | |
| production | | |
| and test | | |
| environments. | | |
| *This bullet | | |
| is a best | | |
| practice | | |
| until its | | |
| effective | | |
| date; refer | | |
| to | | |
| Applicability | | |
| Notes below | | |
| for details.* | | |
| | | |
| - Description | | |
| of the key | | |
| usage for | | |
| each key. | | |
| | | |
| - Inventory of | | |
| any hardware | | |
| security | | |
| modules | | |
| (HSMs), key | | |
| management | | |
| systems | | |
| (KMS), and | | |
| other secure | | |
| cryptographic | | |
| devices | | |
| (SCDs) used | | |
| for key | | |
| management, | | |
| including | | |
| type and | | |
| location of | | |
| devices, as | | |
| outlined in | | |
| Requirement | | |
| 12.3.4. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Accurate details of | | |
| the cryptographic | | |
| architecture are | | |
| maintained and | | |
| available. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| In cloud HSM | | |
| implementations, | | |
| responsibility for | | |
| the cryptographic | | |
| architecture | | |
| according to this | | |
| Requirement will be | | |
| shared between the | | |
| cloud provider and | | |
| the cloud customer. | | |
| | | |
| *The bullet above | | |
| (for including, in | | |
| the cryptographic | | |
| architecture, that | | |
| the use of the same | | |
| cryptographic keys in | | |
| production and test | | |
| is prevented) is a | | |
| best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required as part of | | |
| Requirement 3.6.1.1 | | |
| and must be fully | | |
| considered during a | | |
| PCI DSS assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Storing |
| | | cryptographic keys |
| | | securely prevents |
| | | unauthorized or |
| | | unnecessary access |
| | | that could result in |
| | | the exposure of |
| | | stored account data. |
| | | Storing keys |
| | | separately means |
| | | they are stored such |
| | | that if the location |
| | | of one key is |
| | | compromised, the |
| | | second key is not |
| | | also compromised. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where |
| | | data-encrypting keys |
| | | are stored in an |
| | | HSM, the HSM |
| | | interaction channel |
| | | should be protected |
| | | to prevent |
| | | interception of |
| | | encryption or |
| | | decryption |
| | | operations. |
+-----------------------+-----------------------+----------------------+
| **3.6.1.2** Secret | **3.6.1.2.a** Examine | |
| and private keys used | documented procedures | |
| to encrypt/decrypt | to verify it is | |
| stored account data | defined that | |
| are stored in one (or | cryptographic keys | |
| more) of the | used to | |
| following forms at | encrypt/decrypt | |
| all times: | stored account data | |
| | must exist only in | |
| - Encrypted with a | one (or more) of the | |
| key-encrypting | forms specified in | |
| key that is at | this requirement. | |
| least as strong | | |
| as the | | |
| data-encrypting | | |
| key, and that is | | |
| stored separately | | |
| from the data- | | |
| encrypting key. | | |
| | | |
| - Within a secure | | |
| cryptographic | | |
| device (SCD), | | |
| such as a | | |
| hardware security | | |
| module (HSM) or | | |
| PTS-approved | | |
| | | |
| point-of-interaction | | |
| device. | | |
| | | |
| - As at least two | | |
| full-length key | | |
| components or key | | |
| shares, in | | |
| accordance with | | |
| an | | |
| industry-accepted | | |
| method. | | |
+-----------------------+-----------------------+----------------------+
| | **3.6.1.2.b** Examine | |
| | system configurations | |
| | and key storage | |
| | locations to verify | |
| | that cryptographic | |
| | keys used to | |
| | encrypt/decrypt | |
| | stored account data | |
| | exist in one (or | |
| | more) of the forms | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **3.6.1.2.c** | |
| | Wherever | |
| | key-encrypting keys | |
| | are used, examine | |
| | system configurations | |
| | and key storage | |
| | locations to verify: | |
| | | |
| | - Key-encrypting | |
| | keys are at least | |
| | as strong as the | |
| | data-encrypting | |
| | keys they | |
| | protect. | |
| | | |
| | - Key-encrypting | |
| | keys are stored | |
| | separately from | |
| | data-encrypting | |
| | keys. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Secret and private | | |
| keys are stored in a | | |
| secure form that | | |
| prevents unauthorized | | |
| retrieval or access. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| It is not required | | |
| that public keys be | | |
| stored in one of | | |
| these forms. | | |
| | | |
| Cryptographic keys | | |
| stored as part of a | | |
| key management system | | |
| (KMS) that employs | | |
| SCDs are acceptable. | | |
| | | |
| A cryptographic key | | |
| that is split into | | |
| two parts does not | | |
| meet this | | |
| requirement. Secret | | |
| or private keys | | |
| stored as key | | |
| components or key | | |
| shares must be | | |
| generated via one of | | |
| the following: | | |
| | | |
| - Using an approved | | |
| random number | | |
| generator and | | |
| within an SCD, | | |
| | | |
| > **OR** | | |
| | | |
| - According to ISO | | |
| 19592 or | | |
| equivalent | | |
| industry standard | | |
| for generation of | | |
| secret key | | |
| shares. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Restricting the |
| | | number of people who |
| | | have access to |
| | | cleartext |
| | | cryptographic key |
| | | components reduces |
| | | the risk of stored |
| | | account data being |
| | | retrieved or |
| | | rendered visible by |
| | | unauthorized |
| | | parties. |
| | | |
| | | **Good Practice** |
| | | |
| | | Only personnel with |
| | | defined key |
| | | custodian |
| | | responsibilities |
| | | (creating, altering, |
| | | rotating, |
| | | distributing, or |
| | | otherwise |
| | | maintaining |
| | | encryption keys) |
| | | should be granted |
| | | access to key |
| | | components. |
| | | |
| | | Ideally this will be |
| | | a very small number |
| | | of people. |
+-----------------------+-----------------------+----------------------+
| **3.6.1.3** Access to | **3.6.1.3** Examine | |
| cleartext | user access lists to | |
| cryptographic key | verify that access to | |
| components is | cleartext | |
| restricted to the | cryptographic key | |
| fewest number of | components is | |
| custodians necessary. | restricted to the | |
| | fewest number of | |
| | custodians necessary. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access to cleartext | | |
| cryptographic key | | |
| components is | | |
| restricted to | | |
| necessary personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Storing any |
| | | cryptographic keys |
| | | in the fewest |
| | | locations helps an |
| | | organization track |
| | | and monitor all key |
| | | locations and |
| | | minimizes the |
| | | potential for keys |
| | | to be exposed to |
| | | unauthorized |
| | | parties. |
+-----------------------+-----------------------+----------------------+
| **3.6.1.4** | **3.6.1.4** Examine | |
| Cryptographic keys | key storage locations | |
| are stored in the | and observe processes | |
| fewest possible | to verify that keys | |
| locations. | are stored in the | |
| | fewest possible | |
| | locations. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cryptographic keys | | |
| are retained only | | |
| where necessary. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **3.7** Where | | |
| cryptography is used | | |
| to protect stored | | |
| account data, key | | |
| management processes | | |
| and procedures | | |
| covering all aspects | | |
| of the key lifecycle | | |
| are defined and | | |
| implemented. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Use of strong |
| | | cryptographic keys |
| | | significantly |
| | | increases the level |
| | | of security of |
| | | encrypted account |
| | | data. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See the sources |
| | | referenced at |
| | | \"Cryptographic Key |
| | | Generation in |
| | | [*Appendix |
| | | G*.](#appe |
| | | ndix-g-pci-dss-gloss |
| | | ary-of-terms-abbrevi |
| | | ations-and-acronyms) |
+-----------------------+-----------------------+----------------------+
| **3.7.1** | **3.7.1.a** Examine | |
| Key-management | the documented | |
| policies and | key-management | |
| procedures are | policies and | |
| implemented to | procedures for keys | |
| include generation of | used for protection | |
| strong cryptographic | of stored account | |
| keys used to protect | data to verify that | |
| stored account data. | they define | |
| | generation of strong | |
| | cryptographic keys. | |
+-----------------------+-----------------------+----------------------+
| | **3.7.1.b** Observe | |
| | the method for | |
| | generating keys to | |
| | verify that strong | |
| | keys are generated. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Strong cryptographic | | |
| keys are generated. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Secure distribution |
| | | or conveyance of |
| | | secret or private |
| | | cryptographic keys |
| | | means that keys are |
| | | distributed only to |
| | | authorized |
| | | custodians, as |
| | | identified in |
| | | Requirement 3.6.1.2, |
| | | and are never |
| | | distributed |
| | | insecurely. |
+-----------------------+-----------------------+----------------------+
| **3.7.2** | **3.7.2.a** Examine | |
| Key-management | the documented | |
| policies and | key-management | |
| procedures are | policies and | |
| implemented to | procedures for keys | |
| include secure | used for protection | |
| distribution of | of stored account | |
| cryptographic keys | data to verify that | |
| used to protect | they define secure | |
| stored account data. | distribution of | |
| | cryptographic keys. | |
+-----------------------+-----------------------+----------------------+
| | **3.7.2.b** Observe | |
| | the method for | |
| | distributing keys to | |
| | verify that keys are | |
| | distributed securely. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cryptographic keys | | |
| are secured during | | |
| distribution. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Storing keys without |
| | | proper protection |
| | | could provide access |
| | | to attackers, |
| | | resulting in the |
| | | decryption and |
| | | exposure of account |
| | | data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Data encryption keys |
| | | can be protected by |
| | | encrypting them with |
| | | a key-encrypting |
| | | key. |
| | | |
| | | Keys can be stored |
| | | in a Hardware |
| | | Security Module |
| | | (HSM). |
| | | |
| | | Secret or private |
| | | keys that can |
| | | decrypt data should |
| | | never be present in |
| | | source code. |
+-----------------------+-----------------------+----------------------+
| **3.7.3** | **3.7.3.a** Examine | |
| Key-management | the documented | |
| policies and | key-management | |
| procedures are | policies and | |
| implemented to | procedures for keys | |
| include secure | used for protection | |
| storage of | of stored account | |
| cryptographic keys | data to verify that | |
| used to protect | they define secure | |
| stored account data. | storage of | |
| | cryptographic keys. | |
+-----------------------+-----------------------+----------------------+
| | **3.7.3.b** Observe | |
| | the method for | |
| | storing keys to | |
| | verify that keys are | |
| | stored securely. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cryptographic keys | | |
| are secured when | | |
| stored. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Changing encryption |
| | | keys when they reach |
| | | the end of their |
| | | cryptoperiod is |
| | | imperative to |
| | | minimize the risk of |
| | | someone obtaining |
| | | the encryption keys |
| | | and using them to |
| | | decrypt data. |
| | | |
| | | **Definitions** |
| | | |
| | | A cryptoperiod is |
| | | the time span during |
| | | which a |
| | | cryptographic key |
| | | can be used for its |
| | | defined purpose. |
| | | Cryptoperiods are |
| | | often defined in |
| | | terms of the period |
| | | for which the key is |
| | | active and/or the |
| | | amount of |
| | | cipher-text that has |
| | | been produced by the |
| | | key. Considerations |
| | | for defining the |
| | | cryptoperiod |
| | | include, but are not |
| | | limited to, the |
| | | strength of the |
| | | underlying |
| | | algorithm, size or |
| | | length of the key, |
| | | risk of key |
| | | compromise, and the |
| | | sensitivity of the |
| | | data being |
| | | encrypted. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | *NIST SP 800-57 Part |
| | | 1, Revision 5, |
| | | Section 5.3 |
| | | Cryptoperiods* - |
| | | provides guidance |
| | | for establishing the |
| | | time span during |
| | | which a specific key |
| | | is authorized for |
| | | use by legitimate |
| | | entities, or the |
| | | keys for a given |
| | | system will remain |
| | | in effect. See Table |
| | | 1 of *SP 800-57* |
| | | Part 1 for suggested |
| | | cryptoperiods for |
| | | different key types. |
+-----------------------+-----------------------+----------------------+
| **3.7.4** Key | **3.7.4.a** Examine | |
| management policies | the documented | |
| and procedures are | key-management | |
| implemented for | policies and | |
| cryptographic key | procedures for keys | |
| changes for keys that | used for protection | |
| have reached the end | of stored account | |
| of their | data to verify that | |
| cryptoperiod, as | they define changes | |
| defined by the | to cryptographic keys | |
| associated | that have reached the | |
| application vendor or | end of their | |
| key owner, and based | cryptoperiod and | |
| on industry best | include all elements | |
| practices and | specified in this | |
| guidelines, including | requirement. | |
| the following: | | |
| | | |
| - A defined | | |
| cryptoperiod for | | |
| each key type in | | |
| use. | | |
| | | |
| - A process for key | | |
| changes at the | | |
| end of the | | |
| defined | | |
| cryptoperiod. | | |
+-----------------------+-----------------------+----------------------+
| | **3.7.4.b** Interview | |
| | personnel, examine | |
| | documentation, and | |
| | observe key storage | |
| | locations to verify | |
| | that keys are changed | |
| | at the end of the | |
| | defined | |
| | cryptoperiod(s). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cryptographic keys | | |
| are not used beyond | | |
| their defined | | |
| cryptoperiod. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Keys that are no |
| | | longer required, |
| | | keys with weakened |
| | | integrity, and keys |
| | | that are known or |
| | | suspected to be |
| | | compromised, should |
| | | be archived, |
| | | revoked, and/or |
| | | destroyed to ensure |
| | | that the keys can no |
| | | longer be used. |
| | | |
| | | If such keys need to |
| | | be kept (for |
| | | example, to support |
| | | archived encrypted |
| | | data), they should |
| | | be strongly |
| | | protected. |
| | | |
| | | **Good Practice** |
| | | |
| | | Archived |
| | | cryptographic keys |
| | | should be used only |
| | | for |
| | | dec |
| | | ryption/verification |
| | | purposes. |
| | | |
| | | The encryption |
| | | solution should |
| | | provide for and |
| | | facilitate a process |
| | | to replace keys that |
| | | are due for |
| | | replacement or that |
| | | are known to be, or |
| | | suspected of being, |
| | | compromised. In |
| | | addition, any keys |
| | | that are known to |
| | | be, or suspected of |
| | | being, compromised |
| | | should be managed in |
| | | accordance with the |
| | | entity's incident |
| | | response plan per |
| | | Requirement 12.10.1. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Industry best |
| | | practices for |
| | | archiving retired |
| | | keys are outlined in |
| | | *NIST SP 800-57 Part |
| | | 1, Revision 5, |
| | | Section 8.3.1*, and |
| | | includes maintaining |
| | | the archive with a |
| | | trusted third party |
| | | and storing archived |
| | | key information |
| | | separately from |
| | | operational data. |
+-----------------------+-----------------------+----------------------+
| **3.7.5** Key | **3.7.5.a** Examine | |
| management policies | the documented | |
| procedures are | key-management | |
| implemented to | policies and | |
| include the | procedures for keys | |
| retirement, | used for protection | |
| replacement, or | of stored account | |
| destruction of keys | data and verify that | |
| used to protect | they define | |
| stored account data, | retirement, | |
| as deemed necessary | replacement, or | |
| when: | destruction of keys | |
| | in accordance with | |
| - The key has | all elements | |
| reached the end | specified in this | |
| of its defined | requirement. | |
| cryptoperiod. | | |
| | | |
| - The integrity of | | |
| the key has been | | |
| weakened, | | |
| including when | | |
| personnel with | | |
| knowledge of a | | |
| cleartext key | | |
| component leaves | | |
| the company, or | | |
| the role for | | |
| which the key | | |
| component was | | |
| known. | | |
| | | |
| - The key is | | |
| suspected of or | | |
| known to be | | |
| compromised. | | |
| | | |
| Retired or replaced | | |
| keys are not used for | | |
| encryption | | |
| operations. | | |
+-----------------------+-----------------------+----------------------+
| | **3.7.5.b** Interview | |
| | personnel to verify | |
| | that processes are | |
| | implemented in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Keys are removed from | | |
| active use when it is | | |
| suspected or known | | |
| that the integrity of | | |
| the key is weakened. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| If retired or | | |
| replaced | | |
| cryptographic keys | | |
| need to be retained, | | |
| these keys must be | | |
| securely archived | | |
| (for example, by | | |
| using a | | |
| key-encryption key). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Split knowledge and |
| | | dual control of keys |
| | | are used to |
| | | eliminate the |
| | | possibility of a |
| | | single person having |
| | | access to the whole |
| | | key and therefore |
| | | being able to gain |
| | | unauthorized access |
| | | to the data. |
| | | |
| | | **Definitions** |
| | | |
| | | Split knowledge is a |
| | | method in which two |
| | | or more people |
| | | separately have key |
| | | components, where |
| | | each person knows |
| | | only their own key |
| | | component, and the |
| | | individual key |
| | | components convey no |
| | | knowledge of other |
| | | components or of the |
| | | original |
| | | cryptographic key. |
| | | |
| | | Dual control |
| | | requires two or more |
| | | people to |
| | | authenticate the use |
| | | of a cryptographic |
| | | key or perform a |
| | | key-management |
| | | function. No single |
| | | person can access or |
| | | use the |
| | | authentication |
| | | factor (for example, |
| | | the password, PIN, |
| | | or key) of another. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where key components |
| | | or key shares are |
| | | used, procedures |
| | | should ensure that |
| | | no single custodian |
| | | ever has access to |
| | | sufficient key |
| | | components or shares |
| | | to reconstruct the |
| | | cryptographic key. |
| | | For example, in an |
| | | m-of-n scheme (for |
| | | example, Shamir), |
| | | where only two of |
| | | any three components |
| | | are required to |
| | | reconstruct the |
| | | cryptographic key, a |
| | | custodian must not |
| | | have current or |
| | | prior knowledge of |
| | | more than one |
| | | component. If a |
| | | custodian was |
| | | previously assigned |
| | | component A, which |
| | | was then reassigned, |
| | | the custodian should |
| | | not then be assigned |
| | | component B or C, as |
| | | this would give the |
| | | custodian knowledge |
| | | of two components |
| | | and the ability to |
| | | recreate the key. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **3.7.6** Where | **3.7.6.a** Examine | |
| manual cleartext | the documented | |
| cryptographic key- | key-management | |
| management operations | policies and | |
| are performed by | procedures for keys | |
| personnel, | used for protection | |
| key-management | of stored account | |
| policies and | data and verify that | |
| procedures are | they define using | |
| implemented include | split knowledge and | |
| managing these | dual control. | |
| operations using | | |
| split knowledge and | | |
| dual control. | | |
+-----------------------+-----------------------+----------------------+
| | **3.7.6.b** Interview | |
| | personnel and/or | |
| | observe processes to | |
| | verify that manual | |
| | cleartext keys are | |
| | managed with split | |
| | knowledge and dual | |
| | control. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext secret or | | |
| private keys cannot | | |
| be known by anyone. | | |
| Operations involving | | |
| cleartext keys cannot | | |
| be carried out by a | | |
| single person. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This control is | | |
| applicable for manual | | |
| key- management | | |
| operations or where | | |
| key management is not | | |
| controlled by the | | |
| encryption product. | | |
| | | |
| A cryptographic key | | |
| that is simply split | | |
| into two parts does | | |
| not meet this | | |
| requirement. Secret | | |
| or private keys | | |
| stored as key | | |
| components or key | | |
| shares must be | | |
| generated via one of | | |
| the following: | | |
| | | |
| - Using an approved | | |
| random number | | |
| generator and | | |
| within a secure | | |
| cryptographic | | |
| device (SCD), | | |
| such as a | | |
| hardware security | | |
| module (HSM) or | | |
| PTS-approved | | |
| | | |
| point-of-interaction | | |
| device, | | |
| | | |
| > **OR** | | |
| | | |
| - According to ISO | | |
| 19592 or | | |
| equivalent | | |
| industry standard | | |
| for generation of | | |
| secret key | | |
| shares. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Examples** |
| | | |
| | | Key-management |
| | | operations that |
| | | might be performed |
| | | manually include, |
| | | but are not limited |
| | | to, key generation, |
| | | transmission, |
| | | loading, storage, |
| | | and destruction. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Industry standards |
| | | for managing key |
| | | components include: |
| | | |
| | | - *NIST SP 800-57* |
| | | Part 2, Revision |
| | | 1 \-- |
| | | Recommendation |
| | | for Key |
| | | Management: Part |
| | | 2 -- Best |
| | | Practices for |
| | | Key Management |
| | | Organizations |
| | | \[4.6 Keying |
| | | Material |
| | | Distribution\] |
| | | |
| | | - *ISO 11568-2 |
| | | Banking --- Key |
| | | management |
| | | (retail) --- |
| | | Part 2*: |
| | | Symmetric |
| | | ciphers, their |
| | | key management |
| | | and life cycle |
| | | \[4.7.2.3 Key |
| | | components and |
| | | 4.9.3 Key |
| | | components\] |
| | | |
| | | - *European |
| | | Payments Council |
| | | EPC342-08 |
| | | Guidelines on |
| | | Cryptographic |
| | | Algorithms Usage |
| | | and Key |
| | | Management* |
| | | \[especially |
| | | 4.1.4 Key |
| | | installation\]. |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If an attacker is |
| | | able to substitute |
| | | an entity's key with |
| | | a key the attacker |
| | | knows, the attacker |
| | | will be able to |
| | | decrypt all data |
| | | encrypted with that |
| | | key. |
| | | |
| | | **Good Practice** |
| | | |
| | | The encryption |
| | | solution should not |
| | | allow for or accept |
| | | substitution of keys |
| | | from unauthorized |
| | | sources or |
| | | unexpected |
| | | processes. |
| | | |
| | | Controls should |
| | | include ensuring |
| | | that individuals |
| | | with access to key |
| | | components or shares |
| | | do not have access |
| | | to other components |
| | | or shares that form |
| | | the necessary |
| | | threshold to derive |
| | | the key. |
+-----------------------+-----------------------+----------------------+
| **3.7.7** Key | a. Examine the | |
| management policies | documented | |
| and procedures are | key-management | |
| implemented to | policies and | |
| include the | procedures for | |
| prevention of | keys used for | |
| unauthorized | protection of | |
| substitution of | stored account | |
| cryptographic keys. | data and verify | |
| | that they define | |
| | prevention of | |
| | unauthorized | |
| | substitution of | |
| | cryptographic | |
| | keys. | |
| | | |
| | b. Interview | |
| | personnel and/or | |
| | observe processes | |
| | to verify that | |
| | unauthorized | |
| | substitution of | |
| | keys is | |
| | prevented. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cryptographic keys | | |
| cannot be substituted | | |
| by unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | This process will |
| | | help ensure |
| | | individuals that act |
| | | as key custodians |
| | | commit to the |
| | | key-custodian role |
| | | and understand and |
| | | accept the |
| | | responsibilities. An |
| | | annual reaffirmation |
| | | can help remind key |
| | | custodians of their |
| | | responsibilities. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Industry guidance |
| | | for key custodians |
| | | and their roles and |
| | | responsibilities |
| | | includes: |
| | | |
| | | - *NIST SP 800-130 |
| | | A Framework for |
| | | Designing |
| | | Cryptographic |
| | | Key Management |
| | | Systems* \[5. |
| | | Roles and |
| | | Responsibilities |
| | | (especially) for |
| | | Key Custodians\] |
| | | |
| | | - *ISO 11568-1 |
| | | Banking \-- Key |
| | | management |
| | | (retail) \-- |
| | | Part 1*: |
| | | Principles \[5 |
| | | Principles of |
| | | key management |
| | | (especially b)\] |
+-----------------------+-----------------------+----------------------+
| **3.7.8** Key | **3.7.8.a** Examine | |
| management policies | the documented | |
| and procedures are | key-management | |
| implemented to | policies and | |
| include that | procedures for keys | |
| cryptographic key | used for protection | |
| custodians formally | of stored account | |
| acknowledge (in | data and verify that | |
| writing or | they define | |
| electronically) that | acknowledgments for | |
| they understand and | key custodians in | |
| accept their | accordance with all | |
| key-custodian | elements specified in | |
| responsibilities. | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **3.7.8.b** Examine | |
| | documentation or | |
| | other evidence | |
| | showing that key | |
| | custodians have | |
| | provided | |
| | acknowledgments in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Key custodians are | | |
| knowledgeable about | | |
| their | | |
| responsibilities in | | |
| relation to | | |
| cryptographic | | |
| operations and can | | |
| access assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Providing guidance |
| | | to customers on how |
| | | to securely |
| | | transmit, store, and |
| | | update cryptographic |
| | | keys can help |
| | | prevent keys from |
| | | being mismanaged or |
| | | disclosed to |
| | | unauthorized |
| | | entities. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Numerous industry |
| | | standards for key |
| | | management are cited |
| | | above in the |
| | | Guidance for |
| | | Requirements |
| | | 3.7.1-3.7.8. |
+-----------------------+-----------------------+----------------------+
| **3.7.9 *Additional | **3.7.9 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***Where a | assessments only: | |
| service provider | ***If the service | |
| shares cryptographic | provider shares | |
| keys with its | cryptographic keys | |
| customers for | with its customers | |
| transmission or | for transmission or | |
| storage of account | storage of account | |
| data, guidance on | data, examine the | |
| secure transmission, | documentation that | |
| storage and updating | the service provider | |
| of such keys is | provides to its | |
| documented and | customers to verify | |
| distributed to the | it includes guidance | |
| service provider's | on how to securely | |
| customers. | transmit, store, and | |
| | update customers' | |
| | keys in accordance | |
| | with all elements | |
| | specified in | |
| | Requirements 3.7.1 | |
| | through 3.7.8 above. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Customers are | | |
| provided with | | |
| appropriate key | | |
| management guidance | | |
| whenever they receive | | |
| shared cryptographic | | |
| keys. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
+-----------------------+-----------------------+----------------------+
### *Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public* Networks {#requirement-4-protect-cardholder-data-with-strong-cryptography-during-transmission-over-open-public-networks .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for protecting cardholder data with |
| strong cryptography during transmission over open, public |
| networks are defined and documented. |
| |
| 2. PAN is protected with strong cryptography during transmission |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > The use of strong cryptography provides greater assurance in |
| > preserving data confidentiality, integrity, and non-repudiation. |
| > |
| > To protect against compromise, PAN must be encrypted during |
| > transmission over networks that are easily accessed by malicious |
| > individuals, including untrusted and public networks. Misconfigured |
| > wireless networks and vulnerabilities in legacy encryption and |
| > authentication protocols continue to be targeted by malicious |
| > individuals aiming to exploit these vulnerabilities to gain |
| > privileged access to cardholder data environments (CDE). Any |
| > transmissions of cardholder data over an entity's internal |
| > network(s) will naturally bring that network into scope for PCI DSS |
| > since that network stores, processes, or transmits cardholder data. |
| > Any such networks must be evaluated and assessed against applicable |
| > PCI DSS requirements. |
| > |
| > Requirement 4 applies to transmissions of PAN unless specifically |
| > called out in an individual requirement. |
| > |
| > PAN transmissions can be protected by encrypting the data before it |
| > is transmitted, or by encrypting the session over which the data is |
| > transmitted, or both. While it is not required that strong |
| > cryptography be applied at both the data level and the session |
| > level, it is recommended. |
| > |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of "strong cryptography" and other PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| protecting | | |
| cardholder data | | |
| with strong | | |
| cryptography | | |
| during | | |
| transmission over | | |
| open, public | | |
| networks are | | |
| defined and | | |
| documented. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 4.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 4. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 4, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
| | | Policies and |
| | | procedures, |
| | | including updates, |
| | | are actively |
| | | communicated to all |
| | | affected personnel, |
| | | and are supported by |
| | | operating procedures |
| | | describing how to |
| | | perform activities. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **4.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 4 | operational | |
| are: | procedures identified | |
| | in Requirement 4 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 4 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **4.1.2** Roles and | **4.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 4 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 4 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **4.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 4 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 4 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **4.2** PAN is | | |
| protected with strong | | |
| cryptography during | | |
| transmission. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Sensitive |
| | | information must be |
| | | encrypted during |
| | | transmission over |
| | | public networks |
| | | because it is easy |
| | | and common for a |
| | | malicious individual |
| | | to intercept and/or |
| | | divert data while in |
| | | transit. |
| | | |
| | | **Good Practice** |
| | | |
| | | The network and |
| | | data-flow diagrams |
| | | defined in |
| | | Requirement 1 are |
| | | useful resources for |
| | | identifying all |
| | | connection points |
| | | where account data |
| | | is transmitted or |
| | | received over open, |
| | | public networks. |
| | | |
| | | While not required, |
| | | it is considered a |
| | | good practice for |
| | | entities to also |
| | | encrypt PAN over |
| | | their internal |
| | | networks, and for |
| | | entities to |
| | | establish any new |
| | | network |
| | | implementations with |
| | | encrypted |
| | | communications. |
| | | |
| | | PAN transmissions |
| | | can be protected by |
| | | encrypting the data |
| | | before it is |
| | | transmitted, or by |
| | | encrypting the |
| | | session over which |
| | | the data is |
| | | transmitted, or |
| | | both. While it is |
| | | not required that |
| | | strong cryptography |
| | | be applied at both |
| | | the data level and |
| | | the session level, |
| | | it is strongly |
| | | recommended. If |
| | | encrypted at the |
| | | data level, the |
| | | cryptographic keys |
| | | used for protecting |
| | | the data can be |
| | | managed in |
| | | accordance with |
| | | Requirements 3.6 and |
| | | 3.7. If the data is |
| | | encrypted at the |
| | | session level, |
| | | designated key |
| | | custodians should be |
| | | assigned |
| | | responsibility for |
| | | managing |
| | | transmission keys |
| | | and certificates. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. Strong | **4.2.1.a** Examine | |
| cryptography and | documented policies | |
| security | and procedures and | |
| protocols are | interview personnel | |
| implemented as | to verify processes | |
| follows to | are defined to | |
| safeguard PAN | include all elements | |
| during | specified in this | |
| transmission over | requirement. | |
| open, public | | |
| networks: | | |
| | | |
| - Only trusted | | |
| keys and | | |
| certificates | | |
| are accepted. | | |
| | | |
| - Certificates | | |
| used to | | |
| safeguard PAN | | |
| during | | |
| transmission | | |
| over open, | | |
| public | | |
| networks are | | |
| confirmed as | | |
| valid and are | | |
| not expired | | |
| or revoked. | | |
| *This bullet | | |
| is a best | | |
| practice | | |
| until its | | |
| effective | | |
| date; refer | | |
| to | | |
| applicability | | |
| notes below | | |
| for details.* | | |
| | | |
| - The protocol | | |
| in use | | |
| supports only | | |
| secure | | |
| versions or | | |
| | | |
| configurations | | |
| and does not | | |
| support | | |
| fallback to, | | |
| or use of | | |
| insecure | | |
| versions, | | |
| algorithms, | | |
| key sizes, or | | |
| | | |
| implementations. | | |
| | | |
| - The | | |
| encryption | | |
| strength is | | |
| appropriate | | |
| for the | | |
| encryption | | |
| methodology | | |
| in use. | | |
+-----------------------+-----------------------+----------------------+
| | **4.2.1.b** Examine | |
| | system configurations | |
| | to verify that strong | |
| | cryptography and | |
| | security protocols | |
| | are implemented in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **4.2.1.c** Examine | |
| | cardholder data | |
| | transmissions to | |
| | verify that all PAN | |
| | is encrypted with | |
| | strong cryptography | |
| | when it is | |
| | transmitted over | |
| | open, public | |
| | networks. | |
+-----------------------+-----------------------+----------------------+
| | **4.2.1.d** Examine | |
| | system configurations | |
| | to verify that keys | |
| | and/or certificates | |
| | that cannot be | |
| | verified as trusted | |
| | are rejected. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext PAN cannot | | |
| be read or | | |
| intercepted from any | | |
| transmissions over | | |
| open, public | | |
| networks. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | Some protocol |
| Notes** | | implementations |
| | | (such as SSL, SSH |
| | | v1.0, and early TLS) |
| | | have known |
| | | vulnerabilities that |
| | | an attacker can use |
| | | to gain access to |
| | | the cleartext data. |
| | | It is critical that |
| | | entities maintain |
| | | awareness of |
| | | industry-defined |
| | | deprecation dates |
| | | for the cipher |
| | | suites they are |
| | | using and are |
| | | prepared to migrate |
| | | to newer versions or |
| | | protocols when older |
| | | ones are no longer |
| | | deemed secure. |
| | | |
| | | Verifying that |
| | | certificates are |
| | | trusted helps ensure |
| | | the integrity of the |
| | | secure connection. |
| | | To be considered |
| | | trusted, a |
| | | certificate should |
| | | be issued from a |
| | | trusted source, such |
| | | as a trusted |
| | | certificate |
| | | authority (CA), and |
| | | not be expired. |
| | | Up-to-date |
| | | Certificate |
| | | Revocation Lists |
| | | (CRLs) or Online |
| | | Certificate Status |
| | | Protocol (OCSP) can |
| | | be used to validate |
| | | certificates. |
| | | |
| | | Techniques to |
| | | validate |
| | | certificates may |
| | | include certificate |
| | | and public key |
| | | pinning, where the |
| | | trusted certificate |
| | | or a public key is |
| | | pinned either during |
| | | development or upon |
| | | its first use. |
| | | Entities can also |
| | | confirm with |
| | | developers or review |
| | | source code to |
| | | ensure that clients |
| | | and servers reject |
| | | connections if the |
| | | certificate is bad. |
| | | |
| | | For browser-based |
| | | TLS certificates, |
| | | certificate trust |
| | | can often be |
| | | verified by clicking |
| | | on the lock icon |
| | | that appears next to |
| | | the address bar. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| There could be | | |
| occurrences where an | | |
| entity receives | | |
| cardholder data | | |
| unsolicited via an | | |
| insecure | | |
| communication channel | | |
| that was not intended | | |
| for the purpose of | | |
| receiving sensitive | | |
| data. In this | | |
| situation, the entity | | |
| can choose to either | | |
| include the channel | | |
| in the scope of their | | |
| CDE and secure it | | |
| according to PCI DSS | | |
| or implement measures | | |
| to prevent the | | |
| channel from being | | |
| used for cardholder | | |
| data. | | |
| | | |
| A self-signed | | |
| certificate may also | | |
| be acceptable if the | | |
| certificate is issued | | |
| by an internal CA | | |
| within the | | |
| organization, the | | |
| certificate's author | | |
| is confirmed, and the | | |
| certificate is | | |
| verified---for | | |
| example, via hash or | | |
| signature---and has | | |
| not expired. Note | | |
| that self- signed | | |
| certificates where | | |
| the Distinguished | | |
| Name (DN) field in | | |
| the "issued by" and | | |
| "issued to" field is | | |
| the same are not | | |
| acceptable. | | |
| | | |
| *The bullet above | | |
| (for confirming that | | |
| certificates used to | | |
| safeguard PAN during | | |
| transmission over | | |
| open, public networks | | |
| are valid and are not | | |
| expired or revoked) | | |
| is a best practice | | |
| until 31 March 2025, | | |
| after which it will | | |
| be required as part | | |
| of Requirement* | | |
| | | |
| *4.2.1 and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Examples** |
| | | |
| | | Open, public |
| | | networks include, |
| | | but are not limited |
| | | to: |
| | | |
| | | - The Internet and |
| | | |
| | | - Wireless |
| | | technologies, |
| | | including Wi-Fi, |
| | | Bluetooth, |
| | | cellular |
| | | technologies, |
| | | and satellite |
| | | communications. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Vendor |
| | | recommendations and |
| | | industry best |
| | | practices can be |
| | | consulted for |
| | | information about |
| | | the proper |
| | | encryption strength |
| | | specific to the |
| | | encryption |
| | | methodology in use. |
| | | |
| | | For more information |
| | | about strong |
| | | cryptography and |
| | | secure protocols, |
| | | see industry |
| | | standards and best |
| | | practices such as |
| | | *NIST SP 800-52* and |
| | | *SP 800-57*. |
| | | |
| | | For more information |
| | | about trusted keys |
| | | and certificates, |
| | | see *NIST |
| | | Cybersecurity |
| | | Practice Guide |
| | | Special Publication |
| | | 1800-16*, *Securing |
| | | Web Transactions: |
| | | Transport Layer |
| | | Security (TLS) |
| | | Server Certificate |
| | | Management.* |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The inventory of |
| | | trusted keys helps |
| | | the entity keep |
| | | track of the |
| | | algorithms, |
| | | protocols, key |
| | | strength, key |
| | | custodians, and key |
| | | expiry dates. This |
| | | enables the entity |
| | | to respond quickly |
| | | to vulnerabilities |
| | | discovered in |
| | | encryption software, |
| | | certificates, and |
| | | cryptographic |
| | | algorithms. |
| | | |
| | | **Good Practice** |
| | | |
| | | For certificates, |
| | | the inventory should |
| | | include the issuing |
| | | CA and certification |
| | | expiration date. |
+-----------------------+-----------------------+----------------------+
| **4.2.1.1** An | **4.2.1.1.a** Examine | |
| inventory of the | documented policies | |
| entity's trusted keys | and procedures to | |
| and certificates used | verify processes are | |
| to protect PAN during | defined for the | |
| transmission is | entity to maintain an | |
| maintained. | inventory of its | |
| | trusted keys and | |
| | certificates. | |
+-----------------------+-----------------------+----------------------+
| | **4.2.1.1.b** Examine | |
| | the inventory of | |
| | trusted keys and | |
| | certificates to | |
| | verify it is kept up | |
| | to date. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All keys and | | |
| certificates used to | | |
| protect PAN during | | |
| transmission are | | |
| identified and | | |
| confirmed as trusted. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Since wireless |
| | | networks do not |
| | | require physical |
| | | media to connect, it |
| | | is important to |
| | | establish controls |
| | | limiting who can |
| | | connect and what |
| | | transmission |
| | | protocols will be |
| | | used. Malicious |
| | | users use free and |
| | | widely available |
| | | tools to eavesdrop |
| | | on wireless |
| | | communications. Use |
| | | of strong |
| | | cryptography can |
| | | help limit |
| | | disclosure of |
| | | sensitive |
| | | information across |
| | | wireless networks. |
| | | |
| | | Wireless networks |
| | | present unique risks |
| | | to an organization; |
| | | therefore, they must |
| | | be identified and |
| | | protected according |
| | | to industry |
| | | requirements. Strong |
| | | cryptography for |
| | | authentication and |
| | | transmission of PAN |
| | | is required to |
| | | prevent malicious |
| | | users from gaining |
| | | access to the |
| | | wireless network or |
| | | utilizing wireless |
| | | networks to access |
| | | other internal |
| | | networks or data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Wireless networks |
| | | should not permit |
| | | fallback or |
| | | downgrade to an |
| | | insecure protocol or |
| | | lower encryption |
| | | strength that does |
| | | not meet the intent |
| | | of strong |
| | | cryptography. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Review the vendor's |
| | | specific |
| | | documentation for |
| | | more details on the |
| | | choice of protocols, |
| | | configurations, and |
| | | settings related to |
| | | cryptography. |
+-----------------------+-----------------------+----------------------+
| **4.2.1.2** Wireless | **4.2.1.2** Examine | |
| networks transmitting | system configurations | |
| PAN or connected to | to verify that | |
| the CDE use industry | wireless networks | |
| best practices to | transmitting PAN or | |
| implement strong | connected to the CDE | |
| cryptography for | use industry best | |
| authentication and | practices to | |
| transmission. | implement strong | |
| | cryptography for | |
| | authentication and | |
| | transmission. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext PAN cannot | | |
| be read or | | |
| intercepted from | | |
| wireless network | | |
| transmissions. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | End-user messaging |
| | | technologies |
| | | typically can be |
| | | easily intercepted |
| | | by packet-sniffing |
| | | during delivery |
| | | across internal and |
| | | public networks. |
| | | |
| | | **Good Practice** |
| | | |
| | | The use of end-user |
| | | messaging technology |
| | | to send PAN should |
| | | only be considered |
| | | where there is a |
| | | defined business |
| | | need. |
| | | |
| | | **Examples** |
| | | |
| | | E-mail, instant |
| | | messaging, SMS, and |
| | | chat are examples of |
| | | the type of end-user |
| | | messaging technology |
| | | that this |
| | | requirement refers |
| | | to. |
+-----------------------+-----------------------+----------------------+
| **4.2.2** PAN is | **4.2.2.a** Examine | |
| secured with strong | documented policies | |
| cryptography whenever | and procedures to | |
| it is sent via | verify that processes | |
| end-user messaging | are defined to secure | |
| technologies. | PAN with strong | |
| | cryptography whenever | |
| | sent over end-user | |
| | messaging | |
| | technologies. | |
+-----------------------+-----------------------+----------------------+
| | **4.2.2.b** Examine | |
| | system configurations | |
| | and vendor | |
| | documentation to | |
| | verify that PAN is | |
| | secured with strong | |
| | cryptography whenever | |
| | it is sent via end- | |
| | user messaging | |
| | technologies. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext PAN cannot | | |
| be read or | | |
| intercepted from | | |
| transmissions using | | |
| end-user messaging | | |
| technologies. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement also | | |
| applies if a | | |
| customer, or other | | |
| third-party, requests | | |
| that PAN is sent to | | |
| them via end-user | | |
| messaging | | |
| technologies. | | |
| | | |
| There could be | | |
| occurrences where an | | |
| entity receives | | |
| unsolicited | | |
| cardholder data via | | |
| an insecure | | |
| communication channel | | |
| that was not intended | | |
| for transmissions of | | |
| sensitive data. In | | |
| this situation, the | | |
| entity can choose to | | |
| either include the | | |
| channel in the scope | | |
| of their CDE and | | |
| secure it according | | |
| to PCI DSS or delete | | |
| the cardholder data | | |
| and implement | | |
| measures to prevent | | |
| the channel from | | |
| being used for | | |
| cardholder data. | | |
+-----------------------+-----------------------+----------------------+
## Maintain a Vulnerability Management Program {#maintain-a-vulnerability-management-program .unnumbered}
### *Requirement 5: Protect All Systems and Networks from Malicious Software* {#requirement-5-protect-all-systems-and-networks-from-malicious-software .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for protecting all systems and networks |
| from malicious software are defined and understood. |
| |
| 2. Malicious software (malware) is prevented, or detected and |
| addressed. |
| |
| 3. Anti-malware mechanisms and processes are active, maintained, and |
| monitored. |
| |
| 4. Anti-phishing mechanisms protect users against phishing attacks. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Malicious software (malware) is software or firmware designed to |
| > infiltrate or damage a computer system without the owner\'s |
| > knowledge or consent, with the intent of compromising the |
| > confidentiality, integrity, or availability of the owner's data, |
| > applications, or operating system. |
| > |
| > Examples include viruses, worms, Trojans, spyware, ransomware, |
| > keyloggers, and rootkits, malicious code, scripts, and links. |
| > |
| > Malware can enter the network during many business-approved |
| > activities, including employee e-mail (for example, via phishing) |
| > and use of the Internet, mobile computers, and storage devices, |
| > resulting in the exploitation of system vulnerabilities. |
| > |
| > Using anti-malware solutions that address all types of malware |
| > helps to protect systems from current and evolving malware threats. |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| protecting all | | |
| systems and | | |
| networks from | | |
| malicious | | |
| software are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 5.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 5. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 5, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **5.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 5 | operational | |
| are: | procedures identified | |
| | in Requirement 5 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 5 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, networks |
| | | and systems may not |
| | | be properly |
| | | protected from |
| | | malware. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **5.1.2** Roles and | **5.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 5 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 5 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **5.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 5 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 5 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
| **5.2** Malicious | | |
| software (malware) is | | |
| prevented, or | | |
| detected and | | |
| addressed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | There is a constant |
| | | stream of attacks |
| | | targeting newly |
| | | discovered |
| | | vulnerabilities in |
| | | systems previously |
| | | regarded as secure. |
| | | Without an anti- |
| | | malware solution |
| | | that is updated |
| | | regularly, new forms |
| | | of malware can be |
| | | used to attack |
| | | systems, disable a |
| | | network, or |
| | | compromise data. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is beneficial for |
| | | entities to be aware |
| | | of \"zero- day\" |
| | | attacks (those that |
| | | exploit a previously |
| | | unknown |
| | | vulnerability) and |
| | | consider solutions |
| | | that focus on |
| | | behavioral |
| | | characteristics and |
| | | will alert and react |
| | | to unexpected |
| | | behavior. |
| | | |
| | | **Definitions** |
| | | |
| | | System components |
| | | known to be affected |
| | | by malware have |
| | | active malware |
| | | exploits available |
| | | in the real world |
| | | (not only |
| | | theoretical |
| | | exploits). |
+-----------------------+-----------------------+----------------------+
| **5.2.1** An | **5.2.1.a** Examine | |
| anti-malware | system components to | |
| solution(s) is | verify that an | |
| deployed on all | anti-malware | |
| system components, | solution(s) is | |
| except for those | deployed on all | |
| system components | system components, | |
| identified in | except for those | |
| periodic evaluations | determined to not be | |
| per Requirement 5.2.3 | at risk from malware | |
| that concludes the | based on periodic | |
| system components are | evaluations per | |
| not at risk from | Requirement 5.2.3. | |
| malware. | | |
+-----------------------+-----------------------+----------------------+
| | **5.2.1.b** For any | |
| | system components | |
| | without an | |
| | anti-malware | |
| | solution, examine the | |
| | periodic evaluations | |
| | to verify the | |
| | component was | |
| | evaluated and the | |
| | evaluation concludes | |
| | that the component is | |
| | not at risk from | |
| | malware. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Automated mechanisms | | |
| are implemented to | | |
| prevent systems from | | |
| becoming an attack | | |
| vector for malware. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important to |
| | | protect against all |
| | | types and forms of |
| | | malware to prevent |
| | | unauthorized access. |
| | | |
| | | **Good Practice** |
| | | |
| | | Anti-malware |
| | | solutions may |
| | | include a |
| | | combination of |
| | | network-based |
| | | controls, host-based |
| | | controls, and |
| | | endpoint security |
| | | solutions. In |
| | | addition to |
| | | signature-based |
| | | tools, capabilities |
| | | used by modern |
| | | anti-malware |
| | | solutions include |
| | | sandboxing, |
| | | privilege escalation |
| | | controls, and |
| | | machine learning. |
| | | |
| | | Solution techniques |
| | | include preventing |
| | | malware from getting |
| | | into the network and |
| | | removing or |
| | | containing malware |
| | | that does get into |
| | | the network. |
| | | |
| | | **Examples** |
| | | |
| | | Types of malware |
| | | include, but are not |
| | | limited to, viruses, |
| | | Trojans, worms, |
| | | spyware, ransomware, |
| | | keyloggers, |
| | | rootkits, malicious |
| | | code, scripts, and |
| | | links. |
+-----------------------+-----------------------+----------------------+
| **5.2.2** The | **5.2.2** Examine | |
| deployed anti-malware | vendor documentation | |
| solution(s): | and configurations of | |
| | the anti-malware | |
| - Detects all known | solution(s) to verify | |
| types of malware. | that the solution: | |
| | | |
| - Removes, blocks, | - Detects all known | |
| or contains all | types of malware. | |
| known types of | | |
| malware. | - Removes, blocks, | |
| | or contains all | |
| | known types of | |
| | malware. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Malware cannot | | |
| execute or infect | | |
| other system | | |
| components. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Certain systems, at |
| | | a given point in |
| | | time, may not |
| | | currently be |
| | | commonly targeted or |
| | | affected by malware. |
| | | However, industry |
| | | trends for malware |
| | | can change quickly, |
| | | so it is important |
| | | for organizations to |
| | | be aware of new |
| | | malware that might |
| | | affect their |
| | | systems---for |
| | | example, by |
| | | monitoring vendor |
| | | security notices and |
| | | anti- malware forums |
| | | to determine whether |
| | | its systems might be |
| | | coming under threat |
| | | from new and |
| | | evolving malware. |
| | | |
| | | **Good Practice** |
| | | |
| | | If an entity |
| | | determines that a |
| | | particular system is |
| | | not susceptible to |
| | | any malware, the |
| | | determination should |
| | | be supported by |
| | | industry evidence, |
| | | vendor resources, |
| | | and best practices. |
| | | |
| | | The following steps |
| | | can help entities |
| | | during their |
| | | periodic |
| | | evaluations: |
| | | |
| | | - Identification |
| | | of all system |
| | | types previously |
| | | determined to |
| | | not require |
| | | malware |
| | | protection. |
| | | |
| | | - Review of |
| | | industry |
| | | vulnerability |
| | | alerts and |
| | | notices to |
| | | determine if new |
| | | threats exist |
| | | for any |
| | | identified |
| | | system. |
| | | |
| | | - A documented |
| | | conclusion about |
| | | whether the |
| | | system types |
| | | remain not |
| | | susceptible to |
| | | malware. |
| | | |
| | | - A strategy to |
| | | add malware |
| | | protection for |
| | | any system types |
| | | for which |
| | | malware |
| | | protection has |
| | | become |
| | | necessary. |
| | | |
| | | Trends in malware |
| | | should be included |
| | | in the |
| | | identification of |
| | | new security |
| | | vulnerabilities at |
| | | Requirement 6.3.1, |
| | | and methods to |
| | | address new trends |
| | | should be |
| | | incorporated into |
| | | the entity's |
| | | configuration |
| | | standards and |
| | | protection |
| | | mechanisms as |
| | | needed. |
+-----------------------+-----------------------+----------------------+
| **5.2.3** Any system | **5.2.3.a** Examine | |
| components that are | documented policies | |
| not at risk for | and procedures to | |
| malware are evaluated | verify that a process | |
| periodically to | is defined for | |
| include the | periodic evaluations | |
| following: | of any system | |
| | components that are | |
| - A documented list | not at risk for | |
| of all system | malware that includes | |
| components not at | all elements | |
| risk for malware. | specified in this | |
| | requirement. | |
| - Identification | | |
| and evaluation of | | |
| evolving malware | | |
| threats for those | | |
| system | | |
| components. | | |
| | | |
| - Confirmation | | |
| whether such | | |
| system components | | |
| continue to not | | |
| require | | |
| anti-malware | | |
| protection. | | |
+-----------------------+-----------------------+----------------------+
| | **5.2.3.b** Interview | |
| | personnel to verify | |
| | that the evaluations | |
| | include all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **5.2.3.c** Examine | |
| | the list of system | |
| | components identified | |
| | as not at risk of | |
| | malware and compare | |
| | to the system | |
| | components without an | |
| | anti-malware solution | |
| | deployed per | |
| | Requirement 5.2.1 to | |
| | verify that the | |
| | system components | |
| | match for both | |
| | requirements. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The entity maintains | | |
| awareness of evolving | | |
| malware threats to | | |
| ensure that any | | |
| systems not protected | | |
| from malware are not | | |
| at risk of infection. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| covered by this | | |
| requirement are those | | |
| for which there is no | | |
| anti-malware solution | | |
| deployed per | | |
| Requirement 5.2.1. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Entities determine |
| | | the optimum period |
| | | to undertake the |
| | | evaluation based on |
| | | criteria such as the |
| | | complexity of each |
| | | entity's environment |
| | | and the number of |
| | | types of systems |
| | | that are required to |
| | | be evaluated. |
+-----------------------+-----------------------+----------------------+
| > **5.2.3.1** The | **5.2.3.1.a** Examine | |
| > frequency of | the entity's targeted | |
| > periodic | risk analysis for the | |
| > evaluations of | frequency of periodic | |
| > system components | evaluations of system | |
| > identified as not | components identified | |
| > at risk for malware | as not at risk for | |
| > is defined in the | malware to verify the | |
| > entity's targeted | risk analysis was | |
| > risk analysis, | performed in | |
| > which is performed | accordance with all | |
| > according to all | elements specified in | |
| > elements specified | Requirement 12.3.1. | |
| > in Requirement | | |
| > 12.3.1. | | |
+-----------------------+-----------------------+----------------------+
| | **5.2.3.1.b** Examine | |
| | documented results of | |
| | periodic evaluations | |
| | of system components | |
| | identified as not at | |
| | risk for malware and | |
| | interview personnel | |
| | to verify that | |
| | evaluations are | |
| | performed at the | |
| | frequency defined in | |
| | the entity's targeted | |
| | risk analysis | |
| | performed for this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Systems not known to | | |
| be at risk from | | |
| malware are | | |
| re-evaluated at a | | |
| frequency that | | |
| addresses the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **5.3** Anti-malware | | |
| mechanisms and | | |
| processes are active, | | |
| maintained, and | | |
| monitored. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | For an anti-malware |
| | | solution to remain |
| | | effective, it needs |
| | | to have the latest |
| | | security updates, |
| | | signatures, threat |
| | | analysis engines, |
| | | and any other |
| | | malware protections |
| | | on which the |
| | | solution relies. |
| | | |
| | | Having an automated |
| | | update process |
| | | avoids burdening end |
| | | users with |
| | | responsibility for |
| | | manually installing |
| | | updates and provides |
| | | greater assurance |
| | | that anti-malware |
| | | protection |
| | | mechanisms are |
| | | updated as quickly |
| | | as possible after an |
| | | update is released. |
| | | |
| | | **Good Practice** |
| | | |
| | | Anti-malware |
| | | mechanisms should be |
| | | updated via a |
| | | trusted source as |
| | | soon as possible |
| | | after an update is |
| | | available. Using a |
| | | trusted common |
| | | source to distribute |
| | | updates to end-user |
| | | systems helps ensure |
| | | the integrity and |
| | | consistency of the |
| | | solution |
| | | architecture. |
| | | |
| | | Updates may be |
| | | automatically |
| | | downloaded to a |
| | | central |
| | | location---for |
| | | example, to allow |
| | | for testing---prior |
| | | to being deployed to |
| | | individual system |
| | | components. |
+-----------------------+-----------------------+----------------------+
| **5.3.1** The | **5.3.1.a** Examine | |
| anti-malware | anti-malware | |
| solution(s) is kept | solution(s) | |
| current via automatic | configurations, | |
| updates. | including any master | |
| | installation of the | |
| | software, to verify | |
| | the solution is | |
| | configured to perform | |
| | automatic updates. | |
+-----------------------+-----------------------+----------------------+
| | **5.3.1.b** Examine | |
| | system components and | |
| | logs, to verify that | |
| | the anti-malware | |
| | solution(s) and | |
| | definitions are | |
| | current and have been | |
| | promptly deployed | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Anti-malware | | |
| mechanisms can detect | | |
| and address the | | |
| latest malware | | |
| threats. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Periodic scans can |
| | | identify malware |
| | | that is present, but |
| | | currently inactive, |
| | | within the |
| | | environment. Some |
| | | malware, such as |
| | | zero-day malware, |
| | | can enter an |
| | | environment before |
| | | the scan solution is |
| | | capable of detecting |
| | | it. |
| | | |
| | | Performing regular |
| | | periodic scans or |
| | | continuous |
| | | behavioral analysis |
| | | of systems or |
| | | processes helps |
| | | ensure that |
| | | previously |
| | | undetectable malware |
| | | can be identified, |
| | | removed, and |
| | | investigated to |
| | | determine how it |
| | | gained access to the |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Using a combination |
| | | of periodic scans |
| | | (scheduled and |
| | | on-demand) and |
| | | active, real-time |
| | | (on-access) scanning |
| | | helps ensure that |
| | | malware residing in |
| | | both static and |
| | | dynamic elements of |
| | | the CDE is |
| | | addressed. Users |
| | | should also be able |
| | | to run on- demand |
| | | scans on their |
| | | systems if |
| | | suspicious activity |
| | | is detected -- this |
| | | can be useful in the |
| | | early detection of |
| | | malware. |
| | | |
| | | Scans should include |
| | | the entire file |
| | | system, including |
| | | all disks, memory, |
| | | and start-up files |
| | | and boot records (at |
| | | system restart) to |
| | | detect all malware |
| | | upon file execution, |
| | | including any |
| | | software that may be |
| | | resident on a system |
| | | but not currently |
| | | active. Scan scope |
| | | should include all |
| | | systems and software |
| | | in the CDE, |
| | | including those that |
| | | are often overlooked |
| | | such as email |
| | | servers, web |
| | | browsers, and |
| | | instant messaging |
| | | software. |
| | | |
| | | **Definitions** |
| | | |
| | | Active, or |
| | | real-time, scanning |
| | | checks files for |
| | | malware upon any |
| | | attempt to open, |
| | | close, rename, or |
| | | otherwise interact |
| | | with a file, |
| | | preventing the |
| | | malware from being |
| | | activated. |
+-----------------------+-----------------------+----------------------+
| **5.3.2** The | **5.3.2.a** Examine | |
| anti-malware | anti-malware | |
| solution(s): | solution(s) | |
| | configurations, | |
| - Performs periodic | including any master | |
| scans and active | installation of the | |
| or real-time | software, to verify | |
| scans. | the solution(s) is | |
| | configured to perform | |
| > **OR** | at least one of the | |
| | elements specified in | |
| - Performs | this requirement. | |
| continuous | | |
| behavioral | | |
| analysis of | | |
| systems or | | |
| processes. | | |
+-----------------------+-----------------------+----------------------+
| | **5.3.2.b** Examine | |
| | system components, | |
| | including all | |
| | operating system | |
| | types identified as | |
| | at risk for malware, | |
| | to verify the | |
| | solution(s) is | |
| | enabled in accordance | |
| | with at least one of | |
| | the elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **5.3.2.c** Examine | |
| | logs and scan results | |
| | to verify that the | |
| | solution(s) is | |
| | enabled in accordance | |
| | with at least one of | |
| | the elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Malware cannot | | |
| complete execution. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Entities can |
| | | determine the |
| | | optimum period to |
| | | undertake periodic |
| | | scans based on their |
| | | own assessment of |
| | | the risks posed to |
| | | their environments. |
+-----------------------+-----------------------+----------------------+
| > **5.3.2.1** If | **5.3.2.1.a** Examine | |
| > periodic malware | the entity's targeted | |
| > scans are performed | risk analysis for the | |
| > to meet Requirement | frequency of periodic | |
| > 5.3.2, the | malware scans to | |
| > frequency of scans | verify the risk | |
| > is defined in the | analysis was | |
| > entity's targeted | performed in | |
| > risk analysis, | accordance with all | |
| > which is performed | elements specified in | |
| > according to all | Requirement 12.3.1. | |
| > elements specified | | |
| > in Requirement | | |
| > 12.3.1. | | |
+-----------------------+-----------------------+----------------------+
| | **5.3.2.1.b** Examine | |
| | documented results of | |
| | periodic malware | |
| | scans and interview | |
| | personnel to verify | |
| | scans are performed | |
| | at the frequency | |
| | defined in the | |
| | entity's targeted | |
| | risk analysis | |
| | performed for this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Scans by the malware | | |
| solution are | | |
| performed at a | | |
| frequency that | | |
| addresses the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to entities | | |
| conducting periodic | | |
| malware scans to meet | | |
| Requirement 5.3.2. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Portable media |
| | | devices are often |
| | | overlooked as an |
| | | entry method for |
| | | malware. Attackers |
| | | will often pre-load |
| | | malware onto |
| | | portable devices |
| | | such as USB and |
| | | flash drives; |
| | | connecting an |
| | | infected device to a |
| | | computer then |
| | | triggers the |
| | | malware, introducing |
| | | new threats within |
| | | the environment. |
+-----------------------+-----------------------+----------------------+
| **5.3.3** For | **5.3.3.a** Examine | |
| removable electronic | anti-malware | |
| media, the anti- | solution(**s)** | |
| malware solution(s): | configurations to | |
| | verify that, for | |
| - Performs | removable electronic | |
| automatic scans | media, the solution | |
| of when the media | is configured to | |
| is inserted, | perform at least one | |
| connected, or | of the elements | |
| logically | specified in this | |
| mounted, | requirement. | |
| | | |
| > **OR** | | |
| | | |
| - Performs | | |
| continuous | | |
| behavioral | | |
| analysis of | | |
| systems or | | |
| processes when | | |
| the media is | | |
| inserted, | | |
| connected, or | | |
| logically | | |
| mounted. | | |
+-----------------------+-----------------------+----------------------+
| | **5.3.3.b** Examine | |
| | system components | |
| | with removable | |
| | electronic media | |
| | connected to verify | |
| | that the solution(s) | |
| | is enabled in | |
| | accordance with at | |
| | least one of the | |
| | elements as specified | |
| | in this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **5.3.3.c** Examine | |
| | logs and scan results | |
| | to verify that the | |
| | solution(s) is | |
| | enabled in accordance | |
| | with at least one of | |
| | the elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Malware cannot be | | |
| introduced to system | | |
| components via | | |
| external removable | | |
| media. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important to |
| | | track the |
| | | effectiveness of the |
| | | anti-malware |
| | | mechanisms---for |
| | | example, by |
| | | confirming that |
| | | updates and scans |
| | | are being performed |
| | | as expected, and |
| | | that malware is |
| | | identified and |
| | | addressed. Audit |
| | | logs also allow an |
| | | entity to determine |
| | | how malware entered |
| | | the environment and |
| | | track its activity |
| | | when inside the |
| | | entity's network. |
+-----------------------+-----------------------+----------------------+
| **5.3.4** Audit logs | **5.3.4** Examine | |
| for the anti-malware | anti-malware | |
| solution(s) are | solution(s) | |
| enabled and retained | configurations to | |
| in accordance with | verify logs are | |
| Requirement 10.5.1. | enabled and retained | |
| | in accordance with | |
| | Requirement 10.5.1. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Historical records of | | |
| anti-malware actions | | |
| are immediately | | |
| available and | | |
| retained for at least | | |
| 12 months. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important that |
| | | defensive mechanisms |
| | | are always running |
| | | so that malware is |
| | | detected in real |
| | | time. Ad-hoc |
| | | starting and |
| | | stopping of anti- |
| | | malware solutions |
| | | could allow malware |
| | | to propagate |
| | | unchecked and |
| | | undetected. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where there is a |
| | | legitimate need to |
| | | temporarily disable |
| | | a system's |
| | | anti-malware |
| | | protection---for |
| | | example, to support |
| | | a specific |
| | | maintenance activity |
| | | or investigation of |
| | | a technical |
| | | problem--- the |
| | | reason for taking |
| | | such action should |
| | | be understood and |
| | | approved by an |
| | | appropriate |
| | | management |
| | | representative. Any |
| | | disabling or |
| | | altering of |
| | | anti-malware |
| | | mechanisms, |
| | | including on |
| | | administrators' own |
| | | devices, should be |
| | | performed by |
| | | authorized |
| | | personnel. It is |
| | | recognized that |
| | | administrators have |
| | | privileges that may |
| | | allow them to |
| | | disable anti-malware |
| | | on their own |
| | | computers, but there |
| | | should be alerting |
| | | mechanisms in place |
| | | when such software |
| | | is disabled and then |
| | | follow up that |
| | | occurs to ensure |
| | | correct processes |
| | | were followed. |
| | | |
| | | **Examples** |
| | | |
| | | Additional security |
| | | measures that may |
| | | need to be |
| | | implemented for the |
| | | period during which |
| | | anti- malware |
| | | protection is not |
| | | active include |
| | | disconnecting the |
| | | unprotected system |
| | | from the Internet |
| | | while the |
| | | anti-malware |
| | | protection is |
| | | disabled and running |
| | | a full scan once it |
| | | is re- enabled. |
+-----------------------+-----------------------+----------------------+
| **5.3.5** | **5.3.5.a** Examine | |
| Anti-malware | anti-malware | |
| mechanisms cannot be | configurations, to | |
| disabled or altered | verify that the | |
| by users, unless | anti-malware | |
| specifically | mechanisms cannot be | |
| documented, and | disabled or altered | |
| authorized by | by users. | |
| management on a | | |
| case-by-case basis | | |
| for a limited time | | |
| period. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | **5.3.5.b** Interview | |
| Objective** | responsible personnel | |
| | and observe processes | |
| | to verify that any | |
| | requests to disable | |
| | or alter anti-malware | |
| | mechanisms are | |
| | specifically | |
| | documented and | |
| | authorized by | |
| | management on a | |
| | case-by-case basis | |
| | for a limited time | |
| | period. | |
+-----------------------+-----------------------+----------------------+
| Anti-malware | | |
| mechanisms cannot be | | |
| modified by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Anti-malware | | |
| solutions may be | | |
| temporarily disabled | | |
| only if there is a | | |
| legitimate technical | | |
| need, as authorized | | |
| by management on a | | |
| case-by-case basis. | | |
| If anti-malware | | |
| protection needs to | | |
| be disabled for a | | |
| specific purpose, it | | |
| must be formally | | |
| authorized. | | |
| Additional security | | |
| measures may also | | |
| need to be | | |
| implemented for the | | |
| period during which | | |
| anti-malware | | |
| protection is not | | |
| active. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **5.4** Anti-phishing | | |
| mechanisms protect | | |
| users against | | |
| phishing attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Technical controls |
| | | can limit the number |
| | | of occasions |
| | | personnel have to |
| | | evaluate the |
| | | veracity of a |
| | | communication and |
| | | can also limit the |
| | | effects of |
| | | individual responses |
| | | to phishing. |
| | | |
| | | **Good Practice** |
| | | |
| | | When developing |
| | | anti-phishing |
| | | controls, entities |
| | | are encouraged to |
| | | consider a |
| | | combination of |
| | | approaches. For |
| | | example, using |
| | | anti-spoofing |
| | | controls such as |
| | | Domain-based Message |
| | | Authentication, |
| | | Reporting & |
| | | Conformance (DMARC), |
| | | Sender Policy |
| | | Framework (SPF), and |
| | | Domain Keys |
| | | Identified Mail |
| | | (DKIM) will help |
| | | stop phishers from |
| | | spoofing the |
| | | entity's domain and |
| | | impersonating |
| | | personnel. |
| | | |
| | | The deployment of |
| | | technologies for |
| | | blocking phishing |
| | | emails and malware |
| | | before they reach |
| | | personnel, such as |
| | | link scrubbers and |
| | | server-side |
| | | anti-malware, can |
| | | reduce incidents and |
| | | decrease the time |
| | | required by |
| | | personnel to check |
| | | and report phishing |
| | | attacks. |
| | | Additionally, |
| | | training personnel |
| | | to recognize and |
| | | report phishing |
| | | emails can allow |
| | | similar emails to be |
| | | identified and |
| | | permit them to be |
| | | removed before being |
| | | opened. |
| | | |
| | | It is recommended |
| | | (but not required) |
| | | that anti- phishing |
| | | controls are applied |
| | | across an entity's |
| | | entire organization. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **5.4.1** Processes | **5.4.1** Observe | |
| and automated | implemented processes | |
| mechanisms are in | and examine | |
| place to detect and | mechanisms to verify | |
| protect personnel | controls are in place | |
| against phishing | to detect and protect | |
| attacks. | personnel against | |
| | phishing attacks. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Mechanisms are in | | |
| place to protect | | |
| against and mitigate | | |
| risk posed by | | |
| phishing attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to the | | |
| automated mechanism. | | |
| It is not intended | | |
| that the systems and | | |
| services providing | | |
| such automated | | |
| mechanisms (such as | | |
| email servers) are | | |
| brought into scope | | |
| for PCI DSS. | | |
| | | |
| The focus of this | | |
| requirement is on | | |
| protecting personnel | | |
| with access to system | | |
| components in- scope | | |
| for PCI DSS. | | |
| | | |
| Meeting this | | |
| requirement for | | |
| technical and | | |
| automated controls to | | |
| detect and protect | | |
| personnel against | | |
| phishing is not the | | |
| same as Requirement | | |
| | | |
| 12.6.3.1 for security | | |
| awareness training. | | |
| Meeting this | | |
| requirement does not | | |
| also meet the | | |
| requirement for | | |
| providing personnel | | |
| with security | | |
| awareness training, | | |
| and vice versa. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Definitions** |
| | | |
| | | Phishing is a form |
| | | of social |
| | | engineering and |
| | | describes the |
| | | different methods |
| | | used by attackers to |
| | | trick personnel into |
| | | disclosing sensitive |
| | | information, such as |
| | | user account names |
| | | and passwords, and |
| | | account data. |
| | | Attackers will |
| | | typically disguise |
| | | themselves and |
| | | attempt to appear as |
| | | a genuine or trusted |
| | | source, directing |
| | | personnel to send an |
| | | email response, |
| | | click on a web link, |
| | | or enter data into a |
| | | compromised website. |
| | | Mechanisms that can |
| | | detect and prevent |
| | | phishing attempts |
| | | are often included |
| | | in anti- malware |
| | | solutions. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See the following |
| | | for more information |
| | | about phishing: |
| | | |
| | | *National Cyber |
| | | Security Centre - |
| | | Phishing Attacks: |
| | | Defending your |
| | | Organization*. |
| | | |
| | | *US Cybersecurity & |
| | | Infrastructure |
| | | Security Agency - |
| | | Report Phishing |
| | | Sites.* |
+-----------------------+-----------------------+----------------------+
### *Requirement 6: Develop and Maintain Secure Systems and Software* {#requirement-6-develop-and-maintain-secure-systems-and-software .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for developing and maintaining secure |
| systems and software are defined and understood. |
| |
| 2. Bespoke and custom software are developed securely. |
| |
| 3. Security vulnerabilities are identified and addressed. |
| |
| 4. Public-facing web applications are protected against attacks. |
| |
| 5. Changes to all system components are managed securely. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Actors with bad intentions can use security vulnerabilities to gain |
| > privileged access to systems. Many of these vulnerabilities are |
| > fixed by vendor provided security patches, which must be installed |
| > by the entities that manage the systems. All system components must |
| > have all appropriate software patches to protect against the |
| > exploitation and compromise of account data by malicious |
| > individuals and malicious software. |
| > |
| > Appropriate software patches are those patches that have been |
| > evaluated and tested sufficiently to determine that the patches do |
| > not conflict with existing security configurations. For bespoke and |
| > custom software, numerous vulnerabilities can be avoided by |
| > applying software lifecycle (SLC) processes and secure coding |
| > techniques. |
| > |
| > Code repositories that store application code, system |
| > configurations, or other configuration data that can impact the |
| > security of account data or the CDE are in scope for PCI DSS |
| > assessments. |
| > |
| > See *[Relationship between PCI DSS and PCI SSC Software |
| > Stan |
| dards](#relationship-between-pci-dss-and-pci-ssc-software-standards)* |
| > on page |
| > [7](#relationship-between-pci-dss-and-pci-ssc-software-standards) |
| > for information about the use of PCI SSC-validated software and |
| > software vendors, and how use of PCI SSC's software standards may |
| > help with meeting controls in Requirement 6. |
| > |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
| > |
| > ***Note**: Requirement 6 applies to all system components, except |
| > for section 6.2 for developing software securely, which applies |
| > only to bespoke and custom software used on any system component |
| > included in or connected to the CDE.* |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| developing and | | |
| maintaining | | |
| secure systems | | |
| and software are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 6.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 6. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 6, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **6.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 6 | operational | |
| are: | procedures identified | |
| | in Requirement 6 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 6 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, systems |
| | | will not be securely |
| | | maintained, and |
| | | their security level |
| | | will be reduced. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **6.1.2** Roles and | **6.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 6 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 6 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **6.1.2.b** Interview | |
| | personnel responsible | |
| | for performing | |
| | activities in | |
| | Requirement 6 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 6 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **6.2** Bespoke and | | |
| custom software are | | |
| developed securely. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without the |
| | | inclusion of |
| | | security during the |
| | | requirements |
| | | definition, design, |
| | | analysis, and |
| | | testing phases of |
| | | software |
| | | development, |
| | | security |
| | | vulnerabilities can |
| | | be inadvertently or |
| | | maliciously |
| | | introduced into the |
| | | production |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Understanding how |
| | | sensitive data is |
| | | handled by the |
| | | app |
| | | lication---including |
| | | when stored, |
| | | transmitted, and in |
| | | memory---can help |
| | | identify where data |
| | | needs to be |
| | | protected. |
| | | |
| | | PCI DSS requirements |
| | | must be considered |
| | | when developing |
| | | software to meet |
| | | those requirements |
| | | by design, rather |
| | | than trying to |
| | | retrofit the |
| | | software later. |
| | | |
| | | **Examples** |
| | | |
| | | Secure software |
| | | lifecycle management |
| | | methodologies and |
| | | frameworks include |
| | | PCI Software |
| | | Security Framework, |
| | | BSIMM, OPENSAMM, and |
| | | works from NIST, |
| | | ISO, and SAFECode. |
+-----------------------+-----------------------+----------------------+
| 1. Bespoke and | **6.2.1** Examine | |
| custom software | documented software | |
| are developed | development | |
| securely, as | procedures to verify | |
| follows: | that processes are | |
| | defined that include | |
| - Based on | all elements | |
| industry | specified in this | |
| standards | requirement. | |
| and/or best | | |
| practices for | | |
| secure | | |
| development. | | |
| | | |
| - In accordance | | |
| with PCI DSS | | |
| (for example, | | |
| secure | | |
| | | |
| authentication | | |
| and logging). | | |
| | | |
| - Incorporating | | |
| consideration | | |
| of | | |
| information | | |
| security | | |
| issues during | | |
| each stage of | | |
| the software | | |
| development | | |
| lifecycle. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Bespoke and custom | | |
| software is developed | | |
| in accordance with | | |
| PCI DSS and secure | | |
| development processes | | |
| throughout the | | |
| software lifecycle. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This applies to all | | |
| software developed | | |
| for or by the entity | | |
| for the entity's own | | |
| use. This includes | | |
| both bespoke and | | |
| custom software. This | | |
| does not apply to | | |
| third-party software. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Having staff |
| | | knowledgeable in |
| | | secure coding |
| | | methods, including |
| | | techniques defined |
| | | in Requirement |
| | | 6.2.4, will help |
| | | minimize the number |
| | | of security |
| | | vulnerabilities |
| | | introduced through |
| | | poor coding |
| | | practices. |
| | | |
| | | **Good Practice** |
| | | |
| | | Training for |
| | | developers may be |
| | | provided in-house or |
| | | by third parties. |
| | | |
| | | Training should |
| | | include, but is not |
| | | limited to, |
| | | development |
| | | languages in use, |
| | | secure software |
| | | design, secure |
| | | coding techniques, |
| | | use of |
| | | techniques/methods |
| | | for finding |
| | | vulnerabilities in |
| | | code, processes to |
| | | prevent |
| | | reintroducing |
| | | previously resolved |
| | | vulnerabilities, and |
| | | how to use any |
| | | automated security |
| | | testing tools for |
| | | detecting |
| | | vulnerabilities in |
| | | software. |
| | | |
| | | As industry-accepted |
| | | secure coding |
| | | practices change, |
| | | organizational |
| | | coding practices and |
| | | developer training |
| | | may need to be |
| | | updated to address |
| | | new threats. |
+-----------------------+-----------------------+----------------------+
| **6.2.2** Software | **6.2.2.a** Examine | |
| development personnel | software development | |
| working on bespoke | procedures to verify | |
| and custom software | that processes are | |
| are trained at least | defined for training | |
| once every 12 months | of software | |
| as follows: | development personnel | |
| | developing bespoke | |
| - On software | and custom software | |
| security relevant | that includes all | |
| to their job | elements specified in | |
| function and | this requirement. | |
| development | | |
| languages. | | |
| | | |
| - Including secure | | |
| software design | | |
| and secure coding | | |
| techniques. | | |
| | | |
| - Including, if | | |
| security testing | | |
| tools are used, | | |
| how to use the | | |
| tools for | | |
| detecting | | |
| vulnerabilities | | |
| in software. | | |
+-----------------------+-----------------------+----------------------+
| | **6.2.2.b** Examine | |
| | training records and | |
| | interview personnel | |
| | to verify that | |
| | software development | |
| | personnel working on | |
| | bespoke and custom | |
| | software received | |
| | software security | |
| | training that is | |
| | relevant to their job | |
| | function and | |
| | development languages | |
| | in accordance with | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Software development | | |
| personnel remain | | |
| knowledgeable about | | |
| secure development | | |
| practices; software | | |
| security; and attacks | | |
| against the | | |
| languages, | | |
| frameworks, or | | |
| applications they | | |
| develop. Personnel | | |
| are able to access | | |
| assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Security |
| | | vulnerabilities in |
| | | bespoke and custom |
| | | software are |
| | | commonly exploited |
| | | by malicious |
| | | individuals to gain |
| | | access to a network |
| | | and compromise |
| | | account data. |
| | | |
| | | Vulnerable code is |
| | | far more difficult |
| | | and expensive to |
| | | address after it has |
| | | been deployed or |
| | | released into |
| | | production |
| | | environments. |
| | | |
| | | Requiring a formal |
| | | review and signoff |
| | | by management prior |
| | | to release helps to |
| | | ensure that code is |
| | | approved and has |
| | | been developed in |
| | | accordance with |
| | | policies and |
| | | procedures. |
| | | |
| | | **Good Practice** |
| | | |
| | | The following items |
| | | should be considered |
| | | for inclusion in |
| | | code reviews: |
| | | |
| | | - Searching for |
| | | undocumented |
| | | features |
| | | (implant tools, |
| | | backdoors). |
| | | |
| | | - Confirming that |
| | | software |
| | | securely uses |
| | | external |
| | | components' |
| | | functions |
| | | (libraries, |
| | | frameworks, |
| | | APIs, etc.). For |
| | | example, if a |
| | | third-party |
| | | library |
| | | providing |
| | | cryptographic |
| | | functions is |
| | | used, verify |
| | | that it was |
| | | integrated |
| | | securely. |
| | | |
| | | - Checking for |
| | | correct use of |
| | | logging to |
| | | prevent |
| | | sensitive data |
| | | from getting |
| | | into logs. |
| | | |
| | | - Analysis of |
| | | insecure code |
| | | structures that |
| | | may contain |
| | | potential |
| | | vulnerabilities |
| | | related to |
| | | common software |
| | | attacks |
| | | identified in |
| | | Requirements |
| | | 6.2.5. |
| | | |
| | | - Checking the |
| | | application's |
| | | behavior to |
| | | detect logical |
| | | vulnerabilities. |
+-----------------------+-----------------------+----------------------+
| **6.2.3** Bespoke and | **6.2.3.a** Examine | |
| custom software is | documented software | |
| reviewed prior to | development | |
| being released into | procedures and | |
| production or to | interview responsible | |
| customers, to | personnel to verify | |
| identify and correct | that processes are | |
| potential coding | defined that require | |
| vulnerabilities, as | all bespoke and | |
| follows: | custom software to be | |
| | reviewed in | |
| - Code reviews | accordance with all | |
| ensure code is | elements specified in | |
| developed | this requirement. | |
| according to | | |
| secure coding | | |
| guidelines. | | |
| | | |
| - Code reviews look | | |
| for both existing | | |
| and emerging | | |
| software | | |
| vulnerabilities. | | |
| | | |
| - Appropriate | | |
| corrections are | | |
| implemented prior | | |
| to release. | | |
+-----------------------+-----------------------+----------------------+
| | **6.2.3.b** Examine | |
| | evidence of changes | |
| | to bespoke and custom | |
| | software to verify | |
| | that the code changes | |
| | were reviewed in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Bespoke and custom | | |
| software cannot be | | |
| exploited via coding | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement for | | |
| code reviews applies | | |
| to all bespoke and | | |
| custom software (both | | |
| internal and | | |
| public-facing), as | | |
| part of the system | | |
| development | | |
| lifecycle. | | |
| | | |
| Public-facing web | | |
| applications are also | | |
| subject to additional | | |
| controls, to address | | |
| ongoing threats and | | |
| vulnerabilities after | | |
| implementation, as | | |
| defined at PCI DSS | | |
| Requirement 6.4. | | |
| | | |
| Code reviews may be | | |
| performed using | | |
| either manual or | | |
| automated processes, | | |
| or a combination of | | |
| both. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Having code reviewed |
| | | by someone other |
| | | than the original |
| | | author, who is both |
| | | experienced in code |
| | | reviews and |
| | | knowledgeable about |
| | | secure coding |
| | | practices, minimizes |
| | | the possibility that |
| | | code containing |
| | | security or logic |
| | | errors that could |
| | | affect the security |
| | | of cardholder data |
| | | is released into a |
| | | production |
| | | environment. |
| | | Requiring management |
| | | approval that the |
| | | code was reviewed |
| | | limits the ability |
| | | for the process to |
| | | be bypassed. |
| | | |
| | | **Good Practice** |
| | | |
| | | Having a formal |
| | | review methodology |
| | | and review |
| | | checklists has been |
| | | found to improve the |
| | | quality of the code |
| | | review process. |
| | | |
| | | Code review is a |
| | | tiring process, and |
| | | for this reason, it |
| | | is most effective |
| | | when reviewers only |
| | | review small amounts |
| | | of code at a time. |
| | | |
| | | To maintain the |
| | | effectiveness of |
| | | code reviews, it is |
| | | beneficial to |
| | | monitor the general |
| | | workload of |
| | | reviewers and to |
| | | have them review |
| | | applications they |
| | | are familiar with. |
| | | |
| | | Code reviews may be |
| | | performed using |
| | | either manual or |
| | | automated processes, |
| | | or a combination of |
| | | both. |
| | | |
| | | Entitles that rely |
| | | solely on manual |
| | | code review should |
| | | ensure that |
| | | reviewers maintain |
| | | their skills through |
| | | regular training as |
| | | new vulnerabilities |
| | | are found, and new |
| | | secure coding |
| | | methods are |
| | | recommended. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See the *OWASP Code |
| | | Review Guide*. |
+-----------------------+-----------------------+----------------------+
| 1. If manual code | **6.2.3.1.a** If | |
| reviews are | manual code reviews | |
| performed for | are performed for | |
| bespoke and | bespoke and custom | |
| custom software | software prior to | |
| prior to release | release to | |
| to production, | production, examine | |
| code changes are: | documented software | |
| | development | |
| - Reviewed by | procedures and | |
| individuals | interview responsible | |
| other than | personnel to verify | |
| the | that processes are | |
| originating | defined for manual | |
| code author, | code reviews to be | |
| and who are | conducted in | |
| knowledgeable | accordance with all | |
| about | elements specified in | |
| code-review | this requirement. | |
| techniques | | |
| and secure | | |
| coding | | |
| practices. | | |
| | | |
| - Reviewed and | | |
| approved by | | |
| management | | |
| prior to | | |
| release. | | |
+-----------------------+-----------------------+----------------------+
| | **6.2.3.1.b** Examine | |
| | evidence of changes | |
| | to bespoke and custom | |
| | software and | |
| | interview personnel | |
| | to verify that manual | |
| | code reviews were | |
| | conducted in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The manual code | | |
| review process cannot | | |
| be bypassed and is | | |
| effective at | | |
| discovering security | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Manual code reviews | | |
| can be conducted by | | |
| knowledgeable | | |
| internal personnel or | | |
| knowledgeable | | |
| third-party | | |
| personnel. | | |
| | | |
| An individual that | | |
| has been formally | | |
| granted | | |
| accountability for | | |
| release control and | | |
| who is neither the | | |
| original code author | | |
| nor the code reviewer | | |
| fulfills the criteria | | |
| of being management. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Detecting or |
| | | preventing common |
| | | errors that result |
| | | in vulnerable code |
| | | as early as possible |
| | | in the software |
| | | development process |
| | | lowers the |
| | | probability that |
| | | such errors make it |
| | | through to |
| | | production and lead |
| | | to a compromise. |
| | | Having formal |
| | | engineering |
| | | techniques and tools |
| | | embedded in the |
| | | development process |
| | | will catch these |
| | | errors early. This |
| | | philosophy is |
| | | sometimes called |
| | | "shifting security |
| | | left." |
| | | |
| | | **Good Practice** |
| | | |
| | | For both bespoke and |
| | | custom software, the |
| | | entity must ensure |
| | | that code is |
| | | developed focusing |
| | | on the prevention or |
| | | mitigation of common |
| | | software attacks, |
| | | including: |
| | | |
| | | - Attempts to |
| | | exploit common |
| | | coding |
| | | vulnerabilities |
| | | (bugs). |
| | | |
| | | - Attempts to |
| | | exploit software |
| | | design flaws. |
| | | |
| | | - Attempts to |
| | | exploit |
| | | implemen |
| | | tation/configuration |
| | | flaws. |
| | | |
| | | - Enumeration |
| | | attacks -- |
| | | automated |
| | | attacks that are |
| | | actively |
| | | exploited in |
| | | payments and |
| | | abuse |
| | | identification, |
| | | authentication, |
| | | or authorization |
| | | mechanisms. See |
| | | the *PCI |
| | | Perspectives |
| | | blog article |
| | | "Beware of |
| | | Account Testing |
| | | Attacks*." |
| | | |
| | | Researching and |
| | | documenting software |
| | | engineering |
| | | techniques or other |
| | | methods helps to |
| | | define how software |
| | | developers prevent |
| | | or mitigate various |
| | | software attacks by |
| | | features or |
| | | countermeasures they |
| | | build into software. |
| | | This might include |
| | | identific |
| | | ation/authentication |
| | | mechanisms, access |
| | | control, input |
| | | validation routines, |
| | | etc. Developers |
| | | should be familiar |
| | | with different types |
| | | of vulnerabilities |
| | | and potential |
| | | attacks and use |
| | | measures to avoid |
| | | potential attack |
| | | vectors when |
| | | developing code. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **6.2.4** Software | **6.2.4** Examine | |
| engineering | documented procedures | |
| techniques or other | and interview | |
| methods are defined | responsible software | |
| and in use by | development personnel | |
| software development | to verify that | |
| personnel to prevent | software engineering | |
| or mitigate common | techniques or other | |
| software attacks and | methods are defined | |
| related | and in use by | |
| vulnerabilities in | developers of bespoke | |
| bespoke and custom | and custom software | |
| software, including | to prevent or | |
| but not limited to | mitigate all common | |
| the following: | software attacks as | |
| | specified in this | |
| - Injection | requirement. | |
| attacks, | | |
| including SQL, | | |
| LDAP, XPath, or | | |
| other command, | | |
| parameter, | | |
| object, fault, or | | |
| injection-type | | |
| flaws. | | |
| | | |
| - Attacks on data | | |
| and data | | |
| structures, | | |
| including | | |
| attempts to | | |
| manipulate | | |
| buffers, | | |
| pointers, input | | |
| data, or shared | | |
| data. | | |
| | | |
| - Attacks on | | |
| cryptography | | |
| usage, including | | |
| attempts to | | |
| exploit weak, | | |
| insecure, or | | |
| inappropriate | | |
| cryptographic | | |
| implementations, | | |
| algorithms, | | |
| cipher suites, or | | |
| modes of | | |
| operation. | | |
| | | |
| - Attacks on | | |
| business logic, | | |
| including | | |
| attempts to abuse | | |
| or bypass | | |
| application | | |
| features and | | |
| functionalities | | |
| through the | | |
| manipulation of | | |
| APIs, | | |
| communication | | |
| protocols and | | |
| channels, client- | | |
| side | | |
| functionality, or | | |
| other | | |
| | | |
| system/application | | |
| functions and | | |
| resources. This | | |
| includes | | |
| cross-site | | |
| scripting (XSS) | | |
| and cross-site | | |
| request forgery | | |
| (CSRF). | | |
| | | |
| - Attacks on access | | |
| control | | |
| mechanisms, | | |
| including | | |
| attempts to | | |
| bypass or abuse | | |
| identification, | | |
| authentication, | | |
| or authorization | | |
| mechanisms, or | | |
| attempts to | | |
| exploit | | |
| weaknesses in the | | |
| implementation of | | |
| such mechanisms. | | |
| | | |
| - Attacks via any | | |
| "high-risk" | | |
| vulnerabilities | | |
| identified in the | | |
| vulnerability | | |
| identification | | |
| process, as | | |
| defined in | | |
| Requirement | | |
| 6.3.1. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Customized Approach | | **Examples** |
| Objective** | | |
| | | Techniques include |
| | | automated processes |
| | | and practices that |
| | | scan code early in |
| | | the development |
| | | cycle when code is |
| | | checked in to |
| | | confirm the |
| | | vulnerabilities are |
| | | not present. |
+-----------------------+-----------------------+----------------------+
| Bespoke and custom | | |
| software cannot be | | |
| exploited via common | | |
| attacks and related | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This applies to all | | |
| software developed | | |
| for or by the entity | | |
| for the entity's own | | |
| use. This includes | | |
| both bespoke and | | |
| custom software. This | | |
| does not apply to | | |
| third-party software. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **6.3** Security | | |
| vulnerabilities are | | |
| identified and | | |
| addressed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Classifying the |
| | | risks (for example, |
| | | as critical, high, |
| | | medium, or low) |
| | | allows organizations |
| | | to identify, |
| | | prioritize, and |
| | | address the highest |
| | | risk items more |
| | | quickly and reduce |
| | | the likelihood that |
| | | vulnerabilities |
| | | posing the greatest |
| | | risk will be |
| | | exploited. |
| | | |
| | | **Good Practice** |
| | | |
| | | Methods for |
| | | evaluating |
| | | vulnerabilities and |
| | | assigning risk |
| | | ratings will vary |
| | | based on an |
| | | organization's |
| | | environment and |
| | | risk-assessment |
| | | strategy. |
| | | |
| | | When an entity is |
| | | assigning its risk |
| | | rankings, it should |
| | | consider using a |
| | | formal, objective, |
| | | justifiable |
| | | methodology that |
| | | accurately portrays |
| | | the risks of the |
| | | vulnerabilities |
| | | pertinent to the |
| | | organization and |
| | | translates to an |
| | | appropriate |
| | | entity-assigned |
| | | priority for |
| | | resolution. |
| | | |
| | | An organization's |
| | | processes for |
| | | managing |
| | | vulnerabilities |
| | | should be integrated |
| | | with other |
| | | management |
| | | processes---for |
| | | example, risk |
| | | management, change |
| | | management, patch |
| | | management, incident |
| | | response, |
| | | application |
| | | security, as well as |
| | | proper monitoring |
| | | and logging of these |
| | | processes. This will |
| | | help to ensure all |
| | | vulnerabilities are |
| | | properly identified |
| | | and addressed. |
| | | Processes should |
| | | support ongoing |
| | | evaluation of |
| | | vulnerabilities. For |
| | | example, a |
| | | vulnerability |
| | | initially identified |
| | | as low risk could |
| | | become a higher risk |
| | | later. Additionally, |
| | | vulnerabilities, |
| | | individually |
| | | considered to be low |
| | | or medium risk, |
| | | could collectively |
| | | pose a high or |
| | | critical risk if |
| | | present on the same |
| | | system, or if |
| | | exploited on a |
| | | low-risk system that |
| | | could result in |
| | | access to the CDE. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. Security | **6.3.1.a** Examine | |
| vulnerabilities | policies and | |
| are identified | procedures for | |
| and managed as | identifying and | |
| follows: | managing security | |
| | vulnerabilities to | |
| - New security | verify that processes | |
| | are defined in | |
| vulnerabilities | accordance with all | |
| are | elements specified in | |
| identified | this requirement. | |
| using | | |
| | | |
| industry-recognized | | |
| sources for | | |
| security | | |
| vulnerability | | |
| information, | | |
| including | | |
| alerts from | | |
| international | | |
| and national | | |
| computer | | |
| emergency | | |
| response | | |
| teams | | |
| (CERTs). | | |
| | | |
| | | |
| - Vulnerabilities | | |
| are assigned | | |
| a risk | | |
| ranking based | | |
| on industry | | |
| best | | |
| practices and | | |
| consideration | | |
| of potential | | |
| impact. | | |
| | | |
| - Risk rankings | | |
| identify, at | | |
| a minimum, | | |
| all | | |
| | | |
| vulnerabilities | | |
| considered to | | |
| be a | | |
| high-risk or | | |
| critical to | | |
| the | | |
| environment. | | |
| | | |
| | | |
| - Vulnerabilities | | |
| for bespoke | | |
| and custom, | | |
| and | | |
| third-party | | |
| software (for | | |
| example | | |
| operating | | |
| systems and | | |
| databases) | | |
| are covered. | | |
+-----------------------+-----------------------+----------------------+
| | **6.3.1.b** Interview | |
| | responsible | |
| | personnel, examine | |
| | documentation, and | |
| | observe processes to | |
| | verify that security | |
| | vulnerabilities are | |
| | identified and | |
| | managed in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| New system and | | |
| software | | |
| vulnerabilities that | | |
| may impact the | | |
| security of account | | |
| data or the CDE are | | |
| monitored, cataloged, | | |
| and risk assessed. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not achieved by, nor | | |
| is it the same as, | | |
| vulnerability scans | | |
| performed for | | |
| Requirements 11.3.1 | | |
| and 11.3.2. This | | |
| requirement is for a | | |
| process to actively | | |
| monitor industry | | |
| sources for | | |
| vulnerability | | |
| information and for | | |
| the entity to | | |
| determine the risk | | |
| ranking to be | | |
| associated with each | | |
| vulnerability. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Examples** |
| | | |
| | | Some organizations |
| | | that issue alerts to |
| | | advise entities |
| | | about urgent |
| | | vulnerabilities |
| | | requiring immediate |
| | | patches/updates are |
| | | national Computer |
| | | Emergency |
| | | Readiness/Response |
| | | Teams (CERTs) and |
| | | vendors. |
| | | |
| | | Criteria for ranking |
| | | vulnerabilities may |
| | | include criticality |
| | | of a vulnerability |
| | | identified in an |
| | | alert from Forum of |
| | | Incident Response |
| | | and Security Teams |
| | | (FIRST) or a CERT, |
| | | consideration of the |
| | | CVSS score, the |
| | | classification by |
| | | the vendor, and/or |
| | | type of systems |
| | | affected. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Trustworthy sources |
| | | for vulnerability |
| | | information include |
| | | vendor websites, |
| | | industry newsgroups, |
| | | mailing lists, etc. |
| | | If software is |
| | | developed in- house, |
| | | the internal |
| | | development team |
| | | should also consider |
| | | sources of |
| | | information about |
| | | new vulnerabilities |
| | | that may affect |
| | | internally developed |
| | | applications. Other |
| | | methods to ensure |
| | | new vulnerabilities |
| | | are identified |
| | | include solutions |
| | | that automatically |
| | | recognize and alert |
| | | upon detection of |
| | | unusual behavior. |
| | | Processes should |
| | | account for widely |
| | | published exploits |
| | | as well as |
| | | "zero-day" attacks, |
| | | which target |
| | | previously unknown |
| | | vulnerabilities. |
| | | |
| | | For bespoke and |
| | | custom software, the |
| | | organization may |
| | | obtain information |
| | | about libraries, |
| | | frameworks, |
| | | compilers, |
| | | programming |
| | | languages, etc. from |
| | | public trusted |
| | | sources (for |
| | | example, special |
| | | resources and |
| | | resources from |
| | | component |
| | | developers). The |
| | | organization may |
| | | also independently |
| | | analyze third-party |
| | | components and |
| | | identify |
| | | vulnerabilities. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
------------------------------------------------------------------------
**Requirements and **Guidance**
Testing Procedures**
------------------------ ----------------------- -----------------------
For control over
in-house developed
software, the
organization may
receive such
information from
external sources. The
organization can
consider using a "bug
bounty" program where
it posts information
(for example, on its
website) so third
parties can contact the
organization with
vulnerability
information. External
sources may include
independent
investigators or
companies that report
to the organization
about identified
vulnerabilities and may
include sources such as
the Common
Vulnerability Scoring
System (CVSS) or the
OWASP Risk Rating
Methodology.
------------------------------------------------------------------------
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Identifying and |
| | | listing all the |
| | | entity's bespoke and |
| | | custom software, and |
| | | any third-party |
| | | software that is |
| | | incorporated into |
| | | the entity's bespoke |
| | | and custom software |
| | | enables the entity |
| | | to manage |
| | | vulnerabilities and |
| | | patches. |
| | | |
| | | Vulnerabilities in |
| | | third-party |
| | | components |
| | | (including |
| | | libraries, APIs, |
| | | etc.) embedded in an |
| | | entity's software |
| | | also renders those |
| | | applications |
| | | vulnerable to |
| | | attacks. Knowing |
| | | which third-party |
| | | components are used |
| | | in the entity's |
| | | software and |
| | | monitoring the |
| | | availability of |
| | | security patches to |
| | | address known |
| | | vulnerabilities is |
| | | critical to ensuring |
| | | the security of the |
| | | software. |
| | | |
| | | **Good Practice** |
| | | |
| | | An entity's |
| | | inventory should |
| | | cover all payment |
| | | software components |
| | | and dependencies, |
| | | including supported |
| | | execution platforms |
| | | or environments, |
| | | third-party |
| | | libraries, services, |
| | | and other required |
| | | functionalities. |
| | | |
| | | There are many |
| | | different types of |
| | | solutions that can |
| | | help with managing |
| | | software |
| | | inventories, such as |
| | | software composition |
| | | analysis tools, |
| | | application |
| | | discovery tools, and |
| | | mobile device |
| | | management. |
+-----------------------+-----------------------+----------------------+
| **6.3.2** An | **6.3.2.a** Examine | |
| inventory of bespoke | documentation and | |
| and custom software, | interview personnel | |
| and third-party | to verify that an | |
| software components | inventory of bespoke | |
| incorporated into | and custom software | |
| bespoke and custom | and third-party | |
| software is | software components | |
| maintained to | incorporated into | |
| facilitate | bespoke and custom | |
| vulnerability and | software is | |
| patch management. | maintained, and that | |
| | the inventory is used | |
| | to identify and | |
| | address | |
| | vulnerabilities. | |
+-----------------------+-----------------------+----------------------+
| | **6.3.2.b** Examine | |
| | software | |
| | documentation, | |
| | including for bespoke | |
| | and custom software | |
| | that integrates | |
| | third-party software | |
| | components, and | |
| | compare it to the | |
| | inventory to verify | |
| | that the inventory | |
| | includes the bespoke | |
| | and custom software | |
| | and third-party | |
| | software components. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Known vulnerabilities | | |
| in third-party | | |
| software components | | |
| cannot be exploited | | |
| in bespoke and custom | | |
| software. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | New exploits are |
| | | constantly being |
| | | discovered, and |
| | | these can permit |
| | | attacks against |
| | | systems that have |
| | | previously been |
| | | considered secure. |
| | | If the most recent |
| | | security |
| | | patches/updates are |
| | | not implemented on |
| | | critical systems as |
| | | soon as possible, a |
| | | malicious actor can |
| | | use these exploits |
| | | to attack or disable |
| | | a system or gain |
| | | access to sensitive |
| | | data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Prioritizing |
| | | security |
| | | patches/updates for |
| | | critical |
| | | infrastructure |
| | | ensures that |
| | | high-priority |
| | | systems and devices |
| | | are protected from |
| | | vulnerabilities as |
| | | soon as possible |
| | | after a patch is |
| | | released. |
| | | |
| | | An entity's patching |
| | | cadence should |
| | | factor in any |
| | | re-evaluation of |
| | | vulnerabilities and |
| | | subsequent changes |
| | | in the criticality |
| | | of a vulnerability |
| | | per Requirement |
| | | 6.3.1. For example, |
| | | a vulnerability |
| | | initially identified |
| | | as low risk could |
| | | become a higher risk |
| | | later. Additionally, |
| | | vulnerabilities |
| | | individually |
| | | considered to be low |
| | | or medium risk could |
| | | collectively pose a |
| | | high or critical |
| | | risk if present on |
| | | the same system, or |
| | | if exploited on a |
| | | low-risk system that |
| | | could result in |
| | | access to the CDE. |
+-----------------------+-----------------------+----------------------+
| **6.3.3** All system | **6.3.3.a** Examine | |
| components are | policies and | |
| protected from known | procedures to verify | |
| vulnerabilities by | processes are defined | |
| installing applicable | for addressing | |
| security | vulnerabilities by | |
| patches/updates as | installing applicable | |
| follows: | security | |
| | patches/updates in | |
| - Critical or | accordance with all | |
| high-security | elements specified in | |
| patches/updates | this requirement. | |
| (identified | | |
| according to the | | |
| risk ranking | | |
| process at | | |
| Requirement | | |
| 6.3.1) are | | |
| installed within | | |
| one month of | | |
| release. | | |
| | | |
| - All other | | |
| applicable | | |
| security | | |
| patches/updates | | |
| are installed | | |
| within an | | |
| appropriate time | | |
| frame as | | |
| determined by the | | |
| entity (for | | |
| example, within | | |
| three months of | | |
| release). | | |
+-----------------------+-----------------------+----------------------+
| | **6.3.3.b** Examine | |
| | system components and | |
| | related software and | |
| | compare the list of | |
| | installed security | |
| | patches/updates to | |
| | the most recent | |
| | security patch/update | |
| | information to verify | |
| | vulnerabilities are | |
| | addressed in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components | | |
| cannot be compromised | | |
| via the exploitation | | |
| of a known | | |
| vulnerability. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **6.4** Public-facing | | |
| web applications are | | |
| protected against | | |
| attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Public-facing web |
| | | applications are |
| | | those that are |
| | | available to the |
| | | public (not only for |
| | | internal use). These |
| | | applications are |
| | | primary targets for |
| | | attackers, and |
| | | poorly coded web |
| | | applications provide |
| | | an easy path for |
| | | attackers to gain |
| | | access to sensitive |
| | | data and systems. |
| | | |
| | | **Good Practice** |
| | | |
| | | Manual or automated |
| | | vulnerability |
| | | security assessment |
| | | tools or methods |
| | | review and/or test |
| | | the application for |
| | | vulnerabilities. |
| | | |
| | | Common assessment |
| | | tools include |
| | | specialized web |
| | | scanners that |
| | | perform automatic |
| | | analysis of web |
| | | application |
| | | protection. |
| | | |
| | | When using automated |
| | | technical solutions, |
| | | it is important to |
| | | include processes |
| | | that facilitate |
| | | timely responses to |
| | | alerts generated by |
| | | the solutions so |
| | | that any detected |
| | | attacks can be |
| | | mitigated. |
| | | |
| | | **Examples** |
| | | |
| | | A web application |
| | | firewall (WAF) |
| | | installed in front |
| | | of public-facing web |
| | | applications to |
| | | check all traffic is |
| | | an example of an |
| | | automated technical |
| | | solution that |
| | | detects and prevents |
| | | web-based attacks |
| | | (for example, the |
| | | attacks included in |
| | | Requirement 6.2.4). |
| | | WAFs filter and |
| | | block non- essential |
| | | traffic at the |
| | | application layer. A |
| | | properly configured |
| | | WAF helps to prevent |
| | | application-layer |
| | | attacks on |
| | | applications that |
| | | are improperly coded |
| | | or configured. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. For public-facing | 1. For public-facing | |
| web applications, | web applications, | |
| new threats and | ensure that | |
| vulnerabilities | either one of the | |
| are addressed on | required methods | |
| an ongoing basis | is in place as | |
| and these | follows: | |
| applications are | | |
| protected against | - If manual or | |
| known attacks as | automated | |
| follows: | vulnerability | |
| | security | |
| - Reviewing | assessment | |
| public-facing | tools or | |
| web | methods are | |
| applications | in use, | |
| via manual or | examine | |
| automated | documented | |
| application | processes, | |
| vulnerability | interview | |
| security | personnel, | |
| assessment | and examine | |
| tools or | records of | |
| methods as | application | |
| follows: | security | |
| | assessments | |
| - At least | to verify | |
| once | that | |
| every 12 | public-facing | |
| months | web | |
| and after | applications | |
| | are reviewed | |
| significant | in accordance | |
| changes. | with all | |
| | elements of | |
| - By an | this | |
| entity | requirement | |
| that | specific to | |
| | the | |
| specializes | tool/method. | |
| in | | |
| | **OR** | |
| application | | |
| security. | - If an automated | |
| | technical | |
| | solution(s) is | |
| - Including, | installed that | |
| at a | continually | |
| minimum, | detects and | |
| all | prevents web- | |
| common | based attacks, | |
| software | examine the | |
| attacks | system | |
| in | configuration | |
| | settings and | |
| Requirement | audit logs, and | |
| 6.2.4. | interview | |
| | responsible | |
| - All | personnel to | |
| | verify that the | |
| vulnerabilities | automated | |
| are | technical | |
| ranked in | solution(s) is | |
| | installed in | |
| accordance | accordance with | |
| with | all elements of | |
| | this requirement | |
| requirement | specific to the | |
| 6.3.1. | solution(s). | |
| | | |
| - All | | |
| | | |
| vulnerabilities | | |
| are | | |
| | | |
| corrected. | | |
| | | |
| - The | | |
| | | |
| application | | |
| is | | |
| | | |
| re-evaluated | | |
| after the | | |
| | | |
| corrections | | |
| | | |
| **OR** | | |
| | | |
| - Installing an | | |
| automated | | |
| technical | | |
| solution(s) that | | |
| continually | | |
| detects and | | |
| prevents | | |
| web-based attacks | | |
| as follows: | | |
| | | |
| - Installed in | | |
| front of | | |
| public-facing | | |
| web | | |
| applications | | |
| to detect and | | |
| prevent web- | | |
| based | | |
| attacks. | | |
| | | |
| - Actively | | |
| running and | | |
| up to date as | | |
| applicable. | | |
| | | |
| - Generating | | |
| audit logs. | | |
| | | |
| - Configured to | | |
| either block | | |
| web-based | | |
| attacks or | | |
| generate an | | |
| alert that is | | |
| immediately | | |
| investigated. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Customized Approach | | Another example of |
| Objective** | | an automated |
| | | technical solution |
| | | is Runtime |
| | | Application |
| | | Self-Protection |
| | | (RASP) technologies. |
| | | When implemented |
| | | correctly, RASP |
| | | solutions can detect |
| | | and block anomalous |
| | | behavior by the |
| | | software during |
| | | execution. While |
| | | WAFs typically |
| | | monitor the |
| | | application |
| | | perimeter, RASP |
| | | solutions monitor |
| | | and block behavior |
| | | within the |
| | | application. |
+-----------------------+-----------------------+----------------------+
| Public-facing web | | |
| applications are | | |
| protected against | | |
| malicious attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This assessment is | | |
| not the same as the | | |
| vulnerability scans | | |
| performed for | | |
| Requirement 11.3.1 | | |
| and 11.3.2. | | |
| | | |
| This requirement will | | |
| be superseded by | | |
| Requirement 6.4.2 | | |
| after 31 March 2025 | | |
| when Requirement | | |
| 6.4.2 becomes | | |
| effective. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Public-facing web |
| | | applications are |
| | | primary targets for |
| | | attackers, and |
| | | poorly coded web |
| | | applications provide |
| | | an easy path for |
| | | attackers to gain |
| | | access to sensitive |
| | | data and systems. |
| | | |
| | | **Good Practice** |
| | | |
| | | When using automated |
| | | technical solutions, |
| | | it is important to |
| | | include processes |
| | | that facilitate |
| | | timely responses to |
| | | alerts generated by |
| | | the solutions so |
| | | that any detected |
| | | attacks can be |
| | | mitigated. Such |
| | | solutions may also |
| | | be used to automate |
| | | mitigation, for |
| | | example |
| | | rate-limiting |
| | | controls, which can |
| | | be implemented to |
| | | mitigate against |
| | | brute-force attacks |
| | | and enumeration |
| | | attacks. |
| | | |
| | | **Examples** |
| | | |
| | | A web application |
| | | firewall (WAF), |
| | | which can be either |
| | | on-premise or |
| | | cloud-based, |
| | | installed in front |
| | | of public-facing web |
| | | applications to |
| | | check all traffic, |
| | | is an example of an |
| | | automated technical |
| | | solution that |
| | | detects and prevents |
| | | web-based attacks |
| | | (for example, the |
| | | attacks included in |
| | | Requirement 6.2.4). |
| | | WAFs filter and |
| | | block non- essential |
| | | traffic at the |
| | | application layer. A |
| | | properly configured |
| | | WAF helps to prevent |
| | | application-layer |
| | | attacks on |
| | | applications that |
| | | are improperly coded |
| | | or configured. |
+-----------------------+-----------------------+----------------------+
| **6.4.2** For | **6.4.2** For | |
| public-facing web | public-facing web | |
| applications, an | applications, examine | |
| automated technical | the system | |
| solution is deployed | configuration | |
| that continually | settings and audit | |
| detects and prevents | logs, and interview | |
| web-based attacks, | responsible personnel | |
| with at least the | to verify that an | |
| following: | automated technical | |
| | solution that detects | |
| - Is installed in | and prevents | |
| front of | web-based attacks is | |
| public-facing web | in place in | |
| applications and | accordance with all | |
| is configured to | elements specified in | |
| detect and | this requirement. | |
| prevent web-based | | |
| attacks. | | |
| | | |
| - Actively running | | |
| and up to date as | | |
| applicable. | | |
| | | |
| - Generating audit | | |
| logs. | | |
| | | |
| - Configured to | | |
| either block | | |
| web-based attacks | | |
| or generate an | | |
| alert that is | | |
| immediately | | |
| investigated. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Public-facing web | | |
| applications are | | |
| protected in real | | |
| time against | | |
| malicious attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This new requirement | | |
| will replace | | |
| Requirement | | |
| | | |
| 6.4.1 once its | | |
| effective date is | | |
| reached. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Scripts loaded and |
| | | executed in the |
| | | payment page can |
| | | have their |
| | | functionality |
| | | altered without the |
| | | entity's knowledge |
| | | and can also have |
| | | the functionality to |
| | | load additional |
| | | external scripts |
| | | (for example, |
| | | advertising and |
| | | tracking, tag |
| | | management systems). |
| | | |
| | | Such seemingly |
| | | harmless scripts can |
| | | be used by potential |
| | | attackers to upload |
| | | malicious scripts |
| | | that can read and |
| | | exfiltrate |
| | | cardholder data from |
| | | the consumer |
| | | browser. |
| | | |
| | | Ensuring that the |
| | | functionality of all |
| | | such scripts is |
| | | understood to be |
| | | necessary for the |
| | | operation of the |
| | | payment page |
| | | minimizes the number |
| | | of scripts that |
| | | could be tampered |
| | | with. |
| | | |
| | | Ensuring that |
| | | scripts have been |
| | | explicitly |
| | | authorized reduces |
| | | the probability of |
| | | unnecessary scripts |
| | | being added to the |
| | | payment page without |
| | | appropriate |
| | | management approval. |
| | | |
| | | Using techniques to |
| | | prevent tampering |
| | | with the script will |
| | | minimize the |
| | | probability of the |
| | | script being |
| | | modified to carry |
| | | out unauthorized |
| | | behavior, such as |
| | | skimming the |
| | | cardholder data from |
| | | the payment page. |
| | | |
| | | **Good Practice** |
| | | |
| | | Scripts may be |
| | | authorized by manual |
| | | or automated (e.g., |
| | | workflow) processes. |
| | | |
| | | Where the payment |
| | | page will be loaded |
| | | into an inline frame |
| | | (IFRAME), |
| | | restricting the |
| | | location that the |
| | | payment page can be |
| | | loaded from, using |
| | | the parent page's |
| | | Content Security |
| | | Policy (CSP) can |
| | | help prevent |
| | | unauthorized content |
| | | being substituted |
| | | for the payment |
| | | page. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **6.4.3** All payment | **6.4.3.a** Examine | |
| page scripts that are | policies and | |
| loaded and executed | procedures to verify | |
| in the consumer's | that processes are | |
| browser are managed | defined for managing | |
| as follows: | all payment page | |
| | scripts that are | |
| - A method is | loaded and executed | |
| implemented to | in the consumer's | |
| confirm that each | browser, in | |
| script is | accordance with all | |
| authorized. | elements specified in | |
| | this requirement. | |
| - A method is | | |
| implemented to | | |
| assure the | | |
| integrity of each | | |
| script. | | |
| | | |
| - An inventory of | | |
| all scripts is | | |
| maintained with | | |
| written | | |
| justification as | | |
| to why each is | | |
| necessary. | | |
+-----------------------+-----------------------+----------------------+
| | **6.4.3.b** Interview | |
| | responsible personnel | |
| | and examine inventory | |
| | records and system | |
| | configurations to | |
| | verify that all | |
| | payment page scripts | |
| | that are loaded and | |
| | executed in the | |
| | consumer's browser | |
| | are managed in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized code | | |
| cannot be present in | | |
| the payment page as | | |
| it is rendered in the | | |
| consumer's browser. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to all | | |
| scripts loaded from | | |
| the entity's | | |
| environment and | | |
| scripts loaded from | | |
| third and fourth | | |
| parties. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Definitions** |
| | | |
| | | "Necessary" for this |
| | | requirement means |
| | | that the entity's |
| | | review of each |
| | | script justifies and |
| | | confirms why it is |
| | | needed for the |
| | | functionality of the |
| | | payment page to |
| | | accept a payment |
| | | transaction. |
| | | |
| | | **Examples** |
| | | |
| | | The integrity of |
| | | scripts can be |
| | | enforced by several |
| | | different mechanisms |
| | | including, but not |
| | | limited to: |
| | | |
| | | - Sub-resource |
| | | integrity (SRI), |
| | | which allows the |
| | | consumer browser |
| | | to validate that |
| | | a script has not |
| | | been tampered |
| | | with. |
| | | |
| | | - A CSP, which |
| | | limits the |
| | | locations the |
| | | consumer browser |
| | | can load a |
| | | script from and |
| | | transmit account |
| | | data to. |
| | | |
| | | - Proprietary |
| | | script or |
| | | tag-management |
| | | systems, which |
| | | can prevent |
| | | malicious script |
| | | execution. |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **6.5** Changes to | | |
| all system components | | |
| are managed securely. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Change management |
| | | procedures must be |
| | | applied to all |
| | | changes---including |
| | | the addition, |
| | | removal, or |
| | | modification of any |
| | | system |
| | | component---in the |
| | | production |
| | | environment. It is |
| | | important to |
| | | document the reason |
| | | for a change and the |
| | | change description |
| | | so that relevant |
| | | parties understand |
| | | and agree the change |
| | | is needed. Likewise, |
| | | documenting the |
| | | impacts of the |
| | | change allows all |
| | | affected parties to |
| | | plan appropriately |
| | | for any processing |
| | | changes. |
| | | |
| | | **Good Practice** |
| | | |
| | | Approval by |
| | | authorized parties |
| | | confirms that the |
| | | change is legitimate |
| | | and that the change |
| | | is sanctioned by the |
| | | organization. |
| | | Changes should be |
| | | approved by |
| | | individuals with the |
| | | appropriate |
| | | authority and |
| | | knowledge to |
| | | understand the |
| | | impact of the |
| | | change. |
| | | |
| | | Thorough testing by |
| | | the entity confirms |
| | | that the security of |
| | | the environment is |
| | | not reduced by |
| | | implementing a |
| | | change and that all |
| | | existing security |
| | | controls either |
| | | remain in place or |
| | | are replaced with |
| | | equal or stronger |
| | | security controls |
| | | after the change. |
| | | The specific testing |
| | | to be performed will |
| | | vary according to |
| | | the type of change |
| | | and system |
| | | component(s) |
| | | affected. |
| | | |
| | | For each change, it |
| | | is important to have |
| | | documented |
| | | procedures that |
| | | address any failures |
| | | and provide |
| | | instructions on how |
| | | to return to a |
| | | secure state in case |
| | | the change fails or |
| | | adversely affects |
| | | the security of an |
| | | application or |
| | | system. |
| | | |
| | | These procedures |
| | | will allow the |
| | | application or |
| | | system to be |
| | | restored to its |
| | | previous secure |
| | | state. |
+-----------------------+-----------------------+----------------------+
| 1. Changes to all | **6.5.1.a** Examine | |
| system components | documented change | |
| in the production | control procedures to | |
| environment are | verify procedures are | |
| made according to | defined for changes | |
| established | to all system | |
| procedures that | components in the | |
| include: | production | |
| | environment to | |
| - Reason for, | include all elements | |
| and | specified in this | |
| description | requirement. | |
| of, the | | |
| change. | | |
| | | |
| - Documentation | | |
| of security | | |
| impact. | | |
| | | |
| - Documented | | |
| change | | |
| approval by | | |
| authorized | | |
| parties. | | |
| | | |
| - Testing to | | |
| verify that | | |
| the change | | |
| does not | | |
| adversely | | |
| impact system | | |
| security. | | |
| | | |
| - For bespoke | | |
| and custom | | |
| software | | |
| changes, all | | |
| updates are | | |
| tested for | | |
| compliance | | |
| with | | |
| Requirement | | |
| 6.2.4 before | | |
| being | | |
| deployed into | | |
| production. | | |
| | | |
| - Procedures to | | |
| address | | |
| failures and | | |
| return to a | | |
| secure state. | | |
+-----------------------+-----------------------+----------------------+
| | **6.5.1.b** Examine | |
| | recent changes to | |
| | system components and | |
| | trace those changes | |
| | back to related | |
| | change control | |
| | documentation. For | |
| | each change examined, | |
| | verify the change is | |
| | implemented in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All changes are | | |
| tracked, authorized, | | |
| and evaluated for | | |
| impact and security, | | |
| and changes are | | |
| managed to avoid | | |
| unintended effects to | | |
| the security of | | |
| system components. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Having processes to |
| | | analyze significant |
| | | changes helps ensure |
| | | that all appropriate |
| | | PCI DSS controls are |
| | | applied to any |
| | | systems or networks |
| | | added or changed |
| | | within the in-scope |
| | | environment, and |
| | | that PCI DSS |
| | | requirements |
| | | continue to be met |
| | | to secure the |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Building this |
| | | validation into |
| | | change management |
| | | processes helps |
| | | ensure that device |
| | | inventories and |
| | | configuration |
| | | standards are kept |
| | | up to date and |
| | | security controls |
| | | are applied where |
| | | needed. |
| | | |
| | | **Examples** |
| | | |
| | | Applicable PCI DSS |
| | | requirements that |
| | | could be impacted |
| | | include, but are not |
| | | limited to: |
| | | |
| | | - Network and |
| | | data-flow |
| | | diagrams are |
| | | updated to |
| | | reflect changes. |
| | | |
| | | - Systems are |
| | | configured per |
| | | configuration |
| | | standards, with |
| | | all default |
| | | passwords |
| | | changed and |
| | | unnecessary |
| | | services |
| | | disabled. |
| | | |
| | | - Systems are |
| | | protected with |
| | | required |
| | | controls---for |
| | | example, file |
| | | integrity |
| | | monitoring |
| | | (FIM), |
| | | anti-malware, |
| | | patches, and |
| | | audit logging. |
| | | |
| | | - Sensitive |
| | | authentication |
| | | data is not |
| | | stored, and all |
| | | account data |
| | | storage is |
| | | documented and |
| | | incorporated |
| | | into data |
| | | retention policy |
| | | and procedures. |
| | | |
| | | - New systems are |
| | | included in the |
| | | quarterly |
| | | vulnerability |
| | | scanning |
| | | process. |
| | | |
| | | - Systems are |
| | | scanned for |
| | | internal and |
| | | external |
| | | vulnerabilities |
| | | after |
| | | significant |
| | | changes per |
| | | Requirements |
| | | 11.3.1.3 and |
| | | 11.3.2.1. |
+-----------------------+-----------------------+----------------------+
| **6.5.2** Upon | **6.5.2** Examine | |
| completion of a | documentation for | |
| significant change, | significant changes, | |
| all applicable PCI | interview personnel, | |
| DSS requirements are | and observe the | |
| confirmed to be in | affected | |
| place on all new or | systems/networks to | |
| changed systems and | verify that the | |
| networks, and | entity confirmed | |
| documentation is | applicable PCI DSS | |
| updated as | requirements were in | |
| applicable. | place on all new or | |
| | changed systems and | |
| | networks and that | |
| | documentation was | |
| | updated as | |
| | applicable. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All system components | | |
| are verified after a | | |
| significant change to | | |
| be compliant with the | | |
| applicable PCI DSS | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| These significant | | |
| changes should also | | |
| be captured and | | |
| reflected in the | | |
| entity's annual PCI | | |
| DSS scope | | |
| confirmation activity | | |
| per Requirement | | |
| 12.5.2. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Due to the |
| | | constantly changing |
| | | state of pre- |
| | | production |
| | | environments, they |
| | | are often less |
| | | secure than the |
| | | production |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Organizations must |
| | | clearly understand |
| | | which environments |
| | | are test |
| | | environments or |
| | | development |
| | | environments and how |
| | | these environments |
| | | interact on the |
| | | level of networks |
| | | and applications. |
| | | |
| | | **Definitions** |
| | | |
| | | Pre-production |
| | | environments include |
| | | development, |
| | | testing, user |
| | | acceptance testing |
| | | (UAT), etc. Even |
| | | where production |
| | | infrastructure is |
| | | used to facilitate |
| | | testing or |
| | | development, |
| | | production |
| | | environments still |
| | | need to be separated |
| | | (logically or |
| | | physically) from |
| | | pre- production |
| | | functionality such |
| | | that vulnerabilities |
| | | introduced as a |
| | | result of |
| | | pre-production |
| | | activities do not |
| | | adversely affect |
| | | production systems. |
+-----------------------+-----------------------+----------------------+
| **6.5.3** | **6.5.3.a** Examine | |
| Pre-production | policies and | |
| environments are | procedures to verify | |
| separated from | that processes are | |
| production | defined for | |
| environments and the | separating the pre- | |
| separation is | production | |
| enforced with access | environment from the | |
| controls. | production | |
| | environment via | |
| | access controls that | |
| | enforce the | |
| | separation. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.3.b** Examine | |
| | network documentation | |
| | and configurations of | |
| | network security | |
| | controls to verify | |
| | that the | |
| | pre-production | |
| | environment is | |
| | separate from the | |
| | production | |
| | environment(s). | |
+-----------------------+-----------------------+----------------------+
| | **6.5.3.c** Examine | |
| | access control | |
| | settings to verify | |
| | that access controls | |
| | are in place to | |
| | enforce separation | |
| | between the | |
| | pre-production and | |
| | production | |
| | environment(s). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Pre-production | | |
| environments cannot | | |
| introduce risks and | | |
| vulnerabilities into | | |
| production | | |
| environments. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The goal of |
| | | separating roles and |
| | | functions between |
| | | production and |
| | | pre-production |
| | | environments is to |
| | | reduce the number of |
| | | personnel with |
| | | access to the |
| | | production |
| | | environment and |
| | | account data and |
| | | thereby minimize |
| | | risk of |
| | | unauthorized, |
| | | unintentional, or |
| | | inappropriate access |
| | | to data and system |
| | | components and help |
| | | ensure that access |
| | | is limited to those |
| | | individuals with a |
| | | business need for |
| | | such access. |
| | | |
| | | The intent of this |
| | | control is to |
| | | separate critical |
| | | activities to |
| | | provide oversight |
| | | and review to catch |
| | | errors and minimize |
| | | the chances of fraud |
| | | or theft (since two |
| | | people would need to |
| | | collude in order to |
| | | hide an activity). |
| | | |
| | | Separating roles and |
| | | functions, also |
| | | referred to as |
| | | separation or |
| | | segregation of |
| | | duties, is a key |
| | | internal control |
| | | concept to protect |
| | | an entity's assets. |
+-----------------------+-----------------------+----------------------+
| **6.5.4** Roles and | **6.5.4.a** Examine | |
| functions are | policies and | |
| separated between | procedures to verify | |
| production and | that processes are | |
| pre-production | defined for | |
| environments to | separating roles and | |
| provide | functions to provide | |
| accountability such | accountability such | |
| that only reviewed | that only reviewed | |
| and approved changes | and approved changes | |
| are deployed. | are deployed. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.4.b** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify implemented | |
| | controls separate | |
| | roles and functions | |
| | and provide | |
| | accountability such | |
| | that only reviewed | |
| | and approved changes | |
| | are deployed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Job roles and | | |
| accountability that | | |
| differentiate between | | |
| pre-production and | | |
| production activities | | |
| are defined and | | |
| managed to minimize | | |
| the risk of | | |
| unauthorized, | | |
| unintentional, or | | |
| inappropriate | | |
| actions. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| In environments with | | |
| limited personnel | | |
| where individuals | | |
| perform multiple | | |
| roles or functions, | | |
| this same goal can be | | |
| achieved with | | |
| additional procedural | | |
| controls that provide | | |
| accountability. For | | |
| example, a developer | | |
| may also be an | | |
| administrator that | | |
| uses an | | |
| administrator-level | | |
| account with elevated | | |
| privileges in the | | |
| development | | |
| environment and, for | | |
| their developer role, | | |
| they use a separate | | |
| account with | | |
| user-level access to | | |
| the production | | |
| environment. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Use of live PANs |
| | | outside of protected |
| | | CDEs provides |
| | | malicious |
| | | individuals with the |
| | | opportunity to gain |
| | | unauthorized access |
| | | to cardholder data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities can |
| | | minimize their |
| | | storage of live PANs |
| | | by only storing them |
| | | in pre-production |
| | | when strictly |
| | | necessary for a |
| | | specific and defined |
| | | testing purpose and |
| | | securely deleting |
| | | that data after use. |
| | | |
| | | If an entity |
| | | requires PANs |
| | | specifically |
| | | designed for test |
| | | purposes, these can |
| | | be obtained from |
| | | acquirers. |
| | | |
| | | **Definitions** |
| | | |
| | | Live PANs refer to |
| | | valid PANs (not test |
| | | PANs) that have the |
| | | potential to be used |
| | | to conduct payment |
| | | transactions. |
| | | Additionally, when |
| | | payment cards |
| | | expire, the same PAN |
| | | is often reused with |
| | | a different expiry |
| | | date. All PANs must |
| | | be verified as being |
| | | unable to conduct |
| | | payment transactions |
| | | before they are |
| | | excluded from PCI |
| | | DSS scope. It is the |
| | | responsibility of |
| | | the entity to |
| | | confirm that PANs |
| | | are not live. |
+-----------------------+-----------------------+----------------------+
| **6.5.5** Live PANs | **6.5.5.a** Examine | |
| are not used in | policies and | |
| pre-production | procedures to verify | |
| environments, except | that processes are | |
| where those | defined for not using | |
| environments are | live PANs in | |
| included in the CDE | pre-production | |
| and protected in | environments, except | |
| accordance with all | where those | |
| applicable PCI DSS | environments are in a | |
| requirements. | CDE and protected in | |
| | accordance with all | |
| | applicable PCI DSS | |
| | requirements. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.5.b** Observe | |
| | testing processes and | |
| | interview personnel | |
| | to verify procedures | |
| | are in place to | |
| | ensure live PANs are | |
| | not used in | |
| | pre-production | |
| | environments, except | |
| | where those | |
| | environments are in a | |
| | CDE and protected in | |
| | accordance with all | |
| | applicable PCI DSS | |
| | requirements. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.5.c** Examine | |
| | pre-production test | |
| | data to verify live | |
| | PANs are not used in | |
| | pre-production | |
| | environments, except | |
| | where those | |
| | environments are in a | |
| | CDE and protected in | |
| | accordance with all | |
| | applicable PCI DSS | |
| | requirements. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Live PANs cannot be | | |
| present in | | |
| pre-production | | |
| environments outside | | |
| the CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | This data may give |
| | | away information |
| | | about the |
| | | functioning of an |
| | | application or |
| | | system and is an |
| | | easy target for |
| | | unauthorized |
| | | individuals to |
| | | exploit to gain |
| | | access to systems. |
| | | Possession of such |
| | | information could |
| | | facilitate |
| | | compromise of the |
| | | system and related |
| | | account data. |
+-----------------------+-----------------------+----------------------+
| **6.5.6** Test data | **6.5.6.a** Examine | |
| and test accounts are | policies and | |
| removed from system | procedures to verify | |
| components before the | that processes are | |
| system goes into | defined for removal | |
| production. | of test data and test | |
| | accounts from system | |
| | components before the | |
| | system goes into | |
| | production. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.6.b** Observe | |
| | testing processes for | |
| | both off-the- shelf | |
| | software and in-house | |
| | applications, and | |
| | interview personnel | |
| | to verify test data | |
| | and test accounts are | |
| | removed before a | |
| | system goes into | |
| | production. | |
+-----------------------+-----------------------+----------------------+
| | **6.5.6.c** Examine | |
| | data and accounts for | |
| | recently installed or | |
| | updated off-the-shelf | |
| | software and in- | |
| | house applications to | |
| | verify there is no | |
| | test data or test | |
| | accounts on systems | |
| | in production. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Test data and test | | |
| accounts cannot exist | | |
| in production | | |
| environments. | | |
+-----------------------+-----------------------+----------------------+
## Implement Strong Access Control Measures {#implement-strong-access-control-measures .unnumbered}
### *Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know* {#requirement-7-restrict-access-to-system-components-and-cardholder-data-by-business-need-to-know .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for restricting access to system |
| components and cardholder data by business need to know are |
| defined and understood. |
| |
| 2. Access to system components and data is appropriately defined and |
| assigned. |
| |
| 3. Access to system components and data is managed via an access |
| control system(s). |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Unauthorized individuals may gain access to critical data or |
| > systems due to ineffective access control rules and definitions. To |
| > ensure critical data can only be accessed by authorized personnel, |
| > systems and processes must be in place to limit access based on |
| > need to know and according to job responsibilities. |
| > |
| > "Access" or "access rights" are created by rules that provide users |
| > access to systems, applications, and data, while "privileges" allow |
| > a user to perform a specific action or function in relation to that |
| > system, application, or data. For example, a user may have access |
| > rights to specific data, but whether they can only read that data, |
| > or can also change or delete the data is determined by the user's |
| > assigned privileges. |
| > |
| > "Need to know" refers to providing access to only the least amount |
| > of data needed to perform a job. "Least privileges" refers to |
| > providing only the minimum level of privileges needed to perform a |
| > job. |
| > |
| > These requirements apply to user accounts and access for employees, |
| > contractors, consultants, and internal and external vendors and |
| > other third parties (for example, for providing support or |
| > maintenance services). Certain requirements also apply to |
| > application and system accounts used by the entity (also called |
| > "service accounts"). |
| > |
| > **These requirements do not apply to consumers (cardholders)**. |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| restricting | | |
| access to system | | |
| components and | | |
| cardholder data | | |
| by business need | | |
| to know are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 7.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 7. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 7, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **7.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 7 | operational | |
| are: | procedures identified | |
| | in Requirement 7 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 7 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities, |
| | | and critical |
| | | activities may not |
| | | occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **7.1.2** Roles and | **7.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 7 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 7 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **7.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 7 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 7 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **7.2** Access to | | |
| system components and | | |
| data is appropriately | | |
| defined and assigned. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Defining an access |
| | | control model that |
| | | is appropriate for |
| | | the entity's |
| | | technology and |
| | | access control |
| | | philosophy supports |
| | | a consistent and |
| | | uniform way of |
| | | allocating access |
| | | and reduces the |
| | | possibility of |
| | | errors such as the |
| | | granting of |
| | | excessive rights. |
| | | |
| | | **Good Practice** |
| | | |
| | | A factor to consider |
| | | when defining access |
| | | needs is the |
| | | separation of duties |
| | | principle. This |
| | | principle is |
| | | intended to prevent |
| | | fraud and misuse or |
| | | theft of resources. |
| | | For example, 1) |
| | | dividing mission- |
| | | critical functions |
| | | and information |
| | | system support |
| | | functions among |
| | | different |
| | | individuals and/or |
| | | functions, 2) |
| | | establishing roles |
| | | such that |
| | | information system |
| | | support activities |
| | | are performed by |
| | | different |
| | | f |
| | | unctions/individuals |
| | | (for example, system |
| | | management, |
| | | programming, |
| | | configuration |
| | | management, quality |
| | | assurance and |
| | | testing, and network |
| | | security), and 3) |
| | | ensuring security |
| | | personnel |
| | | administering access |
| | | control functions do |
| | | not also administer |
| | | audit functions. |
| | | |
| | | In environments |
| | | where one individual |
| | | performs multiple |
| | | functions, such as |
| | | administration and |
| | | security operations, |
| | | duties may be |
| | | assigned so that no |
| | | single individual |
| | | has end-to-end |
| | | control of a process |
| | | without an |
| | | independent |
| | | checkpoint. For |
| | | example, |
| | | responsibility for |
| | | configuration and |
| | | responsibility for |
| | | approving changes |
| | | could be assigned to |
| | | separate |
| | | individuals. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. An access control | **7.2.1.a** Examine | |
| model is defined | documented policies | |
| and includes | and procedures and | |
| granting access | interview personnel | |
| as follows: | to verify the access | |
| | control model is | |
| - Appropriate | defined in accordance | |
| access | with all elements | |
| depending on | specified in this | |
| the entity's | requirement. | |
| business and | | |
| access needs. | | |
| | | |
| - Access to | | |
| system | | |
| components | | |
| and data | | |
| resources | | |
| that is based | | |
| on users' job | | |
| | | |
| classification | | |
| and | | |
| functions. | | |
| | | |
| - The least | | |
| privileges | | |
| required (for | | |
| example, | | |
| user, | | |
| | | |
| administrator) | | |
| to perform a | | |
| job function. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.1.b** Examine | |
| | access control model | |
| | settings and verify | |
| | that access needs are | |
| | appropriately defined | |
| | in accordance with | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access requirements | | |
| are established | | |
| according to job | | |
| functions following | | |
| least-privilege and | | |
| need-to- know | | |
| principles. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Definitions** |
| | | |
| | | Key elements of an |
| | | access control model |
| | | include: |
| | | |
| | | - Resources to be |
| | | protected (the |
| | | |
| | | systems/devices/data |
| | | to which access |
| | | is needed), |
| | | |
| | | - Job functions |
| | | that need access |
| | | to the resource |
| | | (for example, |
| | | system |
| | | administrator, |
| | | call-center |
| | | personnel, store |
| | | clerk), and |
| | | |
| | | - Which activities |
| | | each job |
| | | function needs |
| | | to perform (for |
| | | example, |
| | | read/write or |
| | | query). |
| | | |
| | | Once job functions, |
| | | resources, and |
| | | activities per job |
| | | functions are |
| | | defined, individuals |
| | | can be granted |
| | | access accordingly. |
| | | |
| | | **Examples** |
| | | |
| | | Access control |
| | | models that entities |
| | | can consider include |
| | | role-based access |
| | | control (RBAC) and |
| | | attribute-based |
| | | access control |
| | | (ABAC). The access |
| | | control model used |
| | | by a given entity |
| | | depends on their |
| | | business and access |
| | | needs. |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Assigning least |
| | | privileges helps |
| | | prevent users |
| | | without sufficient |
| | | knowledge about the |
| | | application from |
| | | incorrectly or |
| | | accidentally |
| | | changing application |
| | | configuration or |
| | | altering its |
| | | security settings. |
| | | Enforcing least |
| | | privilege also helps |
| | | to minimize the |
| | | scope of damage if |
| | | an unauthorized |
| | | person gains access |
| | | to a user ID. |
| | | |
| | | **Good Practice** |
| | | |
| | | Access rights are |
| | | granted to a user by |
| | | assignment to one or |
| | | several functions. |
| | | Assess is assigned |
| | | depending on the |
| | | specific user |
| | | functions and with |
| | | the minimum scope |
| | | required for the |
| | | job. |
| | | |
| | | When assigning |
| | | privileged access, |
| | | it is important to |
| | | assign individuals |
| | | only the privileges |
| | | they need to perform |
| | | their job (the |
| | | "least privileges"). |
| | | For example, the |
| | | database |
| | | administrator or |
| | | backup administrator |
| | | should not be |
| | | assigned the same |
| | | privileges as the |
| | | overall systems |
| | | administrator. |
| | | |
| | | Once needs are |
| | | defined for user |
| | | functions (per PCI |
| | | DSS requirement |
| | | 7.2.1), it is easy |
| | | to grant individuals |
| | | access according to |
| | | their job |
| | | classification and |
| | | function by using |
| | | the already- created |
| | | roles. |
| | | |
| | | Entities may wish to |
| | | consider use of |
| | | Privileged Access |
| | | Management (PAM), |
| | | which is a method to |
| | | grant access to |
| | | privileged accounts |
| | | only when those |
| | | privileges are |
| | | required, |
| | | immediately revoking |
| | | that access once |
| | | they are no longer |
| | | needed. |
+-----------------------+-----------------------+----------------------+
| **7.2.2** Access is | **7.2.2.a** Examine | |
| assigned to users, | policies and | |
| including privileged | procedures to verify | |
| users, based on: | they cover assigning | |
| | access to users in | |
| - Job | accordance with all | |
| classification | elements specified in | |
| and function. | this requirement. | |
| | | |
| - Least privileges | | |
| necessary to | | |
| perform job | | |
| responsibilities. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.2.b** Examine | |
| | user access settings, | |
| | including for | |
| | privileged users, and | |
| | interview responsible | |
| | management personnel | |
| | to verify that | |
| | privileges assigned | |
| | are in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **7.2.2.c** Interview | |
| | personnel responsible | |
| | for assigning access | |
| | to verify that | |
| | privileged user | |
| | access is assigned in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access to systems and | | |
| data is limited to | | |
| only the access | | |
| needed to perform job | | |
| functions, as defined | | |
| in the related access | | |
| roles. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Documented approval |
| | | (for example, in |
| | | writing or |
| | | electronically) |
| | | assures that those |
| | | with access and |
| | | privileges are known |
| | | and authorized by |
| | | management, and that |
| | | their access is |
| | | necessary for their |
| | | job function. |
+-----------------------+-----------------------+----------------------+
| **7.2.3** Required | **7.2.3.a** Examine | |
| privileges are | policies and | |
| approved by | procedures to verify | |
| authorized personnel. | they define processes | |
| | for approval of all | |
| | privileges by | |
| | authorized personnel. | |
+-----------------------+-----------------------+----------------------+
| | **7.2.3.b** Examine | |
| | user IDs and assigned | |
| | privileges, and | |
| | compare with | |
| | documented approvals | |
| | to verify that: | |
| | | |
| | - Documented | |
| | approval exists | |
| | for the assigned | |
| | privileges. | |
| | | |
| | - The approval was | |
| | by authorized | |
| | personnel. | |
| | | |
| | - Specified | |
| | privileges match | |
| | the roles | |
| | assigned to the | |
| | individual. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access privileges | | |
| cannot be granted to | | |
| users without | | |
| appropriate, | | |
| documented | | |
| authorization. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regular review of |
| | | access rights helps |
| | | to detect excessive |
| | | access rights |
| | | remaining after user |
| | | job responsibilities |
| | | change, system |
| | | functions change, or |
| | | other modifications. |
| | | If excessive user |
| | | rights are not |
| | | revoked in due time, |
| | | they may be used by |
| | | malicious users for |
| | | unauthorized access. |
| | | |
| | | This review provides |
| | | another opportunity |
| | | to ensure that |
| | | accounts for all |
| | | terminated users |
| | | have been removed |
| | | (if any were missed |
| | | at the time of |
| | | termination), as |
| | | well as to ensure |
| | | that any third |
| | | parties that no |
| | | longer need access |
| | | have had their |
| | | access terminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | When a user |
| | | transfers into a new |
| | | role or a new |
| | | department, |
| | | typically the |
| | | privileges and |
| | | access associated |
| | | with their former |
| | | role are no longer |
| | | required. Continued |
| | | access to privileges |
| | | or functions that |
| | | are no longer |
| | | required may |
| | | introduce the risk |
| | | of misuse or errors. |
| | | Therefore, when |
| | | responsibilities |
| | | change, processes |
| | | that revalidate |
| | | access help to |
| | | ensure user access |
| | | is appropriate for |
| | | the user's new |
| | | responsibilities. |
| | | |
| | | Entities can |
| | | consider |
| | | implementing a |
| | | regular, repeatable |
| | | process for |
| | | conducting reviews |
| | | of access rights, |
| | | and assigning "data |
| | | owners" that are |
| | | responsible for |
| | | managing and |
| | | monitoring access to |
| | | data related to |
| | | their job function |
| | | and that also ensure |
| | | user access remains |
| | | current and |
| | | appropriate. As an |
| | | example, a direct |
| | | manager could review |
| | | team access monthly, |
| | | while the senior |
| | | manager reviews |
| | | their groups' access |
| | | quarterly, both |
| | | making updates to |
| | | access as needed. |
| | | The intent of these |
| | | best practices is to |
| | | support and |
| | | facilitate |
| | | conducting the |
| | | reviews at least |
| | | once every 6 months. |
+-----------------------+-----------------------+----------------------+
| **7.2.4** All user | **7.2.4.a** Examine | |
| accounts and related | policies and | |
| access privileges, | procedures to verify | |
| including | they define processes | |
| third-party/vendor | to review all user | |
| accounts, are | accounts and related | |
| reviewed as follows: | access privileges, | |
| | including third- | |
| - At least once | party/vendor | |
| every six months. | accounts, in | |
| | accordance with all | |
| - To ensure user | elements specified in | |
| accounts and | this requirement. | |
| access remain | | |
| appropriate based | | |
| on job function. | | |
| | | |
| - Any inappropriate | | |
| access is | | |
| addressed. | | |
| | | |
| - Management | | |
| acknowledges that | | |
| access remains | | |
| appropriate. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.4.b** Interview | |
| | responsible personnel | |
| | and examine | |
| | documented results of | |
| | periodic reviews of | |
| | user accounts to | |
| | verify that all the | |
| | results are in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Account privilege | | |
| assignments are | | |
| verified periodically | | |
| by management as | | |
| correct, and | | |
| nonconformities are | | |
| remediated. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to all user | | |
| accounts and related | | |
| access privileges, | | |
| including those used | | |
| by personnel and | | |
| third | | |
| parties/vendors, and | | |
| accounts used to | | |
| access third-party | | |
| cloud services. | | |
| | | |
| See Requirements | | |
| 7.2.5 and 7.2.5.1 and | | |
| 8.6.1 through 8.6.3 | | |
| for controls for | | |
| application and | | |
| system accounts. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important to |
| | | establish the |
| | | appropriate access |
| | | level for |
| | | application or |
| | | system accounts. If |
| | | such accounts are |
| | | compromised, |
| | | malicious users will |
| | | receive the same |
| | | access level as that |
| | | granted to the |
| | | application or |
| | | system. Therefore, |
| | | it is important to |
| | | ensure limited |
| | | access is granted to |
| | | system and |
| | | application accounts |
| | | on the same basis as |
| | | to user accounts. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities may want to |
| | | consider |
| | | establishing a |
| | | baseline when |
| | | setting up these |
| | | application and |
| | | system accounts |
| | | including the |
| | | following as |
| | | applicable to the |
| | | organization: |
| | | |
| | | - Making sure that |
| | | the account is |
| | | not a member of |
| | | a privileged |
| | | group such as |
| | | domain |
| | | administrators, |
| | | local |
| | | administrators, |
| | | or root. |
| | | |
| | | - Restricting |
| | | which computers |
| | | the account can |
| | | be used on. |
| | | |
| | | - Restricting |
| | | hours of use. |
| | | |
| | | - Removing any |
| | | additional |
| | | settings like |
| | | VPN access and |
| | | remote access. |
+-----------------------+-----------------------+----------------------+
| **7.2.5** All | **7.2.5.a** Examine | |
| application and | policies and | |
| system accounts and | procedures to verify | |
| related access | they define processes | |
| privileges are | to manage and assign | |
| assigned and managed | application and | |
| as follows: | system accounts and | |
| | related access | |
| - Based on the | privileges in | |
| least privileges | accordance with all | |
| necessary for the | elements specified in | |
| operability of | this requirement. | |
| the system or | | |
| application. | | |
| | | |
| - Access is limited | | |
| to the systems, | | |
| applications, or | | |
| processes that | | |
| specifically | | |
| require their | | |
| use. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.5.b** Examine | |
| | privileges associated | |
| | with system and | |
| | application accounts | |
| | and interview | |
| | responsible personnel | |
| | to verify that | |
| | application and | |
| | system accounts and | |
| | related access | |
| | privileges are | |
| | assigned and managed | |
| | in accordance with | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access rights granted | | |
| to application and | | |
| system accounts are | | |
| limited to only the | | |
| access needed for the | | |
| operability of that | | |
| application or | | |
| system. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regular review of |
| | | access rights helps |
| | | to detect excessive |
| | | access rights |
| | | remaining after |
| | | system functions |
| | | change, or other |
| | | application or |
| | | system modifications |
| | | occur. If excessive |
| | | rights are not |
| | | removed when no |
| | | longer needed, they |
| | | may be used by |
| | | malicious users for |
| | | unauthorized access. |
+-----------------------+-----------------------+----------------------+
| 1. All access by | **7.2.5.1.a** Examine | |
| application and | policies and | |
| system accounts | procedures to verify | |
| and related | they define processes | |
| access privileges | to review all | |
| are reviewed as | application and | |
| follows: | system accounts and | |
| | related access | |
| - Periodically | privileges in | |
| (at the | accordance with all | |
| frequency | elements specified in | |
| defined in | this requirement. | |
| the entity's | | |
| targeted risk | | |
| analysis, | | |
| which is | | |
| performed | | |
| according to | | |
| all elements | | |
| specified in | | |
| Requirement | | |
| 12.3.1). | | |
| | | |
| - The | | |
| | | |
| application/system | | |
| access | | |
| remains | | |
| appropriate | | |
| for the | | |
| function | | |
| being | | |
| performed. | | |
| | | |
| - Any | | |
| inappropriate | | |
| access is | | |
| addressed. | | |
| | | |
| - Management | | |
| acknowledges | | |
| that access | | |
| remains | | |
| appropriate. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.5.1.b** Examine | |
| | the entity's targeted | |
| | risk analysis for the | |
| | frequency of periodic | |
| | reviews of | |
| | application and | |
| | system accounts and | |
| | related access | |
| | privileges to verify | |
| | the risk analysis was | |
| | performed in | |
| | accordance with all | |
| | elements specified in | |
| | Requirement 12.3.1. | |
+-----------------------+-----------------------+----------------------+
| | **7.2.5.1.c** | |
| | Interview responsible | |
| | personnel and examine | |
| | documented results of | |
| | periodic reviews of | |
| | system and | |
| | application accounts | |
| | and related | |
| | privileges to verify | |
| | that the reviews | |
| | occur in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Application and | | |
| system account | | |
| privilege assignments | | |
| are verified | | |
| periodically by | | |
| management as | | |
| correct, and | | |
| nonconformities are | | |
| remediated. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The misuse of query |
| | | access to |
| | | repositories of |
| | | cardholder data has |
| | | been a regular cause |
| | | of data breaches. |
| | | Limiting such access |
| | | to administrators |
| | | reduces the risk of |
| | | such access being |
| | | abused by |
| | | unauthorized users. |
| | | |
| | | **Definitions** |
| | | |
| | | "Programmatic |
| | | methods" means |
| | | granting access |
| | | through means such |
| | | as database stored |
| | | procedures that |
| | | allow users to |
| | | perform controlled |
| | | actions to data in a |
| | | table, rather than |
| | | via direct, |
| | | unfiltered access to |
| | | the data repository |
| | | by end users (except |
| | | for the responsible |
| | | administrator(s), |
| | | who need direct |
| | | access to the |
| | | database for their |
| | | administrative |
| | | duties). |
| | | |
| | | **Good Practice** |
| | | |
| | | Typical user actions |
| | | include moving, |
| | | copying, and |
| | | deleting data. Also |
| | | consider the scope |
| | | of privilege needed |
| | | when granting |
| | | access. For example, |
| | | access can be |
| | | granted to specific |
| | | objects such as data |
| | | elements, files, |
| | | tables, indexes, |
| | | views, and stored |
| | | routines. Granting |
| | | access to |
| | | repositories of |
| | | cardholder data |
| | | should follow the |
| | | same process as all |
| | | other granted |
| | | access, meaning that |
| | | it is based on |
| | | roles, with only the |
| | | privileges assigned |
| | | to each user that |
| | | are needed to |
| | | perform their job |
| | | functions. |
+-----------------------+-----------------------+----------------------+
| **7.2.6** All user | **7.2.6.a** Examine | |
| access to query | policies and | |
| repositories of | procedures and | |
| stored cardholder | interview personnel | |
| data is restricted as | to verify processes | |
| follows: | are defined for | |
| | granting user access | |
| - Via applications | to query repositories | |
| or other | of stored cardholder | |
| programmatic | data, in accordance | |
| methods, with | with all elements | |
| access and | specified in this | |
| allowed actions | requirement. | |
| based on user | | |
| roles and least | | |
| privileges. | | |
| | | |
| - Only the | | |
| responsible | | |
| administrator(s) | | |
| can directly | | |
| access or query | | |
| repositories of | | |
| stored CHD. | | |
+-----------------------+-----------------------+----------------------+
| | **7.2.6.b** Examine | |
| | configuration | |
| | settings for querying | |
| | repositories of | |
| | stored cardholder | |
| | data to verify they | |
| | are in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Direct unfiltered (ad | | |
| hoc) query access to | | |
| cardholder data | | |
| repositories is | | |
| prohibited, unless | | |
| performed by an | | |
| authorized | | |
| administrator. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to controls | | |
| for user access to | | |
| query repositories of | | |
| stored cardholder | | |
| data. | | |
| | | |
| See Requirements | | |
| 7.2.5 and 7.2.5.1 and | | |
| 8.6.1 through 8.6.3 | | |
| for controls for | | |
| application and | | |
| system accounts. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **7.3** Access to | | |
| system components and | | |
| data is managed via | | |
| an access control | | |
| system(s). | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without a mechanism |
| | | to restrict access |
| | | based on user's need |
| | | to know, a user may |
| | | unknowingly be |
| | | granted access to |
| | | cardholder data. |
| | | Access control |
| | | systems automate the |
| | | process of |
| | | restricting access |
| | | and assigning |
| | | privileges. |
+-----------------------+-----------------------+----------------------+
| **7.3.1** An access | **7.3.1** Examine | |
| control system(s) is | vendor documentation | |
| in place that | and system settings | |
| restricts access | to verify that access | |
| based on a user's | is managed for each | |
| need to know and | system component via | |
| covers all system | an access control | |
| components. | system(s) that | |
| | restricts access | |
| | based on a user's | |
| | need to know and | |
| | covers all system | |
| | components. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access rights and | | |
| privileges are | | |
| managed via | | |
| mechanisms intended | | |
| for that purpose. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Restricting |
| | | privileged access |
| | | with an access |
| | | control system |
| | | reduces the |
| | | opportunity for |
| | | errors in the |
| | | assignment of |
| | | permissions to |
| | | individuals, |
| | | applications, and |
| | | systems. |
+-----------------------+-----------------------+----------------------+
| **7.3.2** The access | **7.3.2** Examine | |
| control system(s) is | vendor documentation | |
| configured to enforce | and system settings | |
| permissions assigned | to verify that the | |
| to individuals, | access control | |
| applications, and | system(s) is | |
| systems based on job | configured to enforce | |
| classification and | permissions assigned | |
| function. | to individuals, | |
| | applications, and | |
| | systems based on job | |
| | classification and | |
| | function. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Individual account | | |
| access rights and | | |
| privileges to | | |
| systems, | | |
| applications, and | | |
| data are only | | |
| inherited from group | | |
| membership. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A default setting of |
| | | "deny all" ensures |
| | | no one is granted |
| | | access unless a rule |
| | | is established |
| | | specifically |
| | | granting such |
| | | access. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | check the default |
| | | configuration of |
| | | access control |
| | | systems because some |
| | | are set by default |
| | | to "allow all," |
| | | thereby permitting |
| | | access unless/until |
| | | a rule is written to |
| | | specifically deny |
| | | it. |
+-----------------------+-----------------------+----------------------+
| **7.3.3** The access | **7.3.3** Examine | |
| control system(s) is | vendor documentation | |
| set to "deny all" by | and system settings | |
| default. | to verify that the | |
| | access control | |
| | system(s) is set to | |
| | "deny all" by | |
| | default. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access rights and | | |
| privileges are | | |
| prohibited unless | | |
| expressly permitted. | | |
+-----------------------+-----------------------+----------------------+
### *Requirement 8: Identify Users and Authenticate Access to System Components* {#requirement-8-identify-users-and-authenticate-access-to-system-components .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for identifying users and authenticating |
| access to system components are defined and understood. |
| |
| 2. User identification and related accounts for users and |
| administrators are strictly managed throughout an account's |
| lifecycle. |
| |
| 3. Strong authentication for users and administrators is established |
| and managed. |
| |
| 4. Multi-factor authentication (MFA) is implemented to secure access |
| into the CDE |
| |
| 5. Multi-factor authentication (MFA) systems are configured to |
| prevent misuse. |
| |
| 6. Use of application and system accounts and associated |
| authentication factors is strictly managed. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Two fundamental principles of identifying and authenticating users |
| > are to 1) establish the identity of an individual or process on a |
| > computer system, and 2) prove or verify the user associated with |
| > the identity is who the user claims to be. |
| > |
| > Identification of an individual or process on a computer system is |
| > conducted by associating an identity with a person or process |
| > through an identifier, such as a user, system, or application ID. |
| > These IDs (also referred to as "accounts") fundamentally establish |
| > the identity of an individual or process by assigning unique |
| > identification to each person or process to distinguish one user or |
| > process from another. When each user or process can be uniquely |
| > identified, it ensures there is accountability for actions |
| > performed by that identity. When such accountability is in place, |
| > actions taken can be traced to known and authorized users and |
| > processes. |
| > |
| > The element used to prove or verify the identity is known as the |
| > authentication factor. Authentication factors are 1) something you |
| > know, such as a password or passphrase, 2) something you have, such |
| > as a token device or smart card, or 3) something you are, such as a |
| > biometric element. |
| > |
| > The ID and the authentication factor together are considered |
| > authentication credentials and are used to gain access to the |
| > rights and privileges associated with a user, application, system, |
| > or service accounts. |
| > |
| > *(continued on next page)* |
+-----------------------------------------------------------------------+
> These requirements for identity and authentication are based on
> industry-accepted security principles and best practices to support
> the payment ecosystem. *NIST Special Publication 800-63, Digital
> Identity Guidelines* provides additional information on acceptable
> frameworks for digital identity and authentication factors. It is
> important to note that the *NIST Digital Identity Guidelines* is
> intended for US Federal Agencies and should be viewed in its entirety.
> Many of the concepts and approaches defined in these guidelines are
> expected to work with each other and not as standalone parameters.
>
> ***Note**: Unless otherwise stated in the requirement, these
> requirements apply to **all accounts on all system components**,
> unless specifically called out in an individual requirement, including
> but not limited to:*
- *Point-of-sale accounts*
- *Accounts with administrative capabilities*
- *System and application accounts*
- *All accounts used to view or access cardholder data or to access
systems with cardholder data.*
> *This includes accounts used by employees, contractors, consultants,
> internal and external vendors, and other third parties (for example,
> for providing support or maintenance services).*
>
> *Certain requirements are not intended to apply to user accounts that
> have access to only one card number at a time to facilitate a single
> transaction (such as IDs used by cashiers on point-of-sale terminals).
> When items do not apply, they are noted directly within the specific
> requirement.*
###### These requirements do not apply to accounts used by consumers (cardholders). {#these-requirements-do-not-apply-to-accounts-used-by-consumers-cardholders. .unnumbered}
> Refer to *[Appendix
> G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)*
> for definitions of PCI DSS terms.
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| identifying users | | |
| and | | |
| authenticating | | |
| access to system | | |
| components are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 8.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 8. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 8, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **8.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 8 | operational | |
| are: | procedures that are | |
| | identified in | |
| - Documented. | Requirement 8 are | |
| | managed in accordance | |
| - Kept up to | with all elements | |
| date. | specified in this | |
| | requirement. | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 8 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **8.1.2** Roles and | **8.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 8 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 8 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **8.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 8 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 8 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **8.2** User | | |
| identification and | | |
| related accounts for | | |
| users and | | |
| administrators are | | |
| strictly managed | | |
| throughout an | | |
| account's lifecycle. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The ability to trace |
| | | actions performed on |
| | | a computer system to |
| | | an individual |
| | | establishes |
| | | accountability and |
| | | traceability and is |
| | | fundamental to |
| | | establishing |
| | | effective access |
| | | controls. |
| | | |
| | | By ensuring each |
| | | user is uniquely |
| | | identified, instead |
| | | of using one ID for |
| | | several employees, |
| | | an organization can |
| | | maintain individual |
| | | responsibility for |
| | | actions and an |
| | | effective record in |
| | | the audit log per |
| | | employee. In |
| | | addition, this will |
| | | assist with issue |
| | | resolution and |
| | | containment when |
| | | misuse or malicious |
| | | intent occurs. |
+-----------------------+-----------------------+----------------------+
| **8.2.1** All users | **8.2.1.a** Interview | |
| are assigned a unique | responsible personnel | |
| ID before access to | to verify that all | |
| system components or | users are assigned a | |
| cardholder data is | unique ID for access | |
| allowed. | to system components | |
| | and cardholder data. | |
+-----------------------+-----------------------+----------------------+
| | **8.2.1.b** Examine | |
| | audit logs and other | |
| | evidence to verify | |
| | that access to system | |
| | components and | |
| | cardholder data can | |
| | be uniquely | |
| | identified and | |
| | associated with | |
| | individuals. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All actions by all | | |
| users are | | |
| attributable to an | | |
| individual. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts | | |
| within point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Group, shared, or |
| | | generic (or default) |
| | | accounts are |
| | | typically delivered |
| | | with software or |
| | | operating |
| | | systems---for |
| | | example, root or |
| | | with privileges |
| | | associated with a |
| | | specific function, |
| | | such as an |
| | | administrator. |
| | | |
| | | If multiple users |
| | | share the same |
| | | authentication |
| | | credentials (for |
| | | example, user |
| | | account and |
| | | password), it |
| | | becomes impossible |
| | | to trace system |
| | | access and |
| | | activities to an |
| | | individual. In turn, |
| | | this prevents an |
| | | entity from |
| | | assigning |
| | | accountability for, |
| | | or having effective |
| | | logging of, an |
| | | individual's actions |
| | | since a given action |
| | | could have been |
| | | performed by anyone |
| | | in the group with |
| | | knowledge of the |
| | | user ID and |
| | | associated |
| | | authentication |
| | | factors. |
| | | |
| | | The ability to |
| | | associate |
| | | individuals to the |
| | | actions performed |
| | | with an account is |
| | | essential to provide |
| | | individual |
| | | accountability and |
| | | traceability |
| | | regarding who |
| | | performed an action, |
| | | what action was |
| | | performed, and when |
| | | that action |
| | | occurred. |
| | | |
| | | **Good Practice** |
| | | |
| | | If shared accounts |
| | | are used for any |
| | | reason, strong |
| | | management controls |
| | | need to be |
| | | established to |
| | | maintain individual |
| | | accountability and |
| | | traceability. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **8.2.2** Group, | **8.2.2.a** Examine | |
| shared, or generic | user account lists on | |
| accounts, or other | system components and | |
| shared authentication | applicable | |
| credentials are only | documentation to | |
| used when necessary | verify that shared | |
| on an exception | authentication | |
| basis, and are | credentials are only | |
| managed as follows: | used when necessary, | |
| | on an exception | |
| - Account use is | basis, and are | |
| prevented unless | managed in accordance | |
| needed for an | with all elements | |
| exceptional | specified in this | |
| circumstance. | requirement. | |
| | | |
| - Use is limited to | | |
| the time needed | | |
| for the | | |
| exceptional | | |
| circumstance. | | |
| | | |
| - Business | | |
| justification for | | |
| use is | | |
| documented. | | |
| | | |
| - Use is explicitly | | |
| approved by | | |
| management. | | |
| | | |
| - Individual user | | |
| identity is | | |
| confirmed before | | |
| access to an | | |
| account is | | |
| granted. | | |
| | | |
| - Every action | | |
| taken is | | |
| attributable to | | |
| an individual | | |
| user. | | |
+-----------------------+-----------------------+----------------------+
| | **8.2.2.b** Examine | |
| | authentication | |
| | policies and | |
| | procedures to verify | |
| | processes are defined | |
| | for shared | |
| | authentication | |
| | credentials such that | |
| | they are only used | |
| | when necessary, on an | |
| | exception basis, and | |
| | are managed in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **8.2.2.c** Interview | |
| | system administrators | |
| | to verify that shared | |
| | authentication | |
| | credentials are only | |
| | used when necessary, | |
| | on an exception | |
| | basis, and are | |
| | managed in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All actions performed | | |
| by users with | | |
| generic, system, or | | |
| shared IDs are | | |
| attributable to an | | |
| individual person. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts | | |
| within point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Examples** |
| | | |
| | | Tools and techniques |
| | | can facilitate both |
| | | management and |
| | | security of these |
| | | types of accounts |
| | | and confirm |
| | | individual user |
| | | identity before |
| | | access to an account |
| | | is granted. Entities |
| | | can consider |
| | | password vaults or |
| | | other system- |
| | | managed controls |
| | | such as the *sudo* |
| | | command. |
| | | |
| | | An example of an |
| | | exceptional |
| | | circumstance is |
| | | where all other |
| | | authentication |
| | | methods have failed, |
| | | and a shared account |
| | | is needed for |
| | | emergency use or |
| | | "break the glass" |
| | | administrator |
| | | access. |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Service providers |
| | | with remote access |
| | | to customer premises |
| | | typically use this |
| | | access to support |
| | | POS POI systems or |
| | | provide other remote |
| | | services. |
| | | |
| | | If a service |
| | | provider uses the |
| | | same authentication |
| | | factors to access |
| | | multiple customers, |
| | | all the service |
| | | provider's customers |
| | | can easily be |
| | | compromised if an |
| | | attacker compromises |
| | | that one factor. |
| | | |
| | | Criminals know this |
| | | and deliberately |
| | | target service |
| | | providers looking |
| | | for a shared |
| | | authentication |
| | | factor that gives |
| | | them remote access |
| | | to many merchants |
| | | via that single |
| | | factor. |
| | | |
| | | **Examples** |
| | | |
| | | Technologies such as |
| | | multi-factor |
| | | mechanisms that |
| | | provide a unique |
| | | credential for each |
| | | connection (such as |
| | | a single-use |
| | | password) could also |
| | | meet the intent of |
| | | this requirement. |
+-----------------------+-----------------------+----------------------+
| **8.2.3 *Additional | **8.2.3 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***Service | assessments only: | |
| providers with remote | ***Examine | |
| access to customer | authentication | |
| premises use unique | policies and | |
| authentication | procedures and | |
| factors for each | interview personnel | |
| customer premises. | to verify that | |
| | service providers | |
| | with remote access to | |
| | customer premises use | |
| | unique authentication | |
| | factors for remote | |
| | access to each | |
| | customer premises. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A service provider's | | |
| credential used for | | |
| one customer cannot | | |
| be used for any other | | |
| customer. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| This requirement is | | |
| not intended to apply | | |
| to service providers | | |
| accessing their own | | |
| shared services | | |
| environments, where | | |
| multiple customer | | |
| environments are | | |
| hosted. | | |
| | | |
| If service provider | | |
| employees use shared | | |
| authentication | | |
| factors to remotely | | |
| access customer | | |
| premises, these | | |
| factors must be | | |
| unique per customer | | |
| and managed in | | |
| accordance with | | |
| Requirement 8.2.2. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is imperative |
| | | that the lifecycle |
| | | of a user ID |
| | | (additions, |
| | | deletions, and |
| | | modifications) is |
| | | controlled so that |
| | | only authorized |
| | | accounts can perform |
| | | functions, actions |
| | | are auditable, and |
| | | privileges are |
| | | limited to only what |
| | | is required. |
| | | |
| | | Attackers often |
| | | compromise an |
| | | existing account and |
| | | then escalate the |
| | | privileges of that |
| | | account to perform |
| | | unauthorized acts, |
| | | or they may create |
| | | new IDs to continue |
| | | their activity in |
| | | the background. It |
| | | is essential to |
| | | detect and respond |
| | | when user accounts |
| | | are created or |
| | | changed outside the |
| | | normal change |
| | | process or without |
| | | corresponding |
| | | authorization. |
+-----------------------+-----------------------+----------------------+
| **8.2.4** Addition, | **8.2.4** Examine | |
| deletion, and | documented | |
| modification of user | authorizations across | |
| IDs, authentication | various phases of the | |
| factors, and other | account lifecycle | |
| identifier objects | (additions, | |
| are managed as | modifications, and | |
| follows: | deletions) and | |
| | examine system | |
| - Authorized with | settings to verify | |
| the appropriate | the activity has been | |
| approval. | managed in accordance | |
| | with all elements | |
| - Implemented with | specified in this | |
| only the | requirement. | |
| privileges | | |
| specified on the | | |
| documented | | |
| approval. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Lifecycle events for | | |
| user IDs and | | |
| authentication | | |
| factors cannot occur | | |
| without appropriate | | |
| authorization. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to all user | | |
| accounts, including | | |
| employees, | | |
| contractors, | | |
| consultants, | | |
| temporary workers, | | |
| and third-party | | |
| vendors. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If an employee or |
| | | third party/vendor |
| | | has left the company |
| | | and still has access |
| | | to the network via |
| | | their user account, |
| | | unnecessary or |
| | | malicious access to |
| | | cardholder data |
| | | could occur---either |
| | | by the former |
| | | employee or by a |
| | | malicious user who |
| | | exploits the old |
| | | and/or unused |
| | | account. |
+-----------------------+-----------------------+----------------------+
| **8.2.5** Access for | **8.2.5.a** Examine | |
| terminated users is | information sources | |
| immediately revoked. | for terminated users | |
| | and review current | |
| | user access | |
| | lists---for both | |
| | local and remote | |
| | access---to verify | |
| | that terminated user | |
| | IDs have been | |
| | deactivated or | |
| | removed from the | |
| | access lists. | |
+-----------------------+-----------------------+----------------------+
| | **8.2.5.b** Interview | |
| | responsible personnel | |
| | to verify that all | |
| | physical | |
| | authentication | |
| | factors---such as, | |
| | smart cards, tokens, | |
| | etc.---have been | |
| | returned or | |
| | deactivated for | |
| | terminated users. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The accounts of | | |
| terminated users | | |
| cannot be used. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Accounts that are |
| | | not used regularly |
| | | are often targets of |
| | | attack since it is |
| | | less likely that any |
| | | changes, such as a |
| | | changed password, |
| | | will be noticed. As |
| | | such, these accounts |
| | | may be more easily |
| | | exploited and used |
| | | to access cardholder |
| | | data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where it may be |
| | | reasonably |
| | | anticipated that an |
| | | account will not be |
| | | used for an extended |
| | | period of time, such |
| | | as an extended leave |
| | | of absence, the |
| | | account should be |
| | | disabled as soon as |
| | | the leave begins, |
| | | rather than waiting |
| | | 90 days. |
+-----------------------+-----------------------+----------------------+
| **8.2.6** Inactive | **8.2.6** Examine | |
| user accounts are | user accounts and | |
| removed or disabled | last logon | |
| within 90 days of | information, and | |
| inactivity. | interview personnel | |
| | to verify that any | |
| | inactive user | |
| | accounts are removed | |
| | or disabled within 90 | |
| | days of inactivity. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Inactive user | | |
| accounts cannot be | | |
| used. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Allowing third |
| | | parties to have 24/7 |
| | | access into an |
| | | entity's systems and |
| | | networks in case |
| | | they need to provide |
| | | support increases |
| | | the chances of |
| | | unauthorized access. |
| | | This access could |
| | | result in an |
| | | unauthorized user in |
| | | the third party's |
| | | environment or a |
| | | malicious individual |
| | | using the |
| | | always-available |
| | | external entry point |
| | | into an entity's |
| | | network. Where third |
| | | parties do need |
| | | access 24/7, it |
| | | should be |
| | | documented, |
| | | justified, |
| | | monitored, and tied |
| | | to specific service |
| | | reasons. |
| | | |
| | | **Good Practice** |
| | | |
| | | Enabling access only |
| | | for the time periods |
| | | needed and disabling |
| | | it as soon as it is |
| | | no longer required |
| | | helps prevent misuse |
| | | of these |
| | | connections. |
| | | |
| | | Additionally, |
| | | consider assigning |
| | | third parties a |
| | | start and stop date |
| | | for their access in |
| | | accordance with |
| | | their service |
| | | contract. |
| | | |
| | | Monitoring |
| | | third-party access |
| | | helps ensure that |
| | | third parties are |
| | | accessing only the |
| | | systems necessary |
| | | and only during |
| | | approved time |
| | | frames. Any unusual |
| | | activity using |
| | | third-party accounts |
| | | should be followed |
| | | up and resolved. |
+-----------------------+-----------------------+----------------------+
| **8.2.7** Accounts | **8.2.7** Interview | |
| used by third parties | personnel, examine | |
| to access, support, | documentation for | |
| or maintain system | managing accounts, | |
| components via remote | and examine evidence | |
| access are managed as | to verify that | |
| follows: | accounts used by | |
| | third parties for | |
| - Enabled only | remote access are | |
| during the time | managed according to | |
| period needed and | all elements | |
| disabled when not | specified in this | |
| in use. | requirement. | |
| | | |
| - Use is monitored | | |
| for unexpected | | |
| activity. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Third party remote | | |
| access cannot be used | | |
| except where | | |
| specifically | | |
| authorized and use is | | |
| overseen by | | |
| management. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | When users walk away |
| | | from an open machine |
| | | with access to |
| | | system components or |
| | | cardholder data, |
| | | there is a risk that |
| | | the machine may be |
| | | used by others in |
| | | the user's absence, |
| | | resulting in |
| | | unauthorized account |
| | | access and/or |
| | | misuse. |
| | | |
| | | **Good Practice** |
| | | |
| | | The |
| | | re-authentication |
| | | can be applied |
| | | either at the system |
| | | level to protect all |
| | | sessions running on |
| | | that machine or at |
| | | the application |
| | | level. |
| | | |
| | | Entities may also |
| | | want to consider |
| | | staging controls in |
| | | succession to |
| | | further restrict the |
| | | access of an |
| | | unattended session |
| | | as time passes. For |
| | | example, the |
| | | screensaver may |
| | | activate after 15 |
| | | minutes and log off |
| | | the user after an |
| | | hour. |
| | | |
| | | However, timeout |
| | | controls must |
| | | balance the risk of |
| | | access and exposure |
| | | with the impact to |
| | | the user and purpose |
| | | of the access. |
| | | |
| | | If a user needs to |
| | | run a program from |
| | | an unattended |
| | | computer, the user |
| | | can log in to the |
| | | computer to initiate |
| | | the program, and |
| | | then "lock" the |
| | | computer so that no |
| | | one else can use the |
| | | user's login while |
| | | the computer is |
| | | unattended. |
| | | |
| | | **Examples** |
| | | |
| | | One way to meet this |
| | | requirement is to |
| | | configure an |
| | | automated |
| | | screensaver to |
| | | launch whenever the |
| | | console is idle for |
| | | 15 minutes and |
| | | requiring the |
| | | logged-in user to |
| | | enter their password |
| | | to unlock the |
| | | screen. |
+-----------------------+-----------------------+----------------------+
| **8.2.8** If a user | **8.2.8** Examine | |
| session has been idle | system configuration | |
| for more than 15 | settings to verify | |
| minutes, the user is | that system/session | |
| required to | idle timeout features | |
| re-authenticate to | for user sessions | |
| re-activate the | have been set to 15 | |
| terminal or session. | minutes or less. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A user session cannot | | |
| be used except by the | | |
| authorized user. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts on | | |
| point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
| | | |
| This requirement is | | |
| not meant to prevent | | |
| legitimate activities | | |
| from being performed | | |
| while the console/PC | | |
| is unattended. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **8.3** Strong | | |
| authentication for | | |
| users and | | |
| administrators is | | |
| established and | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | When used in |
| | | addition to unique |
| | | IDs, an |
| | | authentication |
| | | factor helps protect |
| | | user IDs from being |
| | | compromised, since |
| | | the attacker needs |
| | | to have the unique |
| | | ID and compromise |
| | | the associated |
| | | authentication |
| | | factor(s). |
| | | |
| | | **Good Practice** |
| | | |
| | | A common approach |
| | | for a malicious |
| | | individual to |
| | | compromise a system |
| | | is to exploit weak |
| | | or nonexistent |
| | | authentication |
| | | factors (for |
| | | example, |
| | | pas |
| | | swords/passphrases). |
| | | Requiring strong |
| | | authentication |
| | | factors helps |
| | | protect against this |
| | | attack. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See |
| | | *fidoalliance.org* |
| | | for more information |
| | | about using tokens, |
| | | smart cards, or |
| | | biometrics as |
| | | authentication |
| | | factors. |
+-----------------------+-----------------------+----------------------+
| 1. All user access | **8.3.1.a** Examine | |
| to system | documentation | |
| components for | describing the | |
| users and | authentication | |
| administrators is | factor(s) used to | |
| authenticated via | verify that user | |
| at least one of | access to system | |
| the following | components is | |
| authentication | authenticated via at | |
| factors: | least one | |
| | authentication factor | |
| - Something you | specified in this | |
| know, such as | requirement. | |
| a password or | | |
| passphrase. | | |
| | | |
| - Something you | | |
| have, such as | | |
| a token | | |
| device or | | |
| smart card. | | |
| | | |
| - Something you | | |
| are, such as | | |
| a biometric | | |
| element. | | |
+-----------------------+-----------------------+----------------------+
| | **8.3.1.b** For each | |
| | type of | |
| | authentication factor | |
| | used with each type | |
| | of system component, | |
| | observe an | |
| | authentication to | |
| | verify that | |
| | authentication is | |
| | functioning | |
| | consistently with | |
| | documented | |
| | authentication | |
| | factor(s). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| An account cannot be | | |
| accessed except with | | |
| a combination of user | | |
| identity and an | | |
| authentication | | |
| factor. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts on | | |
| point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
| | | |
| This requirement does | | |
| not supersede | | |
| multi-factor | | |
| authentication (MFA) | | |
| requirements but | | |
| applies to those | | |
| in-scope systems not | | |
| otherwise subject to | | |
| MFA requirements. | | |
| | | |
| A digital certificate | | |
| is a valid option for | | |
| "something you have" | | |
| if it is unique for a | | |
| particular user. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Network devices and |
| | | applications have |
| | | been known to |
| | | transmit |
| | | unencrypted, |
| | | readable |
| | | authentication |
| | | factors (such as |
| | | passwords and |
| | | passphrases) across |
| | | the network and/or |
| | | store these values |
| | | without encryption. |
| | | As a result, a |
| | | malicious individual |
| | | can easily intercept |
| | | this information |
| | | during transmission |
| | | using a "sniffer," |
| | | or directly access |
| | | unencrypted |
| | | authentication |
| | | factors in files |
| | | where they are |
| | | stored, and then use |
| | | this data to gain |
| | | unauthorized access. |
+-----------------------+-----------------------+----------------------+
| **8.3.2** Strong | **8.3.2.a** Examine | |
| cryptography is used | vendor documentation | |
| to render all | and system | |
| authentication | configuration | |
| factors unreadable | settings to verify | |
| during transmission | that authentication | |
| and storage on all | factors are rendered | |
| system components. | unreadable with | |
| | strong cryptography | |
| | during transmission | |
| | and storage. | |
+-----------------------+-----------------------+----------------------+
| | **8.3.2.b** Examine | |
| | repositories of | |
| | authentication | |
| | factors to verify | |
| | that they are | |
| | unreadable during | |
| | storage. | |
+-----------------------+-----------------------+----------------------+
| | **8.3.2.c** Examine | |
| | data transmissions to | |
| | verify that | |
| | authentication | |
| | factors are | |
| | unreadable during | |
| | transmission. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cleartext | | |
| authentication | | |
| factors cannot be | | |
| obtained, derived, or | | |
| reused from the | | |
| interception of | | |
| communications or | | |
| from stored data. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Malicious |
| | | individuals use |
| | | \"social |
| | | engineering" |
| | | techniques to |
| | | impersonate a user |
| | | of a system --- for |
| | | example, calling a |
| | | help desk and acting |
| | | as a legitimate |
| | | user---to have an |
| | | authentication |
| | | factor changed so |
| | | they can use a valid |
| | | user ID. |
| | | |
| | | Requiring positive |
| | | identification of a |
| | | user reduces the |
| | | probability of this |
| | | type of attack |
| | | succeeding. |
| | | |
| | | **Good Practice** |
| | | |
| | | Modifications to |
| | | authentication |
| | | factors for which |
| | | user identity should |
| | | be verified include |
| | | but are not limited |
| | | to performing |
| | | password resets, |
| | | provisioning new |
| | | hardware or software |
| | | tokens, and |
| | | generating new keys. |
| | | |
| | | **Examples** |
| | | |
| | | Methods to verify a |
| | | user's identity |
| | | include a secret |
| | | question/answer, |
| | | knowledge-based |
| | | information, and |
| | | calling the user |
| | | back at a known and |
| | | previously |
| | | established phone |
| | | number. |
+-----------------------+-----------------------+----------------------+
| **8.3.3** User | **8.3.3** Examine | |
| identity is verified | procedures for | |
| before modifying any | modifying | |
| authentication | authentication | |
| factor. | factors and observe | |
| | security personnel to | |
| | verify that when a | |
| | user requests a | |
| | modification of an | |
| | authentication | |
| | factor, the user's | |
| | identity is verified | |
| | before the | |
| | authentication factor | |
| | is modified. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized | | |
| individuals cannot | | |
| gain system access by | | |
| impersonating the | | |
| identity of an | | |
| authorized user. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without |
| | | account-lockout |
| | | mechanisms in place, |
| | | an attacker can |
| | | continually try to |
| | | guess a password |
| | | through manual or |
| | | automated tools (for |
| | | example, password |
| | | cracking) until the |
| | | attacker succeeds |
| | | and gains access to |
| | | a user's account. |
| | | |
| | | If an account is |
| | | locked out due to |
| | | someone continually |
| | | trying to guess a |
| | | password, controls |
| | | to delay |
| | | reactivation of the |
| | | locked account stop |
| | | the malicious |
| | | individual from |
| | | guessing the |
| | | password, as they |
| | | will have to stop |
| | | for a minimum of 30 |
| | | minutes until the |
| | | account is |
| | | reactivated. |
| | | |
| | | **Good Practice** |
| | | |
| | | Before reactivating |
| | | a locked account, |
| | | the user's identity |
| | | should be confirmed. |
| | | For example, the |
| | | administrator or |
| | | help desk personnel |
| | | can validate that |
| | | the actual account |
| | | owner is requesting |
| | | reactivation, or |
| | | there may be |
| | | password reset self- |
| | | service mechanisms |
| | | that the account |
| | | owner uses to verify |
| | | their identity. |
+-----------------------+-----------------------+----------------------+
| **8.3.4** Invalid | **8.3.4.a** Examine | |
| authentication | system configuration | |
| attempts are limited | settings to verify | |
| by: | that authentication | |
| | parameters are set to | |
| - Locking out the | require that user | |
| user ID after not | accounts be locked | |
| more than 10 | out after not more | |
| attempts. | than 10 invalid logon | |
| | attempts. | |
| - Setting the | | |
| lockout duration | | |
| to a minimum of | | |
| 30 minutes or | | |
| until the user's | | |
| identity is | | |
| confirmed. | | |
+-----------------------+-----------------------+----------------------+
| | **8.3.4.b** Examine | |
| | system configuration | |
| | settings to verify | |
| | that password | |
| | parameters are set to | |
| | require that once a | |
| | user account is | |
| | locked out, it | |
| | remains locked for a | |
| | minimum of 30 minutes | |
| | or until the user's | |
| | identity is | |
| | confirmed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| An authentication | | |
| factor cannot be | | |
| guessed in a brute | | |
| force, online attack. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts on | | |
| point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If the same |
| | | password/passphrase |
| | | is used for every |
| | | new user, an |
| | | internal user, |
| | | former employee, or |
| | | malicious individual |
| | | may know or easily |
| | | discover the value |
| | | and use it to gain |
| | | access to accounts |
| | | before the |
| | | authorized user |
| | | attempts to use the |
| | | password. |
+-----------------------+-----------------------+----------------------+
| **8.3.5** If | **8.3.5** Examine | |
| passwords/passphrases | procedures for | |
| are used as | setting and resetting | |
| authentication | passwords/passphrases | |
| factors to meet | (if used as | |
| Requirement 8.3.1, | authentication | |
| they are set and | factors to meet | |
| reset for each user | Requirement 8.3.1) | |
| as follows: | and observe security | |
| | personnel to verify | |
| - Set to a unique | that | |
| value for | passwords/passphrases | |
| first-time use | are set and reset in | |
| and upon reset. | accordance with all | |
| | elements specified in | |
| - Forced to be | this requirement. | |
| changed | | |
| immediately after | | |
| the first use. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| An initial or reset | | |
| password/passphrase | | |
| assigned to a user | | |
| cannot be used by an | | |
| unauthorized user. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Strong |
| | | p |
| | | asswords/passphrases |
| | | may be the first |
| | | line of defense into |
| | | a network since a |
| | | malicious individual |
| | | will often first try |
| | | to find accounts |
| | | with weak, static, |
| | | or non-existent |
| | | passwords. If |
| | | passwords are short |
| | | or easily guessable, |
| | | it is relatively |
| | | easy for a malicious |
| | | individual to find |
| | | these weak accounts |
| | | and compromise a |
| | | network under the |
| | | guise of a valid |
| | | user ID. |
| | | |
| | | **Good Practice** |
| | | |
| | | Password/passphrase |
| | | strength is |
| | | dependent on |
| | | password/passphrase |
| | | complexity, length, |
| | | and randomness. |
| | | P |
| | | asswords/passphrases |
| | | should be |
| | | sufficiently |
| | | complex, so they are |
| | | impractical for an |
| | | attacker to guess or |
| | | otherwise discover |
| | | its value. Entities |
| | | can consider adding |
| | | increased complexity |
| | | by requiring the use |
| | | of special |
| | | characters and |
| | | upper- and |
| | | lower-case |
| | | characters, in |
| | | addition to the |
| | | minimum standards |
| | | outlined by this |
| | | requirement. |
| | | Additional |
| | | complexity increases |
| | | the time required |
| | | for offline brute |
| | | force attacks of |
| | | hashed |
| | | pa |
| | | sswords/passphrases. |
| | | |
| | | Another option for |
| | | increasing the |
| | | resistance of |
| | | passwords to |
| | | guessing attacks is |
| | | by comparing |
| | | proposed |
| | | password/passphrases |
| | | to a bad password |
| | | list and having |
| | | users provide new |
| | | passwords for any |
| | | passwords found on |
| | | the list. |
+-----------------------+-----------------------+----------------------+
| **8.3.6** If | **8.3.6** Examine | |
| passwords/passphrases | system configuration | |
| are used as | settings to verify | |
| authentication | that user | |
| factors to meet | password/passphrase | |
| Requirement 8.3.1, | complexity parameters | |
| they meet the | are set in accordance | |
| following minimum | with all elements | |
| level of complexity: | specified in this | |
| | requirement. | |
| - A minimum length | | |
| of 12 characters | | |
| (or IF the system | | |
| does not support | | |
| 12 characters, a | | |
| minimum length of | | |
| eight | | |
| characters). | | |
| | | |
| - Contain both | | |
| numeric and | | |
| alphabetic | | |
| characters. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A guessed | | |
| password/passphrase | | |
| cannot be verified by | | |
| either an online or | | |
| offline brute force | | |
| attack. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to: | | |
| | | |
| - User accounts on | | |
| point-of-sale | | |
| terminals that | | |
| have access to | | |
| only one card | | |
| number at a time | | |
| to facilitate a | | |
| single | | |
| transaction (such | | |
| as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
| | | |
| - Application or | | |
| system accounts, | | |
| which are | | |
| governed by | | |
| requirements in | | |
| section 8.6. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
| | | |
| Until 31 March 2025, | | |
| passwords must be a | | |
| minimum length of | | |
| seven characters in | | |
| accordance with PCI | | |
| DSS v3.2.1 | | |
| Requirement 8.2.3. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If password history |
| | | is not maintained, |
| | | the effectiveness of |
| | | changing passwords |
| | | is reduced, as |
| | | previous passwords |
| | | can be reused over |
| | | and over. Requiring |
| | | that passwords |
| | | cannot be reused for |
| | | a period reduces the |
| | | likelihood that |
| | | passwords that have |
| | | been guessed or |
| | | brute-forced will be |
| | | re- used in the |
| | | future. |
| | | |
| | | Passwords or |
| | | passphrases may have |
| | | previously been |
| | | changed due to |
| | | suspicion of |
| | | compromise or |
| | | because the password |
| | | or passphrase |
| | | exceeded its |
| | | effective use |
| | | period, both of |
| | | which are reasons |
| | | why previously used |
| | | passwords should not |
| | | be reused. |
+-----------------------+-----------------------+----------------------+
| **8.3.7** Individuals | **8.3.7** Examine | |
| are not allowed to | system configuration | |
| submit a new | settings to verify | |
| password/passphrase | that password | |
| that is the same as | parameters are set to | |
| any of the last four | require that new | |
| passwords/passphrases | passwords/passphrases | |
| used. | cannot be the same as | |
| | the four previously | |
| | used | |
| | p | |
| | asswords/passphrases. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A previously used | | |
| password cannot be | | |
| used to gain access | | |
| to an account for at | | |
| least 12 months. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not intended to apply | | |
| to user accounts on | | |
| point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Communicating |
| | | authentication |
| | | policies and |
| | | procedures to all |
| | | users helps them to |
| | | understand and abide |
| | | by the policies. |
| | | |
| | | **Good Practice** |
| | | |
| | | Guidance on |
| | | selecting strong |
| | | passwords may |
| | | include suggestions |
| | | to help personnel |
| | | select hard-to-guess |
| | | passwords that do |
| | | not contain |
| | | dictionary words or |
| | | information about |
| | | the user, such as |
| | | the user ID, names |
| | | of family members, |
| | | date of birth, etc. |
| | | |
| | | Guidance for |
| | | protecting |
| | | authentication |
| | | factors may include |
| | | not writing down |
| | | passwords or not |
| | | saving them in |
| | | insecure files, and |
| | | being alert to |
| | | malicious |
| | | individuals who may |
| | | try to exploit their |
| | | passwords (for |
| | | example, by calling |
| | | an employee and |
| | | asking for their |
| | | password so the |
| | | caller can |
| | | "troubleshoot a |
| | | problem"). |
| | | |
| | | Alternatively, |
| | | entities can |
| | | implement processes |
| | | to confirm passwords |
| | | meet password |
| | | policy, for example, |
| | | by comparing |
| | | password choices to |
| | | a list of |
| | | unacceptable |
| | | passwords and having |
| | | users choose a new |
| | | password for any |
| | | that match with one |
| | | on the list. |
| | | Instructing users to |
| | | change passwords if |
| | | there is a chance |
| | | the password is no |
| | | longer secure can |
| | | prevent malicious |
| | | users from using a |
| | | legitimate password |
| | | to gain unauthorized |
| | | access. |
+-----------------------+-----------------------+----------------------+
| **8.3.8** | **8.3.8.a** Examine | |
| Authentication | procedures and | |
| policies and | interview personnel | |
| procedures are | to verify that | |
| documented and | authentication | |
| communicated to all | policies and | |
| users including: | procedures are | |
| | distributed to all | |
| - Guidance on | users. | |
| selecting strong | | |
| authentication | | |
| factors. | | |
| | | |
| - Guidance for how | | |
| users should | | |
| protect their | | |
| authentication | | |
| factors. | | |
| | | |
| - Instructions not | | |
| to reuse | | |
| previously used | | |
| p | | |
| asswords/passphrases. | | |
| | | |
| - Instructions to | | |
| change | | |
| | | |
| passwords/passphrases | | |
| if there is any | | |
| suspicion or | | |
| knowledge that | | |
| the | | |
| | | |
| password/passphrases | | |
| have been | | |
| compromised and | | |
| how to report the | | |
| incident. | | |
+-----------------------+-----------------------+----------------------+
| | **8.3.8.b** Review | |
| | authentication | |
| | policies and | |
| | procedures that are | |
| | distributed to users | |
| | and verify they | |
| | include the elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **8.3.8.c** Interview | |
| | users to verify that | |
| | they are familiar | |
| | with authentication | |
| | policies and | |
| | procedures. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Users are | | |
| knowledgeable about | | |
| the correct use of | | |
| authentication | | |
| factors and can | | |
| access assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Access to in-scope |
| | | system components |
| | | that are not in the |
| | | CDE may be provided |
| | | using a single |
| | | authentication |
| | | factor, such as a |
| | | password/passphrase, |
| | | token device or |
| | | smart card, or |
| | | biometric attribute. |
| | | Where |
| | | p |
| | | asswords/passphrases |
| | | are employed as the |
| | | only authentication |
| | | factor for such |
| | | access, additional |
| | | controls are |
| | | required to protect |
| | | the integrity of the |
| | | password/passphrase. |
| | | |
| | | **Good Practice** |
| | | |
| | | P |
| | | asswords/passphrases |
| | | that are valid for a |
| | | long time without a |
| | | change provide |
| | | malicious |
| | | individuals with |
| | | more time to break |
| | | the password/phrase. |
| | | Periodically |
| | | changing passwords |
| | | offers less time for |
| | | a malicious |
| | | individual to crack |
| | | a |
| | | password/passphrase |
| | | and less time to use |
| | | a compromised |
| | | password. |
| | | |
| | | Using a |
| | | password/passphrase |
| | | as the only |
| | | authentication |
| | | factor provides a |
| | | single point of |
| | | failure if |
| | | compromised. |
| | | Therefore, in these |
| | | implementations, |
| | | controls are needed |
| | | to minimize how long |
| | | malicious activity |
| | | could occur via a |
| | | compromised |
| | | password/passphrase. |
| | | |
| | | Dynamically |
| | | analyzing an |
| | | account's security |
| | | posture is another |
| | | option that allows |
| | | for more rapid |
| | | detection and |
| | | response to address |
| | | potentially |
| | | compromised |
| | | credentials. Such |
| | | analysis takes a |
| | | number of data |
| | | points, which may |
| | | include device |
| | | integrity, location, |
| | | access times, and |
| | | the resources |
| | | accessed to |
| | | determine in real |
| | | time whether an |
| | | account can be |
| | | granted access to a |
| | | requested resource. |
| | | In this way, access |
| | | can be denied and |
| | | accounts blocked if |
| | | it is suspected that |
| | | authentication |
| | | credentials have |
| | | been compromised. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **8.3.9** If | **8.3.9** If | |
| passwords/passphrases | passwords/passphrases | |
| are used as the only | are used as the only | |
| authentication factor | authentication factor | |
| for user access | for user access, | |
| (i.e., in any | inspect system | |
| single-factor | configuration | |
| authentication | settings to verify | |
| implementation) then | that | |
| either: | passwords/passphrases | |
| | are managed in | |
| - | accordance with ONE | |
| Passwords/passphrases | of the elements | |
| are changed at | specified in this | |
| least once every | requirement. | |
| 90 days, | | |
| | | |
| > **OR** | | |
| | | |
| - The security | | |
| posture of | | |
| accounts is | | |
| dynamically | | |
| analyzed, and | | |
| real-time access | | |
| to resources is | | |
| automatically | | |
| determined | | |
| accordingly. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| An undetected | | |
| compromised | | |
| password/passphrase | | |
| cannot be used | | |
| indefinitely. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to in-scope | | |
| system components | | |
| that are not in the | | |
| CDE because these | | |
| components are not | | |
| subject to MFA | | |
| requirements. | | |
| | | |
| This requirement is | | |
| not intended to apply | | |
| to user accounts on | | |
| point-of-sale | | |
| terminals that have | | |
| access to only one | | |
| card number at a time | | |
| to facilitate a | | |
| single transaction | | |
| (such as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
| | | |
| This requirement does | | |
| not apply to service | | |
| providers' customer | | |
| accounts but does | | |
| apply to accounts for | | |
| service provider | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Further |
| | | Information** |
| | | |
| | | For information |
| | | about using dynamic |
| | | analysis to manage |
| | | user access to |
| | | resources, see *NIST |
| | | SP 800-207 Zero |
| | | Trust Architecture*. |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Using a |
| | | password/passphrase |
| | | as the only |
| | | authentication |
| | | factor provides a |
| | | single point of |
| | | failure if |
| | | compromised. |
| | | Therefore, in these |
| | | implementations, |
| | | controls are needed |
| | | to minimize how long |
| | | malicious activity |
| | | could occur via a |
| | | compromised |
| | | password/passphrase. |
| | | |
| | | **Good Practice** |
| | | |
| | | P |
| | | asswords/passphrases |
| | | that are valid for a |
| | | long time without a |
| | | change provide |
| | | malicious |
| | | individuals with |
| | | more time to break |
| | | the password/phrase. |
| | | Periodically |
| | | changing passwords |
| | | offers less time for |
| | | a malicious |
| | | individual to crack |
| | | a |
| | | password/passphrase |
| | | and less time to use |
| | | a compromised |
| | | password. |
+-----------------------+-----------------------+----------------------+
| **8.3.10 *Additional | **8.3.10 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***If | assessments only: | |
| passwords/passphrases | ***If | |
| are used as the only | passwords/passphrases | |
| authentication factor | are used as the only | |
| for customer user | authentication factor | |
| access to cardholder | for customer user | |
| data (i.e., in any | access to cardholder | |
| single- factor | data, examine | |
| authentication | guidance provided to | |
| implementation), then | customer users to | |
| guidance is provided | verify that the | |
| to customer users | guidance includes all | |
| including: | elements specified in | |
| | this requirement. | |
| - Guidance for | | |
| customers to | | |
| change their user | | |
| | | |
| passwords/passphrases | | |
| periodically. | | |
| | | |
| - Guidance as to | | |
| when, and under | | |
| what | | |
| circumstances, | | |
| | | |
| passwords/passphrases | | |
| are to be | | |
| changed. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Passwords/passphrases | | |
| for service | | |
| providers' customers | | |
| cannot be used | | |
| indefinitely. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| This requirement does | | |
| not apply to accounts | | |
| of consumer users | | |
| accessing their own | | |
| payment card | | |
| information. | | |
| | | |
| This requirement for | | |
| service providers | | |
| will be superseded by | | |
| Requirement 8.3.10.1 | | |
| once 8.3.10.1 becomes | | |
| effective. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Using a |
| | | password/passphrase |
| | | as the only |
| | | authentication |
| | | factor provides a |
| | | single point of |
| | | failure if |
| | | compromised. |
| | | Therefore, in these |
| | | implementations, |
| | | controls are needed |
| | | to minimize how long |
| | | malicious activity |
| | | could occur via a |
| | | compromised |
| | | password/passphrase. |
| | | |
| | | **Good Practice** |
| | | |
| | | P |
| | | asswords/passphrases |
| | | that are valid for a |
| | | long time without a |
| | | change provide |
| | | malicious |
| | | individuals with |
| | | more time to break |
| | | the password/phrase. |
| | | Periodically |
| | | changing passwords |
| | | offers less time for |
| | | a malicious |
| | | individual to crack |
| | | a |
| | | password/passphrase |
| | | and less time to use |
| | | a compromised |
| | | password. |
| | | |
| | | Dynamically |
| | | analyzing an |
| | | account's security |
| | | posture is another |
| | | option that allows |
| | | for more rapid |
| | | detection and |
| | | response to address |
| | | potentially |
| | | compromised |
| | | credentials. Such |
| | | analysis takes a |
| | | number of data |
| | | points which may |
| | | include device |
| | | integrity, location, |
| | | access times, and |
| | | the resources |
| | | accessed to |
| | | determine in real |
| | | time whether an |
| | | account can be |
| | | granted access to a |
| | | requested resource. |
| | | In this way, access |
| | | can be denied and |
| | | accounts blocked if |
| | | it is suspected that |
| | | account credentials |
| | | have been |
| | | compromised. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For information |
| | | about using dynamic |
| | | analysis to manage |
| | | user access to |
| | | resources, refer to |
| | | *NIST SP 800-207 |
| | | Zero Trust |
| | | Architecture*. |
+-----------------------+-----------------------+----------------------+
| 1. ***Additional | **8.3.10.1 | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only:*** If | provider assessments | |
| | only: ***If | |
| passwords/passphrases | passwords/passphrases | |
| are used as the | are used as the only | |
| only | authentication factor | |
| authentication | for customer user | |
| factor for | access, inspect | |
| customer user | system configuration | |
| access (i.e., in | settings to verify | |
| any single-factor | that | |
| authentication | passwords/passphrases | |
| implementation) | are managed in | |
| then either: | accordance with ONE | |
| | of the elements | |
| - | specified in this | |
| Passwords/passphrases | requirement. | |
| are changed | | |
| at least once | | |
| every 90 | | |
| days, | | |
| | | |
| > **OR** | | |
| | | |
| - The security | | |
| posture of | | |
| accounts is | | |
| dynamically | | |
| analyzed, and | | |
| real-time access | | |
| to resources is | | |
| automatically | | |
| determined | | |
| accordingly. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Passwords/passphrases | | |
| for service | | |
| providers' customers | | |
| cannot be used | | |
| indefinitely. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| This requirement does | | |
| not apply to accounts | | |
| of consumer users | | |
| accessing their own | | |
| payment card | | |
| information. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
| | | |
| Until this | | |
| requirement is | | |
| effective on 31 March | | |
| 2025, service | | |
| providers may meet | | |
| either Requirement | | |
| | | |
| 8.3.10 or 8.3.10.1. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If multiple users |
| | | can use |
| | | authentication |
| | | factors such as |
| | | tokens, smart cards, |
| | | and certificates, it |
| | | may be impossible to |
| | | identify the |
| | | individual using the |
| | | authentication |
| | | mechanism. |
| | | |
| | | **Good Practice** |
| | | |
| | | Having physical |
| | | and/or logical |
| | | controls (for |
| | | example, a PIN, |
| | | biometric data, or a |
| | | password) to |
| | | uniquely |
| | | authenticate the |
| | | user of the account |
| | | will prevent |
| | | unauthorized users |
| | | from gaining access |
| | | to the user account |
| | | through use of a |
| | | shared |
| | | authentication |
| | | factor. |
+-----------------------+-----------------------+----------------------+
| **8.3.11** Where | **8.3.11.a** Examine | |
| authentication | authentication | |
| factors such as | policies and | |
| physical or logical | procedures to verify | |
| security tokens, | that procedures for | |
| smart cards, or | using authentication | |
| certificates are | factors such as | |
| used: | physical security | |
| | tokens, smart cards, | |
| - Factors are | and certificates are | |
| assigned to an | defined and include | |
| individual user | all elements | |
| and not shared | specified in this | |
| among multiple | requirement. | |
| users. | | |
| | | |
| - Physical and/or | | |
| logical controls | | |
| ensure only the | | |
| intended user can | | |
| use that factor | | |
| to gain access. | | |
+-----------------------+-----------------------+----------------------+
| | **8.3.11.b** | |
| | Interview security | |
| | personnel to verify | |
| | authentication | |
| | factors are assigned | |
| | to an individual user | |
| | and not shared among | |
| | multiple users. | |
+-----------------------+-----------------------+----------------------+
| | **8.3.11.c** Examine | |
| | system configuration | |
| | settings and/or | |
| | observe physical | |
| | controls, as | |
| | applicable, to verify | |
| | that controls are | |
| | implemented to ensure | |
| | only the intended | |
| | user can use that | |
| | factor to gain | |
| | access. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| An authentication | | |
| factor cannot be used | | |
| by anyone other than | | |
| the user to which it | | |
| is assigned. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **8.4** Multi-factor | | |
| authentication (MFA) | | |
| is implemented to | | |
| secure access into | | |
| the CDE. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requiring more than |
| | | one type of |
| | | authentication |
| | | factor reduces the |
| | | probability that an |
| | | attacker can gain |
| | | access to a system |
| | | by masquerading as a |
| | | legitimate user, |
| | | because the attacker |
| | | would need to |
| | | compromise multiple |
| | | authentication |
| | | factors. |
| | | |
| | | This is especially |
| | | true in environments |
| | | where traditionally |
| | | the single |
| | | authentication |
| | | factor employed was |
| | | something a user |
| | | knows such as a |
| | | password or |
| | | passphrase. |
| | | |
| | | **Definitions** |
| | | |
| | | Using one factor |
| | | twice (for example, |
| | | using two separate |
| | | passwords) is not |
| | | considered multi- |
| | | factor |
| | | authentication. |
+-----------------------+-----------------------+----------------------+
| **8.4.1** MFA is | **8.4.1.a** Examine | |
| implemented for all | network and/or system | |
| non-console access | configurations to | |
| into the CDE for | verify MFA is | |
| personnel with | required for all non- | |
| administrative | console into the CDE | |
| access. | for personnel with | |
| | administrative | |
| | access. | |
+-----------------------+-----------------------+----------------------+
| | **8.4.1.b** Observe | |
| | administrator | |
| | personnel logging | |
| | into the CDE and | |
| | verify that MFA is | |
| | required. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Administrative access | | |
| to the CDE cannot be | | |
| obtained by the use | | |
| of a single | | |
| authentication | | |
| factor. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The requirement for | | |
| MFA for non-console | | |
| administrative access | | |
| applies to all | | |
| personnel with | | |
| elevated or increased | | |
| privileges accessing | | |
| the CDE via a | | |
| non-console | | |
| connection---that is, | | |
| via logical access | | |
| occurring over a | | |
| network interface | | |
| rather than via a | | |
| direct, physical | | |
| connection. | | |
| | | |
| MFA is considered a | | |
| best practice for | | |
| non-console | | |
| administrative access | | |
| to in-scope system | | |
| components that are | | |
| not part of the CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requiring more than |
| | | one type of |
| | | authentication |
| | | factor reduces the |
| | | probability that an |
| | | attacker can gain |
| | | access to a system |
| | | by masquerading as a |
| | | legitimate user, |
| | | because the attacker |
| | | would need to |
| | | compromise multiple |
| | | authentication |
| | | factors. |
| | | |
| | | This is especially |
| | | true in environments |
| | | where traditionally |
| | | the single |
| | | authentication |
| | | factor employed was |
| | | something a user |
| | | knows such as a |
| | | password or |
| | | passphrase. |
| | | |
| | | **Definitions** |
| | | |
| | | Using one factor |
| | | twice (for example, |
| | | using two separate |
| | | passwords) is not |
| | | considered multi- |
| | | factor |
| | | authentication. |
+-----------------------+-----------------------+----------------------+
| **8.4.2** MFA is | **8.4.2.a** Examine | |
| implemented for all | network and/or system | |
| access into the CDE. | configurations to | |
| | verify MFA is | |
| | implemented for all | |
| | access into the CDE. | |
+-----------------------+-----------------------+----------------------+
| | **8.4.2.b** Observe | |
| | personnel logging in | |
| | to the CDE and | |
| | examine evidence to | |
| | verify that MFA is | |
| | required. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Access into the CDE | | |
| cannot be obtained by | | |
| the use of a single | | |
| authentication | | |
| factor. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement does | | |
| not apply to: | | |
| | | |
| - Application or | | |
| system accounts | | |
| performing | | |
| automated | | |
| functions. | | |
| | | |
| - User accounts on | | |
| point-of-sale | | |
| terminals that | | |
| have access to | | |
| only one card | | |
| number at a time | | |
| to facilitate a | | |
| single | | |
| transaction (such | | |
| as IDs used by | | |
| cashiers on | | |
| point-of-sale | | |
| terminals). | | |
| | | |
| MFA is required for | | |
| both types of access | | |
| specified in | | |
| Requirements 8.4.2 | | |
| and 8.4.3. Therefore, | | |
| applying MFA to one | | |
| type of access does | | |
| not replace the need | | |
| to apply another | | |
| instance of MFA to | | |
| the other type of | | |
| access. If an | | |
| individual first | | |
| connects to the | | |
| entity's network via | | |
| remote access, and | | |
| then later initiates | | |
| a connection into the | | |
| CDE from within the | | |
| network, per this | | |
| requirement the | | |
| individual would | | |
| authenticate using | | |
| MFA twice, once when | | |
| connecting via remote | | |
| access to the | | |
| entity's network and | | |
| once when connecting | | |
| via non-console | | |
| administrative access | | |
| from the entity's | | |
| network into the CDE. | | |
| | | |
| *(continued on next | | |
| page)* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| The MFA requirements | | |
| apply for all types | | |
| of system components, | | |
| including cloud, | | |
| hosted systems, and | | |
| on-premises | | |
| applications, network | | |
| security devices, | | |
| workstations, | | |
| servers, and | | |
| endpoints, and | | |
| includes access | | |
| directly to an | | |
| entity's networks or | | |
| systems as well as | | |
| web-based access to | | |
| an application or | | |
| function. | | |
| | | |
| MFA for remote access | | |
| into the CDE can be | | |
| implemented at the | | |
| network or | | |
| system/application | | |
| level; it does not | | |
| have to be applied at | | |
| both levels. For | | |
| example, if MFA is | | |
| used when a user | | |
| connects to the CDE | | |
| network, it does not | | |
| have to be used when | | |
| the user logs into | | |
| each system or | | |
| application within | | |
| the CDE. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requiring more than |
| | | one type of |
| | | authentication |
| | | factor reduces the |
| | | probability that an |
| | | attacker can gain |
| | | access to a system |
| | | by masquerading as a |
| | | legitimate user, |
| | | because the attacker |
| | | would need to |
| | | compromise multiple |
| | | authentication |
| | | factors. |
| | | |
| | | This is especially |
| | | true in environments |
| | | where traditionally |
| | | the single |
| | | authentication |
| | | factor employed was |
| | | something a user |
| | | knows, such as a |
| | | password or |
| | | passphrase. |
| | | |
| | | **Definitions** |
| | | |
| | | Multi-factor |
| | | authentication (MFA) |
| | | requires an |
| | | individual to |
| | | present a minimum of |
| | | two of the three |
| | | authentication |
| | | factors specified in |
| | | Requirement 8.3.1 |
| | | before access is |
| | | granted. Using one |
| | | factor twice (for |
| | | example, using two |
| | | separate passwords) |
| | | is not considered |
| | | multi- factor |
| | | authentication. |
+-----------------------+-----------------------+----------------------+
| **8.4.3** MFA is | **8.4.3.a** Examine | |
| implemented for all | network and/or system | |
| remote network access | configurations for | |
| originating from | remote access servers | |
| outside the entity's | and systems to verify | |
| network that could | MFA is required in | |
| access or impact the | accordance with all | |
| CDE as follows: | elements specified in | |
| | this requirement. | |
| - All remote access | | |
| by all personnel, | | |
| both users and | | |
| administrators, | | |
| originating from | | |
| outside the | | |
| entity's network. | | |
| | | |
| - All remote access | | |
| by third parties | | |
| and vendors. | | |
+-----------------------+-----------------------+----------------------+
| | **8.4.3.b** Observe | |
| | personnel (for | |
| | example, users and | |
| | administrators) | |
| | connecting remotely | |
| | to the network and | |
| | verify that | |
| | multi-factor | |
| | authentication is | |
| | required. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Remote access to the | | |
| entity's network | | |
| cannot be obtained by | | |
| using a single | | |
| authentication | | |
| factor. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The requirement for | | |
| MFA for remote access | | |
| originating from | | |
| outside the entity's | | |
| network applies to | | |
| all user accounts | | |
| that can access the | | |
| network remotely, | | |
| where that remote | | |
| access leads to or | | |
| could lead to access | | |
| into the CDE. | | |
| | | |
| If remote access is | | |
| to a part of the | | |
| entity's network that | | |
| is properly segmented | | |
| from the CDE, such | | |
| that remote users | | |
| cannot access or | | |
| impact the CDE, MFA | | |
| for remote access to | | |
| that part of the | | |
| network is not | | |
| required. However, | | |
| MFA is required for | | |
| any remote access to | | |
| networks with access | | |
| to the CDE and is | | |
| recommended for all | | |
| remote access to the | | |
| entity's networks. | | |
| | | |
| The MFA requirements | | |
| apply for all types | | |
| of system components, | | |
| including cloud, | | |
| hosted systems, and | | |
| on-premises | | |
| applications, network | | |
| security devices, | | |
| workstations, | | |
| servers, and | | |
| endpoints, and | | |
| includes access | | |
| directly to an | | |
| entity's networks or | | |
| systems as well as | | |
| web-based access to | | |
| an application or | | |
| function. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **8.5** Multi-factor | | |
| authentication (MFA) | | |
| systems are | | |
| configured to prevent | | |
| misuse. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Poorly configured |
| | | MFA systems can be |
| | | bypassed by |
| | | attackers. This |
| | | requirement |
| | | therefore addresses |
| | | configuration of MFA |
| | | system(s) that |
| | | provide MFA for |
| | | users accessing |
| | | system components in |
| | | the CDE. |
| | | |
| | | **Definitions** |
| | | |
| | | Using one type of |
| | | factor twice (for |
| | | example, using two |
| | | separate passwords) |
| | | is not considered |
| | | multi- factor |
| | | authentication. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For more information |
| | | about MFA systems |
| | | and features, refer |
| | | to the following: |
| | | |
| | | PCI SSC's |
| | | *Information |
| | | Supplement: |
| | | Multi-Factor |
| | | Authentication* |
| | | |
| | | PCI SSC's Frequently |
| | | Asked Questions |
| | | (FAQs) on this |
| | | topic. |
+-----------------------+-----------------------+----------------------+
| 1. MFA systems are | **8.5.1.a** Examine | |
| implemented as | vendor system | |
| follows: | documentation to | |
| | verify that the MFA | |
| - The MFA | system is not | |
| system is not | susceptible to replay | |
| susceptible | attacks. | |
| to replay | | |
| attacks. | | |
| | | |
| - MFA systems | | |
| cannot be | | |
| bypassed by | | |
| any users, | | |
| including | | |
| | | |
| administrative | | |
| users unless | | |
| specifically | | |
| documented, | | |
| and | | |
| authorized by | | |
| management on | | |
| an exception | | |
| basis, for a | | |
| limited time | | |
| period. | | |
| | | |
| - At least two | | |
| different | | |
| types of | | |
| | | |
| authentication | | |
| factors are | | |
| used. | | |
| | | |
| - Success of | | |
| all | | |
| | | |
| authentication | | |
| factors is | | |
| required | | |
| before access | | |
| is granted. | | |
+-----------------------+-----------------------+----------------------+
| | **8.5.1.b** Examine | |
| | system configurations | |
| | for the MFA | |
| | implementation to | |
| | verify it is | |
| | configured in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **8.5.1.c** Interview | |
| | responsible personnel | |
| | and observe processes | |
| | to verify that any | |
| | requests to bypass | |
| | MFA are specifically | |
| | documented and | |
| | authorized by | |
| | management on an | |
| | exception basis, for | |
| | a limited time | |
| | period. | |
+-----------------------+-----------------------+----------------------+
| | **8.5.1.d** Observe | |
| | personnel logging | |
| | into system | |
| | components in the CDE | |
| | to verify that access | |
| | is granted only after | |
| | all authentication | |
| | factors are | |
| | successful. | |
+-----------------------+-----------------------+----------------------+
| | **8.5.1.e** Observe | |
| | personnel connecting | |
| | remotely from outside | |
| | the entity's network | |
| | to verify that access | |
| | is granted only after | |
| | all authentication | |
| | factors are | |
| | successful. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| MFA systems are | | |
| resistant to attack | | |
| and strictly control | | |
| any administrative | | |
| overrides. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **8.6** Use of | | |
| application and | | |
| system accounts and | | |
| associated | | |
| authentication | | |
| factors is strictly | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Like individual user |
| | | accounts, system and |
| | | application accounts |
| | | require |
| | | accountability and |
| | | strict management to |
| | | ensure they are used |
| | | only for the |
| | | intended purpose and |
| | | are not misused. |
| | | |
| | | Attackers often |
| | | compromise system or |
| | | application accounts |
| | | to gain access to |
| | | cardholder data. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where possible, |
| | | configure system and |
| | | application accounts |
| | | to disallow |
| | | interactive login to |
| | | prevent unauthorized |
| | | individuals from |
| | | logging in and using |
| | | the account with its |
| | | associated system |
| | | privileges, and to |
| | | limit the machines |
| | | and devices on which |
| | | the account can be |
| | | used. |
| | | |
| | | **Definitions** |
| | | |
| | | System or |
| | | application accounts |
| | | are those accounts |
| | | that execute |
| | | processes or perform |
| | | tasks on a computer |
| | | system or |
| | | application and are |
| | | not typically |
| | | accounts that an |
| | | individual logs |
| | | into. |
| | | |
| | | These accounts |
| | | usually have |
| | | elevated privileges |
| | | that are required to |
| | | perform specialized |
| | | tasks or functions. |
| | | |
| | | Interactive login is |
| | | the ability for a |
| | | person to log into a |
| | | system or |
| | | application account |
| | | in the same manner |
| | | as a normal user |
| | | account. Using |
| | | system and |
| | | application accounts |
| | | this way means there |
| | | is no accountability |
| | | and traceability of |
| | | actions taken by the |
| | | user. |
+-----------------------+-----------------------+----------------------+
| 1. If accounts used | **8.6.1** Examine | |
| by systems or | application and | |
| applications can | system accounts that | |
| be used for | can be used | |
| interactive | interactively and | |
| login, they are | interview | |
| managed as | administrative | |
| follows: | personnel to verify | |
| | that application and | |
| - Interactive | system accounts are | |
| use is | managed in accordance | |
| prevented | with all elements | |
| unless needed | specified in this | |
| for an | requirement. | |
| exceptional | | |
| circumstance. | | |
| | | |
| - Interactive | | |
| use is | | |
| limited to | | |
| the time | | |
| needed for | | |
| the | | |
| exceptional | | |
| circumstance. | | |
| | | |
| - Business | | |
| justification | | |
| for | | |
| interactive | | |
| use is | | |
| documented. | | |
| | | |
| - Interactive | | |
| use is | | |
| explicitly | | |
| approved by | | |
| management. | | |
| | | |
| - Individual | | |
| user identity | | |
| is confirmed | | |
| before access | | |
| to account is | | |
| granted. | | |
| | | |
| - Every action | | |
| taken is | | |
| attributable | | |
| to an | | |
| individual | | |
| user. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| When used | | |
| interactively, all | | |
| actions with accounts | | |
| designated as system | | |
| or application | | |
| accounts are | | |
| authorized and | | |
| attributable to an | | |
| individual person. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Not properly |
| | | protecting |
| | | p |
| | | asswords/passphrases |
| | | used by application |
| | | and system accounts, |
| | | especially if those |
| | | accounts can be used |
| | | for interactive |
| | | login, increases the |
| | | risk and success of |
| | | unauthorized use of |
| | | those privileged |
| | | accounts. |
| | | |
| | | **Good Practice** |
| | | |
| | | Changing these |
| | | values due to |
| | | suspected or |
| | | confirmed disclosure |
| | | can be particularly |
| | | difficult to |
| | | implement. |
| | | |
| | | Tools can facilitate |
| | | both management and |
| | | security of |
| | | authentication |
| | | factors for |
| | | application and |
| | | system accounts. For |
| | | example, consider |
| | | password vaults or |
| | | other system-managed |
| | | controls. |
+-----------------------+-----------------------+----------------------+
| **8.6.2** | **8.6.2.a** Interview | |
| Passwords/passphrases | personnel and examine | |
| for any application | system development | |
| and system accounts | procedures to verify | |
| that can be used for | that processes are | |
| interactive login are | defined for | |
| not hard coded in | application and | |
| scripts, | system accounts that | |
| c | can be used for | |
| onfiguration/property | interactive login, | |
| files, or bespoke and | specifying that | |
| custom source code. | passwords/passphrases | |
| | are not hard coded in | |
| | scripts, | |
| | c | |
| | onfiguration/property | |
| | files, or bespoke and | |
| | custom source code. | |
+-----------------------+-----------------------+----------------------+
| | **8.6.2.b** Examine | |
| | scripts, | |
| | c | |
| | onfiguration/property | |
| | files, and bespoke | |
| | and custom source | |
| | code for application | |
| | and system accounts | |
| | that can be used for | |
| | interactive login, to | |
| | verify | |
| | passwords/passphrases | |
| | for those accounts | |
| | are not present. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Passwords/passphrases | | |
| used by application | | |
| and system accounts | | |
| cannot be used by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Stored | | |
| passwords/passphrases | | |
| are required to be | | |
| encrypted in | | |
| accordance with PCI | | |
| DSS Requirement | | |
| 8.3.2. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Systems and |
| | | application accounts |
| | | pose more inherent |
| | | security risk than |
| | | user accounts |
| | | because they often |
| | | run in an elevated |
| | | security context, |
| | | with access to |
| | | systems that may not |
| | | be typically granted |
| | | to user accounts, |
| | | such as programmatic |
| | | access to databases, |
| | | etc. As a result, |
| | | special |
| | | consideration must |
| | | be made to protect |
| | | p |
| | | asswords/passphrases |
| | | used for application |
| | | and system accounts. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | consider the |
| | | following risk |
| | | factors when |
| | | determining how to |
| | | protect application |
| | | and system |
| | | p |
| | | asswords/passphrases |
| | | against misuse: |
| | | |
| | | - How securely the |
| | | p |
| | | asswords/passphrases |
| | | are stored (for |
| | | example, whether |
| | | they are stored |
| | | in a password |
| | | vault). |
| | | |
| | | - Staff turnover. |
| | | |
| | | - The number of |
| | | people with |
| | | access to the |
| | | authentication |
| | | factor. |
| | | |
| | | - Whether the |
| | | account can be |
| | | used for |
| | | interactive |
| | | login. |
| | | |
| | | - Whether the |
| | | security posture |
| | | of accounts is |
| | | dynamically |
| | | analyzed, and |
| | | real-time access |
| | | to resources is |
| | | automatically |
| | | determined |
| | | accordingly (see |
| | | Requirement |
| | | 8.3.9). |
| | | |
| | | All these elements |
| | | affect the level of |
| | | risk for application |
| | | and system accounts |
| | | and might impact the |
| | | security of systems |
| | | accessed by the |
| | | system and |
| | | application |
| | | accounts. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **8.6.3** | **8.6.3.a** Examine | |
| Passwords/passphrases | policies and | |
| for any application | procedures to verify | |
| and system accounts | that procedures are | |
| are protected against | defined to protect | |
| misuse as follows: | passwords/passphrases | |
| | for application or | |
| - | system accounts | |
| Passwords/passphrases | against misuse in | |
| are changed | accordance with all | |
| periodically (at | elements specified in | |
| the frequency | this requirement. | |
| defined in the | | |
| entity's targeted | | |
| risk analysis, | | |
| which is | | |
| performed | | |
| according to all | | |
| elements | | |
| specified in | | |
| Requirement | | |
| 12.3.1) and upon | | |
| suspicion or | | |
| confirmation of | | |
| compromise. | | |
| | | |
| - | | |
| Passwords/passphrases | | |
| are constructed | | |
| with sufficient | | |
| complexity | | |
| appropriate for | | |
| how frequently | | |
| the entity | | |
| changes the | | |
| p | | |
| asswords/passphrases. | | |
+-----------------------+-----------------------+----------------------+
| | **8.6.3.b** Examine | |
| | the entity's targeted | |
| | risk analysis for the | |
| | change frequency and | |
| | complexity for | |
| | passwords/passphrases | |
| | used for interactive | |
| | login to application | |
| | and system accounts | |
| | to verify the risk | |
| | analysis was | |
| | performed in | |
| | accordance with all | |
| | elements specified in | |
| | Requirement 12.3.1 | |
| | and addresses: | |
| | | |
| | - The frequency | |
| | defined for | |
| | periodic changes | |
| | to application | |
| | and system | |
| | p | |
| | asswords/passphrases. | |
| | | |
| | - The complexity | |
| | defined for | |
| | | |
| | passwords/passphrases | |
| | and | |
| | appropriateness | |
| | of the complexity | |
| | relative to the | |
| | frequency of | |
| | changes. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | **8.6.3.c** Interview | |
| Objective** | responsible personnel | |
| | and examine system | |
| | configuration | |
| | settings to verify | |
| | that | |
| | passwords/passphrases | |
| | for any application | |
| | and system accounts | |
| | that can be used for | |
| | interactive login are | |
| | protected against | |
| | misuse in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| Passwords/passphrases | | |
| used by application | | |
| and system accounts | | |
| cannot be used | | |
| indefinitely and are | | |
| structured to resist | | |
| brute-force and | | |
| guessing attacks. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | Entities should |
| | | correlate their |
| | | selected change |
| | | frequency for |
| | | application and |
| | | system |
| | | passwords/passwords |
| | | with their selected |
| | | complexity for those |
| | | p |
| | | asswords/passphrases |
| | | -- i.e., the |
| | | complexity should be |
| | | more rigorous when |
| | | p |
| | | asswords/passphrases |
| | | are changed |
| | | infrequently and can |
| | | be less rigorous |
| | | when changed more |
| | | frequently. For |
| | | example, a longer |
| | | change frequency is |
| | | more justifiable |
| | | when |
| | | p |
| | | asswords/passphrases |
| | | complexity is set to |
| | | 36 alphanumeric |
| | | characters with |
| | | upper- and lower- |
| | | case letters, |
| | | numbers, and special |
| | | characters. |
| | | |
| | | Best practices are |
| | | to consider password |
| | | changes at least |
| | | once a year, a |
| | | password/passphrase |
| | | length of at least |
| | | 15 characters, and |
| | | complexity for the |
| | | passwords/passphrase |
| | | of alphanumeric |
| | | characters, with |
| | | upper- and |
| | | lower-case letters, |
| | | and special |
| | | characters. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For information |
| | | about variability |
| | | and equivalency of |
| | | password strength |
| | | for |
| | | p |
| | | asswords/passphrases |
| | | of different |
| | | formats, see the |
| | | industry standards |
| | | (for example, the |
| | | current version of |
| | | *NIST SP 800- 63 |
| | | Digital Identity |
| | | Guidelines*). |
+-----------------------+-----------------------+----------------------+
### *Requirement 9: Restrict Physical Access to Cardholder Data* {#requirement-9-restrict-physical-access-to-cardholder-data .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for restricting physical access to |
| cardholder data are defined and understood. |
| |
| 2. Physical access controls manage entry into facilities and systems |
| containing cardholder data. |
| |
| 3. Physical access for personnel and visitors is authorized and |
| managed. |
| |
| 4. Media with cardholder data is securely stored, accessed, |
| distributed, and destroyed. |
| |
| 5. Point of interaction (POI) devices are protected from tampering |
| and unauthorized substitution. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Any physical access to cardholder data or systems that store, |
| > process, or transmit cardholder data provides the opportunity for |
| > individuals to access and/or remove systems or hardcopies |
| > containing cardholder data; therefore, physical access should be |
| > appropriately restricted. |
| > |
| > There are three different areas mentioned in Requirement 9: |
| |
| 1. Requirements that specifically refer to sensitive areas are |
| intended to apply to those areas only. |
| |
| 2. Requirements that specifically refer to the cardholder data |
| environment (CDE) are intended to apply to the entire CDE, |
| including any sensitive areas residing within the CDE. |
| |
| 3. Requirements that specifically refer to the facility are |
| referencing the types of controls that may be managed more |
| broadly at the physical boundary of a business premise (such as a |
| building) within which CDEs and sensitive areas reside. These |
| controls often exist outside a CDE or sensitive area, for example |
| a guard desk that identifies, badges, and logs visitors. The term |
| "facility" is used to recognize that these controls may exist at |
| different places within a facility, for instance, at building |
| entry or at an internal entrance to a data center or office |
| space. |
| |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of "media," "personnel," "sensitive areas" and |
| > other PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| restricting | | |
| physical access | | |
| to cardholder | | |
| data are defined | | |
| and understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 9.1.1 is |
| | | about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 9. While |
| | | it is important to |
| | | define the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 9, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
| | | |
| | | Policies and |
| | | procedures, |
| | | including updates, |
| | | are actively |
| | | communicated to all |
| | | affected personnel, |
| | | and are supported by |
| | | operating procedures |
| | | describing how to |
| | | perform activities. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **9.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 9 | operational | |
| are: | procedures identified | |
| | in Requirement 9 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 9 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities, |
| | | and critical |
| | | activities may not |
| | | occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **9.1.2** Roles and | **9.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 9 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 9 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **9.1.2.b** Interview | |
| | personnel with | |
| | responsibility for | |
| | performing activities | |
| | in Requirement 9 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 9 are | | |
| allocated. Personnel | | |
| are accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **9.2** Physical | | |
| access controls | | |
| manage entry into | | |
| facilities and | | |
| systems containing | | |
| cardholder data. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without physical |
| | | access controls, |
| | | unauthorized persons |
| | | could potentially |
| | | gain access to the |
| | | CDE and sensitive |
| | | information, or |
| | | could alter system |
| | | configurations, |
| | | introduce |
| | | vulnerabilities into |
| | | the network, or |
| | | destroy or steal |
| | | equipment. |
| | | Therefore, the |
| | | purpose of this |
| | | requirement is that |
| | | physical access to |
| | | the CDE is |
| | | controlled via |
| | | physical security |
| | | controls such as |
| | | badge readers or |
| | | other mechanisms |
| | | such as lock and |
| | | key. |
| | | |
| | | **Good Practice** |
| | | |
| | | Whichever mechanism |
| | | meets this |
| | | requirement, it must |
| | | be sufficient for |
| | | the organization to |
| | | verify that only |
| | | authorized personnel |
| | | are granted access. |
| | | |
| | | **Examples** |
| | | |
| | | Facility entry |
| | | controls include |
| | | physical security |
| | | controls at each |
| | | computer room, data |
| | | center, and other |
| | | physical areas with |
| | | systems in the CDE. |
| | | It can also include |
| | | badge readers or |
| | | other devices that |
| | | manage physical |
| | | access controls, |
| | | such as lock and key |
| | | with a current list |
| | | of all individuals |
| | | holding the keys. |
+-----------------------+-----------------------+----------------------+
| **9.2.1** Appropriate | **9.2.1** Observe | |
| facility entry | entry controls and | |
| controls are in place | interview responsible | |
| to restrict physical | personnel to verify | |
| access to systems in | that physical | |
| the CDE. | security controls are | |
| | in place to restrict | |
| | access to systems in | |
| | the CDE. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System components in | | |
| the CDE cannot be | | |
| physically accessed | | |
| by unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Maintaining details |
| | | of individuals |
| | | entering and exiting |
| | | the sensitive areas |
| | | can help with |
| | | investigations of |
| | | physical breaches by |
| | | identifying |
| | | individuals that |
| | | physically accessed |
| | | the sensitive areas, |
| | | as well as when they |
| | | entered and exited. |
| | | |
| | | **Good Practice** |
| | | |
| | | Whichever mechanism |
| | | meets this |
| | | requirement, it |
| | | should effectively |
| | | monitor all entry |
| | | and exit points to |
| | | sensitive areas. |
| | | |
| | | Criminals attempting |
| | | to gain physical |
| | | access to sensitive |
| | | areas will often try |
| | | to disable or bypass |
| | | the monitoring |
| | | controls. To protect |
| | | these controls from |
| | | tampering, video |
| | | cameras could be |
| | | positioned so they |
| | | are out of reach |
| | | and/or be monitored |
| | | to detect tampering. |
| | | Similarly, physical |
| | | access control |
| | | mechanisms could be |
| | | monitored or have |
| | | physical protections |
| | | installed to prevent |
| | | them from being |
| | | damaged or disabled |
| | | by malicious |
| | | individuals. |
+-----------------------+-----------------------+----------------------+
| 1. Individual | **9.2.1.1.a** Observe | |
| physical access | locations where | |
| to sensitive | individual physical | |
| areas within the | access to sensitive | |
| CDE is monitored | areas within the CDE | |
| with either video | occurs to verify that | |
| cameras or | either video cameras | |
| physical access | or physical access | |
| control | control mechanisms | |
| mechanisms (or | (or both) are in | |
| both) as follows: | place to monitor the | |
| | entry and exit | |
| - Entry and | points. | |
| exit points | | |
| to/from | | |
| sensitive | | |
| areas within | | |
| the CDE are | | |
| monitored. | | |
| | | |
| - Monitoring | | |
| devices or | | |
| mechanisms | | |
| are protected | | |
| from | | |
| tampering or | | |
| disabling. | | |
| | | |
| - Collected | | |
| data is | | |
| reviewed and | | |
| correlated | | |
| with other | | |
| entries. | | |
| | | |
| - Collected | | |
| data is | | |
| stored for at | | |
| least three | | |
| months, | | |
| unless | | |
| otherwise | | |
| restricted by | | |
| law. | | |
+-----------------------+-----------------------+----------------------+
| | **9.2.1.1.b** Observe | |
| | locations where | |
| | individual physical | |
| | access to sensitive | |
| | areas within the CDE | |
| | occurs to verify that | |
| | either video cameras | |
| | or physical access | |
| | control mechanisms | |
| | (or both) are | |
| | protected from | |
| | tampering or | |
| | disabling. | |
+-----------------------+-----------------------+----------------------+
| | **9.2.1.1.c** Observe | |
| | the physical access | |
| | control mechanisms | |
| | and/or examine video | |
| | cameras and interview | |
| | responsible personnel | |
| | to verify that: | |
| | | |
| | - Collected data | |
| | from video | |
| | cameras and/or | |
| | physical access | |
| | control | |
| | mechanisms is | |
| | reviewed and | |
| | correlated with | |
| | other entries. | |
| | | |
| | - Collected data is | |
| | stored for at | |
| | least three | |
| | months. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Trusted, verifiable | | |
| records are | | |
| maintained of | | |
| individual physical | | |
| entry to, and exit | | |
| from, sensitive | | |
| areas. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Restricting access |
| | | to network jacks (or |
| | | network ports) will |
| | | prevent malicious |
| | | individuals from |
| | | plugging into |
| | | readily available |
| | | network jacks and |
| | | gaining access to |
| | | the CDE or systems |
| | | connected to the |
| | | CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | Whether logical or |
| | | physical controls, |
| | | or a combination of |
| | | both, are used, they |
| | | should prevent an |
| | | individual or device |
| | | that is not |
| | | explicitly |
| | | authorized from |
| | | being able to |
| | | connect to the |
| | | network. |
| | | |
| | | **Examples** |
| | | |
| | | Methods to meet this |
| | | requirement include |
| | | network jacks |
| | | located in public |
| | | areas and areas |
| | | accessible to |
| | | visitors could be |
| | | disabled and only |
| | | enabled when network |
| | | access is explicitly |
| | | authorized. |
| | | |
| | | Alternatively, |
| | | processes could be |
| | | implemented to |
| | | ensure that visitors |
| | | are escorted at all |
| | | times in areas with |
| | | active network |
| | | jacks. |
+-----------------------+-----------------------+----------------------+
| **9.2.2** Physical | **9.2.2** Interview | |
| and/or logical | responsible personnel | |
| controls are | and observe locations | |
| implemented to | of publicly | |
| restrict use of | accessible network | |
| publicly accessible | jacks to verify that | |
| network jacks within | physical and/or | |
| the facility. | logical controls are | |
| | in place to restrict | |
| | access to publicly | |
| | accessible network | |
| | jacks within the | |
| | facility. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized devices | | |
| cannot connect to the | | |
| entity's network from | | |
| public areas within | | |
| the facility. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without appropriate |
| | | physical security |
| | | over access to |
| | | wireless components |
| | | and devices, and |
| | | computer networking |
| | | and |
| | | telecommunications |
| | | equipment and lines, |
| | | malicious users |
| | | could gain access to |
| | | the entity's network |
| | | resources. |
| | | |
| | | Additionally, they |
| | | could connect their |
| | | own devices to the |
| | | network to gain |
| | | unauthorized access |
| | | to the CDE or |
| | | systems connected to |
| | | the CDE. |
| | | |
| | | Additionally, |
| | | securing networking |
| | | and communications |
| | | hardware prevents |
| | | malicious users from |
| | | intercepting network |
| | | traffic or |
| | | physically |
| | | connecting their own |
| | | devices to wired |
| | | network resources. |
+-----------------------+-----------------------+----------------------+
| **9.2.3** Physical | **9.2.3** Interview | |
| access to wireless | responsible personnel | |
| access points, | and observe locations | |
| gateways, | of hardware and lines | |
| netw | to verify that | |
| orking/communications | physical access to | |
| hardware, and | wireless access | |
| telecommunication | points, gateways, | |
| lines within the | netw | |
| facility is | orking/communications | |
| restricted. | hardware, and | |
| | telecommunication | |
| | lines within the | |
| | facility is | |
| | restricted. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Physical networking | | |
| equipment cannot be | | |
| accessed by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Locking console |
| | | login screens |
| | | prevents |
| | | unauthorized persons |
| | | from gaining access |
| | | to sensitive |
| | | information, |
| | | altering system |
| | | configurations, |
| | | introducing |
| | | vulnerabilities into |
| | | the network, or |
| | | destroying records. |
+-----------------------+-----------------------+----------------------+
| **9.2.4** Access to | **9.2.4** Observe a | |
| consoles in sensitive | system | |
| areas is restricted | administrator's | |
| via locking when not | attempt to log into | |
| in use. | consoles in sensitive | |
| | areas and verify that | |
| | they are "locked" to | |
| | prevent unauthorized | |
| | use. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Physical consoles | | |
| within sensitive | | |
| areas cannot be used | | |
| by unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **9.3** Physical | | |
| access for personnel | | |
| and visitors is | | |
| authorized and | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Establishing |
| | | procedures for |
| | | granting, managing, |
| | | and removing access |
| | | when it is no longer |
| | | needed ensures |
| | | non-authorized |
| | | individuals are |
| | | prevented from |
| | | gaining access to |
| | | areas containing |
| | | cardholder data. In |
| | | addition, it is |
| | | important to limit |
| | | access to the actual |
| | | badging system and |
| | | badging materials to |
| | | prevent unauthorized |
| | | personnel from |
| | | making their own |
| | | badges and/or |
| | | setting up their own |
| | | access rules. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | visually identify |
| | | the personnel that |
| | | are physically |
| | | present, and whether |
| | | the individual is a |
| | | visitor or an |
| | | employee. |
| | | |
| | | **Examples** |
| | | |
| | | One way to identify |
| | | personnel is to |
| | | assign them badges. |
+-----------------------+-----------------------+----------------------+
| 1. Procedures are | **9.3.1.a** Examine | |
| implemented for | documented procedures | |
| authorizing and | to verify that | |
| managing physical | procedures to | |
| access of | authorize and manage | |
| personnel to the | physical access of | |
| CDE, including: | personnel to the CDE | |
| | are defined in | |
| - Identifying | accordance with all | |
| personnel. | elements specified in | |
| | this requirement. | |
| - Managing | | |
| changes to an | | |
| individual's | | |
| physical | | |
| access | | |
| requirements. | | |
| | | |
| - Revoking or | | |
| terminating | | |
| personnel | | |
| | | |
| identification. | | |
| | | |
| - Limiting | | |
| access to the | | |
| | | |
| identification | | |
| process or | | |
| system to | | |
| authorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| | **9.3.1.b** Observe | |
| | identification | |
| | methods, such as ID | |
| | badges, and processes | |
| | to verify that | |
| | personnel in the CDE | |
| | are clearly | |
| | identified. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.1.c** Observe | |
| | processes to verify | |
| | that access to the | |
| | identification | |
| | process, such as a | |
| | badge system, is | |
| | limited to authorized | |
| | personnel. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Requirements for | | |
| access to the | | |
| physical CDE are | | |
| defined and enforced | | |
| to identify and | | |
| authorize personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Controlling physical |
| | | access to sensitive |
| | | areas helps ensure |
| | | that only authorized |
| | | personnel with a |
| | | legitimate business |
| | | need are granted |
| | | access. |
| | | |
| | | **Good Practice** |
| | | |
| | | Where possible, |
| | | organizations should |
| | | have policies and |
| | | procedures to ensure |
| | | that before |
| | | personnel leaving |
| | | the organization, |
| | | all physical access |
| | | mechanisms are |
| | | returned, or |
| | | disabled as soon as |
| | | possible upon their |
| | | departure. This will |
| | | ensure personnel |
| | | cannot gain physical |
| | | access to sensitive |
| | | areas once their |
| | | employment has |
| | | ended. |
+-----------------------+-----------------------+----------------------+
| 1. Physical access | **9.3.1.1.a** Observe | |
| to sensitive | personnel in | |
| areas within the | sensitive areas | |
| CDE for personnel | within the CDE, | |
| is controlled as | interview responsible | |
| follows: | personnel, and | |
| | examine physical | |
| - Access is | access control lists | |
| authorized | to verify that: | |
| and based on | | |
| individual | - Access to the | |
| job function. | sensitive area is | |
| | authorized. | |
| - Access is | | |
| revoked | - Access is | |
| immediately | required for the | |
| upon | individual's job | |
| termination. | function. | |
| | | |
| - All physical | | |
| access | | |
| mechanisms, | | |
| such as keys, | | |
| access cards, | | |
| etc., are | | |
| returned or | | |
| disabled upon | | |
| termination. | | |
+-----------------------+-----------------------+----------------------+
| | **9.3.1.1.b** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify that access | |
| | of all personnel is | |
| | revoked immediately | |
| | upon termination. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.1.1.c** For | |
| | terminated personnel, | |
| | examine physical | |
| | access controls lists | |
| | and interview | |
| | responsible personnel | |
| | to verify that all | |
| | physical access | |
| | mechanisms (such as | |
| | keys, access cards, | |
| | etc.) were returned | |
| | or disabled. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Sensitive areas | | |
| cannot be accessed by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Visitor controls are |
| | | important to reduce |
| | | the ability of |
| | | unauthorized and |
| | | malicious persons to |
| | | gain access to |
| | | facilities and |
| | | potentially to |
| | | cardholder data. |
| | | |
| | | Visitor controls |
| | | ensure visitors are |
| | | identifiable as |
| | | visitors so |
| | | personnel can |
| | | monitor their |
| | | activities, and that |
| | | their access is |
| | | restricted to just |
| | | the duration of |
| | | their legitimate |
| | | visit. |
+-----------------------+-----------------------+----------------------+
| **9.3.2** Procedures | **9.3.2.a** Examine | |
| are implemented for | documented procedures | |
| authorizing and | and interview | |
| managing visitor | personnel to verify | |
| access to the CDE, | procedures are | |
| including: | defined for | |
| | authorizing and | |
| - Visitors are | managing visitor | |
| authorized before | access to the CDE in | |
| entering. | accordance with all | |
| | elements specified in | |
| - Visitors are | this requirement. | |
| escorted at all | | |
| times. | | |
| | | |
| - Visitors are | | |
| clearly | | |
| identified and | | |
| given a badge or | | |
| other | | |
| identification | | |
| that expires. | | |
| | | |
| - Visitor badges or | | |
| other | | |
| identification | | |
| visibly | | |
| distinguishes | | |
| visitors from | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| | **9.3.2.b** Observe | |
| | processes when | |
| | visitors are present | |
| | in the CDE and | |
| | interview personnel | |
| | to verify that | |
| | visitors are: | |
| | | |
| | - Authorized before | |
| | entering the CDE. | |
| | | |
| | - Escorted at all | |
| | times within the | |
| | CDE. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.2.c** Observe | |
| | the use of visitor | |
| | badges or other | |
| | identification to | |
| | verify that the badge | |
| | or other | |
| | identification does | |
| | not permit unescorted | |
| | access to the CDE. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.2.d** Observe | |
| | visitors in the CDE | |
| | to verify that: | |
| | | |
| | - Visitor badges or | |
| | other | |
| | identification | |
| | are being used | |
| | for all visitors. | |
| | | |
| | - Visitor badges or | |
| | identification | |
| | easily | |
| | distinguish | |
| | visitors from | |
| | personnel. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.2.e** Examine | |
| | visitor badges or | |
| | other identification | |
| | and observe evidence | |
| | in the badging system | |
| | to verify visitor | |
| | badges or other | |
| | identification | |
| | expires. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Requirements for | | |
| visitor access to the | | |
| CDE are defined and | | |
| enforced. Visitors | | |
| cannot exceed any | | |
| authorized physical | | |
| access allowed while | | |
| in the CDE. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Ensuring that |
| | | visitor badges are |
| | | returned or |
| | | deactivated upon |
| | | expiry or completion |
| | | of the visit |
| | | prevents malicious |
| | | persons from using a |
| | | previously |
| | | authorized pass to |
| | | gain physical access |
| | | into the building |
| | | after the visit has |
| | | ended. |
+-----------------------+-----------------------+----------------------+
| **9.3.3** Visitor | **9.3.3** Observe | |
| badges or | visitors leaving the | |
| identification are | facility and | |
| surrendered or | interview personnel | |
| deactivated before | to verify visitor | |
| visitors leave the | badges or other | |
| facility or at the | identification are | |
| date of expiration. | surrendered or | |
| | deactivated before | |
| | visitors leave the | |
| | facility or at the | |
| | date of expiration. | |
| | upon departure or | |
| | expiration. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Visitor | | |
| identification or | | |
| badges cannot be | | |
| reused after | | |
| expiration. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A visitor log |
| | | documenting minimum |
| | | information about |
| | | the visitor is easy |
| | | and inexpensive to |
| | | maintain. It will |
| | | assist in |
| | | identifying |
| | | historical physical |
| | | access to a building |
| | | or room and |
| | | potential access to |
| | | cardholder data. |
| | | |
| | | **Good Practice** |
| | | |
| | | When logging the |
| | | date and time of |
| | | visit, including |
| | | both in and out |
| | | times is considered |
| | | a best practice, |
| | | since it provides |
| | | helpful tracking |
| | | information and |
| | | provides assurance |
| | | that a visitor has |
| | | left at the end of |
| | | the day. It is also |
| | | good to verify that |
| | | a visitor's ID |
| | | (driver's license, |
| | | etc.) matches the |
| | | name they put on the |
| | | visitor log. |
+-----------------------+-----------------------+----------------------+
| **9.3.4** A visitor | **9.3.4.a** Examine | |
| log is used to | the visitor log and | |
| maintain a physical | interview responsible | |
| record of visitor | personnel to verify | |
| activity within the | that a visitor log is | |
| facility and within | used to record | |
| sensitive areas, | physical access to | |
| including: | the facility and | |
| | sensitive areas. | |
| - The visitor's | | |
| name and the | | |
| organization | | |
| represented. | | |
| | | |
| - The date and time | | |
| of the visit. | | |
| | | |
| - The name of the | | |
| personnel | | |
| authorizing | | |
| physical access. | | |
| | | |
| - Retaining the log | | |
| for at least | | |
| three months, | | |
| unless otherwise | | |
| restricted by | | |
| law. | | |
+-----------------------+-----------------------+----------------------+
| | **9.3.4.b** Examine | |
| | the visitor log and | |
| | verify that the log | |
| | contains: | |
| | | |
| | - The visitor's | |
| | name and the | |
| | organization | |
| | represented. | |
| | | |
| | - The personnel | |
| | authorizing | |
| | physical access. | |
| | | |
| | - Date and time of | |
| | visit. | |
+-----------------------+-----------------------+----------------------+
| | **9.3.4.c** Examine | |
| | visitor log storage | |
| | locations and | |
| | interview responsible | |
| | personnel to verify | |
| | that the log is | |
| | retained for at least | |
| | three months, unless | |
| | otherwise restricted | |
| | by law. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of visitor | | |
| access that enable | | |
| the identification of | | |
| individuals are | | |
| maintained. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **9.4** Media with | | |
| cardholder data is | | |
| securely stored, | | |
| accessed, | | |
| distributed, and | | |
| destroyed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Controls for |
| | | physically securing |
| | | media are intended |
| | | to prevent |
| | | unauthorized persons |
| | | from gaining access |
| | | to cardholder data |
| | | on any media. |
| | | Cardholder data is |
| | | susceptible to |
| | | unauthorized |
| | | viewing, copying, or |
| | | scanning if it is |
| | | unprotected while it |
| | | is on removable or |
| | | portable media, |
| | | printed out, or left |
| | | on someone's desk. |
+-----------------------+-----------------------+----------------------+
| **9.4.1** All media | **9.4.1.** Examine | |
| with cardholder data | documentation to | |
| is physically | verify that the | |
| secured. | procedures defined | |
| | for protecting | |
| | cardholder data | |
| | include controls for | |
| | physically securing | |
| | all media. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Media with cardholder | | |
| data cannot be | | |
| accessed by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **9.4.1.1** Offline | **9.4.1.1.a** Examine | **Purpose** |
| media backups with | documentation to | |
| cardholder data are | verify that | If stored in a |
| stored in a secure | procedures are | non-secured |
| location. | defined for | facility, backups |
| | physically securing | containing |
| | offline media backups | cardholder data may |
| | with cardholder data | easily be lost, |
| | in a secure location. | stolen, or copied |
| | | for malicious |
| | | intent. |
| | | |
| | | **Good Practice** |
| | | |
| | | For secure storage |
| | | of backup media, a |
| | | good practice is to |
| | | store media in an |
| | | off-site facility, |
| | | such as an alternate |
| | | or backup site or |
| | | commercial storage |
| | | facility. |
+-----------------------+-----------------------+----------------------+
| | **9.4.1.1.b** Examine | |
| | logs or other | |
| | documentation and | |
| | interview responsible | |
| | personnel at the | |
| | storage location to | |
| | verify that offline | |
| | media backups are | |
| | stored in a secure | |
| | location. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Offline backups | | |
| cannot be accessed by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Conducting regular |
| | | reviews of the |
| | | storage facility |
| | | enables the |
| | | organization to |
| | | address identified |
| | | security issues |
| | | promptly, minimizing |
| | | the potential risk. |
| | | It is important for |
| | | the entity to be |
| | | aware of the |
| | | security of the area |
| | | where media is being |
| | | stored. |
+-----------------------+-----------------------+----------------------+
| **9.4.1.2** The | **9.4.1.2.a** Examine | |
| security of the | documentation to | |
| offline media backup | verify that | |
| location(s) with | procedures are | |
| cardholder data is | defined for reviewing | |
| reviewed at least | the security of the | |
| once every 12 months. | offline media backup | |
| | location(s) with | |
| | cardholder data at | |
| | least once every 12 | |
| | months. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.1.2.b** Examine | |
| | documented | |
| | procedures, logs, or | |
| | other documentation, | |
| | and interview | |
| | responsible personnel | |
| | at the storage | |
| | location(s) to verify | |
| | that the storage | |
| | location's security | |
| | is reviewed at least | |
| | once every 12 months. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The security controls | | |
| protecting offline | | |
| backups are verified | | |
| periodically by | | |
| inspection. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Media not identified |
| | | as confidential may |
| | | not be adequately |
| | | protected or may be |
| | | lost or stolen. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important that |
| | | media be identified |
| | | such that its |
| | | classification |
| | | status is apparent. |
| | | This does not mean |
| | | however that the |
| | | media needs to have |
| | | a "confidential" |
| | | label. |
+-----------------------+-----------------------+----------------------+
| **9.4.2** All media | **9.4.2.a** Examine | |
| with cardholder data | documentation to | |
| is classified in | verify that | |
| accordance with the | procedures are | |
| sensitivity of the | defined for | |
| data. | classifying media | |
| | with cardholder data | |
| | in accordance with | |
| | the sensitivity of | |
| | the data. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.2.b** Examine | |
| | media logs or other | |
| | documentation to | |
| | verify that all media | |
| | is classified in | |
| | accordance with the | |
| | sensitivity of the | |
| | data. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Media are classified | | |
| and protected | | |
| appropriately. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Media may be lost or |
| | | stolen if sent via a |
| | | non- trackable |
| | | method such as |
| | | regular postal mail. |
| | | The use of secure |
| | | couriers to deliver |
| | | any media that |
| | | contains cardholder |
| | | data allows |
| | | organizations to use |
| | | their tracking |
| | | systems to maintain |
| | | inventory and |
| | | location of |
| | | shipments. |
+-----------------------+-----------------------+----------------------+
| **9.4.3** Media with | **9.4.3.a** Examine | |
| cardholder data sent | documentation to | |
| outside the facility | verify that | |
| is secured as | procedures are | |
| follows: | defined for securing | |
| | media sent outside | |
| - Media sent | the facility in | |
| outside the | accordance with all | |
| facility is | elements specified in | |
| logged. | this requirement. | |
| | | |
| - Media is sent by | | |
| secured courier | | |
| or other delivery | | |
| method that can | | |
| be accurately | | |
| tracked. | | |
| | | |
| - Offsite tracking | | |
| logs include | | |
| details about | | |
| media location. | | |
+-----------------------+-----------------------+----------------------+
| | **9.4.3.b** Interview | |
| | personnel and examine | |
| | records to verify | |
| | that all media sent | |
| | outside the facility | |
| | is logged and sent | |
| | via secured courier | |
| | or other delivery | |
| | method that can be | |
| | tracked. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.3.c** Examine | |
| | offsite tracking logs | |
| | for all media to | |
| | verify tracking | |
| | details are | |
| | documented. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Media is secured and | | |
| tracked when | | |
| transported outside | | |
| the facility. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without a firm |
| | | process for ensuring |
| | | that all media |
| | | movements are |
| | | approved before the |
| | | media is removed |
| | | from secure areas, |
| | | the media would not |
| | | be tracked or |
| | | appropriately |
| | | protected, and its |
| | | location would be |
| | | unknown, leading to |
| | | lost or stolen |
| | | media. |
+-----------------------+-----------------------+----------------------+
| **9.4.4** Management | **9.4.4.a** Examine | |
| approves all media | documentation to | |
| with cardholder data | verify that | |
| that is moved outside | procedures are | |
| the facility | defined to ensure | |
| (including when media | that media moved | |
| is distributed to | outside the facility | |
| individuals). | is approved by | |
| | management. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.4.b** Examine | |
| | offsite media | |
| | tracking logs and | |
| | interview responsible | |
| | personnel to verify | |
| | that proper | |
| | management | |
| | authorization is | |
| | obtained for all | |
| | media moved outside | |
| | the facility | |
| | (including media | |
| | distributed to | |
| | individuals). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Media cannot leave a | | |
| facility without the | | |
| approval of | | |
| accountable | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Individuals approving | | |
| media movements | | |
| should have the | | |
| appropriate level of | | |
| management authority | | |
| to grant this | | |
| approval. However, it | | |
| is not specifically | | |
| required that such | | |
| individuals have | | |
| "manager" as part of | | |
| their title. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without careful |
| | | inventory methods |
| | | and storage |
| | | controls, stolen or |
| | | missing electronic |
| | | media could go |
| | | unnoticed for an |
| | | indefinite amount of |
| | | time. |
+-----------------------+-----------------------+----------------------+
| **9.4.5** Inventory | **9.4.5.a** Examine | |
| logs of all | documentation to | |
| electronic media with | verify that | |
| cardholder data are | procedures are | |
| maintained. | defined to maintain | |
| | electronic media | |
| | inventory logs. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.5.b** Examine | |
| | electronic media | |
| | inventory logs and | |
| | interview responsible | |
| | personnel to verify | |
| | that logs are | |
| | maintained. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Accurate inventories | | |
| of stored electronic | | |
| media are maintained. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without careful |
| | | inventory methods |
| | | and storage |
| | | controls, stolen or |
| | | missing electronic |
| | | media could go |
| | | unnoticed for an |
| | | indefinite amount of |
| | | time. |
+-----------------------+-----------------------+----------------------+
| **9.4.5.1** | **9.4.5.1.a** Examine | |
| Inventories of | documentation to | |
| electronic media with | verify that | |
| cardholder data are | procedures are | |
| conducted at least | defined to conduct | |
| once every 12 months. | inventories of | |
| | electronic media with | |
| | cardholder data at | |
| | least once every 12 | |
| | months. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.5.1.b** Examine | |
| | electronic media | |
| | inventory logs and | |
| | interview personnel | |
| | to verify that | |
| | electronic media | |
| | inventories are | |
| | performed at least | |
| | once every 12 months. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Media inventories are | | |
| verified | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If steps are not |
| | | taken to destroy |
| | | information |
| | | contained on |
| | | hard-copy media |
| | | before disposal, |
| | | malicious |
| | | individuals may |
| | | retrieve information |
| | | from the disposed |
| | | media, leading to a |
| | | data compromise. For |
| | | example, malicious |
| | | individuals may use |
| | | a technique known as |
| | | "dumpster diving," |
| | | where they search |
| | | through trashcans |
| | | and recycle bins |
| | | looking for |
| | | hard-copy materials |
| | | with information |
| | | they can use to |
| | | launch an attack. |
| | | |
| | | Securing storage |
| | | containers used for |
| | | materials that are |
| | | going to be |
| | | destroyed prevents |
| | | sensitive |
| | | information from |
| | | being captured while |
| | | the materials are |
| | | being collected. |
| | | |
| | | **Good Practice** |
| | | |
| | | Consider |
| | | "to-be-shredded" |
| | | containers with a |
| | | lock that prevents |
| | | access to its |
| | | contents or that |
| | | physically prevent |
| | | access to the inside |
| | | of the container. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See *NIST Special |
| | | Publication 800-88, |
| | | Revision 1: |
| | | Guidelines for Media |
| | | Sanitization*. |
+-----------------------+-----------------------+----------------------+
| **9.4.6** Hard-copy | **9.4.6.a** Examine | |
| materials with | the periodic media | |
| cardholder data are | destruction policy to | |
| destroyed when no | verify that | |
| longer needed for | procedures are | |
| business or legal | defined to destroy | |
| reasons, as follows: | hard-copy media with | |
| | cardholder data when | |
| - Materials are | no longer needed for | |
| cross-cut | business or legal | |
| shredded, | reasons in accordance | |
| incinerated, or | with all elements | |
| pulped so that | specified in this | |
| cardholder data | requirement. | |
| cannot be | | |
| reconstructed. | | |
| | | |
| - Materials are | | |
| stored in secure | | |
| storage | | |
| containers prior | | |
| to destruction. | | |
+-----------------------+-----------------------+----------------------+
| | **9.4.6.b** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify that | |
| | hard-copy materials | |
| | are cross-cut | |
| | shredded, | |
| | incinerated, or | |
| | pulped such that | |
| | cardholder data | |
| | cannot be | |
| | reconstructed. | |
+-----------------------+-----------------------+----------------------+
| | **9.4.6.c** Observe | |
| | storage containers | |
| | used for materials | |
| | that contain | |
| | information to be | |
| | destroyed to verify | |
| | that the containers | |
| | are secure. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cardholder data | | |
| cannot be recovered | | |
| from media that has | | |
| been destroyed or | | |
| which is pending | | |
| destruction. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| These requirements | | |
| for media destruction | | |
| when that media is no | | |
| longer needed for | | |
| business or legal | | |
| reasons are separate | | |
| and distinct from PCI | | |
| DSS Requirement | | |
| 3.2.1, which is for | | |
| securely deleting | | |
| cardholder data when | | |
| no longer needed per | | |
| the entity's | | |
| cardholder data | | |
| retention policies. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If steps are not |
| | | taken to destroy |
| | | information |
| | | contained on |
| | | electronic media |
| | | when no longer |
| | | needed, malicious |
| | | individuals may |
| | | retrieve information |
| | | from the disposed |
| | | media, leading to a |
| | | data compromise. For |
| | | example, malicious |
| | | individuals may use |
| | | a technique known as |
| | | "dumpster diving," |
| | | where they search |
| | | through trashcans |
| | | and recycle bins |
| | | looking for |
| | | information they can |
| | | use to launch an |
| | | attack. |
| | | |
| | | **Good Practice** |
| | | |
| | | The deletion |
| | | function in most |
| | | operating systems |
| | | allows deleted data |
| | | to be recovered, so |
| | | instead, a dedicated |
| | | secure deletion |
| | | function or |
| | | application should |
| | | be used to make data |
| | | unrecoverable. |
| | | |
| | | **Examples** |
| | | |
| | | Methods for securely |
| | | destroying |
| | | electronic media |
| | | include secure |
| | | wiping in accordance |
| | | with |
| | | industry-accepted |
| | | standards for secure |
| | | deletion, |
| | | degaussing, or |
| | | physical destruction |
| | | (such as grinding or |
| | | shredding hard |
| | | disks). |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See *NIST Special |
| | | Publication 800-88, |
| | | Revision 1: |
| | | Guidelines for Media |
| | | Sanitization* |
+-----------------------+-----------------------+----------------------+
| **9.4.7** Electronic | **9.4.7.a** Examine | |
| media with cardholder | the periodic media | |
| data is destroyed | destruction policy to | |
| when no longer needed | verify that | |
| for business or legal | procedures are | |
| reasons via one of | defined to destroy | |
| the following: | electronic media when | |
| | no longer needed for | |
| - The electronic | business or legal | |
| media is | reasons in accordance | |
| destroyed. | with all elements | |
| | specified in this | |
| - The cardholder | requirement. | |
| data is rendered | | |
| unrecoverable so | | |
| that it cannot be | | |
| reconstructed. | | |
+-----------------------+-----------------------+----------------------+
| | **9.4.7.b** Observe | |
| | the media destruction | |
| | process and interview | |
| | responsible personnel | |
| | to verify that | |
| | electronic media with | |
| | cardholder data is | |
| | destroyed via one of | |
| | the methods specified | |
| | in this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Cardholder data | | |
| cannot be recovered | | |
| from media that has | | |
| been erased or | | |
| destroyed. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| These requirements | | |
| for media destruction | | |
| when that media is no | | |
| longer needed for | | |
| business or legal | | |
| reasons are separate | | |
| and distinct from PCI | | |
| DSS Requirement | | |
| 3.2.1, which is for | | |
| securely deleting | | |
| cardholder data when | | |
| no longer needed per | | |
| the entity's | | |
| cardholder data | | |
| retention policies. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **9.5** | | |
| Point-of-interaction | | |
| (POI) devices are | | |
| protected from | | |
| tampering and | | |
| unauthorized | | |
| substitution. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Criminals attempt to |
| | | steal payment card |
| | | data by stealing |
| | | and/or manipulating |
| | | card-reading devices |
| | | and terminals. |
| | | Criminals will try |
| | | to steal devices so |
| | | they can learn how |
| | | to break into them, |
| | | and they often try |
| | | to replace |
| | | legitimate devices |
| | | with fraudulent |
| | | devices that send |
| | | them payment card |
| | | data every time a |
| | | card is entered. |
| | | |
| | | They will also try |
| | | to add "skimming" |
| | | components to the |
| | | outside of devices, |
| | | which are designed |
| | | to capture payment |
| | | card data before it |
| | | enters the |
| | | device---for |
| | | example, by |
| | | attaching an |
| | | additional card |
| | | reader on top of the |
| | | legitimate card |
| | | reader so that the |
| | | payment card data is |
| | | captured twice: once |
| | | by the criminal's |
| | | component and then |
| | | by the device's |
| | | legitimate |
| | | component. In this |
| | | way, transactions |
| | | may still be |
| | | completed without |
| | | interruption while |
| | | the criminal is |
| | | "skimming" the |
| | | payment card data |
| | | during the process. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Additional best |
| | | practices on |
| | | skimming prevention |
| | | are available on the |
| | | PCI SSC website. |
+-----------------------+-----------------------+----------------------+
| 1. POI devices that | **9.5.1** Examine | |
| capture payment | documented policies | |
| card data via | and procedures to | |
| direct physical | verify that processes | |
| interaction with | are defined that | |
| the payment card | include all elements | |
| form factor are | specified in this | |
| protected from | requirement. | |
| tampering and | | |
| unauthorized | | |
| substitution, | | |
| including the | | |
| following: | | |
| | | |
| - Maintaining a | | |
| list of POI | | |
| devices. | | |
| | | |
| - Periodically | | |
| inspecting | | |
| POI devices | | |
| to look for | | |
| tampering or | | |
| unauthorized | | |
| substitution. | | |
| | | |
| - Training | | |
| personnel to | | |
| be aware of | | |
| suspicious | | |
| behavior and | | |
| to report | | |
| tampering or | | |
| unauthorized | | |
| substitution | | |
| of devices. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The entity has | | |
| defined procedures to | | |
| protect and manage | | |
| point of interaction | | |
| devices. | | |
| Expectations, | | |
| controls, and | | |
| oversight for the | | |
| management and | | |
| protection of POI | | |
| devices are defined | | |
| and adhered to by | | |
| affected personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| These requirements | | |
| apply to deployed POI | | |
| devices used in | | |
| card-present | | |
| transactions (that | | |
| is, a payment card | | |
| form factor such as a | | |
| card that is swiped, | | |
| tapped, or dipped). | | |
| This requirement is | | |
| not intended to apply | | |
| to manual PAN | | |
| key-entry components | | |
| such as computer | | |
| keyboards. | | |
| | | |
| This requirement is | | |
| recommended, but not | | |
| required, for manual | | |
| PAN key-entry | | |
| components such as | | |
| computer keyboards. | | |
| | | |
| This requirement does | | |
| not apply to | | |
| commercial off- | | |
| the-shelf (COTS) | | |
| devices (for example, | | |
| smartphones or | | |
| tablets), which are | | |
| mobile merchant-owned | | |
| devices designed for | | |
| mass-market | | |
| distribution. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Keeping an |
| | | up-to-date list of |
| | | POI devices helps an |
| | | organization track |
| | | where devices are |
| | | supposed to be and |
| | | quickly identify if |
| | | a device is missing |
| | | or lost. |
| | | |
| | | **Good Practice** |
| | | |
| | | The method for |
| | | maintaining a list |
| | | of devices may be |
| | | automated (for |
| | | example, a device- |
| | | management system) |
| | | or manual (for |
| | | example, documented |
| | | in electronic or |
| | | paper records). For |
| | | on-the-road devices, |
| | | the location may |
| | | include the name of |
| | | the personnel to |
| | | whom the device is |
| | | assigned. |
| | | |
| | | **Examples** |
| | | |
| | | Methods to maintain |
| | | device locations |
| | | include identifying |
| | | the address of the |
| | | site or facility |
| | | where the device is |
| | | located. |
+-----------------------+-----------------------+----------------------+
| 1. An up-to-date | **9.5.1.1.a** Examine | |
| list of POI | the list of POI | |
| devices is | devices to verify it | |
| maintained, | includes all elements | |
| including: | specified in this | |
| | requirement. | |
| - Make and | | |
| model of the | | |
| device. | | |
| | | |
| - Location of | | |
| device. | | |
| | | |
| - Device serial | | |
| number or | | |
| other methods | | |
| of unique | | |
| | | |
| identification. | | |
+-----------------------+-----------------------+----------------------+
| | **9.5.1.1.b** Observe | |
| | POI devices and | |
| | device locations and | |
| | compare to devices in | |
| | the list to verify | |
| | that the list is | |
| | accurate and up to | |
| | date. | |
+-----------------------+-----------------------+----------------------+
| | **9.5.1.1.c** | |
| | Interview personnel | |
| | to verify the list of | |
| | POI devices is | |
| | updated when devices | |
| | are added, relocated, | |
| | decommissioned, etc. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The identity and | | |
| location of POI | | |
| devices is recorded | | |
| and known at all | | |
| times. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regular inspections |
| | | of devices will help |
| | | organizations detect |
| | | tampering more |
| | | quickly via external |
| | | evidence---for |
| | | example, the |
| | | addition of a card |
| | | skimmer---or |
| | | replacement of a |
| | | device, thereby |
| | | minimizing the |
| | | potential impact of |
| | | using fraudulent |
| | | devices. |
| | | |
| | | **Good Practice** |
| | | |
| | | Methods for periodic |
| | | inspection include |
| | | checking the serial |
| | | number or other |
| | | device |
| | | characteristics and |
| | | comparing the |
| | | information to the |
| | | list of POI devices |
| | | to verify the device |
| | | has not been swapped |
| | | with a fraudulent |
| | | device. |
| | | |
| | | **Examples** |
| | | |
| | | The type of |
| | | inspection will |
| | | depend on the |
| | | device. For |
| | | instance, |
| | | photographs of |
| | | devices known to be |
| | | secure can be used |
| | | to compare a |
| | | device's current |
| | | appearance with its |
| | | original appearance |
| | | to see whether it |
| | | has changed. Another |
| | | option may be to use |
| | | a secure marker pen, |
| | | such as a UV light |
| | | marker, to mark |
| | | device surfaces and |
| | | device openings so |
| | | any tampering or |
| | | replacement will be |
| | | apparent. Criminals |
| | | will often replace |
| | | the outer casing of |
| | | a device to hide |
| | | their tampering, and |
| | | these methods may |
| | | help to detect such |
| | | activities. Device |
| | | vendors may also |
| | | provide security |
| | | guidance and "how |
| | | to" guides to help |
| | | determine whether |
| | | the device has been |
| | | subject to |
| | | tampering. |
| | | |
| | | Signs that a device |
| | | might have been |
| | | tampered with or |
| | | substituted include: |
| | | |
| | | - Unexpected |
| | | attachments or |
| | | cables plugged |
| | | into the device. |
| | | |
| | | - Missing or |
| | | changed security |
| | | labels. |
| | | |
| | | - Broken or |
| | | differently |
| | | colored casing. |
| | | |
| | | - Changes to the |
| | | serial number or |
| | | other external |
| | | markings. |
+-----------------------+-----------------------+----------------------+
| **9.5.1.2** POI | **9.5.1.2.a** Examine | |
| device surfaces are | documented procedures | |
| periodically | to verify processes | |
| inspected to detect | are defined for | |
| tampering and | periodic inspections | |
| unauthorized | of POI device | |
| substitution. | surfaces to detect | |
| | tampering and | |
| | unauthorized | |
| | substitution. | |
+-----------------------+-----------------------+----------------------+
| | **9.5.1.2.b** | |
| | Interview responsible | |
| | personnel and observe | |
| | inspection processes | |
| | to verify: | |
| | | |
| | - Personnel are | |
| | aware of | |
| | procedures for | |
| | inspecting | |
| | devices. | |
| | | |
| | - All devices are | |
| | periodically | |
| | inspected for | |
| | evidence of | |
| | tampering and | |
| | unauthorized | |
| | substitution. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Point of Interaction | | |
| Devices cannot be | | |
| tampered with, | | |
| substituted without | | |
| authorization, or | | |
| have skimming | | |
| attachments installed | | |
| without timely | | |
| detection. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Entities are best |
| | | placed to determine |
| | | the frequency of POI |
| | | device inspections |
| | | based on the |
| | | environment in which |
| | | the device operates. |
| | | |
| | | **Good Practice** |
| | | |
| | | The frequency of |
| | | inspections will |
| | | depend on factors |
| | | such as the location |
| | | of a device and |
| | | whether the device |
| | | is attended or |
| | | unattended. For |
| | | example, devices |
| | | left in public areas |
| | | without supervision |
| | | by the |
| | | organization's |
| | | personnel might have |
| | | more frequent |
| | | inspections than |
| | | devices kept in |
| | | secure areas or |
| | | supervised when |
| | | accessible to the |
| | | public. In addition, |
| | | many POI vendors |
| | | include guidance in |
| | | their user |
| | | documentation about |
| | | how often POI |
| | | devices should be |
| | | checked, and for |
| | | what -- entities |
| | | should consult their |
| | | vendors' |
| | | documentation and |
| | | incorporate those |
| | | recommendations into |
| | | their periodic |
| | | inspections. |
+-----------------------+-----------------------+----------------------+
| **9.5.1.2.1** The | **9.5.1.2.1.a** | |
| frequency of periodic | Examine the entity's | |
| POI device | targeted risk | |
| inspections and the | analysis for the | |
| type of inspections | frequency of periodic | |
| performed is defined | POI device | |
| in the entity's | inspections and type | |
| targeted risk | of inspections | |
| analysis, which is | performed to verify | |
| performed according | the risk analysis was | |
| to all elements | performed in | |
| specified in | accordance with all | |
| Requirement 12.3.1. | elements specified in | |
| | Requirement 12.3.1. | |
+-----------------------+-----------------------+----------------------+
| | **9.5.1.2.1.b** | |
| | Examine documented | |
| | results of periodic | |
| | device inspections | |
| | and interview | |
| | personnel to verify | |
| | that the frequency | |
| | and type of POI | |
| | device inspections | |
| | performed match what | |
| | is defined in the | |
| | entity's targeted | |
| | risk analysis | |
| | conducted for this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| POI devices are | | |
| inspected at a | | |
| frequency that | | |
| addresses the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Criminals will often |
| | | pose as authorized |
| | | maintenance |
| | | personnel to gain |
| | | access to POI |
| | | devices. |
| | | |
| | | **Good Practice** |
| | | |
| | | Personnel training |
| | | should include being |
| | | alert to and |
| | | questioning anyone |
| | | who shows up to do |
| | | POI maintenance to |
| | | ensure they are |
| | | authorized and have |
| | | a valid work order, |
| | | including any |
| | | agents, maintenance |
| | | or repair personnel, |
| | | technicians, service |
| | | providers, or other |
| | | third parties. All |
| | | third parties |
| | | requesting access to |
| | | devices should |
| | | always be verified |
| | | before being |
| | | provided |
| | | access---for |
| | | example, by checking |
| | | with management or |
| | | phoning the POI |
| | | maintenance company, |
| | | such as the vendor |
| | | or acquirer, for |
| | | verification. Many |
| | | criminals will try |
| | | to fool personnel by |
| | | dressing for the |
| | | part (for example, |
| | | carrying toolboxes |
| | | and dressed in work |
| | | apparel), and could |
| | | also be |
| | | knowledgeable about |
| | | locations of |
| | | devices, so |
| | | personnel should be |
| | | trained to always |
| | | follow procedures. |
| | | |
| | | Another trick that |
| | | criminals use is to |
| | | send a "new" POI |
| | | device with |
| | | instructions for |
| | | swapping it with a |
| | | legitimate device |
| | | and "returning" the |
| | | legitimate device. |
| | | The criminals may |
| | | even provide return |
| | | postage to their |
| | | specified address. |
| | | Therefore, personnel |
| | | should always verify |
| | | with their manager |
| | | or supplier that the |
| | | device is legitimate |
| | | and came from a |
| | | trusted source |
| | | before installing it |
| | | or using it for |
| | | business. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **9.5.1.3** Training | **9.5.1.3.a** Review | |
| is provided for | training materials | |
| personnel in POI | for personnel in POI | |
| environments to be | environments to | |
| aware of attempted | verify they include | |
| tampering or | all elements | |
| replacement of POI | specified in this | |
| devices, and | requirement. | |
| includes: | | |
| | | |
| - Verifying the | | |
| identity of any | | |
| third-party | | |
| persons claiming | | |
| to be repair or | | |
| maintenance | | |
| personnel, before | | |
| granting them | | |
| access to modify | | |
| or troubleshoot | | |
| devices. | | |
| | | |
| - Procedures to | | |
| ensure devices | | |
| are not | | |
| installed, | | |
| replaced, or | | |
| returned without | | |
| verification. | | |
| | | |
| - Being aware of | | |
| suspicious | | |
| behavior around | | |
| devices. | | |
| | | |
| - Reporting | | |
| suspicious | | |
| behavior and | | |
| indications of | | |
| device tampering | | |
| or substitution | | |
| to appropriate | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| | **9.5.1.3.b** | |
| | Interview personnel | |
| | in POI environments | |
| | to verify they have | |
| | received training and | |
| | know the procedures | |
| | for all elements | |
| | specified in this | |
| | requirement**.** | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel are | | |
| knowledgeable about | | |
| the types of attacks | | |
| against POI devices, | | |
| the entity's | | |
| technical and | | |
| procedural | | |
| countermeasures, and | | |
| can access assistance | | |
| and guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Examples** |
| | | |
| | | Suspicious behavior |
| | | that personnel |
| | | should be aware of |
| | | includes attempts by |
| | | unknown persons to |
| | | unplug or open |
| | | devices. |
| | | |
| | | Ensuring personnel |
| | | are aware of |
| | | mechanisms for |
| | | reporting suspicious |
| | | behavior and who to |
| | | report such behavior |
| | | to---for example, a |
| | | manager or security |
| | | officer---will help |
| | | reduce the |
| | | likelihood and |
| | | potential impact of |
| | | a device being |
| | | tampered with or |
| | | substituted. |
+-----------------------+-----------------------+----------------------+
## Regularly Monitor and Test Networks {#regularly-monitor-and-test-networks .unnumbered}
### *Requirement 10: Log and Monitor All Access to System Components and Cardholder Data* {#requirement-10-log-and-monitor-all-access-to-system-components-and-cardholder-data .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for logging and monitoring all access to |
| system components and cardholder data are defined and documented. |
| |
| 2. Audit logs are implemented to support the detection of anomalies |
| and suspicious activity, and the forensic analysis of events. |
| |
| 3. Audit logs are protected from destruction and unauthorized |
| modifications. |
| |
| 4. Audit logs are reviewed to identify anomalies or suspicious |
| activity. |
| |
| 5. Audit log history is retained and available for analysis. |
| |
| 6. Time-synchronization mechanisms support consistent time settings |
| across all systems. |
| |
| 7. Failures of critical security control systems are detected, |
| reported, and responded to promptly. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Logging mechanisms and the ability to track user activities are |
| > critical in preventing, detecting, or minimizing the impact of a |
| > data compromise. The presence of logs on all system components and |
| > in the cardholder data environment (CDE) allows thorough tracking, |
| > alerting, and analysis when something does go wrong. Determining |
| > the cause of a compromise is difficult, if not impossible, without |
| > system activity logs. |
| |
| This requirement applies to user activities, including those by |
| employees, contractors, consultants, and internal and external |
| vendors, and other third parties (for example, those providing |
| support or maintenance services). |
| |
| These requirements do not apply to user activity of consumers |
| (cardholders). Refer to *[Appendix |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| logging and | | |
| monitoring all | | |
| access to system | | |
| components and | | |
| cardholder data | | |
| are defined and | | |
| documented. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 10.1.1 |
| | | is about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 10. |
| | | While it is |
| | | important to define |
| | | the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 10, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **10.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 10 | operational | |
| are: | procedures identified | |
| | in Requirement 10 are | |
| - Documented. | managed in accordance | |
| | with all elements | |
| - Kept up to | specified in this | |
| date. | requirement. | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 10 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **10.1.2** Roles and | **10.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 10 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 10 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **10.1.2.b** | |
| | Interview personnel | |
| | with responsibility | |
| | for performing | |
| | activities in | |
| | Requirement 10 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as defined | |
| | and are understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 10 are | | |
| allocated. | | |
| | | |
| Personnel are | | |
| accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **10.2** Audit logs | | |
| are implemented to | | |
| support the detection | | |
| of anomalies and | | |
| suspicious activity, | | |
| and the forensic | | |
| analysis of events. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Audit logs must |
| | | exist for all system |
| | | components. Audit |
| | | logs send alerts the |
| | | system |
| | | administrator, |
| | | provides data to |
| | | other monitoring |
| | | mechanisms, such as |
| | | intrusion-detection |
| | | systems (IDS) and |
| | | security information |
| | | and event monitoring |
| | | systems (SIEM) |
| | | tools, and provide a |
| | | history trail for |
| | | post-incident |
| | | investigation. |
| | | |
| | | Logging and |
| | | analyzing |
| | | security-relevant |
| | | events enable an |
| | | organization to |
| | | identify and trace |
| | | potentially |
| | | malicious |
| | | activities. |
| | | |
| | | **Good Practice** |
| | | |
| | | When an entity |
| | | considers which |
| | | information to |
| | | record in their |
| | | logs, it is |
| | | important to |
| | | remember that |
| | | information stored |
| | | in audit logs is |
| | | sensitive and should |
| | | be protected per |
| | | requirements in this |
| | | standard. Care |
| | | should be taken to |
| | | only store essential |
| | | information in the |
| | | audit logs to |
| | | minimize risk. |
+-----------------------+-----------------------+----------------------+
| **10.2.1** Audit logs | **10.2.1** Interview | |
| are enabled and | the system | |
| active for all system | administrator and | |
| components and | examine system | |
| cardholder data. | configurations to | |
| | verify that audit | |
| | logs are enabled and | |
| | active for all system | |
| | components. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| activities affecting | | |
| system components and | | |
| cardholder data are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is critical to |
| | | have a process or |
| | | system that links |
| | | user access to |
| | | system components |
| | | accessed. |
| | | |
| | | Malicious |
| | | individuals could |
| | | obtain knowledge of |
| | | a user account with |
| | | access to systems in |
| | | the CDE, or they |
| | | could create a new, |
| | | unauthorized account |
| | | to access cardholder |
| | | data. |
| | | |
| | | **Good Practice** |
| | | |
| | | A record of all |
| | | individual access to |
| | | cardholder data can |
| | | identify which |
| | | accounts may have |
| | | been compromised or |
| | | misused. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.1** Audit | **10.2.1.1** Examine | |
| logs capture all | audit log | |
| individual user | configurations and | |
| access to cardholder | log data to verify | |
| data. | that all individual | |
| | user access to | |
| | cardholder data is | |
| | logged. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| individual user | | |
| access to cardholder | | |
| data are captured. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Accounts with |
| | | increased access |
| | | privileges, such as |
| | | the "administrator" |
| | | or "root" account, |
| | | have the potential |
| | | to significantly |
| | | impact the security |
| | | or operational |
| | | functionality of a |
| | | system. Without a |
| | | log of the |
| | | activities |
| | | performed, an |
| | | organization is |
| | | cannot trace any |
| | | issues resulting |
| | | from an |
| | | administrative |
| | | mistake or misuse of |
| | | privilege back to |
| | | the specific action |
| | | and account. |
| | | |
| | | **Definitions** |
| | | |
| | | Accounts with |
| | | administrative |
| | | access are those |
| | | assigned with |
| | | specific privileges |
| | | or abilities for |
| | | that account to |
| | | manage systems, |
| | | networks, and/or |
| | | applications. The |
| | | functions or |
| | | activities |
| | | considered to be |
| | | administrative are |
| | | beyond those |
| | | performed by regular |
| | | users as part of |
| | | routine business |
| | | functions. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.2** Audit | **10.2.1.2** Examine | |
| logs capture all | audit log | |
| actions taken by any | configurations and | |
| individual with | log data to verify | |
| administrative | that all actions | |
| access, including any | taken by any | |
| interactive use of | individual with | |
| application or system | administrative | |
| accounts. | access, including any | |
| | interactive use of | |
| | application or system | |
| | accounts, are logged. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| actions performed by | | |
| individuals with | | |
| elevated privileges | | |
| are captured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Malicious users |
| | | often attempt to |
| | | alter audit logs to |
| | | hide their actions. |
| | | A record of access |
| | | allows an |
| | | organization to |
| | | trace any |
| | | inconsistencies or |
| | | potential tampering |
| | | of the logs to an |
| | | individual account. |
| | | Having logs identify |
| | | changes, additions, |
| | | and deletions to the |
| | | audit logs can help |
| | | retrace steps made |
| | | by unauthorized |
| | | personnel. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.3** Audit | **10.2.1.3** Examine | |
| logs capture all | audit log | |
| access to audit logs. | configurations and | |
| | log data to verify | |
| | that access to all | |
| | audit logs is | |
| | captured. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all access | | |
| to audit logs are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Malicious |
| | | individuals will |
| | | often perform |
| | | multiple access |
| | | attempts on targeted |
| | | systems. Multiple |
| | | invalid login |
| | | attempts may be an |
| | | indication of an |
| | | unauthorized user's |
| | | attempts to "brute |
| | | force" or guess a |
| | | password. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.4** Audit | **10.2.1.4** Examine | |
| logs capture all | audit log | |
| invalid logical | configurations and | |
| access attempts. | log data to verify | |
| | that invalid logical | |
| | access attempts are | |
| | captured. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| invalid access | | |
| attempts are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Logging changes to |
| | | authentication |
| | | credentials |
| | | (including elevation |
| | | of privileges, |
| | | additions, and |
| | | deletions of |
| | | accounts with |
| | | administrative |
| | | access) provides |
| | | residual evidence of |
| | | activities. |
| | | |
| | | Malicious users may |
| | | attempt to |
| | | manipulate |
| | | authentication |
| | | credentials to |
| | | bypass them or |
| | | impersonate a valid |
| | | account. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.5** Audit | **10.2.1.5** Examine | |
| logs capture all | audit log | |
| changes to | configurations and | |
| identification and | log data to verify | |
| authentication | that changes to | |
| credentials | identification and | |
| including, but not | authentication | |
| limited to: | credentials are | |
| | captured in | |
| - Creation of new | accordance with all | |
| accounts. | elements specified in | |
| | this requirement. | |
| - Elevation of | | |
| privileges. | | |
| | | |
| - All changes, | | |
| additions, or | | |
| deletions to | | |
| accounts with | | |
| administrative | | |
| access. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| changes to | | |
| identification and | | |
| authentication | | |
| credentials are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Turning off or |
| | | pausing audit logs |
| | | before performing |
| | | illicit activities |
| | | is common practice |
| | | for malicious users |
| | | who want to avoid |
| | | detection. |
| | | |
| | | Initialization of |
| | | audit logs could |
| | | indicate that that a |
| | | user disabled the |
| | | log function to hide |
| | | their actions. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.6** Audit | **10.2.1.6** Examine | |
| logs capture the | audit log | |
| following: | configurations and | |
| | log data to verify | |
| - All | that all elements | |
| initialization of | specified in this | |
| new audit logs, | requirement are | |
| and | captured. | |
| | | |
| - All starting, | | |
| stopping, or | | |
| pausing of the | | |
| existing audit | | |
| logs. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of all | | |
| changes to audit log | | |
| activity status are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Malicious software, |
| | | such as malware, |
| | | often creates or |
| | | replaces |
| | | system-level objects |
| | | on the target system |
| | | to control a |
| | | particular function |
| | | or operation on that |
| | | system. By logging |
| | | when system-level |
| | | objects are created |
| | | or deleted, it will |
| | | be easier to |
| | | determine whether |
| | | such modifications |
| | | were authorized. |
+-----------------------+-----------------------+----------------------+
| **10.2.1.7** Audit | **10.2.1.7** Examine | |
| logs capture all | audit log | |
| creation and deletion | configurations and | |
| of system-level | log data to verify | |
| objects. | that creation and | |
| | deletion of system | |
| | level objects is | |
| | captured. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records of | | |
| alterations that | | |
| indicate a system has | | |
| been modified from | | |
| its intended | | |
| functionality are | | |
| captured. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | By recording these |
| | | details for the |
| | | auditable events at |
| | | 10.2.1.1 through |
| | | 10.2.1.7, a |
| | | potential compromise |
| | | can be quickly |
| | | identified, with |
| | | sufficient detail to |
| | | facilitate following |
| | | up on suspicious |
| | | activities. |
+-----------------------+-----------------------+----------------------+
| **10.2.2** Audit logs | **10.2.2** Interview | |
| record the following | personnel and examine | |
| details for each | audit log | |
| auditable event: | configurations and | |
| | log data to verify | |
| - User | that all elements | |
| identification. | specified in this | |
| | requirement are | |
| - Type of event. | included in log | |
| | entries for each | |
| - Date and time. | auditable event (from | |
| | 10.2.1.1 through | |
| - Success and | 10.2.1.7). | |
| failure | | |
| indication. | | |
| | | |
| - Origination of | | |
| event. | | |
| | | |
| - Identity or name | | |
| of affected data, | | |
| system component, | | |
| resource, or | | |
| service (for | | |
| example, name and | | |
| protocol). | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Sufficient data to be | | |
| able to identify | | |
| successful and failed | | |
| attempts and who, | | |
| what, when, where, | | |
| and how for each | | |
| event listed in | | |
| requirement 10.2.1 | | |
| are captured. | | |
+-----------------------+-----------------------+----------------------+
| **10.3** Audit logs | | |
| are protected from | | |
| destruction and | | |
| unauthorized | | |
| modifications. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Audit log files |
| | | contain sensitive |
| | | information, and |
| | | read access to the |
| | | log files must be |
| | | limited only to |
| | | those with a valid |
| | | business need. This |
| | | access includes |
| | | audit log files on |
| | | the originating |
| | | systems as well as |
| | | anywhere else they |
| | | are stored. |
| | | |
| | | **Good Practice** |
| | | |
| | | Adequate protection |
| | | of the audit logs |
| | | includes strong |
| | | access control that |
| | | limits access to |
| | | logs based on "need |
| | | to know" only and |
| | | the use of physical |
| | | or network |
| | | segregation to make |
| | | the logs harder to |
| | | find and modify. |
+-----------------------+-----------------------+----------------------+
| **10.3.1** Read | **10.3.1** Interview | |
| access to audit logs | system administrators | |
| files is limited to | and examine system | |
| those with a | configurations and | |
| job-related need. | privileges to verify | |
| | that only individuals | |
| | with a job-related | |
| | need have read access | |
| | to audit log files. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Stored activity | | |
| records cannot be | | |
| accessed by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Often a malicious |
| | | individual who has |
| | | entered the network |
| | | will try to edit the |
| | | audit logs to hide |
| | | their activity. |
| | | Without adequate |
| | | protection of audit |
| | | logs, their |
| | | completeness, |
| | | accuracy, and |
| | | integrity cannot be |
| | | guaranteed, and the |
| | | audit logs can be |
| | | rendered useless as |
| | | an investigation |
| | | tool after a |
| | | compromise. |
| | | Therefore, audit |
| | | logs should be |
| | | protected on the |
| | | originating systems |
| | | as well as anywhere |
| | | else they are |
| | | stored. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | attempt to prevent |
| | | logs from being |
| | | exposed in |
| | | public-accessible |
| | | locations. |
+-----------------------+-----------------------+----------------------+
| **10.3.2** Audit log | **10.3.2** Examine | |
| files are protected | system configurations | |
| to prevent | and privileges and | |
| modifications by | interview system | |
| individuals. | administrators to | |
| | verify that current | |
| | audit log files are | |
| | protected from | |
| | modifications by | |
| | individuals via | |
| | access control | |
| | mechanisms, physical | |
| | segregation, and/or | |
| | network segregation. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Stored activity | | |
| records cannot be | | |
| modified by | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Promptly backing up |
| | | the logs to a |
| | | centralized log |
| | | server or media that |
| | | is difficult to |
| | | alter keeps the logs |
| | | protected, even if |
| | | the system |
| | | generating the logs |
| | | becomes compromised. |
| | | |
| | | Writing logs from |
| | | external-facing |
| | | technologies such as |
| | | wireless, network |
| | | security controls, |
| | | DNS, and mail |
| | | servers, reduces the |
| | | risk of those logs |
| | | being lost or |
| | | altered. |
| | | |
| | | **Good Practice** |
| | | |
| | | Each entity |
| | | determines the best |
| | | way to back up log |
| | | files, whether via |
| | | one or more |
| | | centralized log |
| | | servers or other |
| | | secure media. Logs |
| | | may be written |
| | | directly, offloaded, |
| | | or copied from |
| | | external systems to |
| | | the secure internal |
| | | system or media. |
+-----------------------+-----------------------+----------------------+
| **10.3.3** Audit log | **10.3.3** Examine | |
| files, including | backup configurations | |
| those for external- | or log files to | |
| facing technologies, | verify that current | |
| are promptly backed | audit log files, | |
| up to a secure, | including those for | |
| central, internal log | external-facing | |
| server(s) or other | technologies, are | |
| media that is | promptly backed up to | |
| difficult to modify. | a secure, central, | |
| | internal log | |
| | server(s) or other | |
| | media that is | |
| | difficult to modify. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Stored activity | | |
| records are secured | | |
| and preserved in a | | |
| central location to | | |
| prevent unauthorized | | |
| modification. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | File integrity |
| | | monitoring or |
| | | change-detection |
| | | systems check for |
| | | changes to critical |
| | | files and notify |
| | | when such changes |
| | | are identified. For |
| | | file integrity |
| | | monitoring purposes, |
| | | an entity usually |
| | | monitors files that |
| | | do not regularly |
| | | change, but when |
| | | changed, indicate a |
| | | possible compromise. |
| | | |
| | | **Good Practice** |
| | | |
| | | Software used to |
| | | monitor changes to |
| | | audit logs should be |
| | | configured to |
| | | provide alerts when |
| | | existing log data or |
| | | files are changed or |
| | | deleted. However, |
| | | new log data being |
| | | added to an audit |
| | | log should not |
| | | generate an alert. |
+-----------------------+-----------------------+----------------------+
| **10.3.4** File | **10.3.4** Examine | |
| integrity monitoring | system settings, | |
| or change-detection | monitored files, and | |
| mechanisms is used on | results from | |
| audit logs to ensure | monitoring activities | |
| that existing log | to verify the use of | |
| data cannot be | file integrity | |
| changed without | monitoring or | |
| generating alerts. | change-detection | |
| | software on audit | |
| | logs. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Stored activity | | |
| records cannot be | | |
| modified without an | | |
| alert being | | |
| generated. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **10.4** Audit logs | | |
| are reviewed to | | |
| identify anomalies or | | |
| suspicious activity. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Many breaches occur |
| | | months before being |
| | | detected. Regular |
| | | log reviews mean |
| | | incidents can be |
| | | quickly identified |
| | | and proactively |
| | | addressed. |
| | | |
| | | **Good Practice** |
| | | |
| | | Checking logs daily |
| | | (7 days a week, 365 |
| | | days a year, |
| | | including holidays) |
| | | minimizes the amount |
| | | of time and exposure |
| | | of a potential |
| | | breach. Log |
| | | harvesting, parsing, |
| | | and alerting tools, |
| | | centralized log |
| | | management systems, |
| | | event log analyzers, |
| | | and security |
| | | information and |
| | | event management |
| | | (SIEM) solutions are |
| | | examples of |
| | | automated tools that |
| | | can be used to meet |
| | | this requirement. |
| | | |
| | | Daily review of |
| | | security |
| | | events---for |
| | | example, |
| | | notifications or |
| | | alerts that identify |
| | | suspicious or |
| | | anomalous |
| | | activities---as well |
| | | as logs from |
| | | critical system |
| | | components, and logs |
| | | from systems that |
| | | perform security |
| | | functions, such as |
| | | firewalls, IDS/IPS, |
| | | file integrity |
| | | monitoring (FIM) |
| | | systems, etc., is |
| | | necessary to |
| | | identify potential |
| | | issues. |
| | | |
| | | The determination of |
| | | "security event" |
| | | will vary for each |
| | | organization and may |
| | | include |
| | | consideration for |
| | | the type of |
| | | technology, |
| | | location, and |
| | | function of the |
| | | device. |
| | | Organizations may |
| | | also wish to |
| | | maintain a baseline |
| | | of "normal" traffic |
| | | to help identify |
| | | anomalous behavior. |
| | | |
| | | An entity that uses |
| | | third-party service |
| | | providers to perform |
| | | log review services |
| | | is responsible to |
| | | provide context |
| | | about the entity's |
| | | environment to the |
| | | service providers, |
| | | so it understands |
| | | the entity's |
| | | environment, has a |
| | | baseline of "normal" |
| | | traffic for the |
| | | entity, and can |
| | | detect potential |
| | | security issues and |
| | | provide accurate |
| | | exceptions and |
| | | anomaly |
| | | notifications. |
+-----------------------+-----------------------+----------------------+
| 1. The following | **10.4.1.a** Examine | |
| audit logs are | security policies and | |
| reviewed at least | procedures to verify | |
| once daily: | that processes are | |
| | defined for reviewing | |
| - All security | all elements | |
| events. | specified in this | |
| | requirement at least | |
| - Logs of all | once daily. | |
| system | | |
| components | | |
| that store, | | |
| process, or | | |
| transmit CHD | | |
| and/or SAD. | | |
| | | |
| - Logs of all | | |
| critical | | |
| system | | |
| components. | | |
| | | |
| - Logs of all | | |
| servers and | | |
| system | | |
| components | | |
| that perform | | |
| security | | |
| functions | | |
| (for example, | | |
| network | | |
| security | | |
| controls, | | |
| | | |
| intrusion-detection | | |
| systems | | |
| /intrusion-prevention | | |
| systems | | |
| (IDS/IPS), | | |
| | | |
| authentication | | |
| servers). | | |
+-----------------------+-----------------------+----------------------+
| | **10.4.1.b** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify that all | |
| | elements specified in | |
| | this requirement are | |
| | reviewed at least | |
| | once daily | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Potentially | | |
| suspicious or | | |
| anomalous activities | | |
| are quickly | | |
| identified to | | |
| minimize impact. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Manual log reviews |
| | | are difficult to |
| | | perform, even for |
| | | one or two systems, |
| | | due to the amount of |
| | | log data that is |
| | | generated. However, |
| | | using log |
| | | harvesting, parsing, |
| | | and alerting tools, |
| | | centralized log |
| | | management systems, |
| | | event log analyzers, |
| | | and security |
| | | information and |
| | | event management |
| | | (SIEM) solutions can |
| | | help facilitate the |
| | | process by |
| | | identifying log |
| | | events that need to |
| | | be reviewed. |
| | | |
| | | **Good Practice** |
| | | |
| | | The entity should |
| | | keep logging tools |
| | | aligned with any |
| | | changes in their |
| | | environment by |
| | | periodically |
| | | reviewing tool |
| | | settings and |
| | | updating settings to |
| | | reflect any changes. |
+-----------------------+-----------------------+----------------------+
| **10.4.1.1** | **10.4.1.1** Examine | |
| Automated mechanisms | log review mechanisms | |
| are used to perform | and interview | |
| audit log reviews. | personnel to verify | |
| | that automated | |
| | mechanisms are used | |
| | to perform log | |
| | reviews. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Potentially | | |
| suspicious or | | |
| anomalous activities | | |
| are identified via a | | |
| repeatable and | | |
| consistent mechanism. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Periodic review of |
| | | logs for all other |
| | | system components |
| | | (not specified in |
| | | Requirement 10.4.1) |
| | | helps to identify |
| | | indications of |
| | | potential issues or |
| | | attempts to access |
| | | critical systems via |
| | | less-critical |
| | | systems. |
+-----------------------+-----------------------+----------------------+
| **10.4.2** Logs of | **10.4.2.a** Examine | |
| all other system | security policies and | |
| components (those not | procedures to verify | |
| specified in | that processes are | |
| Requirement 10.4.1) | defined for reviewing | |
| are reviewed | logs of all other | |
| periodically. | system components | |
| | periodically. | |
+-----------------------+-----------------------+----------------------+
| | **10.4.2.b** Examine | |
| | documented results of | |
| | log reviews and | |
| | interview personnel | |
| | to verify that log | |
| | reviews are performed | |
| | periodically. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Potentially | | |
| suspicious or | | |
| anomalous activities | | |
| for other system | | |
| components (not | | |
| included in 10.4.1) | | |
| are reviewed in | | |
| accordance with the | | |
| entity's identified | | |
| risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| applicable to all | | |
| other in-scope system | | |
| components not | | |
| included in | | |
| Requirement 10.4.1. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Entities can |
| | | determine the |
| | | optimum period to |
| | | review these logs |
| | | based on criteria |
| | | such as the |
| | | complexity of each |
| | | entity's |
| | | environment, the |
| | | number of types of |
| | | systems that are |
| | | required to be |
| | | evaluated, and the |
| | | functions of such |
| | | systems. |
+-----------------------+-----------------------+----------------------+
| > **10.4.2.1** The | **10.4.2.1.a** | |
| > frequency of | Examine the entity's | |
| > periodic log | targeted risk | |
| > reviews for all | analysis for the | |
| > other system | frequency of periodic | |
| > components (not | log reviews for all | |
| > defined in | other system | |
| > Requirement 10.4.1) | components (not | |
| > is defined in the | defined in | |
| > entity's targeted | Requirement 10.4.1) | |
| > risk analysis, | to verify the risk | |
| > which is performed | analysis was | |
| > according to all | performed in | |
| > elements specified | accordance with all | |
| > in Requirement | elements specified at | |
| > 12.3.1 | Requirement 12.3.1. | |
+-----------------------+-----------------------+----------------------+
| | **10.4.2.1.b** | |
| | Examine documented | |
| | results of periodic | |
| | log reviews of all | |
| | other system | |
| | components (not | |
| | defined in | |
| | Requirement 10.4.1) | |
| | and interview | |
| | personnel to verify | |
| | log reviews are | |
| | performed at the | |
| | frequency specified | |
| | in the entity's | |
| | targeted risk | |
| | analysis performed | |
| | for this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Log reviews for | | |
| lower-risk system | | |
| components are | | |
| performed at a | | |
| frequency that | | |
| addresses the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If exceptions and |
| | | anomalies identified |
| | | during the |
| | | log-review process |
| | | are not |
| | | investigated, the |
| | | entity may be |
| | | unaware of |
| | | unauthorized and |
| | | potentially |
| | | malicious activities |
| | | occurring within |
| | | their network. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | consider how to |
| | | address the |
| | | following when |
| | | developing their |
| | | processes for |
| | | defining and |
| | | managing exceptions |
| | | and anomalies: |
| | | |
| | | - How log review |
| | | activities are |
| | | recorded, |
| | | |
| | | - How to rank and |
| | | prioritize |
| | | exceptions and |
| | | anomalies, |
| | | |
| | | - What procedures |
| | | should be in |
| | | place to report |
| | | and escalate |
| | | exceptions and |
| | | anomalies, and |
| | | |
| | | - Who is |
| | | responsible for |
| | | investigating |
| | | and for any |
| | | remediation |
| | | tasks. |
+-----------------------+-----------------------+----------------------+
| **10.4.3** Exceptions | **10.4.3.a** Examine | |
| and anomalies | security policies and | |
| identified during the | procedures to verify | |
| review process are | that processes are | |
| addressed. | defined for | |
| | addressing exceptions | |
| | and anomalies | |
| | identified during the | |
| | review process. | |
+-----------------------+-----------------------+----------------------+
| | **10.4.3.b** Observe | |
| | processes and | |
| | interview personnel | |
| | to verify that, when | |
| | exceptions and | |
| | anomalies are | |
| | identified, they are | |
| | addressed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Suspicious or | | |
| anomalous activities | | |
| are addressed. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **10.5** Audit log | | |
| history is retained | | |
| and available for | | |
| analysis. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Good Practice** |
| Requirements** | Testing Procedures** | |
| | | Retaining historical |
| | | audit logs for at |
| | | least 12 months is |
| | | necessary because |
| | | compromises often go |
| | | unnoticed for |
| | | significant lengths |
| | | of time. |
| | | |
| | | Having centrally |
| | | stored log history |
| | | allows investigators |
| | | to better determine |
| | | the length of time a |
| | | potential breach was |
| | | occurring, and the |
| | | possible system(s) |
| | | impacted. By having |
| | | three months of logs |
| | | immediately |
| | | available, an entity |
| | | can quickly identify |
| | | and minimize impact |
| | | of a data breach. |
| | | |
| | | **Examples** |
| | | |
| | | Methods that allow |
| | | logs to be |
| | | immediately |
| | | available include |
| | | storing logs online, |
| | | archiving logs, or |
| | | restoring logs |
| | | quickly from |
| | | backups. |
+-----------------------+-----------------------+----------------------+
| **10.5.1** Retain | **10.5.1.a** Examine | |
| audit log history for | documentation to | |
| at least 12 months, | verify that the | |
| with at least the | following is defined: | |
| most recent three | | |
| months immediately | - Audit log | |
| available for | retention | |
| analysis. | policies. | |
| | | |
| | - Procedures for | |
| | retaining audit | |
| | log history for | |
| | at least 12 | |
| | months, with at | |
| | least the most | |
| | recent three | |
| | months | |
| | immediately | |
| | available online. | |
+-----------------------+-----------------------+----------------------+
| | **10.5.1.b** Examine | |
| | configurations of | |
| | audit log history, | |
| | interview personnel | |
| | and examine audit | |
| | logs to verify that | |
| | audit logs history is | |
| | retained for at least | |
| | 12 months. | |
+-----------------------+-----------------------+----------------------+
| | **10.5.1.c** | |
| | Interview personnel | |
| | and observe processes | |
| | to verify that at | |
| | least the most recent | |
| | three months' audit | |
| | log history is | |
| | immediately available | |
| | for analysis. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Historical records of | | |
| activity are | | |
| available immediately | | |
| to support incident | | |
| response and are | | |
| retained for at least | | |
| 12 months. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **10.6** | | |
| Time-synchronization | | |
| mechanisms support | | |
| consistent time | | |
| settings across all | | |
| systems. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Time synchronization |
| | | technology is used |
| | | to synchronize |
| | | clocks on multiple |
| | | systems. When clocks |
| | | are not properly |
| | | synchronized, it can |
| | | be difficult, if not |
| | | impossible, to |
| | | compare log files |
| | | from different |
| | | systems and |
| | | establish an exact |
| | | sequence of events, |
| | | which is crucial for |
| | | forensic analysis |
| | | following a breach. |
| | | |
| | | For post-incident |
| | | forensics teams, the |
| | | accuracy and |
| | | consistency of time |
| | | across all systems |
| | | and the time of each |
| | | activity are |
| | | critical in |
| | | determining how the |
| | | systems were |
| | | compromised. |
| | | |
| | | **Examples** |
| | | |
| | | Network Time |
| | | Protocol (NTP) is |
| | | one example of |
| | | time-synchronization |
| | | technology. |
+-----------------------+-----------------------+----------------------+
| **10.6.1** System | **10.6.1** Examine | |
| clocks and time are | system configuration | |
| synchronized using | settings to verify | |
| time-synchronization | that | |
| technology. | time-synchronization | |
| | technology is | |
| | implemented and kept | |
| | current. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Common time is | | |
| established across | | |
| all systems. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Keeping | | |
| time-synchronization | | |
| technology current | | |
| includes managing | | |
| vulnerabilities and | | |
| patching the | | |
| technology according | | |
| to PCI DSS | | |
| Requirements | | |
| | | |
| 6.3.1 and 6.3.3. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Using reputable time |
| | | servers is a |
| | | critical component |
| | | of the time |
| | | synchronization |
| | | process. |
| | | |
| | | Accepting time |
| | | updates from |
| | | specific, industry- |
| | | accepted external |
| | | sources helps |
| | | prevent a malicious |
| | | individual from |
| | | changing time |
| | | settings on systems. |
| | | |
| | | **Good Practice** |
| | | |
| | | Another option to |
| | | prevent unauthorized |
| | | use of internal time |
| | | servers is to |
| | | encrypt updates with |
| | | a symmetric key and |
| | | create access |
| | | control lists that |
| | | specify the IP |
| | | addresses of client |
| | | machines that will |
| | | be provided with the |
| | | time updates. |
+-----------------------+-----------------------+----------------------+
| **10.6.2** Systems | **10.6.2** Examine | |
| are configured to the | system configuration | |
| correct and | settings for | |
| consistent time as | acquiring, | |
| follows: | distributing, and | |
| | storing the correct | |
| - One or more | time to verify the | |
| designated time | settings are | |
| servers are in | configured in | |
| use. | accordance with all | |
| | elements specified in | |
| - Only the | this requirement. | |
| designated | | |
| central time | | |
| server(s) | | |
| receives time | | |
| from external | | |
| sources. | | |
| | | |
| - Time received | | |
| from external | | |
| sources is based | | |
| on International | | |
| Atomic Time or | | |
| Coordinated | | |
| Universal Time | | |
| (UTC). | | |
| | | |
| - The designated | | |
| time server(s) | | |
| accept time | | |
| updates only from | | |
| specific | | |
| industry-accepted | | |
| external sources. | | |
| | | |
| - Where there is | | |
| more than one | | |
| designated time | | |
| server, the time | | |
| servers peer with | | |
| one another to | | |
| keep accurate | | |
| time. | | |
| | | |
| - Internal systems | | |
| receive time | | |
| information only | | |
| from designated | | |
| central time | | |
| server(s). | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The time on all | | |
| systems is accurate | | |
| and consistent. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Attackers will try |
| | | to change time |
| | | configurations to |
| | | hide their activity. |
| | | Therefore, |
| | | restricting the |
| | | ability to change or |
| | | modify time |
| | | synchronization |
| | | configurations or |
| | | the system time to |
| | | administrators will |
| | | lessen the |
| | | probability of an |
| | | attacker |
| | | successfully |
| | | changing time |
| | | configurations. |
+-----------------------+-----------------------+----------------------+
| **10.6.3** Time | **10.6.3.a** Examine | |
| synchronization | system configurations | |
| settings and data are | and time- | |
| protected as follows: | synchronization | |
| | settings to verify | |
| - Access to time | that access to time | |
| data is | data is restricted to | |
| restricted to | only personnel with a | |
| only personnel | business need. | |
| with a business | | |
| need. | | |
| | | |
| - Any changes to | | |
| time settings on | | |
| critical systems | | |
| are logged, | | |
| monitored, and | | |
| reviewed. | | |
+-----------------------+-----------------------+----------------------+
| | **10.6.3.b** Examine | |
| | system configurations | |
| | and time | |
| | synchronization | |
| | settings and logs and | |
| | observe processes to | |
| | verify that any | |
| | changes to time | |
| | settings on critical | |
| | systems are logged, | |
| | monitored, and | |
| | reviewed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| System time settings | | |
| cannot be modified by | | |
| unauthorized | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **10.7** Failures of | | |
| critical security | | |
| control systems are | | |
| detected, reported, | | |
| and responded to | | |
| promptly. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without formal |
| | | processes to detect |
| | | and alert when |
| | | critical security |
| | | controls fail, |
| | | failures may go |
| | | undetected for |
| | | extended periods and |
| | | provide attackers |
| | | ample time to |
| | | compromise system |
| | | components and steal |
| | | account data from |
| | | the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | The specific types |
| | | of failures may |
| | | vary, depending on |
| | | the function of the |
| | | device system |
| | | component and |
| | | technology in use. |
| | | Typical failures |
| | | include a system |
| | | ceasing to perform |
| | | its security |
| | | function or not |
| | | functioning in its |
| | | intended manner, |
| | | such as a firewall |
| | | erasing all its |
| | | rules or going |
| | | offline. |
+-----------------------+-----------------------+----------------------+
| 1. ***Additional | **10.7.1.a | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only:*** Failures | provider assessments | |
| of critical | only: ***Examine | |
| security control | documentation to | |
| systems are | verify that processes | |
| detected, | are defined for the | |
| alerted, and | prompt detection and | |
| addressed | addressing of | |
| promptly, | failures of critical | |
| including but not | security control | |
| limited to | systems, including | |
| failure of the | but not limited to | |
| following | failure of all | |
| critical security | elements specified in | |
| control systems: | this requirement. | |
| | | |
| - Network | | |
| security | | |
| controls. | | |
| | | |
| - IDS/IPS. | | |
| | | |
| - FIM. | | |
| | | |
| - Anti-malware | | |
| solutions. | | |
| | | |
| - Physical | | |
| access | | |
| controls. | | |
| | | |
| - Logical | | |
| access | | |
| controls. | | |
| | | |
| - Audit logging | | |
| mechanisms. | | |
| | | |
| - Segmentation | | |
| controls (if | | |
| used). | | |
+-----------------------+-----------------------+----------------------+
| | **10.7.1.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Observe | |
| | detection and | |
| | alerting processes | |
| | and interview | |
| | personnel to verify | |
| | that failures of | |
| | critical security | |
| | control systems are | |
| | detected and | |
| | reported, and that | |
| | failure of a critical | |
| | security control | |
| | results in the | |
| | generation of an | |
| | alert. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Failures in critical | | |
| security control | | |
| systems are promptly | | |
| identified and | | |
| addressed. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| This requirement will | | |
| be superseded by | | |
| Requirement 10.7.2 as | | |
| of 31 March 2025. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without formal |
| | | processes to detect |
| | | and alert when |
| | | critical security |
| | | controls fail, |
| | | failures may go |
| | | undetected for |
| | | extended periods and |
| | | provide attackers |
| | | ample time to |
| | | compromise system |
| | | components and steal |
| | | account data from |
| | | the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | The specific types |
| | | of failures may |
| | | vary, depending on |
| | | the function of the |
| | | device system |
| | | component and |
| | | technology in use. |
| | | However, typical |
| | | failures include a |
| | | system no longer |
| | | performing its |
| | | security function or |
| | | not functioning in |
| | | its intended |
| | | manner---for |
| | | example, a firewall |
| | | erasing its rules or |
| | | going offline. |
+-----------------------+-----------------------+----------------------+
| **10.7.2** Failures | **10.7.2.a** Examine | |
| of critical security | documentation to | |
| control systems are | verify that processes | |
| detected, alerted, | are defined for the | |
| and addressed | prompt detection and | |
| promptly, including | addressing of | |
| but not limited to | failures of critical | |
| failure of the | security control | |
| following critical | systems, including | |
| security control | but not limited to | |
| systems: | failure of all | |
| | elements specified in | |
| - Network security | this requirement. | |
| controls. | | |
| | | |
| - IDS/IPS. | | |
| | | |
| - Change-detection | | |
| mechanisms. | | |
| | | |
| - Anti-malware | | |
| solutions. | | |
| | | |
| - Physical access | | |
| controls. | | |
| | | |
| - Logical access | | |
| controls. | | |
| | | |
| - Audit logging | | |
| mechanisms. | | |
| | | |
| - Segmentation | | |
| controls (if | | |
| used). | | |
| | | |
| - Audit log review | | |
| mechanisms. | | |
| | | |
| - Automated | | |
| security testing | | |
| tools (if used). | | |
+-----------------------+-----------------------+----------------------+
| | **10.7.2.b** Observe | |
| | detection and | |
| | alerting processes | |
| | and interview | |
| | personnel to verify | |
| | that failures of | |
| | critical security | |
| | control systems are | |
| | detected and | |
| | reported, and that | |
| | failure of a critical | |
| | security control | |
| | results in the | |
| | generation of an | |
| | alert. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Failures in critical | | |
| security control | | |
| systems are promptly | | |
| identified and | | |
| addressed. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies to all | | |
| entities, including | | |
| service providers, | | |
| and will supersede | | |
| Requirement | | |
| | | |
| 10.7.1 as of 31 March | | |
| 2025. It includes two | | |
| additional critical | | |
| security control | | |
| systems not in | | |
| Requirement 10.7.1. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If alerts from |
| | | failures of critical |
| | | security control |
| | | systems are not |
| | | responded to quickly |
| | | and effectively, |
| | | attackers may use |
| | | this time to insert |
| | | malicious software, |
| | | gain control of a |
| | | system, or steal |
| | | data from the |
| | | entity's |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Documented evidence |
| | | (for example, |
| | | records within a |
| | | problem management |
| | | system) should |
| | | provide support that |
| | | processes and |
| | | procedures are in |
| | | place to respond to |
| | | security failures. |
| | | In addition, |
| | | personnel should be |
| | | aware of their |
| | | responsibilities in |
| | | the event of a |
| | | failure. Actions and |
| | | responses to the |
| | | failure should be |
| | | captured in the |
| | | documented evidence. |
+-----------------------+-----------------------+----------------------+
| **10.7.3** Failures | **10.7.3.a** Examine | |
| of any critical | documentation and | |
| security controls | interview personnel | |
| systems are responded | to verify that | |
| to promptly, | processes are defined | |
| including but not | and implemented to | |
| limited to: | respond to a failure | |
| | of any critical | |
| - Restoring | security control | |
| security | system and include at | |
| functions. | least all elements | |
| | specified in this | |
| - Identifying and | requirement. | |
| documenting the | | |
| duration (date | | |
| and time from | | |
| start to end) of | | |
| the security | | |
| failure. | | |
| | | |
| - Identifying and | | |
| documenting the | | |
| cause(s) of | | |
| failure and | | |
| documenting | | |
| required | | |
| remediation. | | |
| | | |
| - Identifying and | | |
| addressing any | | |
| security issues | | |
| that arose during | | |
| the failure. | | |
| | | |
| - Determining | | |
| whether further | | |
| actions are | | |
| required as a | | |
| result of the | | |
| security failure. | | |
| | | |
| - Implementing | | |
| controls to | | |
| prevent the cause | | |
| of failure from | | |
| reoccurring. | | |
| | | |
| - Resuming | | |
| monitoring of | | |
| security | | |
| controls. | | |
+-----------------------+-----------------------+----------------------+
| | **10.7.3.b** Examine | |
| | records to verify | |
| | that failures of | |
| | critical security | |
| | control systems are | |
| | documented to | |
| | include: | |
| | | |
| | - Identification of | |
| | cause(s) of the | |
| | failure. | |
| | | |
| | - Duration (date | |
| | and time start | |
| | and end) of the | |
| | security failure. | |
| | | |
| | - Details of the | |
| | remediation | |
| | required to | |
| | address the root | |
| | cause. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Failures of critical | | |
| security control | | |
| systems are analyzed, | | |
| contained, and | | |
| resolved, and | | |
| security controls | | |
| restored to minimize | | |
| impact. Resulting | | |
| security issues are | | |
| addressed, and | | |
| measures taken to | | |
| prevent reoccurrence. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service provider | | |
| until 31 March 2025, | | |
| after which this | | |
| requirement will | | |
| apply to all | | |
| entities. | | |
| | | |
| *This is a current | | |
| v3.2.1 requirement | | |
| that applies to | | |
| service providers | | |
| only. However, this | | |
| requirement is a best | | |
| practice for all | | |
| other entities until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment*. | | |
+-----------------------+-----------------------+----------------------+
### *Requirement 11: Test Security of Systems and Networks Regularly* {#requirement-11-test-security-of-systems-and-networks-regularly .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. Processes and mechanisms for regularly testing security of |
| systems and networks are defined and understood. |
| |
| 2. Wireless access points are identified and monitored, and |
| unauthorized wireless access points are addressed. |
| |
| 3. External and internal vulnerabilities are regularly identified, |
| prioritized, and addressed. |
| |
| 4. External and internal penetration testing is regularly performed, |
| and exploitable vulnerabilities and security weaknesses are |
| corrected. |
| |
| 5. Network intrusions and unexpected file changes are detected and |
| responded to. |
| |
| 6. Unauthorized changes on payment pages are detected and responded |
| to. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > Vulnerabilities are being discovered continually by malicious |
| > individuals and researchers, and being introduced by new software. |
| > System components, processes, and bespoke and custom software |
| > should be tested frequently to ensure security controls continue to |
| > reflect a changing environment. |
| > |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. Processes and | | |
| mechanisms for | | |
| regularly testing | | |
| security of | | |
| systems and | | |
| networks are | | |
| defined and | | |
| understood. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Requirement 11.1.1 |
| | | is about effectively |
| | | managing and |
| | | maintaining the |
| | | various policies and |
| | | procedures specified |
| | | throughout |
| | | Requirement 11. |
| | | While it is |
| | | important to define |
| | | the specific |
| | | policies or |
| | | procedures called |
| | | out in Requirement |
| | | 11, it is equally |
| | | important to ensure |
| | | they are properly |
| | | documented, |
| | | maintained, and |
| | | disseminated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important to |
| | | update policies and |
| | | procedures as needed |
| | | to address changes |
| | | in processes, |
| | | technologies, and |
| | | business objectives. |
| | | For this reason, |
| | | consider updating |
| | | these documents as |
| | | soon as possible |
| | | after a change |
| | | occurs and not only |
| | | on a periodic cycle. |
| | | |
| | | **Definitions** |
| | | |
| | | Security policies |
| | | define the entity's |
| | | security objectives |
| | | and principles. |
| | | Operational |
| | | procedures describe |
| | | how to perform |
| | | activities, and |
| | | define the controls, |
| | | methods, and |
| | | processes that are |
| | | followed to achieve |
| | | the desired result |
| | | in a consistent |
| | | manner and in |
| | | accordance with |
| | | policy objectives. |
+-----------------------+-----------------------+----------------------+
| 1. All security | **11.1.1** Examine | |
| policies and | documentation and | |
| operational | interview personnel | |
| procedures that | to verify that | |
| are identified in | security policies and | |
| Requirement 11 | operational | |
| are: | procedures are | |
| | managed in accordance | |
| - Documented. | with all elements | |
| | specified in this | |
| - Kept up to | requirement. | |
| date. | | |
| | | |
| - In use. | | |
| | | |
| - Known to all | | |
| affected | | |
| parties. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Expectations, | | |
| controls, and | | |
| oversight for meeting | | |
| activities within | | |
| Requirement 11 are | | |
| defined and adhered | | |
| to by affected | | |
| personnel. All | | |
| supporting activities | | |
| are repeatable, | | |
| consistently applied, | | |
| and conform to | | |
| management's intent. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If roles and |
| | | responsibilities are |
| | | not formally |
| | | assigned, personnel |
| | | may not be aware of |
| | | their day-to-day |
| | | responsibilities and |
| | | critical activities |
| | | may not occur. |
| | | |
| | | **Good Practice** |
| | | |
| | | Roles and |
| | | responsibilities may |
| | | be documented within |
| | | policies and |
| | | procedures or |
| | | maintained within |
| | | separate documents. |
| | | |
| | | As part of |
| | | communicating roles |
| | | and |
| | | responsibilities, |
| | | entities can |
| | | consider having |
| | | personnel |
| | | acknowledge their |
| | | acceptance and |
| | | understanding of |
| | | their assigned roles |
| | | and |
| | | responsibilities. |
| | | |
| | | **Examples** |
| | | |
| | | A method to document |
| | | roles and |
| | | responsibilities is |
| | | a responsibility |
| | | assignment matrix |
| | | that includes who is |
| | | responsible, |
| | | accountable, |
| | | consulted, and |
| | | informed (also |
| | | called a RACI |
| | | matrix). |
+-----------------------+-----------------------+----------------------+
| **11.1.2** Roles and | **11.1.2.a** Examine | |
| responsibilities for | documentation to | |
| performing activities | verify that | |
| in Requirement 11 are | descriptions of roles | |
| documented, assigned, | and responsibilities | |
| and understood. | for performing | |
| | activities in | |
| | Requirement 11 are | |
| | documented and | |
| | assigned. | |
+-----------------------+-----------------------+----------------------+
| | **11.1.2.b** | |
| | Interview personnel | |
| | with responsibility | |
| | for performing | |
| | activities in | |
| | Requirement 11 to | |
| | verify that roles and | |
| | responsibilities are | |
| | assigned as | |
| | documented and are | |
| | understood. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Day-to-day | | |
| responsibilities for | | |
| performing all the | | |
| activities in | | |
| Requirement 11 are | | |
| allocated. | | |
| | | |
| Personnel are | | |
| accountable for | | |
| successful, | | |
| continuous operation | | |
| of these | | |
| requirements. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **11.2** Wireless | | |
| access points are | | |
| identified and | | |
| monitored, and | | |
| unauthorized wireless | | |
| access points are | | |
| addressed. | | |
+-----------------------+----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Implementation |
| | | and/or exploitation |
| | | of wireless |
| | | technology within a |
| | | network are common |
| | | paths for malicious |
| | | users to gain |
| | | unauthorized access |
| | | to the network and |
| | | cardholder data. |
| | | Unauthorized |
| | | wireless devices |
| | | could be hidden |
| | | within or attached |
| | | to a computer or |
| | | other system |
| | | component. These |
| | | devices could also |
| | | be attached directly |
| | | to a network port, |
| | | to a network device |
| | | such as a switch or |
| | | router, or inserted |
| | | as a wireless |
| | | interface card |
| | | inside a system |
| | | component. |
| | | |
| | | If a wireless device |
| | | or network is |
| | | installed without a |
| | | company's knowledge, |
| | | it can allow an |
| | | attacker to enter |
| | | the network easily |
| | | and "invisibly." |
| | | Detecting and |
| | | removing such |
| | | unauthorized access |
| | | points reduces the |
| | | duration and |
| | | likelihood of such |
| | | devices being |
| | | leveraged for an |
| | | attack. |
| | | |
| | | **Good Practice** |
| | | |
| | | The size and |
| | | complexity of an |
| | | environment will |
| | | dictate the |
| | | appropriate tools |
| | | and processes to be |
| | | used to provide |
| | | sufficient assurance |
| | | that a rogue |
| | | wireless access |
| | | point has not been |
| | | installed in the |
| | | environment. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+----------------------+----------------------+
| 1. Authorized and | **11.2.1.a** Examine | |
| unauthorized | policies and | |
| wireless access | procedures to verify | |
| points are | processes are | |
| managed as | defined for managing | |
| follows: | both authorized and | |
| | unauthorized | |
| - The presence | wireless access | |
| of wireless | points with all | |
| (Wi-Fi) | elements specified | |
| access points | in this requirement. | |
| is tested | | |
| for, | | |
| | | |
| - All | | |
| authorized | | |
| and | | |
| unauthorized | | |
| wireless | | |
| access points | | |
| are detected | | |
| and | | |
| identified, | | |
| | | |
| - Testing, | | |
| detection, | | |
| and | | |
| | | |
| identification | | |
| occurs at | | |
| least once | | |
| every three | | |
| months. | | |
| | | |
| - If automated | | |
| monitoring is | | |
| used, | | |
| personnel are | | |
| notified via | | |
| generated | | |
| alerts. | | |
+-----------------------+----------------------+----------------------+
| | **11.2.1.b** Examine | |
| | the methodology(ies) | |
| | in use and the | |
| | resulting | |
| | documentation, and | |
| | interview personnel | |
| | to verify processes | |
| | are defined to | |
| | detect and identify | |
| | both authorized and | |
| | unauthorized | |
| | wireless access | |
| | points in accordance | |
| | with all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+----------------------+----------------------+
| | **11.2.1.c** Examine | |
| | wireless assessment | |
| | results and | |
| | interview personnel | |
| | to verify that | |
| | wireless assessments | |
| | were conducted in | |
| | accordance with all | |
| | elements specified | |
| | in this requirement. | |
+-----------------------+----------------------+----------------------+
| | **11.2.1.d** If | |
| | automated monitoring | |
| | is used, examine | |
| | configuration | |
| | settings to verify | |
| | the configuration | |
| | will generate alerts | |
| | to notify personnel. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| Unauthorized wireless | | |
| access points are | | |
| identified and | | |
| addressed | | |
| periodically. | | |
+-----------------------+----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+----------------------+----------------------+
| The requirement | | |
| applies even when a | | |
| policy exists that | | |
| prohibits the use of | | |
| wireless technology | | |
| since attackers do | | |
| not read and follow | | |
| company policy. | | |
| | | |
| Methods used to meet | | |
| this requirement must | | |
| be sufficient to | | |
| detect and identify | | |
| both authorized and | | |
| unauthorized devices, | | |
| including | | |
| unauthorized devices | | |
| attached to devices | | |
| that themselves are | | |
| authorized. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | For example, |
| | | performing a |
| | | detailed physical |
| | | inspection of a |
| | | single stand-alone |
| | | retail kiosk in a |
| | | shopping mall, where |
| | | all communication |
| | | components are |
| | | contained within |
| | | tamper-resistant and |
| | | tamper-evident |
| | | casings, may be |
| | | sufficient to |
| | | provide assurance |
| | | that a rogue |
| | | wireless access |
| | | point has not been |
| | | attached or |
| | | installed. |
| | | |
| | | However, in an |
| | | environment with |
| | | multiple nodes (such |
| | | as in a large retail |
| | | store, call center, |
| | | server room or data |
| | | center), detailed |
| | | physical inspection |
| | | can be difficult. In |
| | | this case, multiple |
| | | methods may be |
| | | combined, such as |
| | | performing physical |
| | | system inspections |
| | | in conjunction with |
| | | the results of a |
| | | wireless analyzer. |
| | | |
| | | **Definitions** |
| | | |
| | | This is also |
| | | referred to as rogue |
| | | access point |
| | | detection. |
| | | |
| | | **Examples** |
| | | |
| | | Methods that may be |
| | | used include but are |
| | | not limited to |
| | | wireless network |
| | | scans, |
| | | physical/logical |
| | | inspections of |
| | | system components |
| | | and infrastructure, |
| | | network access |
| | | control (NAC), or |
| | | wireless IDS/IPS. |
| | | NAC and wireless |
| | | IDS/IPS are examples |
| | | of automated |
| | | monitoring tools. |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An inventory of |
| | | authorized wireless |
| | | access points can |
| | | help administrators |
| | | quickly respond when |
| | | unauthorized |
| | | wireless access |
| | | points are detected. |
| | | This helps to |
| | | proactively minimize |
| | | the exposure of CDE |
| | | to malicious |
| | | individuals. |
| | | |
| | | **Good Practice** |
| | | |
| | | If using a wireless |
| | | scanner, it is |
| | | equally important to |
| | | have a defined list |
| | | of known access |
| | | points which, while |
| | | not attached to the |
| | | company's network, |
| | | will usually be |
| | | detected during a |
| | | scan. These |
| | | non-company devices |
| | | are often found in |
| | | multi-tenant |
| | | buildings or |
| | | businesses located |
| | | near one another. |
| | | However, it is |
| | | important to verify |
| | | that these devices |
| | | are not connected to |
| | | the entity's network |
| | | port or through |
| | | another network- |
| | | connected device and |
| | | given an SSID |
| | | resembling a nearby |
| | | business. Scan |
| | | results should note |
| | | such devices and how |
| | | it was determined |
| | | that these devices |
| | | could be "ignored." |
| | | In addition, |
| | | detection of any |
| | | unauthorized |
| | | wireless access |
| | | points that are |
| | | determined to be a |
| | | threat to the CDE |
| | | should be managed |
| | | following the |
| | | entity's incident |
| | | response plan per |
| | | Requirement 12.10.1. |
+-----------------------+-----------------------+----------------------+
| **11.2.2** An | **11.2.2** Examine | |
| inventory of | documentation to | |
| authorized wireless | verify that an | |
| access points is | inventory of | |
| maintained, including | authorized wireless | |
| a documented business | access points is | |
| justification. | maintained, and a | |
| | business | |
| | justification is | |
| | documented for all | |
| | authorized wireless | |
| | access points. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Unauthorized wireless | | |
| access points are not | | |
| mistaken for | | |
| authorized wireless | | |
| access points. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **11.3** External and | | |
| internal | | |
| vulnerabilities are | | |
| regularly identified, | | |
| prioritized, and | | |
| addressed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Identifying and |
| | | addressing |
| | | vulnerabilities |
| | | promptly reduces the |
| | | likelihood of a |
| | | vulnerability being |
| | | exploited and the |
| | | potential compromise |
| | | of a system |
| | | component or |
| | | cardholder data. |
| | | |
| | | Vulnerability scans |
| | | conducted at least |
| | | every three months |
| | | provide this |
| | | detection and |
| | | identification. |
| | | |
| | | **Good Practice** |
| | | |
| | | Vulnerabilities |
| | | posing the greatest |
| | | risk to the |
| | | environment (for |
| | | example, ranked high |
| | | or critical per |
| | | Requirement 6.3.1) |
| | | should be resolved |
| | | with the highest |
| | | priority. |
| | | |
| | | Multiple scan |
| | | reports can be |
| | | combined for the |
| | | quarterly scan |
| | | process to show that |
| | | all systems were |
| | | scanned and all |
| | | applicable |
| | | vulnerabilities were |
| | | resolved as part of |
| | | the three-month |
| | | vulnerability scan |
| | | cycle. However, |
| | | additional, |
| | | documentation may be |
| | | required to verify |
| | | non- remediated |
| | | vulnerabilities are |
| | | in the process of |
| | | being resolved. |
| | | |
| | | While scans are |
| | | required at least |
| | | once every three |
| | | months, more |
| | | frequent scans are |
| | | recommended |
| | | depending on the |
| | | network complexity, |
| | | frequency of change, |
| | | and types of |
| | | devices, software, |
| | | and operating |
| | | systems used. |
| | | |
| | | **Definitions** |
| | | |
| | | A vulnerability scan |
| | | is a combination of |
| | | automated tools, |
| | | techniques, and/or |
| | | methods run against |
| | | external and |
| | | internal devices and |
| | | servers, designed to |
| | | expose potential |
| | | vulnerabilities in |
| | | applications, |
| | | operating systems, |
| | | and network devices |
| | | that could be found |
| | | and exploited by |
| | | malicious |
| | | individuals. |
+-----------------------+-----------------------+----------------------+
| 1. Internal | **11.3.1.a** Examine | |
| vulnerability | internal scan report | |
| scans are | results from the last | |
| performed as | 12 months to verify | |
| follows: | that internal scans | |
| | occurred at least | |
| - At least once | once every three | |
| every three | months in the most | |
| months. | recent 12-month | |
| | period. | |
| - High-risk and | | |
| critical | | |
| | | |
| vulnerabilities | | |
| (per the | | |
| entity's | | |
| vulnerability | | |
| risk rankings | | |
| defined at | | |
| Requirement | | |
| 6.3.1) are | | |
| resolved. | | |
| | | |
| - Rescans are | | |
| performed | | |
| that confirm | | |
| all high- | | |
| risk and | | |
| critical | | |
| | | |
| vulnerabilities | | |
| (as noted | | |
| above) have | | |
| been | | |
| resolved. | | |
| | | |
| - Scan tool is | | |
| kept up to | | |
| date with | | |
| latest | | |
| vulnerability | | |
| information. | | |
| | | |
| - Scans are | | |
| performed by | | |
| qualified | | |
| personnel and | | |
| | | |
| organizational | | |
| independence | | |
| of the tester | | |
| exists. | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.b** Examine | |
| | internal scan report | |
| | results from each | |
| | scan and rescan run | |
| | in the last 12 months | |
| | to verify that all | |
| | high-risk and | |
| | critical | |
| | vulnerabilities | |
| | (identified in PCI | |
| | DSS Requirement | |
| | 6.3.1) are resolved. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.c** Examine | |
| | scan tool | |
| | configurations and | |
| | interview personnel | |
| | to verify that the | |
| | scan tool is kept up | |
| | to date with the | |
| | latest vulnerability | |
| | information. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.d** | |
| | Interview responsible | |
| | personnel to verify | |
| | that the scan was | |
| | performed by a | |
| | qualified internal | |
| | resource(s) or | |
| | qualified external | |
| | third party and that | |
| | organizational | |
| | independence of the | |
| | tester exists. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The security posture | | |
| of all system | | |
| components is | | |
| verified periodically | | |
| using automated tools | | |
| designed to detect | | |
| vulnerabilities | | |
| operating inside the | | |
| network. Detected | | |
| vulnerabilities are | | |
| assessed and | | |
| rectified based on a | | |
| formal risk | | |
| assessment | | |
| framework.*(continued | | |
| on next page)* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| It is not required to | | |
| use a QSA or ASV to | | |
| conduct internal | | |
| vulnerability scans. | | |
| | | |
| Internal | | |
| vulnerability scans | | |
| can be performed by | | |
| qualified, internal | | |
| staff that are | | |
| reasonably | | |
| independent of the | | |
| system component(s) | | |
| being scanned (for | | |
| example, a network | | |
| administrator should | | |
| not be responsible | | |
| for scanning the | | |
| network), or an | | |
| entity may choose to | | |
| have internal | | |
| vulnerability scans | | |
| performed by a firm | | |
| specializing in | | |
| vulnerability | | |
| scanning. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | All vulnerabilities, |
| | | regardless of |
| | | criticality, provide |
| | | a potential avenue |
| | | of attack and must |
| | | therefore be |
| | | addressed |
| | | periodically, with |
| | | the vulnerabilities |
| | | that expose the most |
| | | risk addressed more |
| | | quickly to limit the |
| | | potential window of |
| | | attack. |
+-----------------------+-----------------------+----------------------+
| **11.3.1.1** All | **11.3.1.1.a** | |
| other applicable | Examine the entity's | |
| vulnerabilities | targeted risk | |
| (those not ranked as | analysis that defines | |
| high-risk or critical | the risk for | |
| per the entity's | addressing all other | |
| vulnerability risk | applicable | |
| rankings defined at | vulnerabilities | |
| Requirement | (those not ranked as | |
| | high-risk or critical | |
| 6.3.1) are managed as | per the entity's | |
| follows: | vulnerability risk | |
| | rankings at | |
| - Addressed based | Requirement 6.3.1) to | |
| on the risk | verify the risk | |
| defined in the | analysis was | |
| entity's targeted | performed in | |
| risk analysis, | accordance with all | |
| which is | elements specified at | |
| performed | Requirement 12.3.1. | |
| according to all | | |
| elements | | |
| specified in | | |
| Requirement | | |
| 12.3.1. | | |
| | | |
| - Rescans are | | |
| conducted as | | |
| needed. | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.1.b** | |
| | Interview responsible | |
| | personnel and examine | |
| | internal scan report | |
| | results or other | |
| | documentation to | |
| | verify that all other | |
| | applicable | |
| | vulnerabilities | |
| | (those not ranked as | |
| | high-risk or critical | |
| | per the entity's | |
| | vulnerability risk | |
| | rankings at | |
| | Requirement 6.3.1) | |
| | are addressed based | |
| | on the risk defined | |
| | in the entity's | |
| | targeted risk | |
| | analysis, and that | |
| | the scan process | |
| | includes rescans as | |
| | needed to confirm the | |
| | vulnerabilities have | |
| | been addressed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Lower ranked | | |
| vulnerabilities | | |
| (lower than high or | | |
| critical) are | | |
| addressed at a | | |
| frequency in | | |
| accordance with the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The timeframe for | | |
| addressing lower-risk | | |
| vulnerabilities is | | |
| subject to the | | |
| results of a risk | | |
| analysis per | | |
| Requirement 12.3.1 | | |
| that includes | | |
| (minimally) | | |
| identification of | | |
| assets being | | |
| protected, threats, | | |
| and likelihood and/or | | |
| impact of a threat | | |
| being realized. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Authenticated |
| | | scanning provides |
| | | greater insight into |
| | | an entity's |
| | | vulnerability |
| | | landscape since it |
| | | can detect |
| | | vulnerabilities that |
| | | unauthenticated |
| | | scans cannot detect. |
| | | Attackers may |
| | | leverage |
| | | vulnerabilities that |
| | | an entity is unaware |
| | | of because certain |
| | | vulnerabilities will |
| | | only be detected |
| | | with authenticated |
| | | scanning. |
| | | |
| | | Authenticated |
| | | scanning can yield |
| | | significant |
| | | additional |
| | | information about an |
| | | organization's |
| | | vulnerabilities. |
| | | |
| | | **Good Practice** |
| | | |
| | | The credentials used |
| | | for these scans |
| | | should be considered |
| | | highly privileged. |
| | | They should be |
| | | protected and |
| | | controlled as such, |
| | | following PCI DSS |
| | | Requirements 7 and 8 |
| | | (except for those |
| | | requirements for |
| | | multi-factor |
| | | authentication and |
| | | application and |
| | | system accounts). |
+-----------------------+-----------------------+----------------------+
| **11.3.1.2** Internal | **11.3.1.2.a** | |
| vulnerability scans | Examine scan tool | |
| are performed via | configurations to | |
| authenticated | verify that | |
| scanning as follows: | authenticated | |
| | scanning is used for | |
| - Systems that are | internal scans, with | |
| unable to accept | sufficient | |
| credentials for | privileges, for those | |
| authenticated | systems that accept | |
| scanning are | credentials for | |
| documented. | scanning. | |
| | | |
| - Sufficient | | |
| privileges are | | |
| used for those | | |
| systems that | | |
| accept | | |
| credentials for | | |
| scanning. | | |
| | | |
| - If accounts used | | |
| for authenticated | | |
| scanning can be | | |
| used for | | |
| interactive | | |
| login, they are | | |
| managed in | | |
| accordance with | | |
| Requirement | | |
| 8.2.2. | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.2.b** | |
| | Examine scan report | |
| | results and interview | |
| | personnel to verify | |
| | that authenticated | |
| | scans are performed. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.2.c** If | |
| | accounts used for | |
| | authenticated | |
| | scanning can be used | |
| | for interactive | |
| | login, examine the | |
| | accounts and | |
| | interview personnel | |
| | to verify the | |
| | accounts are managed | |
| | following all | |
| | elements specified in | |
| | Requirement 8.2.2. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Automated tools used | **11.3.1.2.d** | |
| to detect | Examine documentation | |
| vulnerabilities can | to verify that | |
| detect | systems that are | |
| vulnerabilities local | unable to accept | |
| to each system, which | credentials for | |
| are not visible | authenticated | |
| remotely. | scanning are defined. | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The authenticated | | |
| scanning tools can be | | |
| either host-based or | | |
| network-based. | | |
| | | |
| "Sufficient" | | |
| privileges are those | | |
| needed to access | | |
| system resources such | | |
| that a thorough scan | | |
| can be conducted that | | |
| detects known | | |
| vulnerabilities. | | |
| | | |
| This requirement does | | |
| not apply to system | | |
| components that | | |
| cannot accept | | |
| credentials for | | |
| scanning. Examples of | | |
| systems that may not | | |
| accept credentials | | |
| for scanning include | | |
| some network and | | |
| security appliances, | | |
| mainframes, and | | |
| containers. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Scanning an |
| | | environment after |
| | | any significant |
| | | changes ensures that |
| | | changes were |
| | | completed |
| | | appropriately such |
| | | that the security of |
| | | the environment was |
| | | not compromised |
| | | because of the |
| | | change. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | perform scans after |
| | | significant changes |
| | | as part of the |
| | | change process per |
| | | Requirement 6.5.2 |
| | | and before |
| | | considering the |
| | | change complete. All |
| | | system components |
| | | affected by the |
| | | change will need to |
| | | be scanned. |
+-----------------------+-----------------------+----------------------+
| **11.3.1.3** Internal | **11.3.1.3.a** | |
| vulnerability scans | Examine change | |
| are performed after | control documentation | |
| any significant | and internal scan | |
| change as follows: | reports to verify | |
| | that system | |
| - High-risk and | components were | |
| critical | scanned after any | |
| vulnerabilities | significant changes. | |
| (per the entity's | | |
| vulnerability | | |
| risk rankings | | |
| defined at | | |
| Requirement | | |
| 6.3.1) are | | |
| resolved. | | |
| | | |
| - Rescans are | | |
| conducted as | | |
| needed. | | |
| | | |
| - Scans are | | |
| performed by | | |
| qualified | | |
| personnel and | | |
| organizational | | |
| independence of | | |
| the tester exists | | |
| (not required to | | |
| be a QSA or ASV). | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.3.b** | |
| | Interview personnel | |
| | and examine internal | |
| | scan and rescan | |
| | reports to verify | |
| | that internal scans | |
| | were performed after | |
| | significant changes | |
| | and that high-risk | |
| | and critical | |
| | vulnerabilities as | |
| | defined in | |
| | Requirement 6.3.1 | |
| | were resolved. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.1.3.c** | |
| | Interview personnel | |
| | to verify that | |
| | internal scans are | |
| | performed by a | |
| | qualified internal | |
| | resource(s) or | |
| | qualified external | |
| | third party and that | |
| | organizational | |
| | independence of the | |
| | tester exists. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The security posture | | |
| of all system | | |
| components is | | |
| verified following | | |
| significant changes | | |
| to the network or | | |
| systems, by using | | |
| automated tools | | |
| designed to detect | | |
| vulnerabilities | | |
| operating inside the | | |
| network. Detected | | |
| vulnerabilities are | | |
| assessed and | | |
| rectified based on a | | |
| formal risk | | |
| assessment framework. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Authenticated | | |
| internal | | |
| vulnerability | | |
| scanning per | | |
| Requirement 11.3.1.2 | | |
| is not required for | | |
| scans performed after | | |
| significant changes. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Attackers routinely |
| | | look for unpatched |
| | | or vulnerable |
| | | externally facing |
| | | servers, which can |
| | | be leveraged to |
| | | launch a directed |
| | | attack. |
| | | |
| | | Organizations must |
| | | ensure these |
| | | externally facing |
| | | devices are |
| | | regularly scanned |
| | | for weaknesses and |
| | | that vulnerabilities |
| | | are patched or |
| | | remediated to |
| | | protect the entity. |
| | | |
| | | Because external |
| | | networks are at |
| | | greater risk of |
| | | compromise, external |
| | | vulnerability |
| | | scanning must be |
| | | performed at least |
| | | once every three |
| | | months by a PCI SSC |
| | | Approved Scanning |
| | | Vendor (ASV). |
| | | |
| | | **Good Practice** |
| | | |
| | | While scans are |
| | | required at least |
| | | once every three |
| | | months, more |
| | | frequent scans are |
| | | recommended |
| | | depending on the |
| | | network complexity, |
| | | frequency of change, |
| | | and types of |
| | | devices, software, |
| | | and operating |
| | | systems used. |
| | | |
| | | Multiple scan |
| | | reports can be |
| | | combined to show |
| | | that all systems |
| | | were scanned and |
| | | that all applicable |
| | | vulnerabilities were |
| | | resolved as part of |
| | | the three-month |
| | | vulnerability scan |
| | | cycle. |
| | | |
| | | However, additional |
| | | documentation may be |
| | | required to verify |
| | | non-remediated |
| | | vulnerabilities are |
| | | in the process of |
| | | being resolved. |
+-----------------------+-----------------------+----------------------+
| **11.3.2** External | **11.3.2.a** Examine | |
| vulnerability scans | ASV scan reports from | |
| are performed as | the last 12 months to | |
| follows: | verify that external | |
| | vulnerability scans | |
| - At least once | occurred at least | |
| every three | once every three | |
| months. | months in the most | |
| | recent 12-month | |
| - By a PCI SSC | period. | |
| Approved Scanning | | |
| Vendor (ASV). | | |
| | | |
| - Vulnerabilities | | |
| are resolved and | | |
| *ASV Program | | |
| Guide* | | |
| requirements for | | |
| a passing scan | | |
| are met. | | |
| | | |
| - Rescans are | | |
| performed as | | |
| needed to confirm | | |
| that | | |
| vulnerabilities | | |
| are resolved per | | |
| the *ASV Program | | |
| Guide* | | |
| requirements for | | |
| a passing scan. | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.2.b** Examine | |
| | the ASV scan report | |
| | from each scan and | |
| | rescan run in the | |
| | last 12 months to | |
| | verify that | |
| | vulnerabilities are | |
| | resolved and the *ASV | |
| | Program Guide* | |
| | requirements for a | |
| | passing scan are met. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.2.c** Examine | |
| | the ASV scan reports | |
| | to verify that the | |
| | scans were completed | |
| | by a PCI SSC Approved | |
| | Scanning Vendor | |
| | (ASV). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| For initial PCI DSS | | |
| compliance, it is not | | |
| required that four | | |
| passing scans be | | |
| completed within 12 | | |
| months if the | | |
| assessor verifies: 1) | | |
| the most recent scan | | |
| result was a passing | | |
| scan, 2) the entity | | |
| has documented | | |
| policies and | | |
| procedures requiring | | |
| scanning at least | | |
| once every three | | |
| months, and 3) | | |
| vulnerabilities noted | | |
| in the scan results | | |
| have been corrected | | |
| as shown in a | | |
| re-scan(s). | | |
| | | |
| *(continued on next | | |
| page)* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| However, for | | |
| subsequent years | | |
| after the initial PCI | | |
| DSS assessment, | | |
| passing scans at | | |
| least every three | | |
| months must have | | |
| occurred. | | |
| | | |
| ASV scanning tools | | |
| can scan a vast array | | |
| of network types and | | |
| topologies. Any | | |
| specifics about the | | |
| target environment | | |
| (for example, load | | |
| balancers, | | |
| third-party | | |
| providers, ISPs, | | |
| specific | | |
| configurations, | | |
| protocols in use, | | |
| scan interference) | | |
| should be worked out | | |
| between the ASV and | | |
| scan customer. | | |
| | | |
| Refer to the *ASV | | |
| Program Guide* | | |
| published on the PCI | | |
| SSC website for scan | | |
| customer | | |
| responsibilities, | | |
| scan preparation, | | |
| etc. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Scanning an |
| | | environment after |
| | | any significant |
| | | changes ensures that |
| | | changes were |
| | | completed |
| | | appropriately such |
| | | that the security of |
| | | the environment was |
| | | not compromised |
| | | because of the |
| | | change. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | include the need to |
| | | perform scans after |
| | | significant changes |
| | | as part of the |
| | | change process and |
| | | before the change is |
| | | considered complete. |
| | | All system |
| | | components affected |
| | | by the change will |
| | | need to be scanned. |
+-----------------------+-----------------------+----------------------+
| 1. External | **11.3.2.1.a** | |
| vulnerability | Examine change | |
| scans are | control documentation | |
| performed after | and external scan | |
| any significant | reports to verify | |
| change as | that system | |
| follows: | components were | |
| | scanned after any | |
| | significant changes. | |
| - Vulnerabilities | | |
| that are | | |
| scored 4.0 or | | |
| higher by the | | |
| CVSS are | | |
| resolved. | | |
| | | |
| - Rescans are | | |
| conducted as | | |
| needed. | | |
| | | |
| - Scans are | | |
| performed by | | |
| qualified | | |
| personnel and | | |
| | | |
| organizational | | |
| independence | | |
| of the tester | | |
| exists (not | | |
| required to | | |
| be a QSA or | | |
| ASV). | | |
+-----------------------+-----------------------+----------------------+
| | **11.3.2.1.b** | |
| | Interview personnel | |
| | and examine external | |
| | scan and rescan | |
| | reports to verify | |
| | that external scans | |
| | were performed after | |
| | significant changes | |
| | and that | |
| | vulnerabilities | |
| | scored 4.0 or higher | |
| | by the CVSS were | |
| | resolved. | |
+-----------------------+-----------------------+----------------------+
| | **11.3.2.1.c** | |
| | Interview personnel | |
| | to verify that | |
| | external scans are | |
| | performed by a | |
| | qualified internal | |
| | resource(s) or | |
| | qualified external | |
| | third party and that | |
| | organizational | |
| | independence of the | |
| | tester exists. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The security posture | | |
| of all system | | |
| components is | | |
| verified following | | |
| significant changes | | |
| to the network or | | |
| systems, by using | | |
| tools designed to | | |
| detect | | |
| vulnerabilities | | |
| operating from | | |
| outside the network. | | |
| Detected | | |
| vulnerabilities are | | |
| assessed and | | |
| rectified based on a | | |
| formal risk | | |
| assessment framework. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **11.4** External and | | |
| internal penetration | | |
| testing is regularly | | |
| performed, and | | |
| exploitable | | |
| vulnerabilities and | | |
| security weaknesses | | |
| are corrected. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Attackers spend a |
| | | lot of time finding |
| | | external and |
| | | internal |
| | | vulnerabilities to |
| | | leverage to obtain |
| | | access to cardholder |
| | | data and then to |
| | | exfiltrate that |
| | | data. As such, |
| | | entities need to |
| | | test their networks |
| | | thoroughly, just as |
| | | an attacker would |
| | | do. This testing |
| | | allows the entity to |
| | | identify and |
| | | remediate weakness |
| | | that might be |
| | | leveraged to |
| | | compromise the |
| | | entity's network and |
| | | data, and then to |
| | | take appropriate |
| | | actions to protect |
| | | the network and |
| | | system components |
| | | from such attacks. |
| | | |
| | | **Good Practice** |
| | | |
| | | Penetration testing |
| | | techniques will |
| | | differ based on an |
| | | organization's needs |
| | | and structure and |
| | | should be suitable |
| | | for the tested |
| | | environment---for |
| | | example, fuzzing, |
| | | injection, and |
| | | forgery tests might |
| | | be appropriate. The |
| | | type, depth, and |
| | | complexity of the |
| | | testing will depend |
| | | on the specific |
| | | environment and the |
| | | needs of the |
| | | organization. |
| | | |
| | | **Definitions** |
| | | |
| | | Penetration tests |
| | | simulate a |
| | | real-world attack |
| | | situation intending |
| | | to identify how far |
| | | an attacker could |
| | | penetrate an |
| | | environment, given |
| | | differing amounts of |
| | | information provided |
| | | to the tester. |
| | | |
| | | This allows an |
| | | entity to better |
| | | understand its |
| | | potential exposure |
| | | and develop a |
| | | strategy to defend |
| | | against attacks. A |
| | | penetration test |
| | | differs from a |
| | | vulnerability scan, |
| | | as a penetration |
| | | test is an active |
| | | process that usually |
| | | includes exploiting |
| | | identified |
| | | vulnerabilities. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. A penetration | **11.4.1** Examine | |
| testing | documentation and | |
| methodology is | interview personnel | |
| defined, | to verify that the | |
| documented, and | penetration-testing | |
| implemented by | methodology defined, | |
| the entity, and | documented, and | |
| includes: | implemented by the | |
| | entity includes all | |
| | elements specified in | |
| - Industry-accepted | this requirement. | |
| penetration | | |
| testing | | |
| approaches. | | |
| | | |
| - Coverage for | | |
| the entire | | |
| CDE perimeter | | |
| and critical | | |
| systems. | | |
| | | |
| - Testing from | | |
| both inside | | |
| and outside | | |
| the network. | | |
| | | |
| - Testing to | | |
| validate any | | |
| segmentation | | |
| and scope- | | |
| reduction | | |
| controls. | | |
| | | |
| | | |
| - Application-layer | | |
| penetration | | |
| testing to | | |
| identify, at | | |
| a minimum, | | |
| the | | |
| | | |
| vulnerabilities | | |
| listed in | | |
| Requirement | | |
| 6.2.4. | | |
| | | |
| - Network-layer | | |
| penetration | | |
| tests that | | |
| encompass all | | |
| components | | |
| that support | | |
| network | | |
| functions as | | |
| well as | | |
| operating | | |
| systems. | | |
| | | |
| - Review and | | |
| consideration | | |
| of threats | | |
| and | | |
| | | |
| vulnerabilities | | |
| experienced | | |
| in the last | | |
| 12 months. | | |
| | | |
| - Documented | | |
| approach to | | |
| assessing and | | |
| addressing | | |
| the risk | | |
| posed by | | |
| exploitable | | |
| | | |
| vulnerabilities | | |
| and security | | |
| weaknesses | | |
| found during | | |
| penetration | | |
| testing. | | |
| | | |
| - Retention of | | |
| penetration | | |
| testing | | |
| results and | | |
| remediation | | |
| activities | | |
| results for | | |
| at least 12 | | |
| months. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A formal methodology | | |
| is defined for | | |
| thorough technical | | |
| testing that attempts | | |
| to exploit | | |
| vulnerabilities and | | |
| security weaknesses | | |
| via simulated attack | | |
| methods by a | | |
| competent manual | | |
| attacker. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | Scanning for |
| Notes** | | vulnerabilities |
| | | alone is not a |
| | | penetration test, |
| | | nor is a penetration |
| | | test adequate if the |
| | | focus is solely on |
| | | trying to exploit |
| | | vulnerabilities |
| | | found in a |
| | | vulnerability scan. |
| | | |
| | | Conducting a |
| | | vulnerability scan |
| | | may be one of the |
| | | first steps, but it |
| | | is not the only step |
| | | a penetration tester |
| | | will perform to plan |
| | | the testing |
| | | strategy. |
| | | |
| | | Even if a |
| | | vulnerability scan |
| | | does not detect |
| | | known |
| | | vulnerabilities, the |
| | | penetration tester |
| | | will often gain |
| | | enough knowledge |
| | | about the system to |
| | | identify possible |
| | | security gaps. |
| | | |
| | | Penetration testing |
| | | is a highly manual |
| | | process. While some |
| | | automated tools may |
| | | be used, the tester |
| | | uses their knowledge |
| | | of systems to gain |
| | | access into an |
| | | environment. Often |
| | | the tester will |
| | | chain several types |
| | | of exploits together |
| | | with the goal of |
| | | breaking through |
| | | layers of defenses. |
| | | For example, if the |
| | | tester finds a way |
| | | to gain access to an |
| | | application server, |
| | | the tester will then |
| | | use the compromised |
| | | server as a point to |
| | | stage a new attack |
| | | based on the |
| | | resources to which |
| | | the server has |
| | | access. In this way, |
| | | a tester can |
| | | simulate the |
| | | techniques used by |
| | | an attacker to |
| | | identify areas of |
| | | potential weakness |
| | | in the environment. |
| | | The testing of |
| | | security monitoring |
| | | and detection |
| | | methods---for |
| | | example, to confirm |
| | | the effectiveness of |
| | | logging and file |
| | | integrity monitoring |
| | | mechanisms, should |
| | | also be considered. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the |
| | | *Information |
| | | Supplement: |
| | | Penetration Testing |
| | | Guidance* for |
| | | additional guidance. |
| | | |
| | | Industry-accepted |
| | | penetration testing |
| | | approaches include: |
| | | |
| | | *The Open Source |
| | | Security Testing |
| | | Methodology and |
| | | Manual (OSSTMM)* |
| | | |
| | | *Open Web |
| | | Application Security |
| | | Project (OWASP) |
| | | penetration testing |
| | | programs.* |
+-----------------------+-----------------------+----------------------+
| Testing from inside | | |
| the network (or | | |
| "internal penetration | | |
| testing") means | | |
| testing from both | | |
| inside the CDE and | | |
| into the CDE from | | |
| trusted and untrusted | | |
| internal networks. | | |
| | | |
| Testing from outside | | |
| the network (or | | |
| "external penetration | | |
| testing") means | | |
| testing the exposed | | |
| external perimeter of | | |
| trusted networks, and | | |
| critical systems | | |
| connected to or | | |
| accessible to public | | |
| network | | |
| infrastructures. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Internal penetration |
| | | testing serves two |
| | | purposes. Firstly, |
| | | just like an |
| | | external penetration |
| | | test, it discovers |
| | | vulnerabilities and |
| | | misconfigurations |
| | | that could be used |
| | | by an attacker that |
| | | had managed to get |
| | | some degree of |
| | | access to the |
| | | internal network, |
| | | whether that is |
| | | because the attacker |
| | | is an authorized |
| | | user conducting |
| | | unauthorized |
| | | activities, or an |
| | | external attacker |
| | | that had managed to |
| | | penetrate the |
| | | entity's perimeter. |
| | | |
| | | Secondly, internal |
| | | penetration testing |
| | | also helps entities |
| | | to discover where |
| | | their change control |
| | | process failed by |
| | | detecting previously |
| | | unknown systems. |
| | | Additionally, it |
| | | verifies the status |
| | | of many of the |
| | | controls operating |
| | | within the CDE. |
| | | |
| | | A penetration test |
| | | is not truly a |
| | | "test" because the |
| | | outcome of a |
| | | penetration test is |
| | | not something that |
| | | can be classified as |
| | | a "pass" or a |
| | | "fail." The best |
| | | outcome of a test is |
| | | a catalog of |
| | | vulnerabilities and |
| | | misconfigurations |
| | | that an entity did |
| | | not know about and |
| | | the penetration |
| | | tester found them |
| | | before an attacker |
| | | could. A penetration |
| | | test that found |
| | | nothing is typically |
| | | indicative of |
| | | shortcomings of the |
| | | penetration tester, |
| | | rather than being a |
| | | positive reflection |
| | | of the security |
| | | posture of the |
| | | entity. |
| | | |
| | | **Good Practice** |
| | | |
| | | Some considerations |
| | | when choosing a |
| | | qualified resource |
| | | to perform |
| | | penetration testing |
| | | include: |
| | | |
| | | - Specific |
| | | penetration |
| | | testing |
| | | certifications, |
| | | which may be an |
| | | indication of |
| | | the tester's |
| | | skill level and |
| | | competence. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **11.4.2** Internal | **11.4.2.a** Examine | |
| penetration testing | the scope of work and | |
| is performed: | results from the most | |
| | recent internal | |
| - Per the entity's | penetration test to | |
| defined | verify that | |
| methodology, | penetration testing | |
| | is performed in | |
| - At least once | accordance with all | |
| every 12 months | elements specified in | |
| | this requirement. | |
| - After any | | |
| significant | | |
| infrastructure or | | |
| application | | |
| upgrade or change | | |
| | | |
| - By a qualified | | |
| internal resource | | |
| or qualified | | |
| external | | |
| third-party | | |
| | | |
| - Organizational | | |
| independence of | | |
| the tester exists | | |
| (not required to | | |
| be a QSA or ASV). | | |
+-----------------------+-----------------------+----------------------+
| | **11.4.2.b** | |
| | Interview personnel | |
| | to verify that the | |
| | internal penetration | |
| | test was performed by | |
| | a qualified internal | |
| | resource or qualified | |
| | external third-party | |
| | and that | |
| | organizational | |
| | independence of the | |
| | tester exists (not | |
| | required to be a QSA | |
| | or ASV). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Internal system | | |
| defenses are verified | | |
| by technical testing | | |
| according to the | | |
| entity's defined | | |
| methodology as | | |
| frequently as needed | | |
| to address evolving | | |
| and new attacks and | | |
| threats and ensure | | |
| that significant | | |
| changes do not | | |
| introduce unknown | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | |
| Requirements** | Testing Procedures** | |
+-----------------------+-----------------------+----------------------+
| **11.4.3** External | **11.4.3.a** Examine | |
| penetration testing | the scope of work and | |
| is performed: | results from the most | |
| | recent external | |
| - Per the entity's | penetration test to | |
| defined | verify that | |
| methodology | penetration testing | |
| | is performed | |
| - At least once | according to all | |
| every 12 months | elements specified in | |
| | this requirement. | |
| - After any | | |
| significant | | |
| infrastructure or | | |
| application | | |
| upgrade or change | | |
| | | |
| - By a qualified | | |
| internal resource | | |
| or qualified | | |
| external third | | |
| party | | |
| | | |
| - Organizational | | |
| independence of | | |
| the tester exists | | |
| (not required to | | |
| be a QSA or ASV). | | |
| | | |
| *(continued on next | | |
| page)* | | |
+-----------------------+-----------------------+----------------------+
| | **11.4.3.b** | |
| | Interview personnel | |
| | to verify that the | |
| | external penetration | |
| | test was performed by | |
| | a qualified internal | |
| | resource or qualified | |
| | external third-party | |
| | and that | |
| | organizational | |
| | independence of the | |
| | tester exists (not | |
| | required to be a QSA | |
| | or ASV). | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Customized Approach | | - Prior experience |
| Objective** | | conducting |
| | | penetration |
| | | testing---for |
| | | example, the |
| | | number of years |
| | | of experience, |
| | | and the type and |
| | | scope of prior |
| | | engagements can |
| | | help confirm |
| | | whether the |
| | | tester's |
| | | experience is |
| | | appropriate for |
| | | the needs of the |
| | | engagement. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the |
| | | *Information |
| | | Supplement: |
| | | Penetration Testing |
| | | Guidance* on the PCI |
| | | SSC website for |
| | | additional guidance. |
+-----------------------+-----------------------+----------------------+
| External system | | |
| defenses are verified | | |
| by technical testing | | |
| according to the | | |
| entity's defined | | |
| methodology as | | |
| frequently as needed | | |
| to address evolving | | |
| and new attacks and | | |
| threats, and to | | |
| ensure that | | |
| significant changes | | |
| do not introduce | | |
| unknown | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The results of a |
| | | penetration test are |
| | | usually a |
| | | prioritized list of |
| | | vulnerabilities |
| | | discovered by the |
| | | exercise. Often a |
| | | tester will have |
| | | chained a number of |
| | | vulnerabilities |
| | | together to |
| | | compromise a system |
| | | component. |
| | | Remediating the |
| | | vulnerabilities |
| | | found by a |
| | | penetration test |
| | | significantly |
| | | reduces the |
| | | probability that the |
| | | same vulnerabilities |
| | | will be exploited by |
| | | a malicious |
| | | attacker. |
| | | |
| | | Using the entity's |
| | | own vulnerability |
| | | risk assessment |
| | | process (see |
| | | requirement 6.3.1) |
| | | ensures that the |
| | | vulnerabilities that |
| | | pose the highest |
| | | risk to the entity |
| | | will be remediated |
| | | more quickly. |
| | | |
| | | **Good Practice** |
| | | |
| | | As part of the |
| | | entity's assessment |
| | | of risk, entities |
| | | should consider how |
| | | likely the |
| | | vulnerability is to |
| | | be exploited and |
| | | whether there are |
| | | other controls |
| | | present in the |
| | | environment to |
| | | reduce the risk. |
| | | |
| | | Any weaknesses that |
| | | point to PCI DSS |
| | | requirements not |
| | | being met should be |
| | | addressed. |
+-----------------------+-----------------------+----------------------+
| **11.4.4** | **11.4.4** Examine | |
| Exploitable | penetration testing | |
| vulnerabilities and | results to verify | |
| security weaknesses | that noted | |
| found during | exploitable | |
| penetration testing | vulnerabilities and | |
| are corrected as | security weaknesses | |
| follows: | were corrected in | |
| | accordance with all | |
| - In accordance | elements specified in | |
| with the entity's | this requirement. | |
| assessment of the | | |
| risk posed by the | | |
| security issue as | | |
| defined in | | |
| Requirement | | |
| 6.3.1. | | |
| | | |
| - Penetration | | |
| testing is | | |
| repeated to | | |
| verify the | | |
| corrections. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Vulnerabilities and | | |
| security weaknesses | | |
| found while verifying | | |
| system defenses are | | |
| mitigated. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | When an entity uses |
| | | segmentation |
| | | controls to isolate |
| | | the CDE from |
| | | internal untrusted |
| | | networks, the |
| | | security of the CDE |
| | | is dependent on that |
| | | segmentation |
| | | functioning. Many |
| | | attacks have |
| | | involved the |
| | | attacker moving |
| | | laterally from what |
| | | an entity deemed an |
| | | isolated network |
| | | into the CDE. Using |
| | | penetration testing |
| | | tools and techniques |
| | | to validate that an |
| | | untrusted network is |
| | | indeed isolated from |
| | | the CDE can alert |
| | | the entity to a |
| | | failure or |
| | | misconfiguration of |
| | | the segmentation |
| | | controls, which can |
| | | then be rectified. |
| | | |
| | | **Good Practice** |
| | | |
| | | Techniques such as |
| | | host discovery and |
| | | port scanning can be |
| | | used to verify |
| | | out-of-scope |
| | | segments have no |
| | | access to the CDE. |
+-----------------------+-----------------------+----------------------+
| **11.4.5** If | **11.4.5.a** Examine | |
| segmentation is used | segmentation controls | |
| to isolate the CDE | and review | |
| from other networks, | penetration-testing | |
| penetration tests are | methodology to verify | |
| performed on | that | |
| segmentation controls | penetration-testing | |
| as follows: | procedures are | |
| | defined to test all | |
| - At least once | segmentation methods | |
| every 12 months | in accordance with | |
| and after any | all elements | |
| changes to | specified in this | |
| segmentation | requirement. | |
| controls/methods | | |
| | | |
| - Covering all | | |
| segmentation | | |
| controls/methods | | |
| in use. | | |
| | | |
| - According to the | | |
| entity's defined | | |
| penetration | | |
| testing | | |
| methodology. | | |
| | | |
| - Confirming that | | |
| the segmentation | | |
| controls/methods | | |
| are operational | | |
| and effective, | | |
| and isolate the | | |
| CDE from all | | |
| out-of-scope | | |
| systems. | | |
| | | |
| - Confirming | | |
| effectiveness of | | |
| any use of | | |
| isolation to | | |
| separate systems | | |
| with differing | | |
| security levels | | |
| (see Requirement | | |
| 2.2.3). | | |
| | | |
| - Performed by a | | |
| qualified | | |
| internal resource | | |
| or qualified | | |
| external third | | |
| party. | | |
| | | |
| - Organizational | | |
| independence of | | |
| the tester exists | | |
| (not required to | | |
| be a QSA or ASV). | | |
+-----------------------+-----------------------+----------------------+
| | **11.4.5.b** Examine | |
| | the results from the | |
| | most recent | |
| | penetration test to | |
| | verify the | |
| | penetration test | |
| | covers and addresses | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| | **11.4.5.c** | |
| | Interview personnel | |
| | to verify that the | |
| | test was performed by | |
| | a qualified internal | |
| | resource or qualified | |
| | external third party | |
| | and that | |
| | organizational | |
| | independence of the | |
| | tester exists (not | |
| | required to be a QSA | |
| | or ASV). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| If segmentation is | | |
| used, it is verified | | |
| periodically by | | |
| technical testing to | | |
| be continually | | |
| effective, including | | |
| after any changes, in | | |
| isolating the CDE | | |
| from all out- | | |
| of-scope systems. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Service providers |
| | | typically have |
| | | access to greater |
| | | volumes of |
| | | cardholder data or |
| | | can provide an entry |
| | | point that can be |
| | | exploited to then |
| | | compromise multiple |
| | | other entities. |
| | | Service providers |
| | | also typically have |
| | | larger and more |
| | | complex networks |
| | | that are subject to |
| | | more frequent |
| | | change. The |
| | | probability of |
| | | segmentation |
| | | controls failing in |
| | | complex and dynamic |
| | | networks is greater |
| | | in service provider |
| | | environments. |
| | | |
| | | Validating |
| | | segmentation |
| | | controls more |
| | | frequently is likely |
| | | to discover such |
| | | failings before they |
| | | can be exploited by |
| | | an attacker |
| | | attempting to pivot |
| | | laterally from an |
| | | out-of-scope |
| | | untrusted network to |
| | | the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | Although the |
| | | requirement |
| | | specifies that this |
| | | scope validation is |
| | | carried out at least |
| | | once every six |
| | | months and after |
| | | significant change, |
| | | this exercise should |
| | | be performed as |
| | | frequently as |
| | | possible to ensure |
| | | it remains effective |
| | | at isolating the CDE |
| | | from other networks. |
+-----------------------+-----------------------+----------------------+
| **11.4.6 *Additional | **11.4.6.a | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only: ***If | provider assessments | |
| segmentation is used | only: ***Examine the | |
| to isolate the CDE | results from the most | |
| from other networks, | recent penetration | |
| penetration tests are | test to verify that | |
| performed on | the penetration | |
| segmentation controls | covers and addressed | |
| as follows: | all elements | |
| | specified in this | |
| - At least once | requirement. | |
| every six months | | |
| and after any | | |
| changes to | | |
| segmentation | | |
| controls/methods. | | |
| | | |
| - Covering all | | |
| segmentation | | |
| controls/methods | | |
| in use. | | |
| | | |
| - According to the | | |
| entity's defined | | |
| penetration | | |
| testing | | |
| methodology. | | |
| | | |
| - Confirming that | | |
| the segmentation | | |
| controls/methods | | |
| are operational | | |
| and effective, | | |
| and isolate the | | |
| CDE from all | | |
| out-of-scope | | |
| systems. | | |
| | | |
| - Confirming | | |
| effectiveness of | | |
| any use of | | |
| isolation to | | |
| separate systems | | |
| with differing | | |
| security levels | | |
| (see Requirement | | |
| 2.2.3). | | |
| | | |
| - Performed by a | | |
| qualified | | |
| internal resource | | |
| or qualified | | |
| external third | | |
| party. | | |
| | | |
| - Organizational | | |
| independence of | | |
| the tester exists | | |
| (not required to | | |
| be a QSA or ASV). | | |
+-----------------------+-----------------------+----------------------+
| | **11.4.6.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Interview | |
| | personnel to verify | |
| | that the test was | |
| | performed by a | |
| | qualified internal | |
| | resource or qualified | |
| | external third party | |
| | and that | |
| | organizational | |
| | independence of the | |
| | tester exists (not | |
| | required to be a QSA | |
| | or ASV). | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| If segmentation is | | |
| used, it is verified | | |
| by technical testing | | |
| to be continually | | |
| effective, including | | |
| after any changes, in | | |
| isolating the CDE | | |
| from out-of-scope | | |
| systems. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Entities need to |
| | | conduct penetration |
| | | tests in accordance |
| | | with PCI DSS to |
| | | simulate attacker |
| | | behavior and |
| | | discover |
| | | vulnerabilities in |
| | | their environment. |
| | | In shared and cloud |
| | | environments, the |
| | | multi-tenant service |
| | | provider may be |
| | | concerned about the |
| | | activities of a |
| | | penetration tester |
| | | affecting other |
| | | customers' systems. |
| | | |
| | | Multi-tenant service |
| | | providers cannot |
| | | forbid penetration |
| | | testing because this |
| | | would leave their |
| | | customers' systems |
| | | open to |
| | | exploitation. |
| | | |
| | | Therefore, |
| | | multi-tenant service |
| | | providers must |
| | | support customer |
| | | requests to conduct |
| | | penetration testing |
| | | or for penetration |
| | | testing results. |
+-----------------------+-----------------------+----------------------+
| **11.4.7 *Additional | **11.4.7 *Additional | |
| requirement for | testing procedure for | |
| multi-tenant service | multi- tenant service | |
| providers only: | providers only: | |
| ***Multi-tenant | ***Examine evidence | |
| service providers | to verify that | |
| support their | multi-tenant service | |
| customers for | providers support | |
| external penetration | their customers for | |
| testing per | external penetration | |
| Requirement 11.4.3 | testing per | |
| and 11.4.4. | Requirement 11.4.3 | |
| | and 11.4.4. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Multi-tenant service | | |
| providers support | | |
| their customers' need | | |
| for technical testing | | |
| either by providing | | |
| access or evidence | | |
| that comparable | | |
| technical testing has | | |
| been undertaken. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a multi-tenant | | |
| service provider. | | |
| | | |
| To meet this | | |
| requirement, a | | |
| multi-tenant service | | |
| provider may either: | | |
| | | |
| - Provide evidence | | |
| to its customers | | |
| to show that | | |
| penetration | | |
| testing has been | | |
| performed | | |
| according to | | |
| Requirements | | |
| 11.4.3 and 11.4.4 | | |
| on the customers' | | |
| subscribed | | |
| infrastructure, | | |
| or | | |
| | | |
| - Provide prompt | | |
| access to each of | | |
| its customers, so | | |
| customers can | | |
| perform their own | | |
| penetration | | |
| testing. | | |
| | | |
| Evidence provided to | | |
| customers can include | | |
| redacted penetration | | |
| testing results but | | |
| needs to include | | |
| sufficient | | |
| information to prove | | |
| that all elements of | | |
| Requirements 11.4.3 | | |
| and 11.4.4 have been | | |
| met on the customer's | | |
| behalf. | | |
| | | |
| Refer also to | | |
| *[Appendix A1: | | |
| Additional PCI | | |
| DS | | |
| S](#appendix-a1-addit | | |
| ional-pci-dss-require | | |
| ments-for-multi-tenan | | |
| t-service-providers)* | | |
| [*Requirements for | | |
| Multi-Tenant Service | | |
| Providers | | |
| *.](#appendix-a1-addi | | |
| tional-pci-dss-requir | | |
| ements-for-multi-tena | | |
| nt-service-providers) | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
| **11.5** Network | | |
| intrusions and | | |
| unexpected file | | |
| changes are detected | | |
| and responded to. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Intrusion-detection |
| | | and/or |
| | | intrusion-prevention |
| | | techniques (such as |
| | | IDS/IPS) compare the |
| | | traffic coming into |
| | | the network with |
| | | known "signatures" |
| | | and/or behaviors of |
| | | thousands of |
| | | compromise types |
| | | (hacker tools, |
| | | Trojans, and other |
| | | malware), and then |
| | | send alerts and/or |
| | | stop the attempt as |
| | | it happens. Without |
| | | a proactive approach |
| | | to detect |
| | | unauthorized |
| | | activity, attacks on |
| | | (or misuse of) |
| | | computer resources |
| | | could go unnoticed |
| | | for long periods of |
| | | time. The impact of |
| | | an intrusion into |
| | | the CDE is, in many |
| | | ways, a factor of |
| | | the time that an |
| | | attacker has in the |
| | | environment before |
| | | being detected. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. | **11.5.1.a** Examine | |
| Intrusion-detection | system configurations | |
| and/or intrusion- | and network diagrams | |
| prevention | to verify that | |
| techniques are | intrusion-detection | |
| used to detect | and/or | |
| and/or prevent | intrusion-prevention | |
| intrusions into | techniques are in | |
| the network as | place to monitor all | |
| follows: | traffic: | |
| | | |
| - All traffic | - At the perimeter | |
| is monitored | of the CDE. | |
| at the | | |
| perimeter of | - At critical | |
| the CDE. | points in the | |
| | CDE. | |
| - All traffic | | |
| is monitored | | |
| at critical | | |
| points in the | | |
| CDE. | | |
| | | |
| - Personnel are | | |
| alerted to | | |
| suspected | | |
| compromises. | | |
| | | |
| - All | | |
| | | |
| intrusion-detection | | |
| and | | |
| prevention | | |
| engines, | | |
| baselines, | | |
| and | | |
| signatures | | |
| are kept up | | |
| to date. | | |
+-----------------------+-----------------------+----------------------+
| | **11.5.1.b** Examine | |
| | system configurations | |
| | and interview | |
| | responsible personnel | |
| | to verify intrusion- | |
| | detection and/or | |
| | intrusion-prevention | |
| | techniques alert | |
| | personnel of | |
| | suspected | |
| | compromises. | |
+-----------------------+-----------------------+----------------------+
| | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Customized Approach | **11.5.1.c** Examine | **Good Practice** |
| Objective** | system configurations | |
| | and vendor | Security alerts |
| | documentation to | generated by these |
| | verify | techniques should be |
| | intrusion-detection | continually |
| | and/or | monitored, so that |
| | intrusion-prevention | the attempted or |
| | techniques are | actual intrusions |
| | configured to keep | can be stopped, and |
| | all engines, | potential damage |
| | baselines, and | limited. |
| | signatures up to | |
| | date. | **Definitions** |
| | | |
| | | Critical locations |
| | | could include, but |
| | | are not limited to, |
| | | network security |
| | | controls between |
| | | network segments |
| | | (for example, |
| | | between a DMZ and an |
| | | internal network or |
| | | between an in-scope |
| | | and out- of-scope |
| | | network) and points |
| | | protecting |
| | | connections between |
| | | a less trusted and a |
| | | more trusted system |
| | | component. |
+-----------------------+-----------------------+----------------------+
| Mechanisms to detect | | |
| real-time suspicious | | |
| or anomalous network | | |
| traffic that may be | | |
| indicative of threat | | |
| actor activity are | | |
| implemented. Alerts | | |
| generated by these | | |
| mechanisms are | | |
| responded to by | | |
| personnel, or by | | |
| automated means that | | |
| ensure that system | | |
| components cannot be | | |
| compromised as a | | |
| result of the | | |
| detected activity. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Detecting covert |
| | | malware |
| | | communication |
| | | attempts (for |
| | | example, DNS |
| | | tunneling) can help |
| | | block the spread of |
| | | malware laterally |
| | | inside a network and |
| | | the exfiltration of |
| | | data. When deciding |
| | | where to place this |
| | | control, entities |
| | | should consider |
| | | critical locations |
| | | in the network, and |
| | | likely routes for |
| | | covert channels. |
| | | |
| | | When malware |
| | | establishes a |
| | | foothold in an |
| | | infected |
| | | environment, it |
| | | often tries to |
| | | establish a |
| | | communication |
| | | channel to a |
| | | command-and- control |
| | | (C&C) server. |
| | | Through the C&C |
| | | server, the attacker |
| | | communicates with |
| | | and controls malware |
| | | on compromised |
| | | systems to deliver |
| | | malicious payloads |
| | | or instructions, or |
| | | to initiate data |
| | | exfiltration. In |
| | | many cases, the |
| | | malware will |
| | | communicate with the |
| | | C&C server |
| | | indirectly via |
| | | botnets, bypassing |
| | | monitoring, blocking |
| | | controls, and |
| | | rendering these |
| | | methods ineffective |
| | | to detect the covert |
| | | channels. |
| | | |
| | | **Good Practice** |
| | | |
| | | Methods that can |
| | | help detect and |
| | | address malware |
| | | communications |
| | | channels include |
| | | real- time endpoint |
| | | scanning, egress |
| | | traffic filtering, |
| | | an "allow" listing, |
| | | data loss prevention |
| | | tools, and network |
| | | security monitoring |
| | | tools such as |
| | | IDS/IPS. |
| | | Additionally, DNS |
| | | queries and |
| | | responses are a key |
| | | data source used by |
| | | network defenders in |
| | | support of incident |
| | | response as well as |
| | | intrusion discovery. |
| | | When these |
| | | transactions are |
| | | collected for |
| | | processing and |
| | | analytics, they can |
| | | enable a number of |
| | | valuable security |
| | | analytic scenarios. |
| | | |
| | | It is important that |
| | | organizations |
| | | maintain up-to- date |
| | | knowledge of malware |
| | | modes of operation, |
| | | as mitigating these |
| | | can help detect and |
| | | limit the impact of |
| | | malware in the |
| | | environment. |
+-----------------------+-----------------------+----------------------+
| **11.5.1.1 | **11.5.1.1.a | |
| *Additional | *Additional testing | |
| requirement for | procedure for service | |
| service providers | provider assessments | |
| only: | only: ***Examine | |
| * | documentation and | |
| **Intrusion-detection | configuration | |
| and/or | settings to verify | |
| intrusion-prevention | that methods to | |
| techniques detect, | detect and alert | |
| alert on/prevent, and | on/prevent covert | |
| address covert | malware communication | |
| malware communication | channels are in place | |
| channels. | and operating. | |
+-----------------------+-----------------------+----------------------+
| | **11.5.1.1.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Examine the | |
| | entity's | |
| | incident-response | |
| | plan (Requirement | |
| | 12.10.1) to verify it | |
| | requires and defines | |
| | a response in the | |
| | event that covert | |
| | malware communication | |
| | channels are | |
| | detected. | |
+-----------------------+-----------------------+----------------------+
| | **11.5.1.1.c | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Interview | |
| | responsible personnel | |
| | and observe processes | |
| | to verify that | |
| | personnel maintain | |
| | knowledge of covert | |
| | malware communication | |
| | and control | |
| | techniques and are | |
| | knowledgeable about | |
| | how to respond when | |
| | malware is suspected. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Mechanisms are in | | |
| place to detect and | | |
| alert/prevent covert | | |
| communications with | | |
| command-and-control | | |
| systems. Alerts | | |
| generated by these | | |
| mechanisms are | | |
| responded to by | | |
| personnel, or by | | |
| automated means that | | |
| ensure that such | | |
| communications are | | |
| blocked. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Changes to critical |
| | | system, |
| | | configuration, or |
| | | content files can be |
| | | an indicator an |
| | | attacker has |
| | | accessed an |
| | | organization's |
| | | system. Such changes |
| | | can allow an |
| | | attacker to take |
| | | additional malicious |
| | | actions, access |
| | | cardholder data, |
| | | and/or conduct |
| | | activities without |
| | | detection or record. |
| | | |
| | | A change detection |
| | | mechanism will |
| | | detect and evaluate |
| | | such changes to |
| | | critical files and |
| | | generate alerts that |
| | | can be responded to |
| | | following defined |
| | | processes so that |
| | | personnel can take |
| | | appropriate actions. |
| | | |
| | | If not implemented |
| | | properly and the |
| | | output of the |
| | | change-detection |
| | | solution monitored, |
| | | a malicious |
| | | individual could |
| | | add, remove, or |
| | | alter configuration |
| | | file contents, |
| | | operating system |
| | | programs, or |
| | | application |
| | | executables. |
| | | |
| | | Unauthorized |
| | | changes, if |
| | | undetected, could |
| | | render existing |
| | | security controls |
| | | ineffective and/or |
| | | result in cardholder |
| | | data being stolen |
| | | with no perceptible |
| | | impact to normal |
| | | processing. |
| | | |
| | | **Good Practice** |
| | | |
| | | Examples of the |
| | | types of files that |
| | | should be monitored |
| | | include, but are not |
| | | limited to: |
| | | |
| | | - System |
| | | executables. |
| | | |
| | | - Application |
| | | executables. |
| | | |
| | | - Configuration |
| | | and parameter |
| | | files. |
| | | |
| | | - Centrally |
| | | stored, |
| | | historical, or |
| | | archived audit |
| | | logs. |
| | | |
| | | - Additional |
| | | critical files |
| | | determined by |
| | | entity (for |
| | | example, through |
| | | risk assessment |
| | | or other means). |
| | | |
| | | **Examples** |
| | | |
| | | Change-detection |
| | | solutions such as |
| | | file integrity |
| | | monitoring (FIM) |
| | | tools check for |
| | | changes, additions, |
| | | and deletions to |
| | | critical files, and |
| | | notify when such |
| | | changes are |
| | | detected. |
+-----------------------+-----------------------+----------------------+
| **11.5.2** A | **11.5.2.a** Examine | |
| change-detection | system settings, | |
| mechanism (for | monitored files, and | |
| example, file | results from | |
| integrity monitoring | monitoring activities | |
| tools) is deployed as | to verify the use of | |
| follows: | a change-detection | |
| | mechanism. | |
| - To alert | | |
| personnel to | | |
| unauthorized | | |
| modification | | |
| (including | | |
| changes, | | |
| additions, and | | |
| deletions) of | | |
| critical files. | | |
| | | |
| - To perform | | |
| critical file | | |
| comparisons at | | |
| least once | | |
| weekly. | | |
+-----------------------+-----------------------+----------------------+
| | **11.5.2.b** Examine | |
| | settings for the | |
| | change-detection | |
| | mechanism to verify | |
| | it is configured in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Critical files cannot | | |
| be modified by | | |
| unauthorized | | |
| personnel without an | | |
| alert being | | |
| generated. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| For change-detection | | |
| purposes, critical | | |
| files are usually | | |
| those that do not | | |
| regularly change, but | | |
| the modification of | | |
| which could indicate | | |
| a system compromise | | |
| or risk of | | |
| compromise. Change- | | |
| detection mechanisms | | |
| such as file | | |
| integrity monitoring | | |
| products usually come | | |
| pre-configured with | | |
| critical files for | | |
| the related operating | | |
| system. Other | | |
| critical files, such | | |
| as those for custom | | |
| applications, must be | | |
| evaluated and defined | | |
| by the entity (that | | |
| is, the merchant or | | |
| service provider). | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **11.6** Unauthorized | | |
| changes on payment | | |
| pages are detected | | |
| and responded to. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Many web pages now |
| | | rely on assembling |
| | | objects, including |
| | | active content |
| | | (primarily |
| | | JavaScript), from |
| | | multiple internet |
| | | locations. |
| | | Additionally, the |
| | | content of many web |
| | | pages is defined |
| | | using content |
| | | management and tag |
| | | management systems |
| | | that may not be |
| | | possible to monitor |
| | | using traditional |
| | | change detection |
| | | mechanisms. |
| | | |
| | | Therefore, the only |
| | | place to detect |
| | | changes or |
| | | indicators of |
| | | malicious activity |
| | | is in the consumer |
| | | browser as the page |
| | | is constructed and |
| | | all JavaScript |
| | | interpreted. |
| | | |
| | | By comparing the |
| | | current version of |
| | | the HTTP header and |
| | | the active content |
| | | of payment pages as |
| | | received by the |
| | | consumer browser |
| | | with prior or known |
| | | versions, it is |
| | | possible to detect |
| | | unauthorized changes |
| | | that may indicate a |
| | | skimming attack. |
| | | |
| | | Additionally, by |
| | | looking for known |
| | | indicators of |
| | | compromise and |
| | | script elements or |
| | | behavior typical of |
| | | skimmers, suspicious |
| | | alerts can be |
| | | raised. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. A change- and | **11.6.1.a** Examine | |
| tamper-detection | system settings, | |
| mechanism is | monitored payment | |
| deployed as | pages, and results | |
| follows: | from monitoring | |
| | activities to verify | |
| - To alert | the use of a change- | |
| personnel to | and tamper- detection | |
| unauthorized | mechanism. | |
| modification | | |
| (including | | |
| indicators of | | |
| compromise, | | |
| changes, | | |
| additions, | | |
| and | | |
| deletions) to | | |
| the HTTP | | |
| headers and | | |
| the contents | | |
| of payment | | |
| pages as | | |
| received by | | |
| the consumer | | |
| browser. | | |
| | | |
| - The mechanism | | |
| is configured | | |
| to evaluate | | |
| the received | | |
| HTTP header | | |
| and payment | | |
| page. | | |
| | | |
| - The mechanism | | |
| functions are | | |
| performed as | | |
| follows: | | |
| | | |
| - At least | | |
| once | | |
| every | | |
| seven | | |
| days | | |
| | | |
| > **OR** | | |
| | | |
| - Periodically (at | | |
| the frequency | | |
| defined in the | | |
| entity's targeted | | |
| risk analysis, | | |
| which is | | |
| performed | | |
| according to all | | |
| elements | | |
| specified in | | |
| Requirement | | |
| 12.3.1). | | |
+-----------------------+-----------------------+----------------------+
| | **11.6.1.b** Examine | |
| | configuration | |
| | settings to verify | |
| | the mechanism is | |
| | configured in | |
| | accordance with all | |
| | elements specified in | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| | **11.6.1.c** If the | |
| | mechanism functions | |
| | are performed at an | |
| | entity-defined | |
| | frequency, examine | |
| | the entity's targeted | |
| | risk analysis for | |
| | determining the | |
| | frequency to verify | |
| | the risk analysis was | |
| | performed in | |
| | accordance with all | |
| | elements specified at | |
| | Requirement 12.3.1. | |
+-----------------------+-----------------------+----------------------+
| | **11.6.1.d** Examine | |
| | configuration | |
| | settings and | |
| | interview personnel | |
| | to verify the | |
| | mechanism functions | |
| | are performed either: | |
| | | |
| | - At least once | |
| | every seven days | |
| | | |
| | > **OR** | |
| | | |
| | - At the frequency | |
| | defined in the | |
| | entity's targeted | |
| | risk analysis | |
| | performed for | |
| | this requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| E-commerce skimming | | |
| code or techniques | | |
| cannot be added to | | |
| payment pages as | | |
| received by the | | |
| consumer browser | | |
| without a timely | | |
| alert being | | |
| generated. | | |
| Anti-skimming | | |
| measures cannot be | | |
| removed from payment | | |
| pages without a | | |
| prompt alert being | | |
| generated. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Applicability | | **Examples** |
| Notes** | | |
| | | Mechanisms that |
| | | detect and report on |
| | | changes to the |
| | | headers and content |
| | | of the payment page |
| | | include but are not |
| | | limited to: |
| | | |
| | | - Violations of |
| | | the Content |
| | | Security Policy |
| | | (CSP) can be |
| | | reported to the |
| | | entity using the |
| | | *report- to* or |
| | | *report-uri* CSP |
| | | directives. |
| | | |
| | | - Changes to the |
| | | CSP itself can |
| | | indicate |
| | | tampering. |
| | | |
| | | - External |
| | | monitoring by |
| | | systems that |
| | | request and |
| | | analyze the |
| | | received web |
| | | pages (also |
| | | known as |
| | | synthetic user |
| | | monitoring) can |
| | | detect changes |
| | | to JavaScript in |
| | | payment pages |
| | | and alert |
| | | personnel. |
| | | |
| | | - Embedding |
| | | |
| | | tamper-resistant, |
| | | tamper-detection |
| | | script in the |
| | | payment page can |
| | | alert and block |
| | | when malicious |
| | | script behavior |
| | | is detected. |
| | | |
| | | - Reverse proxies |
| | | and Content |
| | | Delivery |
| | | Networks can |
| | | detect changes |
| | | in scripts and |
| | | alert personnel. |
| | | |
| | | Often, these |
| | | mechanisms are |
| | | subscription or |
| | | cloud-based, but can |
| | | also be based on |
| | | custom and bespoke |
| | | solutions. |
+-----------------------+-----------------------+----------------------+
| The intention of this | | |
| requirement is not | | |
| that an entity | | |
| installs software in | | |
| the systems or | | |
| browsers of its | | |
| consumers, but rather | | |
| that the entity uses | | |
| techniques such as | | |
| those described under | | |
| Examples in the | | |
| Guidance column to | | |
| prevent and detect | | |
| unexpected script | | |
| activities. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
## Maintain an Information Security Policy {#maintain-an-information-security-policy .unnumbered}
### *Requirement 12: Support Information Security with Organizational Policies and Programs* {#requirement-12-support-information-security-with-organizational-policies-and-programs .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| 1. A comprehensive information security policy that governs and |
| provides direction for protection of the entity's information |
| assets is known and current. |
| |
| 2. Acceptable use policies for end-user technologies are defined and |
| implemented. |
| |
| 3. Risks to the cardholder data environment are formally identified, |
| evaluated, and managed. |
| |
| 4. PCI DSS compliance is managed. |
| |
| 5. PCI DSS scope is documented and validated. |
| |
| 6. Security awareness education is an ongoing activity. |
| |
| 7. Personnel are screened to reduce risks from insider threats. |
| |
| 8. Risk to information assets associated with third-party service |
| provider (TPSP) relationships is managed. |
| |
| 9. Third-party service providers (TPSPs) support their customers' |
| PCI DSS compliance. |
| |
| 10. Suspected and confirmed security incidents that could impact the |
| CDE are responded to immediately. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > The organization's overall information security policy sets the |
| > tone for the whole entity and informs personnel what is expected of |
| > them. All personnel should be aware of the sensitivity of |
| > cardholder data and their responsibilities for protecting it. |
| > |
| > For the purposes of Requirement 12, "personnel" refers to full-time |
| > and part-time employees, temporary employees, contractors, and |
| > consultants with security responsibilities for protecting account |
| > data or that can impact the security of account data. |
| > |
| > Refer to *[Appendix |
| > |
| G](#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms)* |
| > for definitions of PCI DSS terms. |
+-----------------------------------------------------------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| 1. A comprehensive | | |
| information | | |
| security policy | | |
| that governs and | | |
| provides | | |
| direction for | | |
| protection of the | | |
| entity's | | |
| information | | |
| assets is known | | |
| and current. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An organization's |
| | | overall information |
| | | security policy ties |
| | | to and governs all |
| | | other policies and |
| | | procedures that |
| | | define protection of |
| | | cardholder data. |
| | | |
| | | The information |
| | | security policy |
| | | communicates |
| | | management's intent |
| | | and objectives |
| | | regarding the |
| | | protection of its |
| | | most valuable |
| | | assets, including |
| | | cardholder data. |
| | | |
| | | Without an |
| | | information security |
| | | policy, individuals |
| | | will make their own |
| | | value decisions on |
| | | the controls that |
| | | are required within |
| | | the organization |
| | | which may result in |
| | | the organization |
| | | neither meeting its |
| | | legal, regulatory, |
| | | and contractual |
| | | obligations, nor |
| | | being able to |
| | | adequately protect |
| | | its assets in a |
| | | consistent manner. |
| | | |
| | | To ensure the policy |
| | | is implemented, it |
| | | is important that |
| | | all relevant |
| | | personnel within the |
| | | organization, as |
| | | well as relevant |
| | | third parties, |
| | | vendors, and |
| | | business partners |
| | | are aware of the |
| | | organization's |
| | | information security |
| | | policy and their |
| | | responsibilities for |
| | | protecting |
| | | information assets. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. An overall | **12.1.1** Examine | |
| information | the information | |
| security policy | security policy and | |
| is: | interview personnel | |
| | to verify that the | |
| - Established. | overall information | |
| | security policy is | |
| - Published. | managed in accordance | |
| | with all elements | |
| - Maintained. | specified in this | |
| | requirement. | |
| - Disseminated | | |
| to all | | |
| relevant | | |
| personnel, as | | |
| well as to | | |
| relevant | | |
| vendors and | | |
| business | | |
| partners. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The strategic | | |
| objectives and | | |
| principles of | | |
| information security | | |
| are defined, adopted, | | |
| and known to all | | |
| personnel. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | **Good Practice** |
| | | |
| | | The security policy |
| | | for the organization |
| | | identifies the |
| | | purpose, scope, |
| | | accountability, and |
| | | information that |
| | | clearly defines the |
| | | organization's |
| | | position regarding |
| | | information |
| | | security. |
| | | |
| | | The overall |
| | | information security |
| | | policy differs from |
| | | individual security |
| | | policies that |
| | | address specific |
| | | technology or |
| | | security |
| | | disciplines. This |
| | | policy sets forth |
| | | the directives for |
| | | the entire |
| | | organization whereas |
| | | individual security |
| | | policies align and |
| | | support the overall |
| | | security policy and |
| | | communicate specific |
| | | objectives for |
| | | technology or |
| | | security |
| | | disciplines. |
| | | |
| | | It is important that |
| | | all relevant |
| | | personnel within the |
| | | organization, as |
| | | well as relevant |
| | | third parties, |
| | | vendors, and |
| | | business partners |
| | | are aware of the |
| | | organization's |
| | | information security |
| | | policy and their |
| | | responsibilities for |
| | | protecting |
| | | information assets. |
| | | |
| | | **Definitions** |
| | | |
| | | "Relevant" for this |
| | | requirement means |
| | | that the information |
| | | security policy is |
| | | disseminated to |
| | | those with roles |
| | | applicable to some |
| | | or all the topics in |
| | | the policy, either |
| | | within the company |
| | | or because of |
| | | services/functions |
| | | performed by a |
| | | vendor or third |
| | | party. |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Security threats and |
| | | associated |
| | | protection methods |
| | | evolve rapidly. |
| | | Without updating the |
| | | information security |
| | | policy to reflect |
| | | relevant changes, |
| | | new measures to |
| | | defend against these |
| | | threats may not be |
| | | addressed. |
+-----------------------+-----------------------+----------------------+
| **12.1.2** The | **12.1.2** Examine | |
| information security | the information | |
| policy is: | security policy and | |
| | interview responsible | |
| - Reviewed at least | personnel to verify | |
| once every 12 | the policy is managed | |
| months. | in accordance with | |
| | all elements | |
| - Updated as needed | specified in this | |
| to reflect | requirement. | |
| changes to | | |
| business | | |
| objectives or | | |
| risks to the | | |
| environment. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The information | | |
| security policy | | |
| continues to reflect | | |
| the organization's | | |
| strategic objectives | | |
| and principles. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without clearly |
| | | defined security |
| | | roles and |
| | | responsibilities |
| | | assigned, there |
| | | could be misuse of |
| | | the organization's |
| | | information assets |
| | | or inconsistent |
| | | interaction with |
| | | information security |
| | | personnel, leading |
| | | to insecure |
| | | implementation of |
| | | technologies or use |
| | | of outdated or |
| | | insecure |
| | | technologies. |
+-----------------------+-----------------------+----------------------+
| **12.1.3** The | **12.1.3.a** Examine | |
| security policy | the information | |
| clearly defines | security policy to | |
| information security | verify that they | |
| roles and | clearly define | |
| responsibilities for | information security | |
| all personnel, and | roles and | |
| all personnel are | responsibilities for | |
| aware of and | all personnel. | |
| acknowledge their | | |
| information security | | |
| responsibilities. | | |
+-----------------------+-----------------------+----------------------+
| | **12.1.3.b** | |
| | Interview personnel | |
| | in various roles to | |
| | verify they | |
| | understand their | |
| | information security | |
| | responsibilities. | |
+-----------------------+-----------------------+----------------------+
| | **12.1.3.c** Examine | |
| | documented evidence | |
| | to verify personnel | |
| | acknowledge their | |
| | information security | |
| | responsibilities. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel understand | | |
| their role in | | |
| protecting the | | |
| entity's cardholder | | |
| data. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | To ensure someone |
| | | with sufficient |
| | | authority and |
| | | responsibility is |
| | | actively managing |
| | | and championing the |
| | | organization's |
| | | information security |
| | | program, |
| | | accountability and |
| | | responsibility for |
| | | information security |
| | | needs to be assigned |
| | | at the executive |
| | | level within an |
| | | organization. |
| | | |
| | | Common executive |
| | | management titles |
| | | for this role |
| | | include Chief |
| | | Information Security |
| | | Officer (CISO) and |
| | | Chief Security |
| | | Officer (CSO -- to |
| | | meet this |
| | | requirement, the CSO |
| | | role must be |
| | | responsible for |
| | | information |
| | | security). These |
| | | positions are often |
| | | at the most senior |
| | | level of management |
| | | and are part of the |
| | | chief executive |
| | | level or C-level, |
| | | typically reporting |
| | | to the Chief |
| | | Executive Officer or |
| | | the Board of |
| | | Directors. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should also |
| | | consider transition |
| | | and/or succession |
| | | plans for these key |
| | | personnel to avoid |
| | | potential gaps in |
| | | critical security |
| | | activities. |
+-----------------------+-----------------------+----------------------+
| **12.1.4** | **12.1.4** Examine | |
| Responsibility for | the information | |
| information security | security policy to | |
| is formally assigned | verify that | |
| to a Chief | information security | |
| Information Security | is formally assigned | |
| Officer or other | to a Chief | |
| information security | Information Security | |
| knowledgeable member | Officer or other | |
| of executive | information | |
| management. | s | |
| | ecurity-knowledgeable | |
| | member of executive | |
| | management. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A designated member | | |
| of executive | | |
| management is | | |
| responsible for | | |
| information security. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.2** Acceptable | | |
| use policies for | | |
| end-user technologies | | |
| are defined and | | |
| implemented. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | End-user |
| | | technologies are a |
| | | significant |
| | | investment and may |
| | | pose significant |
| | | risk to an |
| | | organization if not |
| | | managed properly. |
| | | Acceptable use |
| | | policies outline the |
| | | expected behavior |
| | | from personnel when |
| | | using the |
| | | organization's |
| | | information |
| | | technology and |
| | | reflect the |
| | | organization's risk |
| | | tolerance |
| | | |
| | | These policies |
| | | instruct personnel |
| | | on what they can and |
| | | cannot do with |
| | | company equipment |
| | | and instruct |
| | | personnel on correct |
| | | and incorrect uses |
| | | of company Internet |
| | | and email resources. |
| | | Such policies can |
| | | legally protect an |
| | | organization and |
| | | allow it to act when |
| | | the policies are |
| | | violated. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important that |
| | | usage policies are |
| | | supported by |
| | | technical controls |
| | | to manage the |
| | | enforcement of the |
| | | policies. |
| | | |
| | | Structuring polices |
| | | as simple "do" and |
| | | "do not" |
| | | requirements that |
| | | are linked to a |
| | | purpose can help |
| | | remove ambiguity and |
| | | provide personnel |
| | | with the context for |
| | | the requirement. |
+-----------------------+-----------------------+----------------------+
| 1. Acceptable use | **12.2.1** Examine | |
| policies for | the acceptable use | |
| end-user | policies for end-user | |
| technologies are | technologies and | |
| documented and | interview responsible | |
| implemented, | personnel to verify | |
| including: | processes are | |
| | documented and | |
| - Explicit | implemented in | |
| approval by | accordance with all | |
| authorized | elements specified in | |
| parties. | this requirement. | |
| | | |
| - Acceptable | | |
| uses of the | | |
| technology. | | |
| | | |
| - List of | | |
| products | | |
| approved by | | |
| the company | | |
| for employee | | |
| use, | | |
| including | | |
| hardware and | | |
| software. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The use of end-user | | |
| technologies is | | |
| defined and managed | | |
| to ensure authorized | | |
| usage. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Examples of end-user | | |
| technologies for | | |
| which acceptable use | | |
| policies are expected | | |
| include, but are not | | |
| limited to, remote | | |
| access and wireless | | |
| technologies, | | |
| laptops, tablets, | | |
| mobile phones, and | | |
| removable electronic | | |
| media, email usage, | | |
| and Internet usage. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.3** Risks to the | | |
| cardholder data | | |
| environment are | | |
| formally identified, | | |
| evaluated, and | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Some PCI DSS |
| | | requirements allow |
| | | an entity to define |
| | | how frequently an |
| | | activity is |
| | | performed based on |
| | | the risk to |
| | | environment. |
| | | Performing this risk |
| | | analysis according |
| | | to a methodology |
| | | ensures validity and |
| | | consistency with |
| | | policies and |
| | | procedures. |
| | | |
| | | This targeted risk |
| | | analysis (as opposed |
| | | to a traditional |
| | | enterprise-wide risk |
| | | assessment) focuses |
| | | on those PCI DSS |
| | | requirements that |
| | | allow an entity |
| | | flexibility about |
| | | how frequently an |
| | | entity performs a |
| | | given control. For |
| | | this risk analysis, |
| | | the entity carefully |
| | | evaluates each PCI |
| | | DSS requirement that |
| | | provides this |
| | | flexibility and |
| | | determines the |
| | | frequency that |
| | | supports adequate |
| | | security for the |
| | | entity, and the |
| | | level of risk the |
| | | entity is willing to |
| | | accept. |
| | | |
| | | The risk analysis |
| | | identifies the |
| | | specific assets, |
| | | such as the system |
| | | components and |
| | | data---for example, |
| | | log files, or |
| | | credentials---that |
| | | the requirement is |
| | | intended to protect, |
| | | as well as the |
| | | threat(s) or |
| | | outcomes that the |
| | | requirement is |
| | | protecting the |
| | | assets from---for |
| | | example, malware, an |
| | | undetected intruder, |
| | | or misuse of |
| | | credentials. |
| | | Examples of factors |
| | | that could |
| | | contribute to |
| | | likelihood or impact |
| | | include any that |
| | | could increase the |
| | | vulnerability of an |
| | | asset to a |
| | | threat---for |
| | | example, exposure to |
| | | untrusted networks, |
| | | complexity of |
| | | environment, or high |
| | | staff turnover---as |
| | | well as the |
| | | criticality of the |
| | | system components, |
| | | or volume and |
| | | sensitivity of the |
| | | data, being |
| | | protected. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| 1. Each PCI DSS | **12.3.1** Examine | |
| requirement that | documented policies | |
| provides | and procedures to | |
| flexibility for | verify a process is | |
| how frequently it | defined for | |
| is performed (for | performing targeted | |
| example, | risk analyses for | |
| requirements to | each PCI DSS | |
| be performed | requirement that | |
| periodically) is | provides flexibility | |
| supported by a | for how frequently | |
| targeted risk | the requirement is | |
| analysis that is | performed, and that | |
| documented and | the process includes | |
| includes: | all elements | |
| | specified in this | |
| | requirement. | |
| - Identification | | |
| of the assets | | |
| being | | |
| protected. | | |
| | | |
| | | |
| - Identification | | |
| of the | | |
| threat(s) | | |
| that the | | |
| requirement | | |
| is protecting | | |
| against. | | |
| | | |
| | | |
| - Identification | | |
| of factors | | |
| that | | |
| contribute to | | |
| the | | |
| likelihood | | |
| and/or impact | | |
| of a threat | | |
| being | | |
| realized. | | |
| | | |
| - Resulting | | |
| analysis that | | |
| determines, | | |
| and includes | | |
| justification | | |
| for, how | | |
| frequently | | |
| the | | |
| requirement | | |
| must be | | |
| performed to | | |
| minimize the | | |
| likelihood of | | |
| the threat | | |
| being | | |
| realized. | | |
| | | |
| - Review of | | |
| each targeted | | |
| risk analysis | | |
| at least once | | |
| every 12 | | |
| months to | | |
| determine | | |
| whether the | | |
| results are | | |
| still valid | | |
| or if an | | |
| updated risk | | |
| analysis is | | |
| needed. | | |
| | | |
| - Performance | | |
| of updated | | |
| risk analyses | | |
| when needed, | | |
| as determined | | |
| by the annual | | |
| review. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Up to date knowledge | | |
| and assessment of | | |
| risks to the CDE are | | |
| maintained. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | Reviewing the |
| | | results of these |
| | | targeted risk |
| | | analyses at least |
| | | once every 12 months |
| | | and upon changes |
| | | that could impact |
| | | the risk to the |
| | | environment allows |
| | | the organization to |
| | | ensure the risk |
| | | analysis results |
| | | remain current with |
| | | organizational |
| | | changes and evolving |
| | | threats, trends, and |
| | | technologies, and |
| | | that the selected |
| | | frequencies still |
| | | adequately address |
| | | the entity's risk. |
| | | |
| | | **Good Practice** |
| | | |
| | | An enterprise-wide |
| | | risk assessment, |
| | | which is a |
| | | point-in-time |
| | | activity that |
| | | enables entities to |
| | | identify threats and |
| | | associated |
| | | vulnerabilities, is |
| | | recommended, but is |
| | | not required, for |
| | | entities to |
| | | determine and |
| | | understand broader |
| | | and emerging threats |
| | | with the potential |
| | | to negatively impact |
| | | its business. This |
| | | enterprise-wide risk |
| | | assessment could be |
| | | established as part |
| | | of an overarching |
| | | risk management |
| | | program that is used |
| | | as an input to the |
| | | annual review of an |
| | | organization\'s |
| | | overall information |
| | | security policy (see |
| | | Requirement 12.1.1). |
| | | |
| | | Examples of |
| | | risk-assessment |
| | | methodologies for |
| | | enterprise-wide risk |
| | | assessments include, |
| | | but are not limited |
| | | to, ISO *27005* and |
| | | NIST *SP 800-30*. |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A risk analysis |
| | | following a |
| | | repeatable and |
| | | robust methodology |
| | | enables an entity to |
| | | meet the customized |
| | | approach objective. |
| | | |
| | | **Definitions** |
| | | |
| | | The customized |
| | | approach to meeting |
| | | a PCI DSS |
| | | requirement allows |
| | | entities to define |
| | | the controls used to |
| | | meet a given |
| | | requirement's stated |
| | | Customized Approach |
| | | Objective in a way |
| | | that does not |
| | | strictly follow the |
| | | defined requirement. |
| | | These controls are |
| | | expected to at least |
| | | meet or exceed the |
| | | security provided by |
| | | the defined |
| | | requirement and |
| | | require extensive |
| | | documentation by the |
| | | entity using the |
| | | customized approach. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | See *[Appendix |
| | | D:](#appendix-d- |
| | | customized-approach) |
| | | [Customized |
| | | App |
| | | roach](#appendix-d-c |
| | | ustomized-approach)* |
| | | for instructions on |
| | | how to document the |
| | | required evidence |
| | | for the customized |
| | | approach. |
| | | |
| | | See *[Appendix |
| | | E]( |
| | | #appendix-e-sample-t |
| | | emplates-to-support- |
| | | customized-approach) |
| | | [Sample Templates to |
| | | Support]( |
| | | #appendix-e-sample-t |
| | | emplates-to-support- |
| | | customized-approach) |
| | | [Customized |
| | | Approach](# |
| | | appendix-e-sample-te |
| | | mplates-to-support-c |
| | | ustomized-approach)* |
| | | for templates that |
| | | entities may use to |
| | | document their |
| | | customized controls. |
| | | Note that while use |
| | | of the templates is |
| | | optional, the |
| | | information |
| | | specified within |
| | | each template must |
| | | be documented and |
| | | provided to each |
| | | entity's assessor. |
+-----------------------+-----------------------+----------------------+
| **12.3.2** A targeted | **12.3.2** Examine | |
| risk analysis is | the documented | |
| performed for each | targeted risk- | |
| PCI DSS requirement | analysis for each PCI | |
| that the entity meets | DSS requirement that | |
| with the customized | the entity meets with | |
| approach, to include: | the customized | |
| | approach to verify | |
| - Documented | that documentation | |
| evidence | for each requirement | |
| detailing each | exists and is in | |
| element specified | accordance with all | |
| in Appendix D: | elements specified in | |
| Customized | this requirement. | |
| Approach | | |
| (including, at a | | |
| minimum, a | | |
| controls matrix | | |
| and risk | | |
| analysis). | | |
| | | |
| - Approval of | | |
| documented | | |
| evidence by | | |
| senior | | |
| management. | | |
| | | |
| - Performance of | | |
| the targeted | | |
| analysis of risk | | |
| at least once | | |
| every 12 months. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| part of the | | |
| customized approach | | |
| and must be met for | | |
| those using the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement only | | |
| applies to entities | | |
| using a Customized | | |
| Approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Protocols and |
| | | encryption strengths |
| | | may quickly change |
| | | or be deprecated due |
| | | to identification of |
| | | vulnerabilities or |
| | | design flaws. In |
| | | order to support |
| | | current and future |
| | | data security needs, |
| | | entities need to |
| | | know where |
| | | cryptography is used |
| | | and understand how |
| | | they would be able |
| | | to respond rapidly |
| | | to changes impacting |
| | | the strength of |
| | | their cryptographic |
| | | implementations. |
| | | |
| | | **Good Practice** |
| | | |
| | | Cryptographic |
| | | agility is important |
| | | to ensure an |
| | | alternative to the |
| | | original encryption |
| | | method or |
| | | cryptographic |
| | | primitive is |
| | | available, with |
| | | plans to upgrade to |
| | | the alternative |
| | | without significant |
| | | change to system |
| | | infrastructure. For |
| | | example, if the |
| | | entity is aware of |
| | | when protocols or |
| | | algorithms will be |
| | | deprecated by |
| | | standards bodies, it |
| | | can make proactive |
| | | plans to upgrade |
| | | before the |
| | | deprecation is |
| | | impactful to |
| | | operations. |
| | | |
| | | **Definitions** |
| | | |
| | | "Cryptographic |
| | | agility" refers to |
| | | the ability to |
| | | monitor and manage |
| | | the encryption and |
| | | related verification |
| | | technologies |
| | | deployed across an |
| | | organization. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to *NIST SP |
| | | 800-131a, |
| | | Transitioning the |
| | | Use of Cryptographic |
| | | Algorithms and Key |
| | | Lengths*. |
+-----------------------+-----------------------+----------------------+
| **12.3.3** | **12.3.3** Examine | |
| Cryptographic cipher | documentation for | |
| suites and protocols | cryptographic suites | |
| in use are documented | and protocols in use | |
| and reviewed at least | and interview | |
| once every 12 months, | personnel to verify | |
| including at least | the documentation and | |
| the following: | review is in | |
| | accordance with all | |
| - An up-to-date | elements specified in | |
| inventory of all | this requirement. | |
| cryptographic | | |
| cipher suites and | | |
| protocols in use, | | |
| including purpose | | |
| and where used. | | |
| | | |
| - Active monitoring | | |
| of industry | | |
| trends regarding | | |
| continued | | |
| viability of all | | |
| cryptographic | | |
| cipher suites and | | |
| protocols in use. | | |
| | | |
| - A documented | | |
| strategy to | | |
| respond to | | |
| anticipated | | |
| changes in | | |
| cryptographic | | |
| vulnerabilities. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The entity is able to | | |
| respond quickly to | | |
| any vulnerabilities | | |
| in cryptographic | | |
| protocols or | | |
| algorithms, where | | |
| those vulnerabilities | | |
| affect protection of | | |
| cardholder data. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The requirement | | |
| applies to all | | |
| cryptographic suites | | |
| and protocols used to | | |
| meet PCI DSS | | |
| requirements. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Hardware and |
| | | software |
| | | technologies are |
| | | constantly evolving, |
| | | and organizations |
| | | need to be aware of |
| | | changes to the |
| | | technologies they |
| | | use, as well as the |
| | | evolving threats to |
| | | those technologies |
| | | to ensure that they |
| | | can prepare for, and |
| | | manage, |
| | | vulnerabilities in |
| | | hardware and |
| | | software that will |
| | | not be remediated by |
| | | the vendor or |
| | | developer. |
| | | |
| | | **Good Practice** |
| | | |
| | | Organizations should |
| | | review firmware |
| | | versions to ensure |
| | | they remain current |
| | | and supported by the |
| | | vendors. |
| | | Organizations also |
| | | need to be aware of |
| | | changes made by |
| | | technology vendors |
| | | to their products or |
| | | processes to |
| | | understand how such |
| | | changes may impact |
| | | the organization's |
| | | use of the |
| | | technology. |
| | | |
| | | Regular reviews of |
| | | technologies that |
| | | impact or influence |
| | | PCI DSS controls can |
| | | assist with |
| | | purchasing, usage, |
| | | and deployment |
| | | strategies, and |
| | | ensure controls that |
| | | rely on those |
| | | technologies remain |
| | | effective. These |
| | | reviews include, but |
| | | are not limited to, |
| | | reviewing |
| | | technologies that |
| | | are no longer |
| | | supported by the |
| | | vendor and/or no |
| | | longer meet the |
| | | security needs of |
| | | the organization. |
+-----------------------+-----------------------+----------------------+
| **12.3.4** Hardware | **12.3.4** Examine | |
| and software | documentation for the | |
| technologies in use | review of hardware | |
| are reviewed at least | and software | |
| once every 12 months, | technologies in use | |
| including at least | and interview | |
| the following: | personnel to verify | |
| | that the review is in | |
| - Analysis that the | accordance with all | |
| technologies | elements specified in | |
| continue to | this requirement. | |
| receive security | | |
| fixes from | | |
| vendors promptly. | | |
| | | |
| - Analysis that the | | |
| technologies | | |
| continue to | | |
| support (and do | | |
| not preclude) the | | |
| entity's PCI DSS | | |
| compliance. | | |
| | | |
| - Documentation of | | |
| any industry | | |
| announcements or | | |
| trends related to | | |
| a technology, | | |
| such as when a | | |
| vendor has | | |
| announced "end of | | |
| life" plans for a | | |
| technology. | | |
| | | |
| - Documentation of | | |
| a plan, approved | | |
| by senior | | |
| management, to | | |
| remediate | | |
| outdated | | |
| technologies, | | |
| including those | | |
| for which vendors | | |
| have announced | | |
| "end of life" | | |
| plans. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The entity's hardware | | |
| and software | | |
| technologies are up | | |
| to date and supported | | |
| by the vendor. Plans | | |
| to remove or replace | | |
| all unsupported | | |
| system components are | | |
| reviewed | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.4** PCI DSS | | |
| compliance is | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Executive management |
| | | assignment of PCI |
| | | DSS compliance |
| | | responsibilities |
| | | ensures executive- |
| | | level visibility |
| | | into the PCI DSS |
| | | compliance program |
| | | and allows for the |
| | | opportunity to ask |
| | | appropriate |
| | | questions to |
| | | determine the |
| | | effectiveness of the |
| | | program and |
| | | influence strategic |
| | | priorities. |
+-----------------------+-----------------------+----------------------+
| 1. ***Additional | **12.4.1 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only:*** | assessments only: | |
| Responsibility is | ***Examine | |
| established by | documentation to | |
| executive | verify that executive | |
| management for | management has | |
| the protection of | established | |
| cardholder data | responsibility for | |
| and a PCI DSS | the protection of | |
| compliance | cardholder data and a | |
| program to | PCI DSS compliance | |
| include: | program in accordance | |
| | with all elements | |
| - Overall | specified in this | |
| | requirement. | |
| accountability | | |
| for | | |
| maintaining | | |
| PCI DSS | | |
| compliance. | | |
| | | |
| - Defining a | | |
| charter for a | | |
| PCI DSS | | |
| compliance | | |
| program and | | |
| communication | | |
| to executive | | |
| management. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Executives are | | |
| responsible and | | |
| accountable for | | |
| security of | | |
| cardholder data. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| Executive management | | |
| may include C-level | | |
| positions, board of | | |
| directors, or | | |
| equivalent. The | | |
| specific titles will | | |
| depend on the | | |
| particular | | |
| organizational | | |
| structure. | | |
| | | |
| Responsibility for | | |
| the PCI DSS | | |
| compliance program | | |
| may be assigned to | | |
| individual roles | | |
| and/or to business | | |
| units within the | | |
| organization. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regularly confirming |
| | | that security |
| | | policies and |
| | | procedures are being |
| | | followed provides |
| | | assurance that the |
| | | expected controls |
| | | are active and |
| | | working as intended. |
| | | This requirement is |
| | | distinct from other |
| | | requirements that |
| | | specify a task to be |
| | | performed. The |
| | | objective of these |
| | | reviews is not to |
| | | reperform other PCI |
| | | DSS requirements, |
| | | but to confirm that |
| | | security activities |
| | | are being performed |
| | | on an ongoing basis. |
| | | |
| | | **Good Practice** |
| | | |
| | | These reviews can |
| | | also be used to |
| | | verify that |
| | | appropriate evidence |
| | | is being |
| | | maintained---for |
| | | example, audit logs, |
| | | vulnerability scan |
| | | reports, reviews of |
| | | network security |
| | | control |
| | | rulesets---to assist |
| | | in the entity's |
| | | preparation for its |
| | | next PCI DSS |
| | | assessment. |
| | | |
| | | **Examples** |
| | | |
| | | Looking at |
| | | Requirement 1.2.7 as |
| | | one example, |
| | | Requirement 12.4.2 |
| | | is met by |
| | | confirming, at least |
| | | once every three |
| | | months, that reviews |
| | | of configurations of |
| | | network security |
| | | controls have |
| | | occurred at the |
| | | required frequency. |
| | | On the other hand, |
| | | Requirement 1.2.7 is |
| | | met by reviewing |
| | | those configurations |
| | | as specified in the |
| | | requirement. |
+-----------------------+-----------------------+----------------------+
| **12.4.2 *Additional | **12.4.2.a | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only: ***Reviews are | provider assessments | |
| performed at least | only: ***Examine | |
| once every three | policies and | |
| months to confirm | procedures to verify | |
| that personnel are | that processes are | |
| performing their | defined for | |
| tasks in accordance | conducting reviews to | |
| with all security | confirm that | |
| policies and | personnel are | |
| operational | performing their | |
| procedures. Reviews | tasks in accordance | |
| are performed by | with all security | |
| personnel other than | policies and all | |
| those responsible for | operational | |
| performing the given | procedures, including | |
| task and include, but | but not limited to | |
| are not limited to, | the tasks specified | |
| the following tasks: | in this requirement. | |
| | | |
| - Daily log | | |
| reviews. | | |
| | | |
| - Configuration | | |
| reviews for | | |
| network security | | |
| controls. | | |
| | | |
| - Applying | | |
| configuration | | |
| standards to new | | |
| systems. | | |
| | | |
| - Responding to | | |
| security alerts. | | |
| | | |
| - Change-management | | |
| processes. | | |
+-----------------------+-----------------------+----------------------+
| | **12.4.2.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Interview | |
| | responsible personnel | |
| | and examine records | |
| | of reviews to verify | |
| | that reviews are | |
| | performed: | |
| | | |
| | - At least once | |
| | every three | |
| | months. | |
| | | |
| | - By personnel | |
| | other than those | |
| | responsible for | |
| | performing the | |
| | given task. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The operational | | |
| effectiveness of | | |
| critical PCI DSS | | |
| controls is verified | | |
| periodically by | | |
| manual inspection of | | |
| records. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The intent of these |
| | | independent checks |
| | | is to confirm |
| | | whether security |
| | | activities are being |
| | | performed on an |
| | | ongoing basis. These |
| | | reviews can also be |
| | | used to verify that |
| | | appropriate evidence |
| | | is being |
| | | maintained---for |
| | | example, audit logs, |
| | | vulnerability scan |
| | | reports, reviews of |
| | | network security |
| | | control |
| | | rulesets---to assist |
| | | in the entity's |
| | | preparation for its |
| | | next PCI DSS |
| | | assessment. |
+-----------------------+-----------------------+----------------------+
| 1. ***Additional | **12.4.2.1 | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only:*** Reviews | provider assessments | |
| conducted in | only: ***Examine | |
| accordance with | documentation from | |
| Requirement | the reviews conducted | |
| 12.4.2 are | in accordance with | |
| documented to | PCI DSS Requirement | |
| include: | 12.4.2 to verify the | |
| | documentation | |
| - Results of | includes all elements | |
| the reviews. | specified in this | |
| | requirement. | |
| - Documented | | |
| remediation | | |
| actions taken | | |
| for any tasks | | |
| that were | | |
| found to not | | |
| be performed | | |
| at | | |
| Requirement | | |
| 12.4.2. | | |
| | | |
| - Review and | | |
| sign-off of | | |
| results by | | |
| personnel | | |
| assigned | | |
| | | |
| responsibility | | |
| for the PCI | | |
| DSS | | |
| compliance | | |
| program. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Findings from | | |
| operational | | |
| effectiveness reviews | | |
| are evaluated by | | |
| management; | | |
| appropriate | | |
| remediation | | |
| activities are | | |
| implemented. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.5** PCI DSS | | |
| scope is documented | | |
| and validated. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Maintaining a |
| | | current list of all |
| | | system components |
| | | will enable an |
| | | organization to |
| | | define the scope of |
| | | its environment and |
| | | implement PCI DSS |
| | | requirements |
| | | accurately and |
| | | efficiently. |
| | | |
| | | Without an |
| | | inventory, some |
| | | system components |
| | | could be overlooked |
| | | and be inadvertently |
| | | excluded from the |
| | | organization's |
| | | configuration |
| | | standards. |
| | | |
| | | **Good Practice** |
| | | |
| | | If an entity keeps |
| | | an inventory of all |
| | | assets, those system |
| | | components in scope |
| | | for PCI DSS should |
| | | be clearly |
| | | identifiable among |
| | | the other assets. |
| | | |
| | | Inventories should |
| | | include containers |
| | | or images that may |
| | | be instantiated. |
| | | |
| | | Assigning an owner |
| | | to the inventory |
| | | helps to ensure the |
| | | inventory stays |
| | | current. |
| | | |
| | | **Examples** |
| | | |
| | | Methods to maintain |
| | | an inventory include |
| | | as a database, as a |
| | | series of files, or |
| | | in an inventory- |
| | | management tool. |
+-----------------------+-----------------------+----------------------+
| **12.5.1** An | **12.5.1.a** Examine | |
| inventory of system | the inventory to | |
| components that are | verify it includes | |
| in scope for PCI DSS, | all in-scope system | |
| including a | components and a | |
| description of | description of | |
| function/use, is | function/use for | |
| maintained and kept | each. | |
| current. | | |
+-----------------------+-----------------------+----------------------+
| | **12.5.1.b** | |
| | Interview personnel | |
| | to verify the | |
| | inventory is kept | |
| | current. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| All system components | | |
| in scope for PCI DSS | | |
| are identified and | | |
| known. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Frequent validation |
| | | of PCI DSS scope |
| | | helps to ensure PCI |
| | | DSS scope remains up |
| | | to date and aligned |
| | | with changing |
| | | business objectives, |
| | | and therefore that |
| | | security controls |
| | | are protecting all |
| | | appropriate system |
| | | components. |
| | | |
| | | **Good Practice** |
| | | |
| | | Accurate scoping |
| | | involves critically |
| | | evaluating the CDE |
| | | and all connected |
| | | system components to |
| | | determine the |
| | | necessary coverage |
| | | for PCI DSS |
| | | requirements. |
| | | Scoping activities, |
| | | including careful |
| | | analysis and ongoing |
| | | monitoring, help to |
| | | ensure that in-scope |
| | | systems are |
| | | appropriately |
| | | secured. When |
| | | documenting account |
| | | data locations, the |
| | | entity can consider |
| | | creating a table or |
| | | spreadsheet that |
| | | includes the |
| | | following |
| | | information: |
| | | |
| | | - Data stores |
| | | (databases, |
| | | files, cloud, |
| | | etc.), including |
| | | the purpose of |
| | | data storage and |
| | | the retention |
| | | period, |
| | | |
| | | - Which CHD |
| | | elements are |
| | | stored (PAN, |
| | | expiry date, |
| | | cardholder name, |
| | | and/or any |
| | | elements of SAD |
| | | prior to |
| | | completion of |
| | | authorization), |
| | | |
| | | - How data is |
| | | secured (type of |
| | | encryption and |
| | | strength, |
| | | hashing |
| | | algorithm and |
| | | strength, |
| | | truncation, |
| | | tokenization), |
| | | |
| | | - How access to |
| | | data stores is |
| | | logged, |
| | | including a |
| | | description of |
| | | logging |
| | | mechanism(s) in |
| | | use (enterprise |
| | | solution, |
| | | application |
| | | level, operating |
| | | system level, |
| | | etc.). |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **12.5.2** PCI DSS | **12.5.2.a** Examine | |
| scope is documented | documented results of | |
| and confirmed by the | scope reviews and | |
| entity at least once | interview personnel | |
| every 12 months and | to verify that the | |
| upon significant | reviews are | |
| change to the | performed: | |
| in-scope environment. | | |
| At a minimum, the | - At least once | |
| scoping validation | every 12 months. | |
| includes: | | |
| | - After significant | |
| - Identifying all | changes to the | |
| data flows for | in-scope | |
| the various | environment. | |
| payment stages | | |
| (for example, | | |
| authorization, | | |
| capture | | |
| settlement, | | |
| chargebacks, and | | |
| refunds) and | | |
| acceptance | | |
| channels (for | | |
| example, | | |
| card-present, | | |
| card-not-present, | | |
| and e-commerce). | | |
| | | |
| - Updating all | | |
| data-flow | | |
| diagrams per | | |
| Requirement | | |
| 1.2.4. | | |
| | | |
| - Identifying all | | |
| locations where | | |
| account data is | | |
| stored, | | |
| processed, and | | |
| transmitted, | | |
| including but not | | |
| limited to: 1) | | |
| any locations | | |
| outside of the | | |
| currently defined | | |
| CDE, 2) | | |
| applications that | | |
| process CHD, 3) | | |
| transmissions | | |
| between systems | | |
| and networks, | | |
| and 4) file | | |
| backups. | | |
| | | |
| - Identifying all | | |
| system components | | |
| in the CDE, | | |
| connected to the | | |
| CDE, or that | | |
| could impact | | |
| security of the | | |
| CDE. | | |
| | | |
| - Identifying all | | |
| segmentation | | |
| controls in use | | |
| and the | | |
| environment(s) | | |
| from which the | | |
| CDE is segmented, | | |
| including | | |
| justification for | | |
| environments | | |
| being out of | | |
| scope. | | |
| | | |
| - Identifying all | | |
| connections from | | |
| third-party | | |
| entities with | | |
| access to the | | |
| CDE. | | |
| | | |
| - Confirming that | | |
| all identified | | |
| data flows, | | |
| account data, | | |
| system | | |
| components, | | |
| segmentation | | |
| controls, and | | |
| connections from | | |
| third parties | | |
| with access to | | |
| the CDE are | | |
| included in | | |
| scope. | | |
+-----------------------+-----------------------+----------------------+
| | **12.5.2.b** Examine | |
| | documented results of | |
| | scope reviews | |
| | performed by the | |
| | entity to verify that | |
| | PCI DSS scoping | |
| | confirmation activity | |
| | includes all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Customized Approach | | In addition to |
| Objective** | | internal systems and |
| | | networks, all |
| | | connections from |
| | | third-party |
| | | entities---for |
| | | example, business |
| | | partners, entities |
| | | providing remote |
| | | support services, |
| | | and other service |
| | | providers---need to |
| | | be identified to |
| | | determine inclusion |
| | | for PCI DSS scope. |
| | | Once the in-scope |
| | | connections have |
| | | been identified, the |
| | | applicable PCI DSS |
| | | controls can be |
| | | implemented to |
| | | reduce the risk of a |
| | | third-party |
| | | connection being |
| | | used to compromise |
| | | an entity's CDE. |
| | | |
| | | A data discovery |
| | | tool or methodology |
| | | can be used to |
| | | facilitate |
| | | identifying all |
| | | sources and |
| | | locations of PAN, |
| | | and to look for PAN |
| | | that resides on |
| | | systems and networks |
| | | outside the |
| | | currently defined |
| | | CDE or in unexpected |
| | | places within the |
| | | defined CDE--- for |
| | | example, in an error |
| | | log or memory dump |
| | | file. This approach |
| | | can help ensure that |
| | | previously unknown |
| | | locations of PAN are |
| | | detected and that |
| | | the PAN is either |
| | | eliminated or |
| | | properly secured. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For additional |
| | | guidance, refer to |
| | | *Information |
| | | Supplement: Guidance |
| | | for PCI DSS Scoping |
| | | and Network |
| | | Segmentation*. |
+-----------------------+-----------------------+----------------------+
| PCI DSS scope is | | |
| verified | | |
| periodically, and | | |
| after significant | | |
| changes, by | | |
| comprehensive | | |
| analysis and | | |
| appropriate technical | | |
| measures. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This annual | | |
| confirmation of PCI | | |
| DSS scope is an | | |
| activity expected to | | |
| be performed by the | | |
| entity under | | |
| assessment, and is | | |
| not the same, nor is | | |
| it intended to be | | |
| replaced by, the | | |
| scoping confirmation | | |
| performed by the | | |
| entity's assessor | | |
| during the annual | | |
| assessment. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Service providers |
| | | typically have |
| | | access to greater |
| | | volumes of |
| | | cardholder data than |
| | | do merchants, or can |
| | | provide an entry |
| | | point that can be |
| | | exploited to then |
| | | compromise multiple |
| | | other entities. |
| | | Service providers |
| | | also typically have |
| | | larger and more |
| | | complex networks |
| | | that are subject to |
| | | more frequent |
| | | change. The |
| | | probability of |
| | | overlooked changes |
| | | to scope in complex |
| | | and dynamic networks |
| | | is greater in |
| | | service providers' |
| | | environments. |
| | | |
| | | Validating PCI DSS |
| | | scope more |
| | | frequently is likely |
| | | to discover such |
| | | overlooked changes |
| | | before they can be |
| | | exploited by an |
| | | attacker. |
+-----------------------+-----------------------+----------------------+
| **12.5.2.1 | **12.5.2.1.a | |
| *Additional | *Additional testing | |
| requirement for | procedure for service | |
| service providers | provider assessments | |
| only: ***PCI DSS | only: ***Examine | |
| scope is documented | documented results of | |
| and confirmed by the | scope reviews and | |
| entity at least once | interview personnel | |
| every six months and | to verify that | |
| upon significant | reviews per | |
| change to the | Requirement | |
| in-scope environment. | | |
| At a minimum, the | 12.5.2 are performed: | |
| scoping validation | | |
| includes all the | - At least once | |
| elements specified in | every six months, | |
| Requirement 12.5.2. | and | |
| | | |
| | - After significant | |
| | changes | |
+-----------------------+-----------------------+----------------------+
| | **12.5.2.1.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Examine | |
| | documented results of | |
| | scope reviews to | |
| | verify that scoping | |
| | validation includes | |
| | all elements | |
| | specified in | |
| | Requirement 12.5.2. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The accuracy of PCI | | |
| DSS scope is verified | | |
| to be continuously | | |
| accurate by | | |
| comprehensive | | |
| analysis and | | |
| appropriate technical | | |
| measures. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An organization's |
| | | structure and |
| | | management define |
| | | the requirements and |
| | | protocol for |
| | | effective and secure |
| | | operations. Changes |
| | | to this structure |
| | | could have negative |
| | | effects to existing |
| | | controls and |
| | | frameworks by |
| | | reallocating or |
| | | removing resources |
| | | that once supported |
| | | PCI DSS controls or |
| | | inheriting new |
| | | responsibilities |
| | | that may not have |
| | | established controls |
| | | in place. Therefore, |
| | | it is important to |
| | | revisit PCI DSS |
| | | scope and controls |
| | | when there are |
| | | changes to an |
| | | organization's |
| | | structure and |
| | | management to ensure |
| | | controls are in |
| | | place and active. |
| | | |
| | | **Examples** |
| | | |
| | | Changes to |
| | | organizational |
| | | structure include, |
| | | but are not limited |
| | | to, company mergers |
| | | or acquisitions, and |
| | | significant changes |
| | | or reassignments of |
| | | personnel with |
| | | responsibility for |
| | | security controls. |
+-----------------------+-----------------------+----------------------+
| **12.5.3 *Additional | **12.5.3.a | |
| requirement for | *Additional testing | |
| service providers | procedure for service | |
| only: ***Significant | provider assessments | |
| changes to | only: ***Examine | |
| organizational | policies and | |
| structure result in a | procedures to verify | |
| documented (internal) | that processes are | |
| review of the impact | defined such that a | |
| to PCI DSS scope and | significant change to | |
| applicability of | organizational | |
| controls, with | structure results in | |
| results communicated | documented review of | |
| to executive | the impact to PCI DSS | |
| management. | scope and | |
| | applicability of | |
| | controls. | |
+-----------------------+-----------------------+----------------------+
| | **12.5.3.b | |
| | *Additional testing | |
| | procedure for service | |
| | provider assessments | |
| | only: ***Examine | |
| | documentation (for | |
| | example, meeting | |
| | minutes) and | |
| | interview responsible | |
| | personnel to verify | |
| | that significant | |
| | changes to | |
| | organizational | |
| | structure resulted in | |
| | documented reviews | |
| | that included all | |
| | elements specified in | |
| | this requirement, | |
| | with results | |
| | communicated to | |
| | executive management. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| PCI DSS scope is | | |
| confirmed after | | |
| significant | | |
| organizational | | |
| change. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.6** Security | | |
| awareness education | | |
| is an ongoing | | |
| activity. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If personnel are not |
| | | educated about their |
| | | company's |
| | | information security |
| | | policies and |
| | | procedures and their |
| | | own security |
| | | responsibilities, |
| | | security safeguards |
| | | and processes that |
| | | have been |
| | | implemented may |
| | | become ineffective |
| | | through |
| | | unintentional errors |
| | | or intentional |
| | | actions. |
+-----------------------+-----------------------+----------------------+
| **12.6.1** A formal | **12.6.1** Examine | |
| security awareness | the security | |
| program is | awareness program to | |
| implemented to make | verify it provides | |
| all personnel aware | awareness to all | |
| of the entity's | personnel about the | |
| information security | entity's information | |
| policy and | security policy and | |
| procedures, and their | procedures, and | |
| role in protecting | personnel's role in | |
| the cardholder data. | protecting the | |
| | cardholder data. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel are | | |
| knowledgeable about | | |
| the threat landscape, | | |
| their responsibility | | |
| for the operation of | | |
| relevant security | | |
| controls, and are | | |
| able to access | | |
| assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The threat |
| | | environment and an |
| | | entity's defenses |
| | | are not static. As |
| | | such, the security |
| | | awareness program |
| | | materials must be |
| | | updated as |
| | | frequently as needed |
| | | to ensure that the |
| | | education received |
| | | by personnel is up |
| | | to date and |
| | | represents the |
| | | current threat |
| | | environment. |
+-----------------------+-----------------------+----------------------+
| **12.6.2** The | **12.6.2** Examine | |
| security awareness | security awareness | |
| program is: | program content, | |
| | evidence of reviews, | |
| - Reviewed at least | and interview | |
| once every 12 | personnel to verify | |
| months, and | that the security | |
| | awareness program is | |
| - Updated as needed | in accordance with | |
| to address any | all elements | |
| new threats and | specified in this | |
| vulnerabilities | requirement. | |
| that may impact | | |
| the security of | | |
| the entity's CDE, | | |
| or the | | |
| information | | |
| provided to | | |
| personnel about | | |
| their role in | | |
| protecting | | |
| cardholder data. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The content of | | |
| security awareness | | |
| material is reviewed | | |
| and updated | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Training of |
| | | personnel ensures |
| | | they receive the |
| | | information about |
| | | the importance of |
| | | information security |
| | | and that they |
| | | understand their |
| | | role in protecting |
| | | the organization. |
| | | |
| | | Requiring an |
| | | acknowledgment by |
| | | personnel helps |
| | | ensure that they |
| | | have read and |
| | | understood the |
| | | security policies |
| | | and procedures, and |
| | | that they have made |
| | | and will continue to |
| | | make a commitment to |
| | | comply with these |
| | | policies. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities may |
| | | incorporate new-hire |
| | | training as part of |
| | | the Human Resources |
| | | onboarding process. |
| | | |
| | | Training should |
| | | outline the |
| | | security-related |
| | | "dos" and "don'ts." |
| | | Periodic refresher |
| | | training reinforces |
| | | key security |
| | | processes and |
| | | procedures that may |
| | | be forgotten or |
| | | bypassed. |
| | | |
| | | Entities should |
| | | consider requiring |
| | | security awareness |
| | | training anytime |
| | | personnel transfer |
| | | into roles where |
| | | they can impact the |
| | | security of account |
| | | data from roles |
| | | where they did not |
| | | have this impact. |
| | | |
| | | Methods and training |
| | | content can vary, |
| | | depending on |
| | | personnel roles. |
| | | |
| | | **Examples** |
| | | |
| | | Different methods |
| | | that can be used to |
| | | provide security |
| | | awareness and |
| | | education include |
| | | posters, letters, |
| | | web-based training, |
| | | in-person training, |
| | | team meetings, and |
| | | incentives. |
| | | |
| | | Personnel |
| | | acknowledgments may |
| | | be recorded in |
| | | writing or |
| | | electronically. |
+-----------------------+-----------------------+----------------------+
| **12.6.3** Personnel | **12.6.3.a** Examine | |
| receive security | security awareness | |
| awareness training as | program records to | |
| follows: | verify that personnel | |
| | attend security | |
| - Upon hire and at | awareness training | |
| least once every | upon hire and at | |
| 12 months. | least once every 12 | |
| | months. | |
| - Multiple methods | | |
| of communication | | |
| are used. | | |
| | | |
| - Personnel | | |
| acknowledge at | | |
| least once every | | |
| 12 months that | | |
| they have read | | |
| and understood | | |
| the information | | |
| security policy | | |
| and procedures. | | |
+-----------------------+-----------------------+----------------------+
| | **12.6.3.b** Examine | |
| | security awareness | |
| | program materials to | |
| | verify the program | |
| | includes multiple | |
| | methods of | |
| | communicating | |
| | awareness and | |
| | educating personnel. | |
+-----------------------+-----------------------+----------------------+
| | **12.6.3.c** | |
| | Interview personnel | |
| | to verify they have | |
| | completed awareness | |
| | training and are | |
| | aware of their role | |
| | in protecting | |
| | cardholder data. | |
+-----------------------+-----------------------+----------------------+
| | **12.6.3.d** Examine | |
| | security awareness | |
| | program materials and | |
| | personnel | |
| | acknowledgments to | |
| | verify that personnel | |
| | acknowledge at least | |
| | once every 12 months | |
| | that they have read | |
| | and understand the | |
| | information security | |
| | policy and | |
| | procedures. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel remain | | |
| knowledgeable about | | |
| the threat landscape, | | |
| their responsibility | | |
| for the operation of | | |
| relevant security | | |
| controls, and are | | |
| able to access | | |
| assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Educating personnel |
| | | on how to detect, |
| | | react to, and report |
| | | potential phishing |
| | | and related attacks |
| | | and social |
| | | engineering attempts |
| | | is essential to |
| | | minimizing the |
| | | probability of |
| | | successful attacks. |
| | | |
| | | **Good Practice** |
| | | |
| | | An effective |
| | | security awareness |
| | | program should |
| | | include examples of |
| | | phishing emails and |
| | | periodic testing to |
| | | determine the |
| | | prevalence of |
| | | personnel reporting |
| | | such attacks. |
| | | Training material an |
| | | entity can consider |
| | | for this topic |
| | | include: |
| | | |
| | | - How to identify |
| | | phishing and |
| | | other social |
| | | engineering |
| | | attacks. |
| | | |
| | | - How to react to |
| | | suspected |
| | | phishing and |
| | | social |
| | | engineering. |
| | | |
| | | - Where and how to |
| | | report suspected |
| | | phishing and |
| | | social |
| | | engineering |
| | | activity. |
| | | |
| | | An emphasis on |
| | | reporting allows the |
| | | organization to |
| | | reward positive |
| | | behavior, to |
| | | optimize technical |
| | | defenses (see |
| | | Requirement 5.4.1), |
| | | and to take |
| | | immediate action to |
| | | remove similar |
| | | phishing emails that |
| | | evaded technical |
| | | defenses from |
| | | recipient inboxes. |
+-----------------------+-----------------------+----------------------+
| 1. Security | **12.6.3.1** Examine | |
| awareness | security awareness | |
| training includes | training content to | |
| awareness of | verify it includes | |
| threats and | all elements | |
| vulnerabilities | specified in this | |
| that could impact | requirement. | |
| the security of | | |
| the CDE, | | |
| including but not | | |
| limited to: | | |
| | | |
| - Phishing and | | |
| related | | |
| attacks. | | |
| | | |
| - Social | | |
| engineering. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel are | | |
| knowledgeable about | | |
| their own human | | |
| vulnerabilities and | | |
| how threat actors | | |
| will attempt to | | |
| exploit such | | |
| vulnerabilities. | | |
| Personnel are able to | | |
| access assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| See Requirement 5.4.1 | | |
| for guidance on the | | |
| difference between | | |
| technical and | | |
| automated controls to | | |
| detect and protect | | |
| users from phishing | | |
| attacks, and this | | |
| requirement for | | |
| providing users | | |
| security awareness | | |
| training about | | |
| phishing and social | | |
| engineering. These | | |
| are two separate and | | |
| distinct | | |
| requirements, and one | | |
| is not met by | | |
| implementing controls | | |
| required by the other | | |
| one. | | |
| | | |
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | By including the key |
| | | points of the |
| | | acceptable use |
| | | policy in regular |
| | | training and the |
| | | related context, |
| | | personnel will |
| | | understand their |
| | | responsibilities and |
| | | how these impact the |
| | | security of an |
| | | organization's |
| | | systems. |
+-----------------------+-----------------------+----------------------+
| **12.6.3.2** Security | **12.6.3.2** Examine | |
| awareness training | security awareness | |
| includes awareness | training content to | |
| about the acceptable | verify it includes | |
| use of end-user | awareness about | |
| technologies in | acceptable use of | |
| accordance with | end-user technologies | |
| Requirement 12.2.1. | in accordance with | |
| | Requirement 12.2.1. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel are | | |
| knowledgeable about | | |
| their responsibility | | |
| for the security and | | |
| operation of end- | | |
| user technologies and | | |
| are able to access | | |
| assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.7** Personnel | | |
| are screened to | | |
| reduce risks from | | |
| insider threats. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Performing thorough |
| | | screening prior to |
| | | hiring potential |
| | | personnel who are |
| | | expected to be given |
| | | access to the CDE |
| | | provides entities |
| | | with the information |
| | | necessary to make |
| | | informed risk |
| | | decisions regarding |
| | | personnel they hire |
| | | that will have |
| | | access to the CDE. |
| | | |
| | | Other benefits of |
| | | screening potential |
| | | personnel include |
| | | helping to ensure |
| | | workplace safety and |
| | | confirming |
| | | information provided |
| | | by prospective |
| | | employees on their |
| | | resumes. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities should |
| | | consider screening |
| | | for existing |
| | | personnel anytime |
| | | they transfer into |
| | | roles where they |
| | | have access to the |
| | | CDE from roles where |
| | | they did not have |
| | | this access. |
| | | |
| | | To be effective, the |
| | | level of screening |
| | | should be |
| | | appropriate for the |
| | | position. For |
| | | example, positions |
| | | requiring greater |
| | | responsibility or |
| | | that have |
| | | administrative |
| | | access to critical |
| | | data or systems may |
| | | warrant more |
| | | detailed or more |
| | | frequent screening |
| | | than positions with |
| | | less responsibility |
| | | and access. |
| | | |
| | | **Examples** |
| | | |
| | | Screening options |
| | | can include, as |
| | | appropriate for the |
| | | entity's region, |
| | | previous employment |
| | | history, review of |
| | | public |
| | | information/social |
| | | media resources, |
| | | criminal record, |
| | | credit history, and |
| | | reference checks. |
+-----------------------+-----------------------+----------------------+
| **12.7.1** Potential | **12.7.1** Interview | |
| personnel who will | responsible Human | |
| have access to the | Resource department | |
| CDE are screened, | management to verify | |
| within the | that screening is | |
| constraints of local | conducted, within the | |
| laws, prior to hire | constraints of local | |
| to minimize the risk | laws, prior to hiring | |
| of attacks from | potential personnel | |
| internal sources. | who will have access | |
| | to the CDE. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The risk related to | | |
| allowing new members | | |
| of staff access to | | |
| the CDE is understood | | |
| and managed. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| For those potential | | |
| personnel to be hired | | |
| for positions such as | | |
| store cashiers, who | | |
| only have access to | | |
| one card number at a | | |
| time when | | |
| facilitating a | | |
| transaction, this | | |
| requirement is a | | |
| recommendation only. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.8** Risk to | | |
| information assets | | |
| associated with | | |
| third-party service | | |
| provider (TPSP) | | |
| relationships is | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Maintaining a list |
| | | of all TPSPs |
| | | identifies where |
| | | potential risk |
| | | extends outside the |
| | | organization and |
| | | defines the |
| | | organization's |
| | | extended attack |
| | | surface. |
| | | |
| | | **Examples** |
| | | |
| | | Different types of |
| | | TPSPs include those |
| | | that: |
| | | |
| | | - Store, process, |
| | | or transmit |
| | | account data on |
| | | the entity's |
| | | behalf (such as |
| | | payment |
| | | gateways, |
| | | payment |
| | | processors, |
| | | payment service |
| | | providers |
| | | (PSPs), and |
| | | off-site storage |
| | | providers). |
| | | |
| | | - Manage system |
| | | components |
| | | included in the |
| | | entity's PCI DSS |
| | | assessment (such |
| | | as providers of |
| | | network security |
| | | control |
| | | services, |
| | | anti-malware |
| | | services, and |
| | | security |
| | | incident and |
| | | event management |
| | | (SIEM); contact |
| | | and call |
| | | centers; |
| | | web-hosting |
| | | companies; and |
| | | IaaS, PaaS, |
| | | SaaS, and FaaS |
| | | cloud |
| | | providers). |
| | | |
| | | - Could impact the |
| | | security of the |
| | | entity's CDE |
| | | (such as vendors |
| | | providing |
| | | support via |
| | | remote access, |
| | | and bespoke |
| | | software |
| | | developers). |
+-----------------------+-----------------------+----------------------+
| **12.8.1** A list of | **12.8.1.a** Examine | |
| all third-party | policies and | |
| service providers | procedures to verify | |
| (TPSPs) with which | that processes are | |
| account data is | defined to maintain a | |
| shared or that could | list of TPSPs, | |
| affect the security | including a | |
| of account data is | description for each | |
| maintained, including | of the services | |
| a description for | provided, for all | |
| each of the services | TPSPs with whom | |
| provided. | account data is | |
| | shared or that could | |
| | affect the security | |
| | of account data. | |
+-----------------------+-----------------------+----------------------+
| | **12.8.1.b** Examine | |
| | documentation to | |
| | verify that a list of | |
| | all TPSPs is | |
| | maintained that | |
| | includes a | |
| | description of the | |
| | services provided. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records are | | |
| maintained of TPSPs | | |
| and the services | | |
| provided. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The use of a PCI DSS | | |
| compliant TPSP does | | |
| not make an entity | | |
| PCI DSS compliant, | | |
| nor does it remove | | |
| the entity's | | |
| responsibility for | | |
| its own PCI DSS | | |
| compliance. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The written |
| | | acknowledgment from |
| | | a TPSP demonstrates |
| | | its commitment to |
| | | maintaining proper |
| | | security of account |
| | | data that it obtains |
| | | from its customers |
| | | and that the TPSP is |
| | | fully aware of the |
| | | assets that could be |
| | | affected during the |
| | | provisioning of the |
| | | TPSP's service. The |
| | | extent to which a |
| | | specific TPSP is |
| | | responsible for the |
| | | security of account |
| | | data will depend on |
| | | the service provided |
| | | and the agreement |
| | | between the provider |
| | | and assessed entity |
| | | (the customer). |
| | | |
| | | In conjunction with |
| | | Requirement 12.9.1, |
| | | this requirement is |
| | | intended to promote |
| | | a consistent level |
| | | of understanding |
| | | between parties |
| | | about their |
| | | applicable PCI DSS |
| | | responsibilities. |
| | | For example, the |
| | | agreement may |
| | | include the |
| | | applicable PCI DSS |
| | | requirements to be |
| | | maintained as part |
| | | of the provided |
| | | service. |
| | | |
| | | **Good Practice** |
| | | |
| | | The entity may also |
| | | want to consider |
| | | including in their |
| | | written agreement |
| | | with a TPSP that the |
| | | TPSP will support |
| | | the entity's request |
| | | for information per |
| | | Requirement 12.9.2. |
| | | Entities will also |
| | | want to understand |
| | | whether any TPSPs |
| | | have "nested" |
| | | relationships with |
| | | other TPSPs, meaning |
| | | the primary TPSP |
| | | contracts with |
| | | another TPSP(s) for |
| | | the purposes of |
| | | providing a service. |
| | | |
| | | It is important to |
| | | understand whether |
| | | the primary TPSP is |
| | | relying on the |
| | | secondary TPSP(s) to |
| | | achieve overall |
| | | compliance of a |
| | | service, and what |
| | | types of written |
| | | agreements the |
| | | primary TPSP has in |
| | | place with the |
| | | secondary TPSPs. |
| | | Entities can |
| | | consider including |
| | | coverage in their |
| | | written agreement |
| | | for any "nested" |
| | | TPSPs a primary TPSP |
| | | may use. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the |
| | | *"Information |
| | | Supplement: |
| | | Third-Party Security |
| | | Assurance* for |
| | | further guidance. |
+-----------------------+-----------------------+----------------------+
| **12.8.2** Written | **12.8.2.a** Examine | |
| agreements with TPSPs | policies and | |
| are maintained as | procedures to verify | |
| follows: | that processes are | |
| | defined to maintain | |
| - Written | written agreements | |
| agreements are | with all TPSPs in | |
| maintained with | accordance with all | |
| all TPSPs with | elements specified in | |
| which account | this requirement. | |
| data is shared or | | |
| that could affect | | |
| the security of | | |
| the CDE. | | |
| | | |
| - Written | | |
| agreements | | |
| include | | |
| acknowledgments | | |
| from TPSPs that | | |
| they are | | |
| responsible for | | |
| the security of | | |
| account data the | | |
| TPSPs possess or | | |
| otherwise store, | | |
| process, or | | |
| transmit on | | |
| behalf of the | | |
| entity, or to the | | |
| extent that they | | |
| could impact the | | |
| security of the | | |
| entity's CDE. | | |
+-----------------------+-----------------------+----------------------+
| | **12.8.2.b** Examine | |
| | written agreements | |
| | with TPSPs to verify | |
| | they are maintained | |
| | in accordance with | |
| | all elements as | |
| | specified in this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records are | | |
| maintained of each | | |
| TPSP's acknowledgment | | |
| of its responsibility | | |
| to protect account | | |
| data. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| The exact wording of | | |
| an acknowledgment | | |
| will depend on the | | |
| agreement between the | | |
| two parties, the | | |
| details of the | | |
| service being | | |
| provided, and the | | |
| responsibilities | | |
| assigned to each | | |
| party. The | | |
| acknowledgment does | | |
| not have to include | | |
| the exact wording | | |
| provided in this | | |
| requirement. | | |
| | | |
| Evidence that a TPSP | | |
| is meeting PCI DSS | | |
| requirements (for | | |
| example, a PCI DSS | | |
| Attestation of | | |
| Compliance (AOC) or a | | |
| declaration on a | | |
| company's website) is | | |
| not the same as a | | |
| written agreement | | |
| specified in this | | |
| requirement. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A thorough process |
| | | for engaging TPSPs, |
| | | including details |
| | | for selection and |
| | | vetting prior to |
| | | engagement, helps |
| | | ensure that a TPSP |
| | | is thoroughly vetted |
| | | internally by an |
| | | entity prior to |
| | | establishing a |
| | | formal relationship |
| | | and that the risk to |
| | | cardholder data |
| | | associated with the |
| | | engagement of the |
| | | TPSP is understood. |
| | | |
| | | **Good Practice** |
| | | |
| | | Specific |
| | | due-diligence |
| | | processes and goals |
| | | will vary for each |
| | | organization. |
| | | Elements that should |
| | | be considered |
| | | include the |
| | | provider's reporting |
| | | practices, |
| | | breach-notification |
| | | and incident |
| | | response procedures, |
| | | details of how PCI |
| | | DSS responsibilities |
| | | are assigned between |
| | | each party, how the |
| | | TPSP validates their |
| | | PCI DSS compliance |
| | | and what evidence |
| | | they provide. |
+-----------------------+-----------------------+----------------------+
| **12.8.3** An | **12.8.3.a** Examine | |
| established process | policies and | |
| is implemented for | procedures to verify | |
| engaging TPSPs, | that processes are | |
| including proper due | defined for engaging | |
| diligence prior to | TPSPs, including | |
| engagement. | proper due diligence | |
| | prior to engagement. | |
+-----------------------+-----------------------+----------------------+
| | **12.8.3.b** Examine | |
| | evidence and | |
| | interview responsible | |
| | personnel to verify | |
| | the process for | |
| | engaging TPSPs | |
| | includes proper due | |
| | diligence prior to | |
| | engagement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The capability, | | |
| intent, and resources | | |
| of a prospective TPSP | | |
| to adequately protect | | |
| account data are | | |
| assessed before the | | |
| TPSP is engaged. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Knowing the PCI DSS |
| | | compliance status of |
| | | all engaged TPSPs |
| | | provides assurance |
| | | and awareness about |
| | | whether they comply |
| | | with the |
| | | requirements |
| | | applicable to the |
| | | services they offer |
| | | to the organization. |
| | | |
| | | **Good Practice** |
| | | |
| | | If the TPSP offers a |
| | | variety of services, |
| | | the compliance |
| | | status the entity |
| | | monitors should be |
| | | specific to those |
| | | services delivered |
| | | to the entity and |
| | | those services in |
| | | scope for the |
| | | entity's PCI DSS |
| | | assessment. |
| | | |
| | | If a TPSP has a PCI |
| | | DSS Attestation of |
| | | Compliance (AOC), |
| | | the expectation is |
| | | that the TPSP should |
| | | provide that to |
| | | customers upon |
| | | request to |
| | | demonstrate their |
| | | PCI DSS compliance |
| | | status. |
| | | |
| | | If the TPSP did not |
| | | undergo a PCI DSS |
| | | assessment, it may |
| | | be able to provide |
| | | other sufficient |
| | | evidence to |
| | | demonstrate that it |
| | | has met the |
| | | applicable |
| | | requirements without |
| | | undergoing a formal |
| | | compliance |
| | | validation. For |
| | | example, the TPSP |
| | | can provide specific |
| | | evidence to the |
| | | entity's assessor so |
| | | the assessor can |
| | | confirm applicable |
| | | requirements are |
| | | met. Alternatively, |
| | | the TPSP can elect |
| | | to undergo multiple |
| | | on-demand |
| | | assessments by each |
| | | of its customers' |
| | | assessors, with each |
| | | assessment targeted |
| | | to confirm that |
| | | applicable |
| | | requirements are |
| | | met. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For more information |
| | | about third-party |
| | | service providers, |
| | | refer to: |
| | | |
| | | - PCI DSS section: |
| | | *Use of |
| | | Third-Party |
| | | Service |
| | | Providers*. |
| | | |
| | | - *Information |
| | | Supplement: |
| | | Third-Party |
| | | Security |
| | | Assurance*. |
+-----------------------+-----------------------+----------------------+
| **12.8.4** A program | **12.8.4.a** Examine | |
| is implemented to | policies and | |
| monitor TPSPs' PCI | procedures to verify | |
| DSS compliance status | that processes are | |
| at least once every | defined to monitor | |
| 12 months. | TPSPs' PCI DSS | |
| | compliance status at | |
| | least once every 12 | |
| | months. | |
+-----------------------+-----------------------+----------------------+
| | **12.8.4.b** Examine | |
| | documentation and | |
| | interview responsible | |
| | personnel to verify | |
| | that the PCI DSS | |
| | compliance status of | |
| | each TPSP is | |
| | monitored at least | |
| | once every 12 months. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The PCI DSS | | |
| compliance status of | | |
| TPSPs is verified | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| Where an entity has | | |
| an agreement with a | | |
| TPSP for meeting PCI | | |
| DSS requirements on | | |
| behalf of the entity | | |
| (for example, via a | | |
| firewall service), | | |
| the entity must work | | |
| with the TPSP to make | | |
| sure the applicable | | |
| PCI DSS requirements | | |
| are met. If the TPSP | | |
| does not meet those | | |
| applicable PCI DSS | | |
| requirements, then | | |
| those requirements | | |
| are also "not in | | |
| place" for the | | |
| entity. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important that |
| | | the entity |
| | | understands which |
| | | PCI DSS requirements |
| | | and sub-requirements |
| | | its TPSPs have |
| | | agreed to meet, |
| | | which requirements |
| | | are shared between |
| | | the TPSP and the |
| | | entity, and for |
| | | those that are |
| | | shared, specifics |
| | | about how the |
| | | requirements are |
| | | shared and which |
| | | entity is |
| | | responsible for |
| | | meeting each |
| | | sub-requirement. |
| | | |
| | | Without this shared |
| | | understanding, it is |
| | | inevitable that the |
| | | entity and the TPSP |
| | | will assume a given |
| | | PCI DSS |
| | | sub-requirement is |
| | | the responsibility |
| | | of the other party, |
| | | and therefore that |
| | | sub- requirement may |
| | | not be addressed at |
| | | all. |
| | | |
| | | The specific |
| | | information an |
| | | entity maintains |
| | | will depend on the |
| | | particular agreement |
| | | with their |
| | | providers, the type |
| | | of service, etc. |
| | | TPSPs may define |
| | | their PCI DSS |
| | | responsibilities to |
| | | be the same for all |
| | | their customers; |
| | | otherwise, this |
| | | responsibility |
| | | should be agreed |
| | | upon by both the |
| | | entity and TPSP. |
| | | |
| | | **Good Practice** |
| | | |
| | | Entities can |
| | | document these |
| | | responsibilities via |
| | | a matrix that |
| | | identifies all |
| | | applicable PCI DSS |
| | | requirements and |
| | | indicates for each |
| | | requirement whether |
| | | the entity or TPSP |
| | | is responsible for |
| | | meeting that |
| | | requirement or |
| | | whether it is a |
| | | shared |
| | | responsibility. This |
| | | type of document is |
| | | often referred to as |
| | | a *responsibility |
| | | matrix*. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **12.8.5** | **12.8.5.a** Examine | |
| Information is | policies and | |
| maintained about | procedures to verify | |
| which PCI DSS | that processes are | |
| requirements are | defined to maintain | |
| managed by each TPSP, | information about | |
| which are managed by | which PCI DSS | |
| the entity, and any | requirements are | |
| that are shared | managed by each TPSP, | |
| between the TPSP and | which are managed by | |
| the entity. | the entity, and any | |
| | that are shared | |
| | between both the TPSP | |
| | and the entity. | |
+-----------------------+-----------------------+----------------------+
| | **12.8.5.b** Examine | |
| | documentation and | |
| | interview personnel | |
| | to verify the entity | |
| | maintains information | |
| | about which PCI DSS | |
| | requirements are | |
| | managed by each TPSP, | |
| | which are managed by | |
| | the entity, and any | |
| | that are shared | |
| | between both | |
| | entities. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Records detailing the | | |
| PCI DSS requirements | | |
| and related system | | |
| components for which | | |
| each TPSP is solely | | |
| or jointly | | |
| responsible, are | | |
| maintained and | | |
| reviewed | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | It is also important |
| | | for entities to |
| | | understand whether |
| | | any TPSPs have |
| | | "nested" |
| | | relationships with |
| | | other TPSPs, meaning |
| | | the primary TPSP |
| | | contracts with |
| | | another TPSP(s) for |
| | | the purposes of |
| | | providing a service. |
| | | It is important to |
| | | understand whether |
| | | the primary TPSP is |
| | | relying on the |
| | | secondary TPSP(s) to |
| | | achieve overall |
| | | compliance of a |
| | | service, and how the |
| | | primary TPSP is |
| | | monitoring |
| | | performance of the |
| | | service and the PCI |
| | | DSS compliance |
| | | status of the |
| | | secondary TPSP(s). |
| | | Note that it is the |
| | | responsibility of |
| | | the primary TPSP to |
| | | manage and monitor |
| | | any secondary TPSPs. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to |
| | | *Information |
| | | Supplement: |
| | | Third-Party Security |
| | | Assurance* for a |
| | | sample |
| | | responsibility |
| | | matrix template. |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.9** Third-party | | |
| service providers | | |
| (TPSPs) support their | | |
| customers' PCI DSS | | |
| compliance. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | In conjunction with |
| | | Requirement 12.8.2, |
| | | this requirement is |
| | | intended to promote |
| | | a consistent level |
| | | of understanding |
| | | between TPSPs and |
| | | their customers |
| | | about their |
| | | applicable PCI DSS |
| | | responsibilities. |
| | | The acknowledgment |
| | | of the TPSPs |
| | | evidences their |
| | | commitment to |
| | | maintaining proper |
| | | security of account |
| | | data that it obtains |
| | | from its clients. |
| | | |
| | | The method by which |
| | | the TPSP provides |
| | | written |
| | | acknowledgment |
| | | should be agreed |
| | | between the provider |
| | | and its customers. |
+-----------------------+-----------------------+----------------------+
| **12.9.1 *Additional | **12.9.1 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***TPSPs | assessments only: | |
| acknowledge in | ***Examine TPSP | |
| writing to customers | policies, procedures, | |
| that they are | and templates used | |
| responsible for the | for written | |
| security of account | agreements to verify | |
| data the TPSP | processes are defined | |
| possesses or | for the TPSP to | |
| otherwise stores, | provide written | |
| processes, or | acknowledgments to | |
| transmits on behalf | customers in | |
| of the customer, or | accordance with all | |
| to the extent that | elements specified in | |
| they could impact the | this requirement. | |
| security of the | | |
| customer's CDE. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| TPSPs formally | | |
| acknowledge their | | |
| security | | |
| responsibilities to | | |
| their customers. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
| | | |
| The exact wording of | | |
| an acknowledgment | | |
| will depend on the | | |
| agreement between the | | |
| two parties, the | | |
| details of the | | |
| service being | | |
| provided, and the | | |
| responsibilities | | |
| assigned to each | | |
| party. The | | |
| acknowledgment does | | |
| not have to include | | |
| the exact wording | | |
| provided in this | | |
| requirement. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If a TPSP does not |
| | | provide the |
| | | necessary |
| | | information to |
| | | enable its customers |
| | | to meet their |
| | | security and |
| | | compliance |
| | | requirements, the |
| | | customers will not |
| | | be able to protect |
| | | cardholder data nor |
| | | meet their own |
| | | contractual |
| | | obligations. |
| | | |
| | | **Good Practice** |
| | | |
| | | If a TPSP has a PCI |
| | | DSS Attestation of |
| | | Compliance (AOC), |
| | | the expectation is |
| | | that the TPSP should |
| | | provide that to |
| | | customers upon |
| | | request to |
| | | demonstrate their |
| | | PCI DSS compliance |
| | | status. |
| | | |
| | | If the TPSP did not |
| | | undergo a PCI DSS |
| | | assessment, they may |
| | | be able to provide |
| | | other sufficient |
| | | evidence to |
| | | demonstrate that it |
| | | has met the |
| | | applicable |
| | | requirements without |
| | | undergoing a formal |
| | | compliance |
| | | validation. For |
| | | example, the TPSP |
| | | can provide specific |
| | | evidence to the |
| | | entity's assessor so |
| | | the assessor can |
| | | confirm applicable |
| | | requirements are |
| | | met. Alternatively, |
| | | the TPSP can elect |
| | | to undergo multiple |
| | | on-demand |
| | | assessments by each |
| | | of its customers' |
| | | assessors, with each |
| | | assessment targeted |
| | | to confirm that |
| | | applicable |
| | | requirements are |
| | | met. |
| | | |
| | | TPSPs should provide |
| | | sufficient evidence |
| | | to their customers |
| | | to verify that the |
| | | scope of the TPSP's |
| | | PCI DSS assessment |
| | | covered the services |
| | | applicable to the |
| | | customer and that |
| | | the relevant PCI DSS |
| | | requirements were |
| | | examined and |
| | | determined to be in |
| | | place. |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+-----------------------+----------------------+
| **12.9.2 *Additional | **12.9.2 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***TPSPs | assessments only: | |
| support their | ***Examine policies | |
| customers' requests | and procedures to | |
| for information to | verify processes are | |
| meet Requirements | defined for the TPSPs | |
| | to support customers' | |
| 12.8.4 and 12.8.5 by | request for | |
| providing the | information to meet | |
| following upon | Requirements 12.8.4 | |
| customer request: | and | |
| | | |
| - PCI DSS | 12.8.5 in accordance | |
| compliance status | with all elements | |
| information for | specified in this | |
| any service the | requirement. | |
| TPSP performs on | | |
| behalf of | | |
| customers | | |
| (Requirement | | |
| 12.8.4). | | |
| | | |
| - Information about | | |
| which PCI DSS | | |
| requirements are | | |
| the | | |
| responsibility of | | |
| the TPSP and | | |
| which are the | | |
| responsibility of | | |
| the customer, | | |
| including any | | |
| shared | | |
| responsibilities | | |
| (Requirement | | |
| 12.8.5). | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| TPSPs provide | | |
| information as needed | | |
| to support their | | |
| customers' PCI DSS | | |
| compliance efforts. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when the | | |
| entity being assessed | | |
| is a service | | |
| provider. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| | | TPSPs may define |
| | | their PCI DSS |
| | | responsibilities to |
| | | be the same for all |
| | | their customers; |
| | | otherwise, this |
| | | responsibility |
| | | should be agreed |
| | | upon by both the |
| | | customer and TPSP. |
| | | It is important that |
| | | the customer |
| | | understands which |
| | | PCI DSS requirements |
| | | and sub-requirements |
| | | its TPSPs have |
| | | agreed to meet, |
| | | which requirements |
| | | are shared between |
| | | the TPSP and the |
| | | customer, and for |
| | | those that are |
| | | shared, specifics |
| | | about how the |
| | | requirements are |
| | | shared and which |
| | | entity is |
| | | responsible for |
| | | meeting each |
| | | sub-requirement. An |
| | | example of a way to |
| | | document these |
| | | responsibilities is |
| | | via a matrix that |
| | | identifies all |
| | | applicable PCI DSS |
| | | requirements and |
| | | indicates whether |
| | | the customer or TPSP |
| | | is responsible for |
| | | meeting that |
| | | requirement or |
| | | whether it is a |
| | | shared |
| | | responsibility. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For further |
| | | guidance, refer to: |
| | | |
| | | - PCI DSS section: |
| | | *Use of |
| | | Third-Party |
| | | Service |
| | | Providers*. |
| | | |
| | | - *Information |
| | | Supplement: |
| | | Third-Party |
| | | Security |
| | | Assurance* |
| | | (includes a |
| | | sample |
| | | responsibility |
| | | matrix |
| | | template). |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **12.10** Suspected | | |
| and confirmed | | |
| security incidents | | |
| that could impact the | | |
| CDE are responded to | | |
| immediately. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without a |
| | | comprehensive |
| | | incident response |
| | | plan that is |
| | | properly |
| | | disseminated, read, |
| | | and understood by |
| | | the parties |
| | | responsible, |
| | | confusion and lack |
| | | of a unified |
| | | response could |
| | | create further |
| | | downtime for the |
| | | business, |
| | | unnecessary public |
| | | media exposure, as |
| | | well as risk of |
| | | financial and/or |
| | | reputational loss |
| | | and legal |
| | | liabilities. |
| | | |
| | | **Good Practice** |
| | | |
| | | The incident |
| | | response plan should |
| | | be thorough and |
| | | contain all the key |
| | | elements for |
| | | stakeholders (for |
| | | example, legal, |
| | | communications) to |
| | | allow the entity to |
| | | respond effectively |
| | | in the event of a |
| | | breach that could |
| | | impact account data. |
| | | It is important to |
| | | keep the plan up to |
| | | date with current |
| | | contact information |
| | | of all individuals |
| | | designated as having |
| | | a role in incident |
| | | response. Other |
| | | relevant parties for |
| | | notifications may |
| | | include customers, |
| | | financial |
| | | institutions |
| | | (acquirers and |
| | | issuers), and |
| | | business partners. |
| | | |
| | | Entities should |
| | | consider how to |
| | | address all |
| | | compromises of data |
| | | within the CDE in |
| | | their incident |
| | | response plans, |
| | | including to account |
| | | data, wireless |
| | | encryption keys, |
| | | encryption keys used |
| | | for transmission and |
| | | storage or account |
| | | data or cardholder |
| | | data, etc. |
| | | |
| | | **Examples** |
| | | |
| | | Legal requirements |
| | | for reporting |
| | | compromises include |
| | | those in most US |
| | | states, the EU |
| | | General Data |
| | | Protection |
| | | Regulation (GDPR), |
| | | and the Personal |
| | | Data Protection Act |
| | | (Singapore). |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For more |
| | | information, refer |
| | | to the *NIST SP 800- |
| | | 61 Rev. 2, Computer |
| | | Security Incident |
| | | Handling Guide*. |
+-----------------------+-----------------------+----------------------+
| 1. An incident | **12.10.1.a** Examine | |
| response plan | the incident response | |
| exists and is | plan to verify that | |
| ready to be | the plan exists and | |
| activated in the | includes at least the | |
| event of a | elements specified in | |
| suspected or | this requirement. | |
| confirmed | | |
| security | | |
| incident. The | | |
| plan includes, | | |
| but is not | | |
| limited to: | | |
| | | |
| - Roles, | | |
| | | |
| responsibilities, | | |
| and | | |
| communication | | |
| and contact | | |
| strategies in | | |
| the event of | | |
| a suspected | | |
| or confirmed | | |
| security | | |
| incident, | | |
| including | | |
| notification | | |
| of payment | | |
| brands and | | |
| acquirers, at | | |
| a minimum. | | |
| | | |
| - Incident | | |
| response | | |
| procedures | | |
| with specific | | |
| containment | | |
| and | | |
| mitigation | | |
| activities | | |
| for different | | |
| types of | | |
| incidents. | | |
| | | |
| - Business | | |
| recovery and | | |
| continuity | | |
| procedures. | | |
| | | |
| - Data backup | | |
| processes. | | |
| | | |
| - Analysis of | | |
| legal | | |
| requirements | | |
| for reporting | | |
| compromises. | | |
| | | |
| - Coverage and | | |
| responses of | | |
| all critical | | |
| system | | |
| components. | | |
| | | |
| - Reference or | | |
| inclusion of | | |
| incident | | |
| response | | |
| procedures | | |
| from the | | |
| payment | | |
| brands. | | |
+-----------------------+-----------------------+----------------------+
| | **12.10.1.b** | |
| | Interview personnel | |
| | and examine | |
| | documentation from | |
| | previously reported | |
| | incidents or alerts | |
| | to verify that the | |
| | documented incident | |
| | response plan and | |
| | procedures were | |
| | followed. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| A comprehensive | | |
| incident response | | |
| plan that meets card | | |
| brand expectations is | | |
| maintained. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Proper testing of |
| | | the security |
| | | incident response |
| | | plan can identify |
| | | broken business |
| | | processes and ensure |
| | | key steps are not |
| | | missed, which could |
| | | result in increased |
| | | exposure during an |
| | | incident. Periodic |
| | | testing of the plan |
| | | ensures that the |
| | | processes remain |
| | | viable, as well as |
| | | ensuring that all |
| | | relevant personnel |
| | | in the organization |
| | | are familiar with |
| | | the plan. |
| | | |
| | | **Good Practice** |
| | | |
| | | The test of the |
| | | incident response |
| | | plan can include |
| | | simulated incidents |
| | | and the |
| | | corresponding |
| | | responses in the |
| | | form of a "table-top |
| | | exercise", that |
| | | include |
| | | participation by |
| | | relevant personnel. |
| | | A review of the |
| | | incident and the |
| | | quality of the |
| | | response can provide |
| | | entities with the |
| | | assurance that all |
| | | required elements |
| | | are included in the |
| | | plan. |
+-----------------------+-----------------------+----------------------+
| **12.10.2** At least | **12.10.2** Interview | |
| once every 12 months, | personnel and review | |
| the security incident | documentation to | |
| response plan is: | verify that, at least | |
| | once every 12 months, | |
| - Reviewed and the | the security incident | |
| content is | response plan is: | |
| updated as | | |
| needed. | - Reviewed and | |
| | updated as | |
| - Tested, including | needed. | |
| all elements | | |
| listed in | - Tested, including | |
| Requirement | all elements | |
| 12.10.1. | listed in | |
| | Requirement | |
| | 12.10.1. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The incident response | | |
| plan is kept current | | |
| and tested | | |
| periodically. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An incident could |
| | | occur at any time, |
| | | therefore if a |
| | | person who is |
| | | trained in incident |
| | | response and |
| | | familiar with the |
| | | entity's plan is |
| | | available when an |
| | | incident is |
| | | detected, the |
| | | entity's ability to |
| | | correctly respond to |
| | | the incident is |
| | | increased. |
| | | |
| | | **Good Practice** |
| | | |
| | | Often, specific |
| | | personnel are |
| | | designated to be |
| | | part of a security |
| | | incident response |
| | | team, with the team |
| | | having overall |
| | | responsibility for |
| | | responding to |
| | | incidents (perhaps |
| | | on a rotating |
| | | schedule basis) and |
| | | managing those |
| | | incidents in |
| | | accordance with the |
| | | plan. The incident |
| | | response team can |
| | | consist of core |
| | | members who are |
| | | permanently assigned |
| | | or "on-demand" |
| | | personnel who may be |
| | | called up as |
| | | necessary, depending |
| | | on their expertise |
| | | and the specifics of |
| | | the incident. |
| | | |
| | | Having available |
| | | resources to respond |
| | | quickly to incidents |
| | | minimizes disruption |
| | | to the organization. |
| | | |
| | | Examples of types of |
| | | activity the team or |
| | | individuals should |
| | | respond to include |
| | | any evidence of |
| | | unauthorized |
| | | activity, detection |
| | | of unauthorized |
| | | wireless access |
| | | points, critical IDS |
| | | alerts, and reports |
| | | of unauthorized |
| | | critical system or |
| | | content file |
| | | changes. |
+-----------------------+-----------------------+----------------------+
| **12.10.3** Specific | **12.10.3** Examine | |
| personnel are | documentation and | |
| designated to be | interview responsible | |
| available on a 24/7 | personnel occupying | |
| basis to respond to | designated roles to | |
| suspected or | verify that specific | |
| confirmed security | personnel are | |
| incidents. | designated to be | |
| | available on a 24/7 | |
| | basis to respond to | |
| | security incidents. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Incidents are | | |
| responded to | | |
| immediately where | | |
| appropriate. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without a trained |
| | | and readily |
| | | available incident |
| | | response team, |
| | | extended damage to |
| | | the network could |
| | | occur, and critical |
| | | data and systems may |
| | | become "polluted" by |
| | | inappropriate |
| | | handling of the |
| | | targeted systems. |
| | | This can hinder the |
| | | success of a |
| | | post-incident |
| | | investigation. |
| | | |
| | | **Good Practice** |
| | | |
| | | It is important that |
| | | all personnel |
| | | involved in incident |
| | | response are trained |
| | | and knowledgeable |
| | | about managing |
| | | evidence for |
| | | forensics and |
| | | investigations. |
+-----------------------+-----------------------+----------------------+
| **12.10.4** Personnel | **12.10.4** Examine | |
| responsible for | training | |
| responding to | documentation and | |
| suspected and | interview incident | |
| confirmed security | response personnel to | |
| incidents are | verify that personnel | |
| appropriately and | are appropriately and | |
| periodically trained | periodically trained | |
| on their incident | on their incident | |
| response | response | |
| responsibilities. | responsibilities. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Personnel are | | |
| knowledgeable about | | |
| their role and | | |
| responsibilities in | | |
| incident response and | | |
| are able to access | | |
| assistance and | | |
| guidance when | | |
| required. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Each entity's |
| | | environment and |
| | | incident response |
| | | plan are different |
| | | and the approach |
| | | will depend on a |
| | | number of factors, |
| | | including the size |
| | | and complexity of |
| | | the entity, the |
| | | degree of change in |
| | | the environment, the |
| | | size of the incident |
| | | response team, and |
| | | the turnover in |
| | | personnel. |
| | | |
| | | Performing a risk |
| | | analysis will allow |
| | | the entity to |
| | | determine the |
| | | optimum frequency |
| | | for training |
| | | personnel with |
| | | incident response |
| | | responsibilities. |
+-----------------------+-----------------------+----------------------+
| > **12.10.4.1** The | **12.10.4.1.a** | |
| > frequency of | Examine the entity's | |
| > periodic training | targeted risk | |
| > for incident | analysis for the | |
| > response personnel | frequency of training | |
| > is defined in the | for incident response | |
| > entity's targeted | personnel to verify | |
| > risk analysis, | the risk analysis was | |
| > which is performed | performed in | |
| > according to all | accordance with all | |
| > elements specified | elements specified in | |
| > in Requirement | Requirement 12.3.1. | |
| > 12.3.1. | | |
+-----------------------+-----------------------+----------------------+
| | **12.10.4.1.b** | |
| | Examine documented | |
| | results of periodic | |
| | training of incident | |
| | response personnel | |
| | and interview | |
| | personnel to verify | |
| | training is performed | |
| | at the frequency | |
| | defined in the | |
| | entity's targeted | |
| | risk analysis | |
| | performed for this | |
| | requirement. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Incident response | | |
| personnel are trained | | |
| at a frequency that | | |
| addresses the | | |
| entity's risk. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Responding to alerts |
| | | generated by |
| | | security monitoring |
| | | systems that are |
| | | explicitly designed |
| | | to focus on |
| | | potential risk to |
| | | data is critical to |
| | | prevent a breach and |
| | | therefore, this must |
| | | be included in the |
| | | incident-response |
| | | processes. |
+-----------------------+-----------------------+----------------------+
| **12.10.5** The | **12.10.5** Examine | |
| security incident | documentation and | |
| response plan | observe incident | |
| includes monitoring | response processes to | |
| and responding to | verify that | |
| alerts from security | monitoring and | |
| monitoring systems, | responding to alerts | |
| including but not | from security | |
| limited to: | monitoring systems | |
| | are covered in the | |
| - | security incident | |
| Intrusion-detection | response plan, | |
| and | including but not | |
| | limited to the | |
| intrusion-prevention | systems specified in | |
| systems. | this requirement. | |
| | | |
| - Network security | | |
| controls. | | |
| | | |
| - Change-detection | | |
| mechanisms for | | |
| critical files. | | |
| | | |
| - The change-and | | |
| tamper-detection | | |
| mechanism for | | |
| payment pages. | | |
| *This bullet is a | | |
| best practice | | |
| until its | | |
| effective date; | | |
| refer to | | |
| Applicability | | |
| Notes below for | | |
| details.* | | |
| | | |
| - Detection of | | |
| unauthorized | | |
| wireless access | | |
| points. | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Alerts generated by | | |
| monitoring and | | |
| detection | | |
| technologies are | | |
| responded to in a | | |
| structured, | | |
| repeatable manner. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *The bullet above | | |
| (for monitoring and | | |
| responding to alerts | | |
| from a change- and | | |
| tamper-detection | | |
| mechanism for payment | | |
| pages) is a best | | |
| practice until 31 | | |
| March 2025, after | | |
| which it will be | | |
| required as part of | | |
| Requirement 12.10.5 | | |
| and must be fully | | |
| considered during a | | |
| PCI DSS assessment.* | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Incorporating |
| | | lessons learned into |
| | | the incident |
| | | response plan after |
| | | an incident occurs |
| | | and in-step with |
| | | industry |
| | | developments, helps |
| | | keep the plan |
| | | current and able to |
| | | react to emerging |
| | | threats and security |
| | | trends. |
| | | |
| | | **Good Practice** |
| | | |
| | | The lessons-learned |
| | | exercise should |
| | | include all levels |
| | | of personnel. |
| | | Although it is often |
| | | included as part of |
| | | the review of the |
| | | entire incident, it |
| | | should focus on how |
| | | the entity's |
| | | response to the |
| | | incident could be |
| | | improved. |
| | | |
| | | It is important to |
| | | not just consider |
| | | elements of the |
| | | response that did |
| | | not have the planned |
| | | outcomes but also to |
| | | understand what |
| | | worked well and |
| | | whether lessons from |
| | | those elements that |
| | | worked well can be |
| | | applied areas of the |
| | | plan that didn't. |
| | | |
| | | Another way to |
| | | optimize an entity's |
| | | incident response |
| | | plan is to |
| | | understand the |
| | | attacks made against |
| | | other organizations |
| | | and use that |
| | | information to |
| | | fine-tune the |
| | | entity's detection, |
| | | containment, |
| | | mitigation, or |
| | | recovery procedures. |
+-----------------------+-----------------------+----------------------+
| **12.10.6** The | **12.10.6.a** Examine | |
| security incident | policies and | |
| response plan is | procedures to verify | |
| modified and evolved | that processes are | |
| according to lessons | defined to modify and | |
| learned and to | evolve the security | |
| incorporate industry | incident response | |
| developments. | plan according to | |
| | lessons learned and | |
| | to incorporate | |
| | industry | |
| | developments. | |
+-----------------------+-----------------------+----------------------+
| | **12.10.6.b** Examine | |
| | the security incident | |
| | response plan and | |
| | interview responsible | |
| | personnel to verify | |
| | that the incident | |
| | response plan is | |
| | modified and evolved | |
| | according to lessons | |
| | learned and to | |
| | incorporate industry | |
| | developments. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| The effectiveness and | | |
| accuracy of the | | |
| incident response | | |
| plan is reviewed and | | |
| updated after each | | |
| invocation. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Having documented |
| | | incident response |
| | | procedures that are |
| | | followed in the |
| | | event that stored |
| | | PAN is found |
| | | anywhere it is not |
| | | expected to be, |
| | | helps to identify |
| | | the necessary |
| | | remediation actions |
| | | and prevent future |
| | | leaks. |
| | | |
| | | **Good Practice** |
| | | |
| | | If PAN was found |
| | | outside the CDE, |
| | | analysis should be |
| | | performed to 1) |
| | | determine whether it |
| | | was saved |
| | | independently of |
| | | other data or with |
| | | sensitive |
| | | authentication data, |
| | | 2) identify the |
| | | source of the data, |
| | | and 3) identify the |
| | | control gaps that |
| | | resulted in the data |
| | | being outside the |
| | | CDE. |
| | | |
| | | Entities should |
| | | consider whether |
| | | there are |
| | | contributory |
| | | factors, such as |
| | | business processes, |
| | | user behavior, |
| | | improper system |
| | | configurations, etc. |
| | | that caused the PAN |
| | | to be stored in an |
| | | unexpected location. |
| | | If such contributory |
| | | factors are present, |
| | | they should be |
| | | addressed per this |
| | | Requirement to |
| | | prevent recurrence. |
+-----------------------+-----------------------+----------------------+
| **12.10.7** Incident | **12.10.7.a** Examine | |
| response procedures | documented incident | |
| are in place, to be | response procedures | |
| initiated upon the | to verify that | |
| detection of stored | procedures for | |
| PAN anywhere it is | responding to the | |
| not expected, and | detection of stored | |
| include: | PAN anywhere it is | |
| | not expected to | |
| - Determining what | exist, ready to be | |
| to do if PAN is | initiated, and | |
| discovered | include all elements | |
| outside the CDE, | specified in this | |
| including its | requirement. | |
| retrieval, secure | | |
| deletion, and/or | | |
| migration into | | |
| the currently | | |
| defined CDE, as | | |
| applicable. | | |
| | | |
| - Identifying | | |
| whether sensitive | | |
| authentication | | |
| data is stored | | |
| with PAN. | | |
| | | |
| - Determining where | | |
| the account data | | |
| came from and how | | |
| it ended up where | | |
| it was not | | |
| expected. | | |
| | | |
| - Remediating data | | |
| leaks or process | | |
| gaps that | | |
| resulted in the | | |
| account data | | |
| being where it | | |
| was not expected. | | |
+-----------------------+-----------------------+----------------------+
| | **12.10.7.b** | |
| | Interview personnel | |
| | and examine records | |
| | of response actions | |
| | to verify that | |
| | incident response | |
| | procedures are | |
| | performed upon | |
| | detection of stored | |
| | PAN anywhere it is | |
| | not expected. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| Processes are in | | |
| place to quickly | | |
| respond, analyze, and | | |
| address situations in | | |
| the event that | | |
| cleartext PAN is | | |
| detected where it is | | |
| not expected. | | |
+-----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+-----------------------+----------------------+
| *This requirement is | | |
| a best practice until | | |
| 31 March 2025, after | | |
| which it will be | | |
| required and must be | | |
| fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+-----------------------+-----------------------+----------------------+
# Appendix A Additional PCI DSS Requirements {#appendix-a-additional-pci-dss-requirements .unnumbered}
> This appendix contains additional PCI DSS requirements for different
> types of entities. The sections within this Appendix include:
- Appendix A1: Additional PCI DSS Requirements for Multi-Tenant
Service Providers
- Appendix A2: Additional PCI DSS Requirements for Entities Using
SSL/early TLS for Card-Present POS POI Terminal Connections
- Appendix A3: Designated Entities Supplemental Validation (DESV)
Guidance and applicability information is provided in each section.
## Appendix A1: Additional PCI DSS Requirements for Multi-Tenant Service Providers {#appendix-a1-additional-pci-dss-requirements-for-multi-tenant-service-providers .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| > **A1.1** Multi-tenant service providers protect and separate all |
| > customer environments and data. |
| > |
| > **A1.2** Multi-tenant service providers facilitate logging and |
| > incident response for all customers. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > All service providers are responsible for meeting PCI DSS |
| > requirements for their own environments as applicable to the |
| > services offered to their customers. In addition, multi-tenant |
| > service providers must meet the requirements in this Appendix. |
| > |
| > Multi-tenant service providers are a type of third-party service |
| > provider that offers various shared services to merchants and other |
| > service providers, where customers share system resources (such as |
| > physical or virtual servers), infrastructure, applications |
| > (including Software as a Service (SaaS)), and/or databases. |
| > Services may include, but are not limited to, hosting multiple |
| > entities on a single shared server, providing e-commerce and/or |
| > "shopping cart" services, web- based hosting services, payment |
| > applications, various cloud applications and services, and |
| > connections to payment gateways and processors. |
| > |
| > Service providers that provide only shared data center services |
| > (often called co-location or "co-lo" providers), where equipment, |
| > space, and bandwidth are available on a rental basis, are not |
| > considered multi-tenant service providers for purposes of this |
| > Appendix. |
| > |
| > **Note**: Even though a multi-tenant service provider may meet |
| > these requirements, each customer is still responsible to comply |
| > with the PCI DSS requirements that are applicable to its |
| > environment and validate compliance as applicable. Often, there are |
| > PCI DSS requirements for which responsibility is shared between the |
| > provider and the customer (for perhaps different aspects of the |
| > environment). Requirements 12.8 and 12.9 delineate requirements |
| > specific to the relationships between all third-party service |
| > providers (TPSPs) and their customers, and the responsibilities of |
| > both. This includes defining the specific services the customer is |
| > receiving, along with which PCI DSS requirements are the |
| > responsibility of the customer to meet, which are the |
| > responsibility of the TPSP, and which requirements are shared |
| > between both customer and the TPSP. |
+-----------------------------------------------------------------------+
+----------------------+-----------------------+------------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+========================+
| **A1.1** | | |
| Multi-tenant service | | |
| providers protect | | |
| and separate all | | |
| customer | | |
| environments and | | |
| data. | | |
+----------------------+-----------------------+------------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without controls |
| | | between the provider's |
| | | environment and the |
| | | customer's |
| | | environment, a |
| | | malicious actor within |
| | | the provider's |
| | | environment could |
| | | compromise the |
| | | customer's |
| | | environment, and |
| | | similarly, a malicious |
| | | actor in a customer |
| | | environment could |
| | | compromise the |
| | | provider and |
| | | potentially other of |
| | | the provider's |
| | | customers. |
| | | |
| | | Multi-tenant |
| | | environments should be |
| | | isolated from each |
| | | other and from the |
| | | provider's |
| | | infrastructure such |
| | | that they can be |
| | | separately managed |
| | | entities with no |
| | | connectivity between |
| | | them. |
| | | |
| | | **Good Practice** |
| | | |
| | | Providers should |
| | | ensure strong |
| | | separation between the |
| | | environments that are |
| | | designed for customer |
| | | access, for example, |
| | | configuration and |
| | | billing portals, and |
| | | the provider's private |
| | | environment that |
| | | should only be |
| | | accessed by authorized |
| | | provider personnel. |
| | | |
| | | Service provider |
| | | access to customer |
| | | environments is |
| | | performed in |
| | | accordance with |
| | | requirement 8.2.3. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the |
| | | *Information |
| | | Supplement: PCI SSC |
| | | Cloud Computing |
| | | Guidelines* for |
| | | further guidance on |
| | | cloud environments. |
+----------------------+-----------------------+------------------------+
| **A1.1.1** Logical | **A1.1.1** Examine | |
| separation is | documentation and | |
| implemented as | system and network | |
| follows: | configurations and | |
| | interview personnel | |
| - The provider | to verify that | |
| cannot access | logical separation is | |
| its customers' | implemented in | |
| environments | accordance with all | |
| without | elements specified in | |
| authorization. | this requirement. | |
| | | |
| - Customers cannot | | |
| access the | | |
| provider's | | |
| environment | | |
| without | | |
| authorization. | | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Customers cannot | | |
| access the | | |
| provider's | | |
| environment. The | | |
| provider cannot | | |
| access its | | |
| customers' | | |
| environments without | | |
| authorization. | | |
+----------------------+-----------------------+------------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+------------------------+
| *This requirement is | | |
| a best practice | | |
| until 31 March 2025, | | |
| after which it will | | |
| be required and must | | |
| be fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+----------------------+-----------------------+------------------------+
+----------------------+-----------------------+------------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+========================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important that a |
| | | multi-tenant service |
| | | provider define |
| | | controls so that each |
| | | customer can only |
| | | access their own |
| | | environment and CDE to |
| | | prevent unauthorized |
| | | access from one |
| | | customer's environment |
| | | to another. |
| | | |
| | | **Examples** |
| | | |
| | | In a cloud-based |
| | | infrastructure, such |
| | | as an infrastructure |
| | | as a service (IaaS) |
| | | offering, the |
| | | customers' CDE may |
| | | include virtual |
| | | network devices and |
| | | virtual servers that |
| | | are configured and |
| | | managed by the |
| | | customers, including |
| | | operating systems, |
| | | files, memory, etc. |
+----------------------+-----------------------+------------------------+
| **A1.1.2** Controls | **A1.1.2.a** Examine | |
| are implemented such | documentation to | |
| that each customer | verify controls are | |
| only has permission | defined such that | |
| to access its own | each customer only | |
| cardholder data and | has permission to | |
| CDE. | access its own | |
| | cardholder data and | |
| | CDE. | |
+----------------------+-----------------------+------------------------+
| | **A1.1.2.b** Examine | |
| | system configurations | |
| | to verify that | |
| | customers have | |
| | privileges | |
| | established to only | |
| | access their own | |
| | account data and CDE. | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Customers cannot | | |
| access other | | |
| customers' | | |
| environments. | | |
+----------------------+-----------------------+------------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | To prevent any |
| | | inadvertent or |
| | | intentional impact to |
| | | other customers' |
| | | environments or |
| | | account data, it is |
| | | important that each |
| | | customer can access |
| | | only resources |
| | | allocated to that |
| | | customer. |
+----------------------+-----------------------+------------------------+
| **A1.1.3** Controls | **A1.1.3** Examine | |
| are implemented such | customer privileges | |
| that each customer | to verify each | |
| can only access | customer can only | |
| resources allocated | access resources | |
| to them. | allocated to them. | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Customers cannot | | |
| impact resources | | |
| allocated to other | | |
| customers. | | |
+----------------------+-----------------------+------------------------+
+----------------------+-----------------------+------------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+========================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Multi-tenant services |
| | | providers are |
| | | responsible for |
| | | managing the |
| | | segmentation between |
| | | their customers. |
| | | |
| | | Without technical |
| | | assurance that |
| | | segmentation controls |
| | | are effective, it is |
| | | possible that changes |
| | | to the service |
| | | provider's technology |
| | | would inadvertently |
| | | create a vulnerability |
| | | that could be |
| | | exploited across all |
| | | the service provider's |
| | | customers. |
| | | |
| | | **Good Practice** |
| | | |
| | | Effectiveness of |
| | | separation techniques |
| | | can be confirmed by |
| | | using |
| | | se |
| | | rvice-provider-created |
| | | temporary (mock-up) |
| | | environments that |
| | | represent customer |
| | | environments and |
| | | attempting to 1) |
| | | access one temporary |
| | | environment from |
| | | another environment, |
| | | and 2) access a |
| | | temporary environment |
| | | from the Internet. |
+----------------------+-----------------------+------------------------+
| **A1.1.4** The | **A1.1.4** Examine | |
| effectiveness of | the results from the | |
| logical separation | most recent | |
| controls used to | penetration test to | |
| separate customer | verify that testing | |
| environments is | confirmed the | |
| confirmed at least | effectiveness of | |
| once every six | logical separation | |
| months via | controls used to | |
| penetration testing. | separate customer | |
| | environments. | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Segmentation of | | |
| customer | | |
| environments from | | |
| other environments | | |
| is periodically | | |
| validated to be | | |
| effective. | | |
+----------------------+-----------------------+------------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+------------------------+
| The testing of | | |
| adequate separation | | |
| between customers in | | |
| a multi-tenant | | |
| service provider | | |
| environment is in | | |
| addition to the | | |
| penetration tests | | |
| specified in | | |
| Requirement 11.4.6. | | |
| | | |
| *This requirement is | | |
| a best practice | | |
| until 31 March 2025, | | |
| after which it will | | |
| be required and must | | |
| be fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+----------------------+-----------------------+------------------------+
+----------------------+-----------------------+------------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+========================+
| **A1.2** | | |
| Multi-tenant service | | |
| providers facilitate | | |
| logging and incident | | |
| response for all | | |
| customers. | | |
+----------------------+-----------------------+------------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Log information is |
| | | useful for detecting |
| | | and troubleshooting |
| | | security incidents and |
| | | is invaluable for |
| | | forensic |
| | | investigations. |
| | | Customers therefore |
| | | need to have access to |
| | | these logs. |
| | | |
| | | However, log |
| | | information can also |
| | | be used by an attacker |
| | | for reconnaissance, |
| | | and so a customer's |
| | | log information must |
| | | only be accessible by |
| | | the customer that the |
| | | log relates to. |
+----------------------+-----------------------+------------------------+
| **A1.2.1** Audit log | **A1.2.1** Examine | |
| capability is | documentation and | |
| enabled for each | system configuration | |
| customer's | settings to verify | |
| environment that is | the provider has | |
| consistent with PCI | enabled audit log | |
| DSS Requirement 10, | capability for each | |
| including: | customer environment | |
| | in accordance with | |
| - Logs are enabled | all elements | |
| for common | specified in this | |
| third-party | requirement. | |
| applications. | | |
| | | |
| - Logs are active | | |
| by default. | | |
| | | |
| - Logs are | | |
| available for | | |
| review only by | | |
| the owning | | |
| customer. | | |
| | | |
| - Log locations | | |
| are clearly | | |
| communicated to | | |
| the owning | | |
| customer. | | |
| | | |
| - Log data and | | |
| availability is | | |
| consistent with | | |
| PCI DSS | | |
| Requirement 10. | | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Log capability is | | |
| available to all | | |
| customers without | | |
| affecting the | | |
| confidentiality of | | |
| other customers. | | |
+----------------------+-----------------------+------------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | In the event of a |
| | | suspected or confirmed |
| | | breach of |
| | | confidentiality of |
| | | cardholder data, a |
| | | customer's forensic |
| | | investigator aims to |
| | | find the cause of the |
| | | breach, exclude the |
| | | attacker from the |
| | | environment, and |
| | | ensure all |
| | | unauthorized access is |
| | | removed. |
| | | |
| | | Prompt and efficient |
| | | responses to forensic |
| | | investigators' |
| | | requests can |
| | | significantly reduce |
| | | the time taken for the |
| | | investigator to secure |
| | | the customer's |
| | | environment. |
+----------------------+-----------------------+------------------------+
| **A1.2.2** Processes | **A1.2.2** Examine | |
| or mechanisms are | documented procedures | |
| implemented to | to verify that the | |
| support and/or | provider has | |
| facilitate prompt | processes or | |
| forensic | mechanisms to support | |
| investigations in | and/or facilitate a | |
| the event of a | prompt forensic | |
| suspected or | investigation of | |
| confirmed security | related servers in | |
| incident for any | the event of a | |
| customer. | suspected or | |
| | confirmed security | |
| | incident for any | |
| | customer. | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Forensic | | |
| investigation is | | |
| readily available to | | |
| all customers in the | | |
| event of a suspected | | |
| or confirmed | | |
| security incident. | | |
+----------------------+-----------------------+------------------------+
+----------------------+-----------------------+------------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+========================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Security |
| | | vulnerabilities in the |
| | | provided services can |
| | | impact the security of |
| | | all the service |
| | | provider's customers |
| | | and therefore must be |
| | | managed in accordance |
| | | with the service |
| | | provider's established |
| | | processes, with |
| | | priority given to |
| | | resolving |
| | | vulnerabilities that |
| | | have the highest |
| | | probability of |
| | | compromise. |
| | | |
| | | Customers are likely |
| | | to notice |
| | | vulnerabilities and |
| | | security |
| | | misconfigurations |
| | | while using the |
| | | service. |
| | | |
| | | Implementing secure |
| | | methods for customers |
| | | to report security |
| | | incidents and |
| | | vulnerabilities |
| | | encourages customers |
| | | to report potential |
| | | issues and enable the |
| | | provider to quickly |
| | | learn about and |
| | | address potential |
| | | issues within their |
| | | environment. |
+----------------------+-----------------------+------------------------+
| **A1.2.3** Processes | **A1.2.3** Examine | |
| or mechanisms are | documented procedures | |
| implemented for | and interview | |
| reporting and | personnel to verify | |
| addressing suspected | that the provider has | |
| or confirmed | a mechanism for | |
| security incidents | reporting and | |
| and vulnerabilities, | addressing suspected | |
| including: | or confirmed security | |
| | incidents and | |
| - Customers can | vulnerabilities, in | |
| securely report | accordance with all | |
| security | elements specified in | |
| incidents and | this requirement. | |
| vulnerabilities | | |
| to the provider. | | |
| | | |
| - The provider | | |
| addresses and | | |
| remediates | | |
| suspected or | | |
| confirmed | | |
| security | | |
| incidents and | | |
| vulnerabilities | | |
| according to | | |
| Requirement | | |
| 6.3.1. | | |
+----------------------+-----------------------+------------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+------------------------+
| Suspected or | | |
| confirmed security | | |
| incidents or | | |
| vulnerabilities are | | |
| discovered and | | |
| addressed. Customers | | |
| are informed where | | |
| appropriate. | | |
+----------------------+-----------------------+------------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+------------------------+
| *This requirement is | | |
| a best practice | | |
| until 31 March 2025, | | |
| after which it will | | |
| be required and must | | |
| be fully considered | | |
| during a PCI DSS | | |
| assessment.* | | |
+----------------------+-----------------------+------------------------+
## Appendix A2: Additional PCI DSS Requirements for Entities Using SSL/Early TLS for Card- Present POS POI Terminal Connections {#appendix-a2-additional-pci-dss-requirements-for-entities-using-sslearly-tls-for-card--present-pos-poi-terminal-connections .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| > **A2.1** POI terminals using SSL and/or early TLS are confirmed as |
| > not susceptible to known SSL/TLS exploits. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| > This Appendix applies only to entities using SSL/early TLS as a |
| > security control to protect POS POI terminals, including service |
| > providers that provide connections into POS POI terminals. |
| > |
| > Entities using SSL and early TLS for POS POI terminal connections |
| > must work toward upgrading to a strong cryptographic protocol as |
| > soon as possible. Additionally, SSL and/or early TLS must not be |
| > introduced into environments where those protocols don't already |
| > exist. At the time of publication, the known vulnerabilities are |
| > difficult to exploit in POS POI payment terminals. However, new |
| > vulnerabilities could emerge at any time, and it is up to the |
| > organization to remain up to date with vulnerability trends and |
| > determine whether it is susceptible to any known exploits. |
| > |
| > The PCI DSS requirements directly affected are: |
| |
| - **Requirement 2.2.5**: Where any insecure services, protocols, or |
| daemons are present; business justification is documented, and |
| additional security features are documented and implemented that |
| reduce the risk of using insecure services, protocols, or |
| daemons. |
| |
| - **Requirement 2.2.7**: All non-console administrative access is |
| encrypted using strong cryptography. |
| |
| - **Requirement 4.2.1**: Strong cryptography and security protocols |
| are implemented to safeguard PAN during transmission over open, |
| public networks. |
| |
| > SSL and early TLS must not be used as a security control to meet |
| > these requirements, except in the case of POS POI terminal |
| > connections, as detailed in this appendix. To support entities |
| > working to migrate from SSL/early TLS on POS POI terminals, the |
| > following provisions are included: |
| |
| - New POS POI terminal implementations must not use SSL or early |
| TLS as a security control. |
| |
| - All POS POI terminal service providers must provide a secure |
| service offering. |
| |
| - Service providers supporting existing POS POI terminal |
| implementations that use SSL and/or early TLS must have a formal |
| Risk Mitigation and Migration Plan in place. |
| |
| - POS POI terminals in card-present environments that can be |
| verified as not being susceptible to any known exploits for SSL |
| and early TLS, |
| |
| > **and the SSL/TLS termination points to which they connect**, may |
| > continue using SSL/early TLS as a security control. |
| > |
| > Requirements in this Appendix are not eligible for the Customized |
| > Approach. |
+-----------------------------------------------------------------------+
+----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+======================+
| **A2.1** POI | | |
| terminals using SSL | | |
| and/or early TLS are | | |
| confirmed as not | | |
| susceptible to known | | |
| SSL/TLS exploits. | | |
+----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | POS POI terminals |
| | | used in card-present |
| | | environments can |
| | | continue using |
| | | SSL/early TLS when |
| | | it can be shown that |
| | | the POS POI terminal |
| | | is not susceptible |
| | | to the currently |
| | | known exploits. |
| | | |
| | | **Good Practice** |
| | | |
| | | However, SSL is |
| | | outdated technology |
| | | and could be |
| | | susceptible to |
| | | additional security |
| | | vulnerabilities in |
| | | the future; it is |
| | | therefore strongly |
| | | recommended that POS |
| | | POI terminals be |
| | | upgraded to a secure |
| | | protocol as soon as |
| | | possible. If |
| | | SSL/early TLS is not |
| | | needed in the |
| | | environment, use of, |
| | | and fallback to |
| | | these versions |
| | | should be disabled. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the current |
| | | PCI SSC Information |
| | | Supplements on |
| | | SSL/Early TLS for |
| | | further guidance. |
+----------------------+-----------------------+----------------------+
| **A2.1.1** Where POS | **A2.1.1** For POS | |
| POI terminals at the | POI terminals using | |
| merchant or payment | SSL and/or early TLS, | |
| acceptance location | confirm the entity | |
| use SSL and/or early | has documentation | |
| TLS, the entity | (for example, vendor | |
| confirms the devices | documentation, | |
| are not susceptible | system/network | |
| to any known | configuration | |
| exploits for those | details) that | |
| protocols. | verifies the devices | |
| | are not susceptible | |
| | to any known exploits | |
| | for SSL/early TLS. | |
+----------------------+-----------------------+----------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+----------------------+
| This requirement is | | |
| intended to apply to | | |
| the entity with the | | |
| POS POI terminal, | | |
| such as a merchant. | | |
| This requirement is | | |
| not intended for | | |
| service providers | | |
| who serve as the | | |
| termination or | | |
| connection point to | | |
| those POS POI | | |
| terminals. | | |
| | | |
| Requirements A2.1.2 | | |
| and A2.1.3 apply to | | |
| POS POI service | | |
| providers. | | |
| | | |
| The allowance for | | |
| POS POI terminals | | |
| that are not | | |
| currently | | |
| susceptible to | | |
| exploits is based on | | |
| currently known | | |
| risks. If new | | |
| exploits are | | |
| introduced to which | | |
| POS POI terminals | | |
| are susceptible, the | | |
| POS POI terminals | | |
| will need to be | | |
| updated immediately. | | |
+----------------------+-----------------------+----------------------+
+----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | POS POI termination |
| | | points, including |
| | | but not limited to |
| | | service providers |
| | | such as acquirers or |
| | | acquirer processors, |
| | | can continue using |
| | | SSL/early TLS when |
| | | it can be shown that |
| | | the service provider |
| | | has controls in |
| | | place that mitigate |
| | | the risk of |
| | | supporting those |
| | | connections for the |
| | | service provider |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Service providers |
| | | should communicate |
| | | to all customers |
| | | using SSL/early TLS |
| | | about the risks |
| | | associated with its |
| | | use and the need to |
| | | migrate to a secure |
| | | protocol. |
| | | |
| | | **Definitions** |
| | | |
| | | The Risk Mitigation |
| | | and Migration Plan |
| | | is a document |
| | | prepared by the |
| | | entity that details |
| | | its plans for |
| | | migrating to a |
| | | secure protocol and |
| | | describes controls |
| | | the entity has in |
| | | place to reduce the |
| | | risk associated with |
| | | SSL/early TLS until |
| | | the migration is |
| | | complete. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the current |
| | | PCI SSC Information |
| | | Supplements on |
| | | SSL/early TLS for |
| | | further guidance on |
| | | Risk Mitigation and |
| | | Migration Plans. |
+----------------------+-----------------------+----------------------+
| **A2.1.2 *Additional | **A2.1.2 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only: ***All service | assessments only: | |
| providers with | ***Review the | |
| existing connection | documented Risk | |
| points to POS POI | Mitigation and | |
| terminals that use | Migration Plan to | |
| SSL and/or early TLS | verify it includes | |
| as defined in A2.1 | all elements | |
| have a formal Risk | specified in this | |
| Mitigation and | requirement. | |
| Migration Plan in | | |
| place that includes: | | |
| | | |
| - Description of | | |
| usage, including | | |
| what data is | | |
| being | | |
| transmitted, | | |
| types and number | | |
| of systems that | | |
| use and/or | | |
| support | | |
| SSL/early TLS, | | |
| and type of | | |
| environment. | | |
| | | |
| - Risk-assessment | | |
| results and | | |
| risk-reduction | | |
| controls in | | |
| place. | | |
| | | |
| - Description of | | |
| processes to | | |
| monitor for new | | |
| vulnerabilities | | |
| associated with | | |
| SSL/early TLS. | | |
| | | |
| - Description of | | |
| change control | | |
| processes that | | |
| are implemented | | |
| to ensure | | |
| SSL/early TLS is | | |
| not implemented | | |
| into new | | |
| environments. | | |
| | | |
| - Overview of | | |
| migration | | |
| project plan to | | |
| replace | | |
| SSL/early TLS at | | |
| a future date. | | |
+----------------------+-----------------------+----------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when | | |
| the entity being | | |
| assessed is a | | |
| service provider. | | |
+----------------------+-----------------------+----------------------+
+----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Customers must be |
| | | able to choose to |
| | | upgrade their POIs |
| | | to eliminate the |
| | | vulnerability in |
| | | using SSL and early |
| | | TLS. In many cases, |
| | | customers will need |
| | | to take a phased or |
| | | gradual approach to |
| | | migrate their POS |
| | | POI estate from the |
| | | insecure protocol to |
| | | a secure protocol |
| | | and so will require |
| | | the service provider |
| | | to support a secure |
| | | offering. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to the current |
| | | PCI SSC Information |
| | | Supplements on |
| | | SSL/Early TLS for |
| | | further guidance. |
+----------------------+-----------------------+----------------------+
| **A2.1.3 *Additional | **A2.1.3 *Additional | |
| requirement for | testing procedure for | |
| service providers | service provider | |
| only***: All service | assessments only: | |
| providers provide a | ***Examine system | |
| secure service | configurations and | |
| offering. | supporting | |
| | documentation to | |
| | verify the service | |
| | provider offers a | |
| | secure protocol | |
| | option for its | |
| | service. | |
+----------------------+-----------------------+----------------------+
| **Customized | | |
| Approach Objective** | | |
+----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+----------------------+-----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+----------------------+-----------------------+----------------------+
| This requirement | | |
| applies only when | | |
| the entity being | | |
| assessed is a | | |
| service provider. | | |
+----------------------+-----------------------+----------------------+
## Appendix A3: Designated Entities Supplemental Validation (DESV) {#appendix-a3-designated-entities-supplemental-validation-desv .unnumbered}
+-----------------------------------------------------------------------+
| **Sections** |
+=======================================================================+
| **A3.1** A PCI DSS compliance program is implemented. |
| |
| **A3.2** PCI DSS scope is documented and validated. |
| |
| **A3.3** PCI DSS is incorporated into business-as-usual (BAU) |
| activities. |
| |
| **A3.4** Logical access to the cardholder data environment is |
| controlled and managed. |
| |
| **A3.5** Suspicious events are identified and responded to. |
+-----------------------------------------------------------------------+
| **Overview** |
+-----------------------------------------------------------------------+
| This Appendix applies only to entities designated by a payment |
| brand(s) or acquirer as requiring additional validation of existing |
| PCI DSS requirements. An entity is required to undergo an assessment |
| according to this Appendix ONLY if instructed to do so by an acquirer |
| or a payment brand. Examples of entities that this Appendix could |
| apply to include: |
| |
| - Those storing, processing, and/or transmitting large volumes of |
| account data, |
| |
| - Those providing aggregation points for account data, or |
| |
| - Those that have suffered significant or repeated breaches of |
| account data. Additionally, other PCI standards may reference |
| completion of this Appendix. |
| |
| These supplemental validation steps are intended to provide greater |
| assurance that PCI DSS controls are maintained effectively and on a |
| continuous basis through validation of business-as-usual (BAU) |
| processes and increased validation and scoping consideration. |
| |
| ***Note**: Some requirements have defined timeframes (for example, at |
| least once every three months or at least once every six months) |
| within which certain activities are to be performed. For initial |
| assessment to this document, it is not required that an activity has |
| been performed for every such timeframe during the previous year, if |
| the assessor verifies:* |
| |
| - *The activity was performed in accordance with the applicable |
| requirement within the most recent timeframe (for example, the |
| most recent three-month or six-month period), and* |
| |
| - *The entity has documented policies and procedures for continuing |
| to perform the activity within the defined timeframe.* |
| |
| *For subsequent years after the initial assessment, an activity must |
| have been performed within each required timeframe (for example, an |
| activity required every three months must have been performed at |
| least four times during the previous year at an interval that does |
| not exceed 90 days).* |
| |
| Not all requirements in PCI DSS apply to all entities that may |
| undergo a PCI DSS assessment. It is for this reason that some PCI DSS |
| Requirements are duplicated in this appendix. Any questions about |
| this appendix should be addressed to acquirers or payment brands. |
+-----------------------------------------------------------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **A3.1** A PCI DSS | | |
| compliance program is | | |
| implemented. | | |
+-----------------------+----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Executive management |
| | | assignment of PCI |
| | | DSS compliance |
| | | responsibilities |
| | | ensures executive- |
| | | level visibility |
| | | into the PCI DSS |
| | | compliance program |
| | | and allows for the |
| | | opportunity to ask |
| | | appropriate |
| | | questions to |
| | | determine the |
| | | effectiveness of the |
| | | program and |
| | | influence strategic |
| | | priorities. |
| | | |
| | | **Good Practice** |
| | | |
| | | Executive management |
| | | may include C-level |
| | | positions, board of |
| | | directors, or |
| | | equivalent. The |
| | | specific titles will |
| | | depend on the |
| | | particular |
| | | organizational |
| | | structure. |
| | | |
| | | Responsibility for |
| | | the PCI DSS |
| | | compliance program |
| | | may be assigned to |
| | | individual roles |
| | | and/or to business |
| | | units within the |
| | | organization. |
+-----------------------+----------------------+----------------------+
| **A3.1.1** | **A3.1.1.a** Examine | |
| Responsibility is | documentation to | |
| established by | verify executive | |
| executive management | management has | |
| for the protection of | assigned overall | |
| account data and a | accountability for | |
| PCI DSS compliance | maintaining the | |
| program that | entity's PCI DSS | |
| includes: | compliance. | |
| | | |
| - Overall | | |
| accountability | | |
| for maintaining | | |
| PCI DSS | | |
| compliance. | | |
| | | |
| - Defining a | | |
| charter for a PCI | | |
| DSS compliance | | |
| program. | | |
| | | |
| - Providing updates | | |
| to executive | | |
| management and | | |
| board of | | |
| directors on PCI | | |
| DSS compliance | | |
| initiatives and | | |
| issues, including | | |
| remediation | | |
| activities, at | | |
| least once every | | |
| 12 months. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirement 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.1.1.b** Examine | |
| | the company's PCI | |
| | DSS charter to | |
| | verify it outlines | |
| | the conditions under | |
| | which the PCI DSS | |
| | compliance program | |
| | is organized. | |
+-----------------------+----------------------+----------------------+
| | **A3.1.1.c** Examine | |
| | executive management | |
| | and board of | |
| | directors meeting | |
| | minutes and/or | |
| | presentations to | |
| | ensure PCI DSS | |
| | compliance | |
| | initiatives and | |
| | remediation | |
| | activities are | |
| | communicated at | |
| | least once every 12 | |
| | months. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A formal compliance |
| | | program allows an |
| | | organization to |
| | | monitor the health |
| | | of its security |
| | | controls, be |
| | | proactive if a |
| | | control fails, and |
| | | effectively |
| | | communicate |
| | | activities and |
| | | compliance status |
| | | throughout the |
| | | organization. |
| | | |
| | | **Good Practice** |
| | | |
| | | The PCI DSS |
| | | compliance program |
| | | can be a dedicated |
| | | program or part of |
| | | overarching |
| | | compliance and/or |
| | | governance program, |
| | | and should include a |
| | | well-defined |
| | | methodology that |
| | | demonstrates |
| | | consistent and |
| | | effective |
| | | evaluation. |
| | | |
| | | Strategic business |
| | | decisions that |
| | | should be analyzed |
| | | for potential PCI |
| | | DSS impacts may |
| | | include mergers and |
| | | acquisitions, new |
| | | technology |
| | | purchases, or new |
| | | payment-acceptance |
| | | channels. |
| | | |
| | | **Definitions** |
| | | |
| | | Maintaining and |
| | | monitoring an |
| | | organization's |
| | | overall PCI DSS |
| | | compliance includes |
| | | identifying |
| | | activities to be |
| | | performed daily, |
| | | weekly, monthly, |
| | | every three months, |
| | | or annually, and |
| | | ensuring these |
| | | activities are being |
| | | performed |
| | | accordingly (for |
| | | example, using a |
| | | security |
| | | self-assessment or |
| | | PDCA methodology). |
| | | |
| | | **Examples** |
| | | |
| | | Methodologies that |
| | | support the |
| | | management of |
| | | compliance programs |
| | | include |
| | | Plan-Do-Check-Act |
| | | (PDCA), ISO 27001, |
| | | COBIT, DMAIC, and |
| | | Six |
| | | |
| | | Sigma. |
+-----------------------+----------------------+----------------------+
| **A3.1.2** A formal | **A3.1.2.a** Examine | |
| PCI DSS compliance | information security | |
| program is in place | policies and | |
| that includes: | procedures to verify | |
| | that processes are | |
| - Definition of | defined for a formal | |
| activities for | PCI DSS compliance | |
| maintaining and | program that | |
| monitoring | includes all | |
| overall PCI DSS | elements specified | |
| compliance, | in this requirement. | |
| including | | |
| business-as-usual | | |
| activities. | | |
| | | |
| - Annual PCI DSS | | |
| assessment | | |
| processes. | | |
| | | |
| - Processes for the | | |
| continuous | | |
| validation of PCI | | |
| DSS requirements | | |
| (for example, | | |
| daily, weekly, | | |
| every three | | |
| months, as | | |
| applicable per | | |
| the requirement). | | |
| | | |
| - A process for | | |
| performing | | |
| business-impact | | |
| analysis to | | |
| determine | | |
| potential PCI DSS | | |
| impacts for | | |
| strategic | | |
| business | | |
| decisions. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirements 1-12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.1.2.b** | |
| | Interview personnel | |
| | and observe | |
| | compliance | |
| | activities to verify | |
| | that a formal PCI | |
| | DSS compliance | |
| | program is | |
| | implemented in | |
| | accordance with all | |
| | elements specified | |
| | in this requirement. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The formal |
| | | definition of |
| | | specific PCI DSS |
| | | compliance roles and |
| | | responsibilities |
| | | helps to ensure |
| | | accountability and |
| | | monitoring of |
| | | ongoing PCI DSS |
| | | compliance efforts. |
| | | |
| | | **Good Practice** |
| | | |
| | | Ownership should be |
| | | assigned to |
| | | individuals with the |
| | | authority to make |
| | | risk-based |
| | | decisions, and upon |
| | | whom accountability |
| | | rests for the |
| | | specific function. |
| | | Duties should be |
| | | formally defined, |
| | | and owners should be |
| | | able to demonstrate |
| | | an understanding of |
| | | their |
| | | responsibilities and |
| | | accountability. |
| | | |
| | | Compliance roles may |
| | | be assigned to a |
| | | single owner or |
| | | multiple owners for |
| | | different |
| | | requirement |
| | | elements. |
+-----------------------+----------------------+----------------------+
| **A3.1.3** PCI DSS | **A3.1.3.a** Examine | |
| compliance roles and | information security | |
| responsibilities are | policies and | |
| specifically defined | procedures and | |
| and formally assigned | interview personnel | |
| to one or more | to verify that PCI | |
| personnel, including: | DSS compliance roles | |
| | and responsibilities | |
| - Managing PCI DSS | are specifically | |
| business-as-usual | defined and formally | |
| activities. | assigned to one or | |
| | more personnel in | |
| - Managing annual | accordance with all | |
| PCI DSS | elements of this | |
| assessments. | requirement. | |
| | | |
| - Managing | | |
| continuous | | |
| validation of PCI | | |
| DSS requirements | | |
| (for example, | | |
| daily, weekly, | | |
| every three | | |
| months, as | | |
| applicable per | | |
| the requirement). | | |
| | | |
| - Managing | | |
| business-impact | | |
| analysis to | | |
| determine | | |
| potential PCI DSS | | |
| impacts for | | |
| strategic | | |
| business | | |
| decisions. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirement 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.1.3.b** | |
| | Interview | |
| | responsible | |
| | personnel and verify | |
| | they are familiar | |
| | with and performing | |
| | their designated PCI | |
| | DSS compliance | |
| | responsibilities. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Personnel |
| | | responsible for PCI |
| | | DSS compliance have |
| | | specific training |
| | | needs exceeding that |
| | | which is typically |
| | | provided by general |
| | | security awareness |
| | | training to enable |
| | | them to perform |
| | | their role. |
| | | |
| | | **Good Practice** |
| | | |
| | | Individuals with PCI |
| | | DSS compliance |
| | | responsibilities |
| | | should receive |
| | | specialized training |
| | | that, in addition to |
| | | a general awareness |
| | | of information |
| | | security, focuses on |
| | | specific security |
| | | topics, skills, |
| | | processes, or |
| | | methodologies that |
| | | must be followed for |
| | | those individuals to |
| | | perform their |
| | | compliance |
| | | responsibilities |
| | | effectively. |
| | | |
| | | Training may be |
| | | offered by third |
| | | parties such as the |
| | | PCI SSC (for |
| | | example, PCI |
| | | Awareness, PCIP, and |
| | | ISA), payment |
| | | brands, and |
| | | acquirers, or |
| | | training may be |
| | | internal. Training |
| | | content should be |
| | | applicable for the |
| | | individual's job |
| | | function, be |
| | | current, and include |
| | | the latest security |
| | | threats and/or |
| | | version of PCI DSS. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | For additional |
| | | guidance, refer to |
| | | *Information |
| | | Supplement: Best |
| | | Practices for |
| | | Implementing a |
| | | Security Awareness |
| | | Program*. |
+-----------------------+----------------------+----------------------+
| **A3.1.4** Up-to-date | **A3.1.4.a** Examine | |
| PCI DSS and/or | information security | |
| information security | policies and | |
| training is provided | procedures to verify | |
| at least once every | that PCI DSS and/or | |
| 12 months to | information security | |
| personnel with PCI | training is required | |
| DSS compliance | at least once every | |
| responsibilities (as | 12 months for each | |
| identified in | role with PCI DSS | |
| A3.1.3). | compliance | |
| | responsibilities. | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirement 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.1.4.b** | |
| | Interview personnel | |
| | and examine | |
| | certificates of | |
| | attendance or other | |
| | records to verify | |
| | that personnel with | |
| | PCI DSS compliance | |
| | responsibility | |
| | receive up-to-date | |
| | PCI DSS and/or | |
| | similar information | |
| | security training at | |
| | least once every 12 | |
| | months. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **A3.2** PCI DSS | | |
| scope is documented | | |
| and validated. | | |
+-----------------------+----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Frequent validation |
| | | of PCI DSS scope |
| | | helps to ensure PCI |
| | | DSS scope remains up |
| | | to date and aligned |
| | | with changing |
| | | business objectives, |
| | | and therefore that |
| | | security controls |
| | | are protecting all |
| | | appropriate system |
| | | components. |
| | | |
| | | **Good Practice** |
| | | |
| | | Accurate scoping |
| | | involves critically |
| | | evaluating the CDE |
| | | and all connected |
| | | system components to |
| | | determine the |
| | | necessary coverage |
| | | for PCI DSS |
| | | requirements. |
| | | Scoping activities, |
| | | including careful |
| | | analysis and ongoing |
| | | monitoring, help to |
| | | ensure that in-scope |
| | | systems are |
| | | appropriately |
| | | secured. When |
| | | documenting account |
| | | data locations, the |
| | | entity can consider |
| | | creating a table or |
| | | spreadsheet that |
| | | includes the |
| | | following |
| | | information: |
| | | |
| | | - Data stores |
| | | (databases, |
| | | files, cloud, |
| | | etc.), including |
| | | purpose of data |
| | | storage and the |
| | | retention |
| | | period, |
| | | |
| | | - Which CHD |
| | | elements are |
| | | stored (PAN, |
| | | expiry date, |
| | | cardholder name, |
| | | and/or any |
| | | elements of SAD |
| | | prior to |
| | | completion of |
| | | authorization), |
| | | |
| | | - How data is |
| | | secured (type of |
| | | encryption and |
| | | strength, |
| | | hashing |
| | | algorithm and |
| | | strength, |
| | | truncation, |
| | | tokenization), |
| | | |
| | | - How access to |
| | | data stores is |
| | | logged, |
| | | including a |
| | | description of |
| | | logging |
| | | mechanism(s) in |
| | | use (enterprise |
| | | solution, |
| | | application |
| | | level, operating |
| | | system level, |
| | | etc.). |
| | | |
| | | *(continued on next |
| | | page)* |
+-----------------------+----------------------+----------------------+
| **A3.2.1** PCI DSS | **A3.2.1.a** Examine | |
| scope is documented | documented results | |
| and confirmed for | of scope reviews and | |
| accuracy at least | interview personnel | |
| once every three | to verify that the | |
| months and upon | reviews are | |
| significant changes | performed: | |
| to the in- scope | | |
| environment. At a | - At least once | |
| minimum, the scoping | every three | |
| validation includes: | months. | |
| | | |
| - Identifying all | - After | |
| data flows for | significant | |
| the various | changes to the | |
| payment stages | in-scope | |
| (for example, | environment. | |
| authorization, | | |
| capture, | | |
| settlement, | | |
| chargebacks, and | | |
| refunds) and | | |
| acceptance | | |
| channels (for | | |
| example, | | |
| card-present, | | |
| card-not-present, | | |
| and e-commerce). | | |
| | | |
| - Updating all | | |
| data-flow | | |
| diagrams per | | |
| Requirement | | |
| 1.2.4. | | |
| | | |
| - Identifying all | | |
| locations where | | |
| account data is | | |
| stored, | | |
| processed, and | | |
| transmitted, | | |
| including but not | | |
| limited to 1) any | | |
| locations outside | | |
| of the currently | | |
| defined CDE, 2) | | |
| applications that | | |
| process CHD, 3) | | |
| transmissions | | |
| between systems | | |
| and networks, | | |
| and 4) file | | |
| backups. | | |
| | | |
| - For any account | | |
| data found | | |
| outside of the | | |
| currently defined | | |
| CDE, either 1) | | |
| securely delete | | |
| it, 2) migrate it | | |
| into the | | |
| currently defined | | |
| CDE, or | | |
| | | |
| > 3\) expand the | | |
| > currently defined | | |
| > CDE to include it. | | |
| | | |
| - Identifying all | | |
| system components | | |
| in the CDE, | | |
| connected to the | | |
| CDE, or that | | |
| could impact | | |
| security of the | | |
| CDE. | | |
| | | |
| - Identifying all | | |
| segmentation | | |
| controls in use | | |
| and the | | |
| environment(s) | | |
| from which the | | |
| CDE is segmented, | | |
| including | | |
| justification for | | |
| environments | | |
| being out of | | |
| scope. | | |
| | | |
| - Identifying all | | |
| connections to | | |
| third-party | | |
| entities with | | |
| access to the | | |
| CDE. | | |
| | | |
| *(continued on next | | |
| page)* | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.1.b** Examine | |
| | documented results | |
| | of scope reviews | |
| | occurring at least | |
| | once every three | |
| | months to verify | |
| | that scoping | |
| | validation includes | |
| | all elements | |
| | specified in this | |
| | requirement. | |
+-----------------------+----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| - Confirming that | | In addition to |
| all identified | | internal systems and |
| data flows, | | networks, all |
| account data, | | connections from |
| system | | third-party |
| components, | | entities---for |
| segmentation | | example, business |
| controls, and | | partners, entities |
| connections from | | providing remote |
| third parties | | support services, |
| with access to | | and other service |
| the CDE are | | providers---need to |
| included in | | be identified to |
| scope. | | determine inclusion |
| | | for PCI DSS scope. |
| **PCI DSS | | Once the in-scope |
| Reference**: *Scope | | connections have |
| of PCI DSS | | been identified, the |
| Requirements, | | applicable PCI DSS |
| Requirement 12.* | | controls can be |
| | | implemented to |
| | | reduce the risk of a |
| | | third-party |
| | | connection being |
| | | used to compromise |
| | | an entity's CDE. |
| | | |
| | | A data discovery |
| | | tool or methodology |
| | | can be used to |
| | | facilitate |
| | | identifying all |
| | | sources and |
| | | locations of PAN, |
| | | and to look for PAN |
| | | that resides on |
| | | systems and networks |
| | | outside the |
| | | currently defined |
| | | CDE or in unexpected |
| | | places within the |
| | | defined CDE--- for |
| | | example, in an error |
| | | log or memory dump |
| | | file. This approach |
| | | can help ensure that |
| | | previously unknown |
| | | locations of PAN are |
| | | detected and that |
| | | the PAN is either |
| | | eliminated or |
| | | properly secured. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to |
| | | *Information |
| | | Supplement: Guidance |
| | | for PCI DSS Scoping |
| | | and Network |
| | | Segmentation* for |
| | | additional guidance. |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Changes to systems |
| | | or networks can have |
| | | a significant impact |
| | | on PCI DSS scope. |
| | | For example, changes |
| | | to network security |
| | | control rulesets can |
| | | bring whole network |
| | | segments into scope, |
| | | or new systems may |
| | | be added to the CDE |
| | | that have to be |
| | | appropriately |
| | | protected. |
| | | |
| | | A formal impact |
| | | assessment performed |
| | | in advance of a |
| | | change gives the |
| | | entity assurance |
| | | that the change will |
| | | not adversely affect |
| | | the security of the |
| | | CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | Processes to |
| | | determine the |
| | | potential impact |
| | | that changes to |
| | | systems and networks |
| | | may have on an |
| | | entity's PCI DSS |
| | | scope may be |
| | | performed as part of |
| | | a dedicated PCI DSS |
| | | compliance program |
| | | or may fall under an |
| | | entity's overarching |
| | | compliance and/or |
| | | governance program. |
+-----------------------+-----------------------+----------------------+
| **A3.2.2** PCI DSS | **A3.2.2** Examine | |
| scope impact for all | change documentation | |
| changes to systems or | and interview | |
| networks is | personnel to verify | |
| determined, including | that for each change | |
| additions of new | to systems or | |
| systems and new | networks the PCI DSS | |
| network connections. | scope impact is | |
| Processes include: | determined, and | |
| | includes all elements | |
| - Performing a | specified in this | |
| formal PCI DSS | requirement. | |
| impact | | |
| assessment. | | |
| | | |
| - Identifying | | |
| applicable PCI | | |
| DSS requirements | | |
| to the system or | | |
| network. | | |
| | | |
| - Updating PCI DSS | | |
| scope as | | |
| appropriate. | | |
| | | |
| - Documented | | |
| sign-off of the | | |
| results of the | | |
| impact assessment | | |
| by responsible | | |
| personnel (as | | |
| defined in | | |
| A3.1.3). | | |
| | | |
| **PCI DSS | | |
| Reference**: *Scope | | |
| of PCI DSS | | |
| Requirements; | | |
| Requirements 1-12* | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | It is important to |
| | | have processes to |
| | | analyze all changes |
| | | made to systems or |
| | | networks, to ensure |
| | | that all appropriate |
| | | PCI DSS controls are |
| | | applied to any |
| | | systems or networks |
| | | added to the |
| | | in-scope environment |
| | | due to a change. |
| | | |
| | | Building this |
| | | validation into |
| | | change management |
| | | processes helps |
| | | ensure that device |
| | | inventories and |
| | | configuration |
| | | standards are kept |
| | | up to date, and |
| | | security controls |
| | | are applied where |
| | | needed. |
| | | |
| | | **Good Practice** |
| | | |
| | | A change management |
| | | process should |
| | | include supporting |
| | | evidence that PCI |
| | | DSS requirements are |
| | | implemented or |
| | | preserved through an |
| | | iterative process. |
| | | |
| | | **Examples** |
| | | |
| | | PCI DSS requirements |
| | | that should be |
| | | verified include, |
| | | but are not limited |
| | | to: |
| | | |
| | | - Network diagrams |
| | | are updated to |
| | | reflect changes. |
| | | |
| | | - Systems are |
| | | configured per |
| | | configuration |
| | | standards, with |
| | | all default |
| | | passwords |
| | | changed and |
| | | unnecessary |
| | | services |
| | | disabled. |
| | | |
| | | - Systems are |
| | | protected with |
| | | required |
| | | controls--- for |
| | | example, file |
| | | integrity |
| | | monitoring, |
| | | |
| | | > anti-malware, |
| | | > patches, and audit |
| | | > logging. |
| | | |
| | | - Sensitive |
| | | authentication |
| | | data is not |
| | | stored, and that |
| | | all account data |
| | | storage is |
| | | documented and |
| | | incorporated |
| | | into |
| | | data-retention |
| | | policy and |
| | | procedures. |
| | | |
| | | - New systems are |
| | | included in the |
| | | quarterly |
| | | vulnerability |
| | | scanning |
| | | process. |
+-----------------------+-----------------------+----------------------+
| **A3.2.2.1** Upon | **A3.2.2.1** Examine | |
| completion of a | change records and | |
| change, all relevant | the affected | |
| PCI DSS requirements | systems/networks, and | |
| are confirmed to be | interview personnel | |
| implemented on all | to verify that all | |
| new or changed | relevant PCI DSS | |
| systems and networks, | requirements were | |
| and documentation is | confirmed to be | |
| updated as | implemented and | |
| applicable. | documentation updated | |
| | as part of the | |
| **PCI DSS | change. | |
| Reference**: *Scope | | |
| of PCI DSS | | |
| Requirements; | | |
| Requirement 1-12* | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | An organization's |
| | | structure and |
| | | management define |
| | | the requirements and |
| | | protocol for |
| | | effective and secure |
| | | operations. Changes |
| | | to this structure |
| | | could have negative |
| | | effects to existing |
| | | controls and |
| | | frameworks by |
| | | reallocating or |
| | | removing resources |
| | | that once supported |
| | | PCI DSS controls or |
| | | inheriting new |
| | | responsibilities |
| | | that may not have |
| | | established controls |
| | | in place. Therefore, |
| | | it is important to |
| | | revisit PCI DSS |
| | | scope and controls |
| | | when there are |
| | | changes to an |
| | | organization's |
| | | structure and |
| | | management to ensure |
| | | controls are in |
| | | place and active. |
| | | |
| | | **Examples** |
| | | |
| | | Changes to |
| | | organizational |
| | | structure include, |
| | | but are not limited |
| | | to, company mergers |
| | | or acquisitions, and |
| | | significant changes |
| | | or reassignments of |
| | | personnel with |
| | | responsibility for |
| | | security control. |
+-----------------------+-----------------------+----------------------+
| **A3.2.3** Changes to | **A3.2.3** Examine | |
| organizational | policies and | |
| structure result in a | procedures to verify | |
| formal (internal) | that a change to | |
| review of the impact | organizational | |
| to PCI DSS scope and | structure results in | |
| applicability of | formal a review of | |
| controls. | the impact on PCI DSS | |
| | scope and | |
| **PCI DSS | applicability of | |
| Reference**: | controls. | |
| *Requirement 12* | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | PCI DSS normally |
| | | requires |
| | | segmentation |
| | | controls to be |
| | | verified by |
| | | penetration testing |
| | | every twelve months. |
| | | |
| | | Validating |
| | | segmentation |
| | | controls more |
| | | frequently is likely |
| | | to discover failings |
| | | in segmentation |
| | | before they can be |
| | | exploited by an |
| | | attacker attempting |
| | | to pivot laterally |
| | | from an out-of-scope |
| | | untrusted network to |
| | | the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | Although the |
| | | requirement |
| | | specifies that this |
| | | scope validation is |
| | | carried out at least |
| | | once every six |
| | | months and after a |
| | | significant change, |
| | | this exercise should |
| | | be performed as |
| | | frequently as |
| | | possible to ensure |
| | | it remains effective |
| | | at isolating the CDE |
| | | from other networks. |
| | | |
| | | **Further |
| | | Information** |
| | | |
| | | Refer to |
| | | *Information |
| | | Supplement: |
| | | Penetration Testing |
| | | Guidance* for |
| | | additional guidance. |
+-----------------------+-----------------------+----------------------+
| **A3.2.4** If | **A3.2.4** Examine | |
| segmentation is used, | the results from the | |
| PCI DSS scope is | most recent | |
| confirmed as follows: | penetration test to | |
| | verify that the test | |
| - Per the entity's | was conducted in | |
| methodology | accordance with all | |
| defined at | elements specified in | |
| Requirement | this requirement. | |
| 11.4.1. | | |
| | | |
| - Penetration | | |
| testing is | | |
| performed on | | |
| segmentation | | |
| controls at least | | |
| once every six | | |
| months and after | | |
| any changes to | | |
| segmentation | | |
| controls/methods. | | |
| | | |
| - The penetration | | |
| testing covers | | |
| all segmentation | | |
| controls/methods | | |
| in use. | | |
| | | |
| - The penetration | | |
| testing verifies | | |
| that segmentation | | |
| controls/methods | | |
| are operational | | |
| and effective, | | |
| and isolate the | | |
| CDE from all out- | | |
| of-scope systems. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirement 11* | | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | PCI DSS requires |
| | | that, as part of the |
| | | scoping exercise, |
| | | assessed entities |
| | | must identify and |
| | | document the |
| | | existence of all |
| | | cleartext PAN in |
| | | their environments. |
| | | Implementing a data- |
| | | discovery |
| | | methodology that |
| | | identifies all |
| | | sources and |
| | | locations of |
| | | cleartext PAN and |
| | | looks for cleartext |
| | | PAN on systems and |
| | | networks outside the |
| | | currently defined |
| | | CDE or in unexpected |
| | | places within the |
| | | defined CDE---for |
| | | example, in an error |
| | | log or memory dump |
| | | file--- helps to |
| | | ensure that |
| | | previously unknown |
| | | locations of |
| | | cleartext PAN are |
| | | detected and |
| | | properly secured. |
| | | |
| | | **Examples** |
| | | |
| | | A data-discovery |
| | | process can be |
| | | performed via a |
| | | variety of methods, |
| | | including, but not |
| | | limited to 1) |
| | | commercially |
| | | available |
| | | data-discovery |
| | | software, |
| | | |
| | | 2\) an in-house |
| | | developed |
| | | data-discovery |
| | | program, or 3) a |
| | | manual search. A |
| | | combination of |
| | | methodologies may |
| | | also be used as |
| | | needed. |
| | | |
| | | Regardless of the |
| | | method used, the |
| | | goal of the effort |
| | | is to find all |
| | | sources and |
| | | locations of |
| | | cleartext PAN (not |
| | | just in the defined |
| | | CDE). |
+-----------------------+----------------------+----------------------+
| **A3.2.5** A | **A3.2.5.a** Examine | |
| data-discovery | the documented | |
| methodology is | data-discovery | |
| implemented that: | methodology to | |
| | verify it includes | |
| - Confirms PCI DSS | all elements | |
| scope. | specified in this | |
| | requirement. | |
| - Locates all | | |
| sources and | | |
| locations of | | |
| cleartext PAN at | | |
| least once every | | |
| three months and | | |
| upon significant | | |
| changes to the | | |
| CDE or processes. | | |
| | | |
| - Addresses the | | |
| potential for | | |
| cleartext PAN to | | |
| reside on systems | | |
| and networks | | |
| outside the | | |
| currently defined | | |
| CDE. | | |
| | | |
| **PCI DSS | | |
| Reference**: *Scope | | |
| of PCI DSS | | |
| Requirements* | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.5.b** Examine | |
| | results from recent | |
| | data discovery | |
| | efforts, and | |
| | interview | |
| | responsible | |
| | personnel to verify | |
| | that data discovery | |
| | is performed at | |
| | least once every | |
| | three months and | |
| | upon significant | |
| | changes to the CDE | |
| | or processes. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | A process to test |
| | | the effectiveness of |
| | | the methods used for |
| | | data discovery |
| | | ensures the |
| | | completeness and |
| | | accuracy of account |
| | | data detection. |
| | | |
| | | **Good Practice** |
| | | |
| | | For completeness, |
| | | system components in |
| | | the in- scope |
| | | networks, and |
| | | systems in |
| | | out-of-scope |
| | | networks, should be |
| | | included in the |
| | | data- discovery |
| | | process. |
| | | |
| | | The data-discovery |
| | | process should be |
| | | effective on all |
| | | operating systems |
| | | and platforms in |
| | | use. Accuracy can be |
| | | tested by placing |
| | | test PANs on system |
| | | components and file |
| | | formats in use and |
| | | confirming that the |
| | | data-discovery |
| | | method detected the |
| | | test PANs. |
+-----------------------+----------------------+----------------------+
| **A3.2.5.1** Data | **A3.2.5.1.a** | |
| discovery methods are | Interview personnel | |
| confirmed as follows: | and review | |
| | documentation to | |
| - Effectiveness of | verify: | |
| methods is | | |
| tested. | - The entity has a | |
| | process in place | |
| - Methods are able | to test the | |
| to discover | effectiveness of | |
| cleartext PAN on | methods used for | |
| all types of | data discovery. | |
| system components | | |
| and file formats | - The process | |
| in use. | includes | |
| | verifying the | |
| - The effectiveness | methods are able | |
| of data-discovery | to discover | |
| methods is | cleartext PAN on | |
| confirmed at | all types of | |
| least once every | system | |
| 12 months. | components and | |
| | file formats in | |
| **PCI DSS | use. | |
| Reference**: *Scope | | |
| of PCI DSS | | |
| Requirements* | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.5.1.b** | |
| | Examine the results | |
| | of effectiveness | |
| | tests to verify that | |
| | the effectiveness of | |
| | data- discovery | |
| | methods is confirmed | |
| | at least once every | |
| | 12 months. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Having documented |
| | | response procedures |
| | | that are followed in |
| | | the event cleartext |
| | | PAN is found outside |
| | | the CDE helps to |
| | | identify the |
| | | necessary |
| | | remediation actions |
| | | and prevent future |
| | | leaks. |
| | | |
| | | **Good Practice** |
| | | |
| | | If PAN was found |
| | | outside the CDE, an |
| | | analysis should be |
| | | performed to 1) |
| | | determine whether it |
| | | was saved |
| | | independently of |
| | | other data or with |
| | | sensitive |
| | | authentication data, |
| | | 2) to identify the |
| | | source of the data, |
| | | and 3) identify the |
| | | control gaps that |
| | | resulted in the data |
| | | being outside the |
| | | CDE. |
| | | |
| | | Entities should |
| | | consider whether |
| | | contributory |
| | | factors, such as |
| | | business processes, |
| | | user behavior, |
| | | improper system |
| | | configurations, |
| | | etc., caused the PAN |
| | | to be stored in an |
| | | unexpected location. |
| | | If such contributory |
| | | factors are present, |
| | | they should be |
| | | addressed per this |
| | | Requirement to |
| | | prevent a |
| | | recurrence. |
+-----------------------+----------------------+----------------------+
| **A3.2.5.2** Response | **A3.2.5.2.a** | |
| procedures are | Examine documented | |
| implemented to be | response procedures | |
| initiated upon the | to verify that | |
| detection of | procedures for | |
| cleartext PAN outside | responding to the | |
| the CDE to include: | detection of | |
| | cleartext PAN | |
| - Determining what | outside the CDE are | |
| to do if | defined and include | |
| cleartext PAN is | all elements | |
| discovered | specified in this | |
| outside the CDE, | requirement. | |
| including its | | |
| retrieval, secure | | |
| deletion, and/or | | |
| migration into | | |
| the currently | | |
| defined CDE, as | | |
| applicable. | | |
| | | |
| - Determining how | | |
| the data ended up | | |
| outside the CDE. | | |
| | | |
| - Remediating data | | |
| leaks or process | | |
| gaps that | | |
| resulted in the | | |
| data being | | |
| outside the CDE. | | |
| | | |
| - Identifying the | | |
| source of the | | |
| data. | | |
| | | |
| - Identifying | | |
| whether any track | | |
| data is stored | | |
| with the PANs. | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.5.2.b** | |
| | Interview personnel | |
| | and examine records | |
| | of response actions | |
| | to verify that | |
| | remediation | |
| | activities are | |
| | performed when | |
| | cleartext PAN is | |
| | detected outside the | |
| | CDE. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The use of |
| | | mechanisms to detect |
| | | and prevent |
| | | unauthorized PAN |
| | | from leaving the CDE |
| | | allows an |
| | | organization to |
| | | detect and prevent |
| | | situations that may |
| | | lead to data loss. |
| | | |
| | | **Good Practice** |
| | | |
| | | Coverage of the |
| | | mechanisms should |
| | | include, but not be |
| | | limited to, e-mails, |
| | | downloads to |
| | | removable media, and |
| | | output to printers. |
| | | |
| | | **Examples** |
| | | |
| | | Mechanisms to detect |
| | | and prevent |
| | | unauthorized loss of |
| | | cleartext PAN may |
| | | include the use of |
| | | appropriate tools |
| | | such as data loss |
| | | prevention (DLP) |
| | | solutions as well as |
| | | manual processes and |
| | | procedures. |
+-----------------------+----------------------+----------------------+
| **A3.2.6** Mechanisms | **A3.2.6.a** Examine | |
| are implemented for | documentation and | |
| detecting and | observe implemented | |
| preventing cleartext | mechanisms to verify | |
| PAN from leaving the | that the mechanisms | |
| CDE via an | are in accordance | |
| unauthorized channel, | with all elements | |
| method, or process, | specified in this | |
| including mechanisms | requirement. | |
| that are: | | |
| | | |
| - Actively running. | | |
| | | |
| - Configured to | | |
| detect and | | |
| prevent cleartext | | |
| PAN leaving the | | |
| CDE via an | | |
| unauthorized | | |
| channel, method, | | |
| or process. | | |
| | | |
| - Generating audit | | |
| logs and alerts | | |
| upon detection of | | |
| cleartext PAN | | |
| leaving the CDE | | |
| via an | | |
| unauthorized | | |
| channel, method, | | |
| or process. | | |
| | | |
| **PCI DSS | | |
| Reference**: *Scope | | |
| of PCI DSS | | |
| Requirements, | | |
| Requirement 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.6.b** Examine | |
| | audit logs and | |
| | alerts, and | |
| | interview | |
| | responsible | |
| | personnel to verify | |
| | that alerts are | |
| | investigated. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Attempts to remove |
| | | cleartext PAN via an |
| | | unauthorized |
| | | channel, method, or |
| | | process may indicate |
| | | malicious intent to |
| | | steal data, or may |
| | | be the actions of an |
| | | authorized employee |
| | | who is unaware of or |
| | | simply not following |
| | | the proper methods. |
| | | Prompt investigation |
| | | of these occurrences |
| | | can identify where |
| | | remediation needs to |
| | | be applied and |
| | | provides valuable |
| | | information to help |
| | | understand from |
| | | where the threats |
| | | are coming. |
+-----------------------+----------------------+----------------------+
| **A3.2.6.1** Response | **A3.2.6.1.a** | |
| procedures are | Examine documented | |
| implemented to be | response procedures | |
| initiated upon the | to verify that | |
| detection of attempts | procedures for | |
| to remove cleartext | responding to the | |
| PAN from the CDE via | attempted removal of | |
| an unauthorized | cleartext PAN from | |
| channel, method, or | the CDE via an | |
| process. | unauthorized | |
| | channel, method, or | |
| Response procedures | process include all | |
| include: | elements specified | |
| | in this requirement: | |
| - Procedures for | | |
| the prompt | - Procedures for | |
| investigation of | the prompt | |
| alerts by | investigation of | |
| responsible | alerts by | |
| personnel. | responsible | |
| | personnel. | |
| - Procedures for | | |
| remediating data | - Procedures for | |
| leaks or process | remediating data | |
| gaps, as | leaks or process | |
| necessary, to | gaps, as | |
| prevent any data | necessary, to | |
| loss. | prevent any data | |
| | loss. | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirement 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.2.6.1.b** | |
| | Interview personnel | |
| | and examine records | |
| | of actions taken | |
| | when cleartext PAN | |
| | is detected leaving | |
| | the CDE via an | |
| | unauthorized | |
| | channel, method, or | |
| | process and verify | |
| | that remediation | |
| | activities were | |
| | performed. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **A3.3** PCI DSS is | | |
| incorporated into | | |
| business-as-usual | | |
| (BAU) activities. | | |
+-----------------------+----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Without formal |
| | | processes for the |
| | | prompt (as soon as |
| | | possible) detection, |
| | | alerting, and |
| | | addressing of |
| | | critical security |
| | | control failures, |
| | | failures may go |
| | | undetected or remain |
| | | unresolved for |
| | | extended periods. In |
| | | addition, without |
| | | formalized time- |
| | | bound processes, |
| | | attackers will have |
| | | ample time to |
| | | compromise systems |
| | | and steal account |
| | | data from the CDE. |
| | | |
| | | **Good Practice** |
| | | |
| | | The specific types |
| | | of failures may |
| | | vary, depending on |
| | | the function of the |
| | | device system |
| | | component and |
| | | technology in use. |
| | | Typical failures |
| | | include a system |
| | | ceasing to perform |
| | | its security |
| | | function or not |
| | | functioning in its |
| | | intended manner, |
| | | such as a firewall |
| | | erasing all its |
| | | rules or going |
| | | offline. |
+-----------------------+----------------------+----------------------+
| **A3.3.1** Failures | **A3.3.1.a** Examine | |
| of critical security | documented policies | |
| control systems are | and procedures to | |
| detected, alerted, | verify that | |
| and addressed | processes are | |
| promptly, including | defined to promptly | |
| but not limited to | detect, alert, and | |
| failure of: | address critical | |
| | security control | |
| - Network security | failures in | |
| controls | accordance with all | |
| | elements specified | |
| - IDS/IPS | in this requirement. | |
| | | |
| - FIM | | |
| | | |
| - Anti-malware | | |
| solutions | | |
| | | |
| - Physical access | | |
| controls | | |
| | | |
| - Logical access | | |
| controls | | |
| | | |
| - Audit logging | | |
| mechanisms | | |
| | | |
| - Segmentation | | |
| controls (if | | |
| used) | | |
| | | |
| - Automated audit | | |
| log review | | |
| mechanisms. *This | | |
| bullet is a best | | |
| practice until | | |
| its effective | | |
| date; refer to | | |
| Applicability | | |
| Notes below for | | |
| details.* | | |
| | | |
| - Automated code | | |
| review tools (if | | |
| used). *This | | |
| bullet is a best | | |
| practice until | | |
| its effective | | |
| date; refer to | | |
| Applicability | | |
| Notes below for | | |
| details.* | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirements 1-12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.3.1.b** Examine | |
| | detection and | |
| | alerting processes, | |
| | and interview | |
| | personnel to verify | |
| | that processes are | |
| | implemented for all | |
| | critical security | |
| | controls specified | |
| | in this requirement | |
| | and that each | |
| | failure of a | |
| | critical security | |
| | control results in | |
| | the generation of an | |
| | alert. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+----------------------+----------------------+
| *The bullets above | | |
| (for automated log | | |
| review mechanisms and | | |
| automated code review | | |
| tools (if used)) are | | |
| best practices until | | |
| 31 March 2025, after | | |
| which they will be | | |
| required as part of | | |
| Requirement A3.3.1 | | |
| and must be fully | | |
| considered during a | | |
| PCI DSS assessment.* | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | If alerts from |
| | | failures of critical |
| | | security control |
| | | systems are not |
| | | responded to quickly |
| | | and effectively, |
| | | attackers may use |
| | | this time to insert |
| | | malicious software, |
| | | gain control of a |
| | | system, or steal |
| | | data from the |
| | | entity's |
| | | environment. |
| | | |
| | | **Good Practice** |
| | | |
| | | Documented evidence |
| | | (for example, |
| | | records within a |
| | | problem management |
| | | system) should |
| | | support processes |
| | | and procedures in |
| | | place that respond |
| | | to security |
| | | failures. In |
| | | addition, personnel |
| | | should be aware of |
| | | their |
| | | responsibilities in |
| | | the event of a |
| | | failure. Actions and |
| | | responses to the |
| | | failure should be |
| | | captured in the |
| | | documented evidence. |
+-----------------------+----------------------+----------------------+
| **A3.3.1.2** Failures | **A3.3.1.2.a** | |
| of any critical | Examine documented | |
| security control | policies and | |
| systems are responded | procedures and | |
| to promptly. | interview personnel | |
| Processes for | to verify processes | |
| responding to | are defined and | |
| failures in security | implemented to | |
| control systems | respond promptly to | |
| include: | a security control | |
| | failure in | |
| - Restoring | accordance with all | |
| security | elements specified | |
| functions. | in this requirement. | |
| | | |
| - Identifying and | | |
| documenting the | | |
| duration (date | | |
| and time from | | |
| start to end) of | | |
| the security | | |
| failure. | | |
| | | |
| - Identifying and | | |
| documenting the | | |
| cause(s) of | | |
| failure, | | |
| including root | | |
| cause, and | | |
| documenting | | |
| remediation | | |
| required to | | |
| address the root | | |
| cause. | | |
| | | |
| - Identifying and | | |
| addressing any | | |
| security issues | | |
| that arose during | | |
| the failure. | | |
| | | |
| - Determining | | |
| whether further | | |
| actions are | | |
| required as a | | |
| result of the | | |
| security failure. | | |
| | | |
| - Implementing | | |
| controls to | | |
| prevent the cause | | |
| of failure from | | |
| reoccurring. | | |
| | | |
| - Resuming | | |
| monitoring of | | |
| security | | |
| controls. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirements 1-12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.3.1.2.b** | |
| | Examine records to | |
| | verify that security | |
| | control failures are | |
| | documented to | |
| | include: | |
| | | |
| | - Identification | |
| | of cause(s) of | |
| | the failure, | |
| | including root | |
| | cause. | |
| | | |
| | - Duration (date | |
| | and time start | |
| | and end) of the | |
| | security | |
| | failure. | |
| | | |
| | - Details of the | |
| | remediation | |
| | required to | |
| | address the root | |
| | cause. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Hardware and |
| | | software |
| | | technologies are |
| | | constantly evolving, |
| | | and organizations |
| | | need to be aware of |
| | | changes to the |
| | | technologies they |
| | | use, as well as the |
| | | evolving threats to |
| | | those technologies. |
| | | Conducting |
| | | appropriate reviews |
| | | of these |
| | | technologies ensures |
| | | that they can |
| | | prepare for, and |
| | | manage, |
| | | vulnerabilities in |
| | | hardware and |
| | | software that will |
| | | not be remediated by |
| | | the vendor or |
| | | developer. |
| | | |
| | | **Good Practice** |
| | | |
| | | Organizations should |
| | | also consider |
| | | reviewing firmware |
| | | versions to ensure |
| | | they remain current |
| | | and supported by the |
| | | vendors. |
| | | |
| | | Organizations also |
| | | need to be aware of |
| | | changes made by |
| | | technology vendors |
| | | to their products or |
| | | processes to |
| | | understand how such |
| | | changes may impact |
| | | the organization's |
| | | use of the |
| | | technology. |
| | | |
| | | Regular reviews of |
| | | technologies that |
| | | impact or influence |
| | | PCI DSS controls can |
| | | assist with |
| | | purchasing, usage, |
| | | and deployment |
| | | strategies and |
| | | ensure controls that |
| | | rely on those |
| | | technologies remain |
| | | effective. These |
| | | reviews include, but |
| | | are not limited to, |
| | | reviewing |
| | | technologies that |
| | | are no longer |
| | | supported by the |
| | | vendor and/or no |
| | | longer meet the |
| | | security needs of |
| | | the organization. |
+-----------------------+----------------------+----------------------+
| **A3.3.2** Hardware | **A3.3.2.a** Examine | |
| and software | documented policies | |
| technologies are | and procedures and | |
| reviewed at least | interview personnel | |
| once every 12 months | to verify processes | |
| to confirm whether | are defined and | |
| they continue to meet | implemented to | |
| the organization's | review hardware and | |
| PCI DSS requirements. | software | |
| | technologies to | |
| **PCI DSS | confirm whether they | |
| Reference**: | continue to meet the | |
| *Requirements 2, 6, | organization's PCI | |
| 12.* | DSS requirements. | |
+-----------------------+----------------------+----------------------+
| | **A3.3.2.b** Review | |
| | the results of the | |
| | recent reviews of | |
| | hardware and | |
| | software | |
| | technologies to | |
| | verify reviews are | |
| | performed at least | |
| | once every 12 | |
| | months. | |
+-----------------------+----------------------+----------------------+
| | **A3.3.2.c** Review | |
| | documentation to | |
| | verify that, for any | |
| | technologies that | |
| | have been determined | |
| | to no longer meet | |
| | the organization's | |
| | PCI DSS | |
| | requirements, a plan | |
| | is in place to | |
| | remediate the | |
| | technology. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
| **Applicability | | |
| Notes** | | |
+-----------------------+----------------------+----------------------+
| The process includes | | |
| a plan for | | |
| remediating | | |
| technologies that no | | |
| longer meet the | | |
| organization's PCI | | |
| DSS requirements, up | | |
| to and including | | |
| replacement of the | | |
| technology, as | | |
| appropriate. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regularly confirming |
| | | that security |
| | | policies and |
| | | procedures are being |
| | | followed provides |
| | | assurance that the |
| | | expected controls |
| | | are active and |
| | | working as intended. |
| | | The objective of |
| | | these reviews is not |
| | | to reperform other |
| | | PCI DSS |
| | | requirements, but to |
| | | confirm that |
| | | security activities |
| | | are being performed |
| | | on an ongoing basis. |
| | | |
| | | **Good Practice** |
| | | |
| | | These reviews can |
| | | also be used to |
| | | verify that |
| | | appropriate evidence |
| | | is being |
| | | maintained---for |
| | | example, audit logs, |
| | | vulnerability scan |
| | | reports, reviews of |
| | | network security |
| | | control |
| | | rulesets---to assist |
| | | in the entity's |
| | | preparation for its |
| | | next PCI DSS |
| | | assessment. |
| | | |
| | | **Examples** |
| | | |
| | | Looking at |
| | | Requirement 1.2.7 as |
| | | one example, |
| | | Requirement A3.3.3 |
| | | is met by |
| | | confirming, at least |
| | | once every three |
| | | months, that reviews |
| | | of configurations of |
| | | network security |
| | | controls have |
| | | occurred at the |
| | | required frequency. |
| | | On the other hand, |
| | | Requirement 1.2.7 is |
| | | met by reviewing |
| | | those configurations |
| | | as specified in the |
| | | requirement. |
+-----------------------+----------------------+----------------------+
| **A3.3.3** Reviews | **A3.3.3.a** Examine | |
| are performed at | policies and | |
| least once every | procedures to verify | |
| three months to | that processes are | |
| verify BAU activities | defined for | |
| are being followed. | reviewing and | |
| Reviews are performed | verifying BAU | |
| by personnel assigned | activities in | |
| to the PCI DSS | accordance with all | |
| compliance program | elements specified | |
| (as identified in | in this requirement. | |
| A3.1.3), and include: | | |
| | | |
| - Confirmation that | | |
| all BAU | | |
| activities, | | |
| including A3.2.2, | | |
| A3.2.6, and | | |
| A3.3.1, are being | | |
| performed. | | |
| | | |
| - Confirmation that | | |
| personnel are | | |
| following | | |
| security policies | | |
| and operational | | |
| procedures (for | | |
| example, daily | | |
| log reviews, | | |
| ruleset reviews | | |
| for network | | |
| security | | |
| controls, | | |
| configuration | | |
| standards for new | | |
| systems). | | |
| | | |
| - Documenting how | | |
| the reviews were | | |
| completed, | | |
| including how all | | |
| BAU activities | | |
| were verified as | | |
| being in place. | | |
| | | |
| - Collection of | | |
| documented | | |
| evidence as | | |
| required for the | | |
| annual PCI DSS | | |
| assessment. | | |
| | | |
| - Review and | | |
| sign-off of | | |
| results by | | |
| personnel | | |
| assigned | | |
| responsibility | | |
| for the PCI DSS | | |
| compliance | | |
| program, as | | |
| identified in | | |
| A3.1.3. | | |
| | | |
| - Retention of | | |
| records and | | |
| documentation for | | |
| at least 12 | | |
| months, covering | | |
| all BAU | | |
| activities. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirements 1-12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.3.3.b** | |
| | Interview | |
| | responsible | |
| | personnel and | |
| | examine records of | |
| | reviews to verify | |
| | that: | |
| | | |
| | - Reviews are | |
| | performed by | |
| | personnel | |
| | assigned to the | |
| | PCI DSS | |
| | compliance | |
| | program. | |
| | | |
| | - Reviews are | |
| | performed at | |
| | least once every | |
| | three months. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
+-----------------------+-----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+=======================+======================+
| **A3.4** Logical | | |
| access to the | | |
| cardholder data | | |
| environment is | | |
| controlled and | | |
| managed. | | |
+-----------------------+-----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | Regular review of |
| | | access rights helps |
| | | to detect excessive |
| | | access rights |
| | | remaining after user |
| | | job responsibilities |
| | | change, system |
| | | functions change, or |
| | | other modifications. |
| | | If excessive user |
| | | rights are not |
| | | revoked in due time, |
| | | they may be used by |
| | | malicious users for |
| | | unauthorized access. |
| | | |
| | | This review provides |
| | | another opportunity |
| | | to ensure that |
| | | accounts for all |
| | | terminated users |
| | | have been removed |
| | | (if any were missed |
| | | at the time of |
| | | termination), as |
| | | well as to ensure |
| | | that any third |
| | | parties that no |
| | | longer need access |
| | | have had their |
| | | access terminated. |
+-----------------------+-----------------------+----------------------+
| **A3.4.1** User | **A3.4.1** Interview | |
| accounts and access | responsible personnel | |
| privileges to in- | and examine | |
| scope system | supporting | |
| components are | documentation to | |
| reviewed at least | verify that: | |
| once every six months | | |
| to ensure user | - User accounts and | |
| accounts and access | access privileges | |
| privileges remain | are reviewed at | |
| appropriate based on | least every six | |
| job function, and | months. | |
| that all access is | | |
| authorized. | - Reviews confirm | |
| | that access is | |
| **PCI DSS | appropriate based | |
| Reference**: | on job function | |
| *Requirement 7* | and that all | |
| | access is | |
| | authorized. | |
+-----------------------+-----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+-----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+-----------------------+----------------------+
+-----------------------+----------------------+----------------------+
| **Requirements and | | **Guidance** |
| Testing Procedures** | | |
+=======================+======================+======================+
| **A3.5** Suspicious | | |
| events are identified | | |
| and responded to. | | |
+-----------------------+----------------------+----------------------+
| **Defined Approach | **Defined Approach | **Purpose** |
| Requirements** | Testing Procedures** | |
| | | The ability to |
| | | identify attack |
| | | patterns and |
| | | undesirable behavior |
| | | across systems---for |
| | | example, using |
| | | centrally managed or |
| | | automated |
| | | log-correlation |
| | | tools--- is critical |
| | | in preventing, |
| | | detecting, or |
| | | minimizing the |
| | | impact of a data |
| | | compromise. The |
| | | presence of logs in |
| | | all environments |
| | | allows thorough |
| | | tracking, alerting, |
| | | and analysis when |
| | | something goes |
| | | wrong. |
| | | |
| | | Determining the |
| | | cause of a |
| | | compromise is very |
| | | difficult, if not |
| | | impossible, without |
| | | a process to |
| | | corroborate |
| | | information from |
| | | critical system |
| | | components and |
| | | systems that perform |
| | | security functions, |
| | | such as network |
| | | security controls, |
| | | IDS/IPS, and file |
| | | integrity monitoring |
| | | (FIM) systems. Thus, |
| | | logs for all |
| | | critical system |
| | | components and |
| | | systems that perform |
| | | security functions |
| | | need to be |
| | | collected, |
| | | correlated, and |
| | | maintained. This |
| | | could include using |
| | | software products |
| | | and service |
| | | methodologies to |
| | | provide real-time |
| | | analysis, alerting, |
| | | and reporting, such |
| | | as security |
| | | information and |
| | | event management |
| | | (SIEM), FIM, or |
| | | change detection. |
+-----------------------+----------------------+----------------------+
| **A3.5.1** A | **A3.5.1.a** Examine | |
| methodology is | documentation and | |
| implemented for the | interview personnel | |
| prompt identification | to verify a | |
| of attack patterns | methodology is | |
| and undesirable | defined and | |
| behavior across | implemented to | |
| systems that | identify attack | |
| includes: | patterns and | |
| | undesirable behavior | |
| - Identification of | across systems in a | |
| anomalies or | prompt manner, and | |
| suspicious | includes all | |
| activity as it | elements specified | |
| occurs. | in this requirement. | |
| | | |
| - Issuance of | | |
| prompt alerts | | |
| upon detection of | | |
| suspicious | | |
| activity or | | |
| anomaly to | | |
| responsible | | |
| personnel. | | |
| | | |
| - Response to | | |
| alerts in | | |
| accordance with | | |
| documented | | |
| response | | |
| procedures. | | |
| | | |
| **PCI DSS | | |
| Reference**: | | |
| *Requirements 10, 12* | | |
+-----------------------+----------------------+----------------------+
| | **A3.5.1.b** Examine | |
| | incident response | |
| | procedures and | |
| | interview | |
| | responsible | |
| | personnel to verify | |
| | that: | |
| | | |
| | - On-call | |
| | personnel | |
| | receive prompt | |
| | alerts. | |
| | | |
| | - Alerts are | |
| | responded to per | |
| | documented | |
| | response | |
| | procedures. | |
+-----------------------+----------------------+----------------------+
| **Customized Approach | | |
| Objective** | | |
+-----------------------+----------------------+----------------------+
| This requirement is | | |
| not eligible for the | | |
| customized approach. | | |
+-----------------------+----------------------+----------------------+
# Appendix B Compensating Controls {#appendix-b-compensating-controls .unnumbered}
> Compensating controls may be considered when an entity cannot meet a
> PCI DSS requirement explicitly as stated, due to legitimate and
> documented technical or business constraints but has sufficiently
> mitigated the risk associated with the requirement through
> implementation of other, or compensating, controls.
>
> Compensating controls must satisfy the following criteria:
1. Meet the intent and rigor of the original PCI DSS requirement.
2. Provide a similar level of defense as the original PCI DSS
requirement, such that the compensating control sufficiently offsets
the risk that the original PCI DSS requirement was designed to
defend against. To understand the intent of a requirement, see *the
Customized Approach Objective* for most PCI DSS requirements. If a
requirement is not eligible for the Customized Approach and
therefore does not have a Customized Approach Objective, refer to
the **Purpose** in the Guidance column for that requirement.
3. Be "above and beyond" other PCI DSS requirements. (Simply being in
compliance with other PCI DSS requirements is not a compensating
control.)
4. When evaluating "above and beyond" for compensating controls,
consider the following:
> ***Note:** All compensating controls must be reviewed and validated
> for sufficiency by the assessor who conducts the PCI DSS assessment.
> The effectiveness of a compensating control is dependent on the
> specifics of the environment in which the control is implemented, the
> surrounding security controls, and the configuration of the control.
> Entities should be aware that a given compensating control will not be
> effective in all environments.*
a. Existing PCI DSS requirements CANNOT be considered as compensating
controls if they are already required for the item under review. For
example, passwords for non-console administrative access must be
sent encrypted to mitigate the risk of intercepting cleartext
administrative passwords. An entity cannot use other PCI DSS
password requirements (intruder lockout, complex passwords, etc.) to
compensate for lack of encrypted passwords, since those other
password requirements do not mitigate the risk of interception of
cleartext passwords. Also, the other password controls are already
PCI DSS requirements for the item under review (passwords).
b. Existing PCI DSS requirements MAY be considered as compensating
controls if they are required for another area but are not required
for the item under review.
c. Existing PCI DSS requirements may be combined with new controls to
become a compensating control. For example, if a company is unable
to address a vulnerability that is exploitable through a network
interface because a security update is not yet available from a
vendor, a compensating control could consist of controls that
include all of the following: 1) internal network segmentation, 2)
limiting network access to the vulnerable interface to only required
devices (IP address or MAC address filtering), and 3) IDS/IPS
monitoring of all traffic destined to the vulnerable interface.
```{=html}
<!-- -->
```
5. Address the additional risk imposed by not adhering to the PCI DSS
requirement.
6. Address the requirement currently and in the future. A compensating
control cannot address a requirement that was missed in the past
(for example, where performance of a task was required two quarters
ago, but that task was not performed).
> The assessor is required to thoroughly evaluate compensating controls
> during each annual PCI DSS assessment to confirm that each
> compensating control adequately addresses the risk that the original
> PCI DSS requirement was designed to address, per items 1-6 above.
>
> To maintain compliance, processes and controls must be in place to
> ensure compensating controls remain effective after the assessment is
> complete. Additionally, compensating control results must be
> documented in the applicable report for the assessment (for example, a
> Report on Compliance or a Self-Assessment Questionnaire) in the
> corresponding PCI DSS requirement section, and included when the
> applicable report is submitted to the requesting organization.
# Appendix C Compensating Controls Worksheet
> The entity must use this worksheet to define compensating controls for
> any requirement where compensating controls are used to meet a PCI DSS
> requirement. Note that compensating controls should also be documented
> in accordance with instructions in the Report on Compliance in the
> corresponding PCI DSS requirement section.
>
> ***Note:** Only entities that have legitimate and documented
> technological or business constraints can consider the use of
> compensating controls to achieve compliance.*
###### Requirement Number and Definition: {#requirement-number-and-definition .unnumbered}
------------------------------------------------------------------------
**Information Required** **Explanation**
----------------------- ------------------------ -----------------------
**1. Constraints** Document the legitimate
technical or business
constraints precluding
compliance with the
original requirement.
**2. Definition of Define the compensating
Compensating Controls** controls: explain how
they address the
objectives of the
original control and the
increased risk, if any.
**3. Objective** Define the objective of
the original control
(for example, the
Customized Approach
Objective).
Identify the objective
met by the compensating
control *(note: this can
be, but is not required
to be, the stated
Customized Approach
Objective for the PCI
DSS requirement).*
**4. Identified Risk** Identify any additional
risk posed by the lack
of the original control.
**5. Validation of Define how the
Compensating Controls** compensating controls
were validated and
tested.
**6. Maintenance** Define process(es) and
controls in place to
maintain compensating
controls.
------------------------------------------------------------------------
# Appendix D Customized Approach {#appendix-d-customized-approach .unnumbered}
> This approach is intended for entities that decide to meet a PCI DSS
> requirement's stated Customized Approach Objective in a way that does
> not strictly follow the defined requirement. The customized approach
> allows an entity to take a strategic approach to meeting a
> requirement's Customized Approach Objective, so it can determine and
> design the security controls needed to meet the objective in a manner
> unique for that organization.
>
> **The entity** implementing a customized approach must satisfy the
> following criteria:
- Document and maintain evidence about each customized control,
including all information specified in the Controls Matrix Template
in Appendix E1.
- Perform and document a targeted risk analysis (PCI DSS Requirement
12.3.2) for each customized control, including all information
specified in the Targeted Risk Analysis Template in Appendix E2.
- Perform testing of each customized control to prove effectiveness,
and document testing performed, methods used, what was tested, when
testing was performed, and results of testing in the controls
matrix.
- Monitor and maintain evidence about the effectiveness of each
customized control.
- Provide completed controls matrix(es), targeted risk analysis,
testing evidence, and evidence of customized control effectiveness
to its assessor.
> **The assessor** performing an assessment of customized controls must
> satisfy the following criteria:
- Review the entity's controls matrix(es), targeted risk analysis, and
evidence of control effectiveness to fully understand the customized
control(s) and to verify the entity meets all Customized Approach
documentation and evidence requirements.
- Derive and document the appropriate testing procedures needed to
conduct thorough testing of each customized control.
- Test each customized control to determine whether the entity's
implementation 1) meets the requirement's Customized Approach
Objective and 2) results in an "in place" finding for the
requirement.
- At all times, QSAs maintain independence requirements defined in the
QSA Qualification Requirements. This means if a QSA is involved in
designing or implementing a customized control, that QSA does not
also derive testing procedures for, assess, or assist with the
assessment of that customized control.
> The entity and its assessor are expected to work together to ensure 1)
> they agree that the customized control(s) fully meets the customized
> approach objective, 2) the assessor fully understands the customized
> control, and 3) the entity understands the derived testing the
> assessor will perform.
>
> Use of the customized approach must be completed by a QSA or ISA and
> documented in accordance with instructions in the Report on Compliance
> (ROC) Template and following the instructions in the *FAQs for use
> with PCI DSS v4.0 ROC Template* available on the PCI SSC website.
>
> Entities that complete a Self-Assessment Questionnaire are not
> eligible to use a customized approach; however, these entities may
> elect to have a QSA or ISA perform their assessment and document it in
> a ROC Template.
>
> The use of the customized approach may be regulated by organizations
> that manage compliance programs (for example, payment brands and
> acquirers). Therefore, questions about use of a customized approach
> must be referred to those organizations, including, for example,
> whether an entity is required to use a QSA, or may use an ISA to
> complete an assessment using the customized approach.
>
> ***Note:** Compensating controls are not an option with the customized
> approach. Because the customized approach allows an entity to
> determine and design the controls needed to meet a requirement's
> Customized Approach Objective, the entity is expected to effectively
> implement the controls it designed for that requirement without
> needing to also implement alternate, compensating controls.*
# Appendix E Sample Templates to Support Customized Approach
> This appendix contains example templates for the controls matrix and a
> targeted risk analysis, to be documented by the entity as part of the
> customized approach. These templates are examples of formats that
> could be used. *While it is not required that entities follow the
> specific formats provided in this appendix, the entity's control
> matrix and targeted risk analysis must include all the information as
> defined in these templates.*
>
> **E1 Sample Controls Matrix Template**
>
> The following is a sample controls matrix template that an entity may
> use to document their customized implementation.
>
> As described in *Appendix D: Customized Approach*, entities using the
> customized approach must complete a controls matrix to provide details
> for each implemented control that explain what is implemented, how the
> entity has determined that the controls meet the stated objective of a
> PCI DSS requirement, how the control provides at least the equivalent
> level of protection as would be achieved by meeting the defined
> requirement, and how the entity has assurance about the effectiveness
> of the control on an ongoing basis.
>
> The assessor uses the information within each controls matrix to plan
> and prepare for the assessment.
>
> This sample controls matrix template includes the minimum information
> to be documented by the entity and provided to the assessor for a
> customized validation. While it is not required that this specific
> template be used, it is required that the entity's customized approach
> documentation includes all information defined in this template, and
> that the entity provides this exact information to its assessor.
>
> **The controls matrix does not replace the need for the assessor to
> independently develop appropriate testing procedures for validating
> the implemented controls.** The assessor must still perform the
> necessary testing to verify the controls meet the objective of the
> requirement, are effective, and are properly maintained. The controls
> matrix also does not replace the reporting requirements for customized
> validations as specified in the ROC Template.
>
> The controls matrix must include at least the information in the
> following table.
+--------------------------------+------------+-----------------------+
| > **Sample Controls Matrix | | |
| > Template for PCI DSS | | |
| > Requirements met via the | | |
| > Customized Approach To be | | |
| > completed by the entity | | |
| > being assessed** | | |
+================================+============+=======================+
| Customized control | \<Entity | |
| name/identifier | defines | |
| | how they | |
| | want to | |
| | refer to | |
| | this | |
| | control\> | |
+--------------------------------+------------+-----------------------+
| PCI DSS Requirement(s) number | R | Objective: Objective: |
| and objective(s) that is met | equirement | |
| with this control(s) | #: | |
| | R | |
| | equirement | |
| | #: | |
+--------------------------------+------------+-----------------------+
+--------------------------------+-------------------------------------+
| > **Sample Controls Matrix | |
| > Template for PCI DSS | |
| > Requirements met via the | |
| > Customized Approach To be | |
| > completed by the entity | |
| > being assessed** | |
+================================+=====================================+
| **Details of control(s)** | |
+--------------------------------+-------------------------------------+
| **What** is the implemented | \<Entity describes what the control |
| control(s)? | is and what it does\> |
+--------------------------------+-------------------------------------+
| **Where** is the control(s) | \<Entity identifies locations of |
| implemented? | facilities and system components |
| | where control is implemented and |
| | managed\> |
+--------------------------------+-------------------------------------+
| **When** is the control(s) | \<Entity details how frequently the |
| performed? | control is performed -- for |
| | example, runs continuously in real |
| | time or is scheduled to run at NN |
| | times and at XX intervals\> |
+--------------------------------+-------------------------------------+
| **Who** has overall | \<Entity includes details of |
| responsibility and | individual personnel/roles with |
| accountability for the | responsibility and accountability |
| control(s)? | for this control\> |
+--------------------------------+-------------------------------------+
| **Who** is involved in | \<Entity includes details of |
| managing, maintaining, and | individual personnel/roles and/or |
| monitoring the control(s)? | teams, as applicable, that manage, |
| | maintain, and monitor the control\> |
+--------------------------------+-------------------------------------+
| ***[For each]{.underline}* PCI | |
| DSS requirement the control(s) | |
| is used for, the entity | |
| provides details of the | |
| following:** | |
+--------------------------------+-------------------------------------+
| Entity describes how the | \<Entity describes how the control |
| implemented control(s) meets | meets the stated customized |
| the stated | approach objective of the PCI DSS |
| | requirement, and summarizes related |
| ***Customized Approach | results\> |
| Objective*** of the PCI DSS | |
| requirement. | |
+--------------------------------+-------------------------------------+
| Entity describes testing **it | \<Entity describes the testing it |
| performed** and the results of | performed to prove the control |
| that testing that demonstrates | meets the stated objective of the |
| the control(s) meets the | PCI DSS requirement, and summarizes |
| objective of the applicable | related results\> |
| requirement. | |
+--------------------------------+-------------------------------------+
| Entity briefly describes the | \<Entity briefly describes the |
| results of the separate | results of its risk analysis for |
| targeted risk analysis **it | this control, which is detailed |
| performed** that explains the | separately in the Targeted Risk |
| control(s) implemented and | Analysis\> |
| describes how the results | |
| verify the control(s) provides | |
| at least an equivalent level | |
| of protection as the defined | |
| approach for the applicable | |
| PCI DSS requirement. *See the | |
| separate Targeted Risk | |
| Analysis Template for details | |
| on how to document this risk | |
| analysis*. | |
+--------------------------------+-------------------------------------+
+--------------------------------+-------------------------------------+
| > **Sample Controls Matrix | |
| > Template for PCI DSS | |
| > Requirements met via the | |
| > Customized Approach To be | |
| > completed by the entity | |
| > being assessed** | |
+================================+=====================================+
| Entity describes the measures | \<Entity describes how it ensures |
| **it has implemented** to | the control is maintained and how |
| ensure the control(s) is | the control\'s effectiveness is |
| maintained and its | assured.\> |
| effectiveness is assured on an | |
| ongoing basis. *For example, | |
| how the entity monitors for | |
| control effectiveness, how | |
| control failures are detected | |
| and responded to, and the | |
| actions taken.* | |
+--------------------------------+-------------------------------------+
> **E2 Sample Targeted Risk Analysis Template**
>
> The following is a sample targeted risk analysis template an entity
> may use for their customized implementation. *While it is not required
> that an entity follow this specific format, its customized approach
> documentation must include all the information defined in this
> template.*
>
> As described in *Appendix D: Customized Approach* and in accordance
> with PCI DSS Requirement 12.3.2, an entity using the customized
> approach must provide a detailed targeted risk analysis for each
> requirement the entity is meeting with the customized approach. The
> risk analysis defines the risk, evaluates the effect on security if
> the defined requirement is not met, and describes how the entity has
> determined that the controls provide at least an equivalent level of
> protection as provided by the defined PCI DSS requirement.
>
> The assessor uses the information in the targeted risk analysis to
> plan and prepare for the assessment. In completing a targeted risk
> analysis for a customized approach, it is important to remember that:
>
> ***Note:** The term "mischief" as used in this targeted risk analysis
> (for example, in 1.3 in the table below) refers to an occurrence or
> event that negatively affects the security posture of the entity.
> Examples of this are the absence of a policy, the failure to conduct a
> vulnerability scan, or that malware executes in the entity's
> environment.*
- The asset being protected is the cardholder data that is stored,
processed, or transmitted by the entity.
- The threat actor is highly motivated and capable. The motivation and
capability of threat actors tends to increase in relation to the
volume of cardholder data that a successful attack will realize.
- The likelihood that an entity will be targeted by threat actors
increases as the entity stores, processes, or transmits greater
volumes of cardholder data.
- The mischief is directly related to the objective. For example, if
the objective is "malicious
> software cannot execute", the mischief is that malicious software
> executes; if the objective is "day-to-day responsibilities for
> performing all the activities are allocated", the mischief is that the
> responsibilities are not allocated.
>
> This sample targeted risk analysis template includes the minimum
> information to be documented by the entity and provided to the
> assessor for a customized validation. While it is not required that
> this specific template be used, it is required that the entity's
> customized approach documentation include all information defined in
> this template, and that the entity provides this exact information to
> its assessor.
>
> The targeted risk analysis must include at least the information in
> the following table.
+-------------------------+--------------------------------------------+
| > **Sample Targeted | |
| > Risk Analysis for PCI | |
| > DSS Requirements met | |
| > via the Customized | |
| > Approach To be | |
| > completed by the | |
| > entity being | |
| > assessed** | |
+=========================+============================================+
| **Item** | **Details** |
+-------------------------+--------------------------------------------+
| **1. Identify the | |
| requirement** | |
+-------------------------+--------------------------------------------+
| **1.1** Identify the | \<Entity identifies the requirement\> |
| PCI DSS requirement as | |
| written. | |
+-------------------------+--------------------------------------------+
| **1.2** Identify the | \<Entity identifies the objective of the |
| objective of the PCI | requirement\> |
| DSS requirement as | |
| written. | |
+-------------------------+--------------------------------------------+
| **1.3** Describe the | \<Entity describes the mischief\> |
| mischief that the | |
| requirement was | \<Entity describes the effect on its |
| designed to prevent | security if the objective is not |
| | successfully met by the entity.\> |
| | |
| | \<Entity describes which security |
| | fundamentals would not be in place, or |
| | what a threat actor may be able to do if |
| | the objective is not successfully met by |
| | the entity.\> |
+-------------------------+--------------------------------------------+
| **2. Describe the | |
| proposed solution** | |
+-------------------------+--------------------------------------------+
| **2.1** Customized | \<Entity identifies the customized control |
| control name/identifier | as documented in the Controls Matrix.\> |
+-------------------------+--------------------------------------------+
| **2.2** What parts of | \<Entity identifies what elements of the |
| the requirement as | requirement will not be met by the defined |
| written will change in | approach and so will be covered by |
| the proposed solution? | customized approach. This could be as |
| | small as changing the periodicity of a |
| | requirement, or the implementation of a |
| | completely different set of controls to |
| | meet the objective.\> |
+-------------------------+--------------------------------------------+
| **2.3** How will the | \<Entity describes how the controls |
| proposed solution | detailed in the Controls Matrix will |
| prevent the mischief? | prevent the mischief identified in 1.3.\> |
+-------------------------+--------------------------------------------+
+-------------------------+---------+---+-------+----+--------+-----+
| > **Sample Targeted | | | | | | |
| > Risk Analysis for PCI | | | | | | |
| > DSS Requirements met | | | | | | |
| > via the Customized | | | | | | |
| > Approach To be | | | | | | |
| > completed by the | | | | | | |
| > entity being | | | | | | |
| > assessed** | | | | | | |
+=========================+=========+===+=======+====+========+=====+
| **Item** | **De | | | | | |
| | tails** | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
| **3. Analyze any | | | | | | |
| changes to the | | | | | | |
| LIKELIHOOD of the | | | | | | |
| mischief occurring, | | | | | | |
| leading to a breach in | | | | | | |
| confidentiality of | | | | | | |
| cardholder data** | | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
| **3.1** Describe the | Entity | | | | | |
| factors detailed in the | des | | | | | |
| Control Matrix that | cribes: | | | | | |
| affect the likelihood | | | | | | |
| of the mischief | - How | | | | | |
| occurring. | suc | | | | | |
| | cessful | | | | | |
| | the | | | | | |
| | c | | | | | |
| | ontrols | | | | | |
| | | | | | | |
| | will | | | | | |
| | be | | | | | |
| | at | | | | | |
| | pre | | | | | |
| | venting | | | | | |
| | the | | | | | |
| | m | | | | | |
| | ischief | | | | | |
| | | | | | | |
| | - How | | | | | |
| | the | | | | | |
| | c | | | | | |
| | ontrols | | | | | |
| | d | | | | | |
| | etailed | | | | | |
| | in | | | | | |
| | the | | | | | |
| | | | | | | |
| | Control | | | | | |
| | | | | | | |
| | Matrix | | | | | |
| | | | | | | |
| | reduce | | | | | |
| | the | | | | | |
| | lik | | | | | |
| | elihood | | | | | |
| | of | | | | | |
| | the | | | | | |
| | m | | | | | |
| | ischief | | | | | |
| | oc | | | | | |
| | curring | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
| **3.2** Describe the | Entity | | | | | |
| reasons the mischief | des | | | | | |
| may still occur after | cribes: | | | | | |
| the application of the | | | | | | |
| customized control. | - The | | | | | |
| | | | | | | |
| | typical | | | | | |
| | | | | | | |
| | reasons | | | | | |
| | for | | | | | |
| | the | | | | | |
| | | | | | | |
| | control | | | | | |
| | to | | | | | |
| | | | | | | |
| | fail, | | | | | |
| | the | | | | | |
| | lik | | | | | |
| | elihood | | | | | |
| | of | | | | | |
| | | | | | | |
| | this, | | | | | |
| | and | | | | | |
| | how | | | | | |
| | | | | | | |
| | could | | | | | |
| | it | | | | | |
| | be | | | | | |
| | pr | | | | | |
| | evented | | | | | |
| | | | | | | |
| | - How | | | | | |
| | re | | | | | |
| | silient | | | | | |
| | the | | | | | |
| | e | | | | | |
| | ntity's | | | | | |
| | pr | | | | | |
| | ocesses | | | | | |
| | and | | | | | |
| | | | | | | |
| | systems | | | | | |
| | are | | | | | |
| | for | | | | | |
| | de | | | | | |
| | tecting | | | | | |
| | | | | | | |
| | that | | | | | |
| | the | | | | | |
| | con | | | | | |
| | trol(s) | | | | | |
| | are | | | | | |
| | not | | | | | |
| | op | | | | | |
| | erating | | | | | |
| | no | | | | | |
| | rmally? | | | | | |
| | | | | | | |
| | - How | | | | | |
| | a | | | | | |
| | | | | | | |
| | threat | | | | | |
| | | | | | | |
| | actor | | | | | |
| | | | | | | |
| | could | | | | | |
| | | | | | | |
| | bypass | | | | | |
| | | | | | | |
| | this | | | | | |
| | | | | | | |
| | control | | | | | |
| | -- | | | | | |
| | | | | | | |
| | what | | | | | |
| | | | | | | |
| | steps | | | | | |
| | | | | | | |
| | would | | | | | |
| | | | | | | |
| | they | | | | | |
| | | | | | | |
| | need | | | | | |
| | to | | | | | |
| | | | | | | |
| | take, | | | | | |
| | how | | | | | |
| | | | | | | |
| | hard | | | | | |
| | is | | | | | |
| | it, | | | | | |
| | | | | | | |
| | would | | | | | |
| | the | | | | | |
| | | | | | | |
| | threat | | | | | |
| | | | | | | |
| | actor | | | | | |
| | be | | | | | |
| | d | | | | | |
| | etected | | | | | |
| | | | | | | |
| | before | | | | | |
| | the | | | | | |
| | | | | | | |
| | control | | | | | |
| | | | | | | |
| | failed? | | | | | |
| | How | | | | | |
| | has | | | | | |
| | | | | | | |
| | this | | | | | |
| | | | | | | |
| | been | | | | | |
| | | | | | | |
| | dete | | | | | |
| | rmined? | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
| **3.3** To what extent | M | □ | No | □ | Mi | □ |
| do the controls | ischief | | c | | schief | |
| detailed in the | more | | hange | | less | |
| customized approach | likely | | | | likely | |
| represent a change in | to | | | | to | |
| the likelihood of the | occur | | | | occur | |
| mischief occurring when | | | | | | |
| compared with the | | | | | | |
| defined approach | | | | | | |
| requirement? | | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
| **3.4** Provide the | Entity | | | | | |
| reasoning for your | pr | | | | | |
| assessment of the | ovides: | | | | | |
| change in likelihood | | | | | | |
| that the mischief | - The | | | | | |
| occurs once the | | | | | | |
| customized controls are | justif | | | | | |
| in place. | ication | | | | | |
| | for | | | | | |
| | the | | | | | |
| | ass | | | | | |
| | essment | | | | | |
| | doc | | | | | |
| | umented | | | | | |
| | at | | | | | |
| | | | | | | |
| | 3.3. | | | | | |
| | | | | | | |
| | - The | | | | | |
| | c | | | | | |
| | riteria | | | | | |
| | and | | | | | |
| | | | | | | |
| | values | | | | | |
| | | | | | | |
| | used | | | | | |
| | for | | | | | |
| | the | | | | | |
| | ass | | | | | |
| | essment | | | | | |
| | doc | | | | | |
| | umented | | | | | |
| | at | | | | | |
| | | | | | | |
| | 3.3. | | | | | |
+-------------------------+---------+---+-------+----+--------+-----+
+-------------------------+---------+------+-------------------+-----+
| > **Sample Targeted | | | | |
| > Risk Analysis for PCI | | | | |
| > DSS Requirements met | | | | |
| > via the Customized | | | | |
| > Approach To be | | | | |
| > completed by the | | | | |
| > entity being | | | | |
| > assessed** | | | | |
+=========================+=========+======+===================+=====+
| **Item** | **De | | | |
| | tails** | | | |
+-------------------------+---------+------+-------------------+-----+
| **4. Analyze any | | | | |
| changes to the IMPACT | | | | |
| of unauthorized access | | | | |
| to account data** | | | | |
+-------------------------+---------+------+-------------------+-----+
| **4.1** For the scope | ** | *Max | **4.1.2** Number | * |
| of system components | 4.1.1** | imum | of PANs processed | Tot |
| that this solution | Number | at | or transmitted | al* |
| covers what volume of | of | any | over a 12-month | |
| account data would be | stored | one | period | |
| at risk of unauthorized | PANs | t | | |
| access if the solution | | ime* | | |
| failed? | | | | |
+-------------------------+---------+------+-------------------+-----+
| **4.2** Description of | Impact | | | |
| how the customized | to the | | | |
| controls will directly: | payment | | | |
| | ec | | | |
| - Reduce the number | osystem | | | |
| of individual PANs | is | | | |
| compromised if a | d | | | |
| threat actor is | irectly | | | |
| successful, and/or | related | | | |
| | to the | | | |
| - Allow quicker | number | | | |
| notification of the | of | | | |
| PANs compromised to | a | | | |
| the card brands. | ccounts | | | |
| | comp | | | |
| | romised | | | |
| | and how | | | |
| | quickly | | | |
| | any | | | |
| | comp | | | |
| | romised | | | |
| | PANs | | | |
| | can be | | | |
| | blocked | | | |
| | by the | | | |
| | card | | | |
| | issuer. | | | |
| | | | | |
| | Entity | | | |
| | de | | | |
| | scribes | | | |
| | how the | | | |
| | cus | | | |
| | tomized | | | |
| | c | | | |
| | ontrols | | | |
| | achieve | | | |
| | the | | | |
| | fo | | | |
| | llowing | | | |
| | if any | | | |
| | of the | | | |
| | cus | | | |
| | tomized | | | |
| | co | | | |
| | ntrols: | | | |
| | | | | |
| | - | | | |
| | Reduce | | | |
| | the | | | |
| | | | | |
| | volume | | | |
| | of | | | |
| | car | | | |
| | dholder | | | |
| | | | | |
| | data | | | |
| | | | | |
| | that | | | |
| | is | | | |
| | | | | |
| | stored, | | | |
| | pro | | | |
| | cessed, | | | |
| | or | | | |
| | | | | |
| | tran | | | |
| | smitted | | | |
| | and | | | |
| | th | | | |
| | erefore | | | |
| | | | | |
| | reduce | | | |
| | | | | |
| | what | | | |
| | is | | | |
| | av | | | |
| | ailable | | | |
| | to | | | |
| | a | | | |
| | suc | | | |
| | cessful | | | |
| | | | | |
| | threat | | | |
| | | | | |
| | actor, | | | |
| | | | | |
| | and/or | | | |
| | | | | |
| | - D | | | |
| | ecrease | | | |
| | the | | | |
| | | | | |
| | time | | | |
| | to | | | |
| | det | | | |
| | ection, | | | |
| | | | | |
| | notif | | | |
| | ication | | | |
| | of | | | |
| | | | | |
| | comp | | | |
| | romised | | | |
| | ac | | | |
| | counts, | | | |
| | and | | | |
| | | | | |
| | cont | | | |
| | ainment | | | |
| | of | | | |
| | the | | | |
| | | | | |
| | threat | | | |
| | | | | |
| | actor. | | | |
+-------------------------+---------+------+-------------------+-----+
| **5. Risk approval and | | | | |
| review** | | | | |
+-------------------------+---------+------+-------------------+-----+
| **5.1** I have reviewed | A | | | |
| the above risk analysis | member | | | |
| and I agree that the | of | | | |
| use of the proposed | ex | | | |
| customized approach as | ecutive | | | |
| detailed provides at | man | | | |
| least an equivalent | agement | | | |
| level of protection as | must | | | |
| the defined approach | review | | | |
| for the applicable PCI | and | | | |
| DSS requirement. | agree | | | |
| | to the | | | |
| | p | | | |
| | roposed | | | |
| | cus | | | |
| | tomized | | | |
| | ap | | | |
| | proach. | | | |
| | | | | |
| | \ | | | |
| | <Member | | | |
| | of | | | |
| | e | | | |
| | ntity's | | | |
| | ex | | | |
| | ecutive | | | |
| | man | | | |
| | agement | | | |
| | signs | | | |
| | that it | | | |
| | r | | | |
| | eviewed | | | |
| | and | | | |
| | agreed | | | |
| | to the | | | |
| | cus | | | |
| | tomized | | | |
| | a | | | |
| | pproach | | | |
| | doc | | | |
| | umented | | | |
| | he | | | |
| | rein.\> | | | |
+-------------------------+---------+------+-------------------+-----+
| **5.2** This risk | The | | | |
| analysis must be | risk | | | |
| reviewed and updated no | a | | | |
| later than: | nalysis | | | |
| | should | | | |
| | be | | | |
| | r | | | |
| | eviewed | | | |
| | at | | | |
| | least | | | |
| | every | | | |
| | twelve | | | |
| | months | | | |
| | and | | | |
| | more | | | |
| | fre | | | |
| | quently | | | |
| | if the | | | |
| | cus | | | |
| | tomized | | | |
| | a | | | |
| | pproach | | | |
| | itself | | | |
| | is time | | | |
| | limited | | | |
| | (for | | | |
| | e | | | |
| | xample, | | | |
| | because | | | |
| | there | | | |
| | is a | | | |
| | planned | | | |
| | change | | | |
| | in | | | |
| | tech | | | |
| | nology) | | | |
| | or if | | | |
| | other | | | |
| | factors | | | |
| | dictate | | | |
| | a | | | |
| | needed | | | |
| | change. | | | |
| | In the | | | |
| | event | | | |
| | of an | | | |
| | unsc | | | |
| | heduled | | | |
| | risk | | | |
| | review, | | | |
| | detail | | | |
| | the | | | |
| | reason | | | |
| | the | | | |
| | review | | | |
| | oc | | | |
| | curred. | | | |
| | | | | |
| | \ | | | |
| | <Entity | | | |
| | in | | | |
| | dicates | | | |
| | date | | | |
| | the | | | |
| | t | | | |
| | argeted | | | |
| | risk | | | |
| | a | | | |
| | nalysis | | | |
| | was | | | |
| | r | | | |
| | eviewed | | | |
| | and | | | |
| | upd | | | |
| | ated.\> | | | |
+-------------------------+---------+------+-------------------+-----+
# Appendix F Leveraging the PCI Software Security Framework to Support Requirement 6 {#appendix-f-leveraging-the-pci-software-security-framework-to-support-requirement-6 .unnumbered}
> PCI DSS Requirement 6 defines requirements for the development and
> maintenance of secure systems and software. Because the PCI SSC Secure
> Software Standard and the Secure SLC Standard (collectively, the
> Software Security Framework) include rigorous software security
> requirements, the use of bespoke and custom software that is developed
> and maintained in accordance with either standard can help the entity
> to meet several requirements in PCI DSS Requirement 6 without having
> to perform additional detailed testing, and may also support use of
> the Customized Approach for other requirements. For details, see
> [Table
> 7.](#table-7.-leveraging-the-pci-software-security-framework-to-support-requirement-6)
>
> ***Note**: This support for meeting Requirement 6 applies only to
> software that is specifically developed and maintained in accordance
> with the Secure Software Standard or the Secure SLC Standard; it does
> not extend to other software or system components in scope for
> Requirement 6.*
##### Table 7. Leveraging the PCI Software Security Framework to Support Requirement 6 {#table-7.-leveraging-the-pci-software-security-framework-to-support-requirement-6 .unnumbered}
+--------------------+------------------------+------------------------+
| > **PCI DSS | > **How PCI DSS | **How PCI DSS |
| > Requirements** | > Requirements Apply | Requirements Apply to |
| | > to Software | Software Developed and |
| | > Developed and | Maintained in |
| | > Maintained in | Accordance with the |
| | > Accordance with the | Secure SLC Standard** |
| | > Secure Software | |
| | > Standard** | |
+====================+========================+========================+
| **6.1** Processes | PCI DSS | |
| and mechanisms for | r | |
| performing | equirements/objectives | |
| activities in | apply as usual. | |
| Requirement 6 are | | |
| defined and | | |
| understood. | | |
+--------------------+------------------------+------------------------+
| **6.2** Bespoke | > PCI DSS Requirement | PCI DSS Requirement |
| and custom | > 6.2.4 can be | 6.2 can be considered |
| software is | > considered in place | in place for software |
| developed | > for software that is | that is developed and |
| securely. | > developed and | maintained in |
| | > maintained in | accordance with the |
| | > accordance with the | Secure SLC Standard. |
| | > Secure Software | |
| | > Standard. | |
+--------------------+------------------------+------------------------+
| **6.3** Security | PCI DSS | |
| vulnerabilities | r | |
| are identified and | equirements/objectives | |
| promptly | apply as usual. | |
| addressed. | | |
| | Software developed and | |
| | maintained in | |
| | accordance with the | |
| | Secure SLC Standard | |
| | may support the | |
| | customized approach | |
| | for Requirement 6.3 | |
| | objectives. | |
| | | |
| | > While use of | |
| | > software developed | |
| | > and maintained in | |
| | > accordance with the | |
| | > Secure SLC Standard | |
| | > provides assurance | |
| | > that the vendor | |
| | > makes security | |
| | > patches and software | |
| | > updates available in | |
| | > a timely manner, | |
| | > **the entity retains | |
| | > responsibility** for | |
| | > ensuring that | |
| | > patches and updates | |
| | > are installed in | |
| | > accordance with PCI | |
| | > DSS requirements. | |
+--------------------+------------------------+------------------------+
+--------------------+------------------------+------------------------+
| > **PCI DSS | > **How PCI DSS | **How PCI DSS |
| > Requirements** | > Requirements Apply | Requirements Apply to |
| | > to Software | Software Developed and |
| | > Developed and | Maintained in |
| | > Maintained in | Accordance with the |
| | > Accordance with the | Secure SLC Standard** |
| | > Secure Software | |
| | > Standard** | |
+====================+========================+========================+
| **6.4** | PCI DSS | |
| Public-facing web | r | |
| applications are | equirements/objectives | |
| protected against | apply as usual. | |
| attacks. | | |
+--------------------+------------------------+------------------------+
| **6.5** Changes to | PCI DSS | |
| all system | r | |
| components are | equirements/objectives | |
| managed securely. | apply as usual. | |
| | | |
| | Software developed and | |
| | maintained in | |
| | accordance with the | |
| | Secure SLC Standard | |
| | may support the | |
| | customized approach | |
| | for Requirement 6.5 | |
| | objectives. | |
| | | |
| | > While use of | |
| | > software developed | |
| | > and maintained in | |
| | > accordance with the | |
| | > Secure SLC Standard | |
| | > provides assurance | |
| | > that the vendor | |
| | > follows change | |
| | > management | |
| | > procedures during | |
| | > development of | |
| | > software and related | |
| | > updates, **the | |
| | > entity retains | |
| | > responsibility** for | |
| | > ensuring that | |
| | > software and other | |
| | > changes to system | |
| | > components are | |
| | > implemented into its | |
| | > production | |
| | > environment in | |
| | > accordance with PCI | |
| | > DSS requirements. | |
+--------------------+------------------------+------------------------+
### *Use of Bespoke and Custom Software Developed and Maintained by a Secure SLC Qualified Vendor* {#use-of-bespoke-and-custom-software-developed-and-maintained-by-a-secure-slc-qualified-vendor .unnumbered}
> When validating the use of software developed and maintained by a
> Secure SLC Qualified Vendor to meet PCI DSS Requirement 6.2 and
> support the Customized Approach for Requirements 6.3 and 6.5, the
> assessor must confirm that the following is met:
- The software vendor has a current listing on the PCI SSC List of
Secure SLC Qualified Vendors---that is, the validation has not
expired.
- The software was developed and is being maintained using software
lifecycle management practices that were assessed as part of the
software vendor's validation.
- The entity is following the implementation guidance provided by the
Secure SLC Qualified Vendor.
### *Use of Bespoke and Custom Software Developed in Accordance with the Secure SLC Standard* {#use-of-bespoke-and-custom-software-developed-in-accordance-with-the-secure-slc-standard .unnumbered}
> Entities that internally develop software solely for their use or that
> develop software for use by a single entity may choose to engage a
> Secure SLC Assessor to assess their software lifecycle management
> practices against the Secure SLC Standard. The Secure SLC Assessor
> will document the results of the assessment in a Secure SLC Report on
> Compliance (ROC) and a Secure SLC Attestation of Compliance (AOC).
>
> Software that is developed and maintained following software lifecycle
> management practices provides the same support for PCI DSS Requirement
> 6 as software developed and maintained by a Secure SLC Qualified
> Vendor, if those practices were assessed by a Secure SLC Assessor and
> confirmed to meet the Secure SLC Standard requirements, with the
> results documented in a Secure SLC ROC and AOC.
### *Validating the Use of the Secure SLC Standard* {#validating-the-use-of-the-secure-slc-standard .unnumbered}
> When validating the use of software developed and maintained in
> accordance with the Secure SLC Standard to meet PCI DSS Requirement
>
> 6.2 and support customized approach for Requirements 6.3 and 6.5, the
> assessor must confirm that the following are met:
- The software lifecycle management practices were assessed by a
Secure SLC Assessor and confirmed to meet all Secure SLC Standard
requirements with the results documented in a Secure SLC Report on
Compliance (ROC) and Secure SLC Attestation of Compliance (AOC).
- The software was developed and maintained using the software
lifecycle management practices covered by the Secure SLC assessment.
- A full Secure SLC assessment of the software lifecycle management
practices was completed within the previous 36 months. Additionally,
if the most recent full Secure SLC assessment occurred more than 12
months ago, an Annual Attestation was provided by the
developer/vendor within the previous 12 months that confirms
continued adherence to Secure SLC Standard for the software
lifecycle management practices in use.
### *Validating the Use of the Secure Software Standard* {#validating-the-use-of-the-secure-software-standard .unnumbered}
> When validating the use of software developed and maintained in
> accordance with the Secure Software Standard to meet PCI DSS
> Requirement 6.2.4 and support customized approach for Requirements 6.3
> and 6.5, the assessor must confirm that the following are met:
- The secure software assessment was conducted by a Secure Software
Assessor and confirmed to meet all requirements in the Secure
Software Standard with the results documented in a Secure Software
Report on Validation (ROV) and Secure Software Attestation of
Validation (AOV).
- The software was developed and is being maintained using the
software lifecycle management practices that were covered by the
Secure Software assessment.
- A full Secure Software assessment was completed within the previous
36 months. Additionally, if the most recent full Secure Software
assessment occurred more than 12 months ago, an Annual Attestation
was provided by the developer/vendor within the previous 12 months
that confirms continued adherence to Secure Software Standard.
# Appendix G PCI DSS Glossary of Terms, Abbreviations, and Acronyms {#appendix-g-pci-dss-glossary-of-terms-abbreviations-and-acronyms .unnumbered}
+-----------+----------------------------------------------------------+
| **Term** | **Definition** |
+===========+==========================================================+
| > ** | Also referred to as "user ID," "account ID," or |
| Account** | "application ID." Used to identify an individual or |
| | process on a computer system. See |
| | |
| | *Authentication Credentials* and *Authentication |
| | Factor*. |
+-----------+----------------------------------------------------------+
| > | Account data consists of cardholder data and/or |
| **Account | sensitive authentication data. See *Cardholder Data* and |
| > Data** | *Sensitive Authentication Data*. |
+-----------+----------------------------------------------------------+
| > **A | Also referred to as "merchant bank," "acquiring bank," |
| cquirer** | or "acquiring financial institution." Entity, typically |
| | a financial institution, that processes payment card |
| | transactions for merchants and is defined by a payment |
| | brand as an acquirer. Acquirers are subject to payment |
| | brand rules and procedures regarding merchant |
| | compliance. See *Payment Processor*. |
+-----------+----------------------------------------------------------+
| > **Admin | Elevated or increased privileges granted to an account |
| istrative | for that account to manage systems, networks, and/or |
| > | applications. |
| Access** | |
| | Administrative access can be assigned to an individual's |
| | account or a built-in system account. Accounts with |
| | administrative access are often referred to as |
| | "superuser," "root," "administrator," "admin," |
| | "sysadmin," or "supervisor-state," depending on the |
| | particular operating system and organizational |
| | structure. |
+-----------+----------------------------------------------------------+
| > **AES** | Acronym for "Advanced Encryption Standard." See *Strong |
| | Cryptography.* |
+-----------+----------------------------------------------------------+
| > | Acronym for "American National Standards Institute." |
| **ANSI** | |
+-----------+----------------------------------------------------------+
| > **Anti- | Software that is designed to detect, and remove, block, |
| Malware** | or contain various forms of malicious software. |
+-----------+----------------------------------------------------------+
| > **AOC** | Acronym for "Attestation of Compliance." The AOC is the |
| | official PCI SSC form for merchants and service |
| | providers to attest to the results of a PCI DSS |
| | assessment, as documented in a Self-Assessment |
| | Questionnaire (SAQ) or Report on Compliance (ROC). |
+-----------+----------------------------------------------------------+
| > []{#_b | Includes all purchased, custom, and bespoke software |
| ookmark62 | programs or groups of programs, including both internal |
| > .anch | and external (for example, web) applications. |
| or}**Appl | |
| ication** | |
+-----------+----------------------------------------------------------+
| > **Ap | Also referred to as "service accounts." Accounts that |
| plication | execute processes or perform tasks on a computer system |
| > and | or in an application. These accounts usually have |
| > System | elevated privileges that are required to perform |
| > A | specialized tasks or functions and are not typically |
| ccounts** | accounts used by an individual. |
+-----------+----------------------------------------------------------+
| > **ASV** | Acronym for "Approved Scanning Vendor." Company approved |
| | by the PCI SSC to conduct external vulnerability |
| | scanning services. |
+-----------+----------------------------------------------------------+
| > **Audit | Also referred to as "audit trail." Chronological record |
| > Log** | of system activities. Provides an independently |
| | verifiable trail sufficient to permit reconstruction, |
| | review, and examination of sequence of environments and |
| | activities surrounding or leading to operation, |
| | procedure, or event in a transaction from inception to |
| | final results. |
+-----------+----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| ** | Process of verifying identity of an individual, device, |
| Authenti | or process. Authentication typically occurs with one or |
| cation** | more authentication factors. See *Account, Authentication |
| | Credential,* and *Authentication Factor.* |
+----------+-----------------------------------------------------------+
| **Authen | Combination of the user ID or account ID plus the |
| tication | authentication factor(s) used to authenticate an |
| Cred | individual, device, or process. See |
| ential** | |
| | *Account* and *Authentication Factor.* |
+----------+-----------------------------------------------------------+
| **Authen | The element used to prove or verify the identity of an |
| tication | individual or process on a computer system. |
| Factor** | Authentication typically occurs with one or more of the |
| | following authentication factors: |
| | |
| | - Something you know, such as a password or passphrase |
| | |
| | - Something you have, such as a token device or smart |
| | card |
| | |
| | - Something you are, such as a biometric element. |
| | |
| | The ID (or account) and authentication factor together |
| | are considered authentication credentials." See *Account* |
| | and *Authentication Credential.* |
+----------+-----------------------------------------------------------+
| * | In the context of access control, authorization is the |
| *Authori | granting of access or other rights to a user, program, or |
| zation** | process. Authorization defines what an individual or |
| | program can do after successful authentication. |
| | |
| | In the context of a payment card transaction, |
| | authorization refers to the authorization process, which |
| | completes when a merchant receives a transaction response |
| | (for example, an approval or decline). |
+----------+-----------------------------------------------------------+
| **BAU** | Acronym for "Business as Usual." |
+----------+-----------------------------------------------------------+
| * | *Bespoke software* is developed for the entity by a third |
| *Bespoke | party on the entity's behalf and per the entity's |
| and | specifications. |
| Custom | |
| So | *Custom software* is developed by the entity for its own |
| ftware** | use. |
+----------+-----------------------------------------------------------+
| **Card | A physical device, often attached to a legitimate |
| S | card-reading device, designed to illegitimately capture |
| kimmer** | and/or store the information from a payment card. |
+----------+-----------------------------------------------------------+
| **Card | Also referred to as Card Validation Code or Value, or |
| Veri | Card Security Code. For PCI DSS purposes, it is the |
| fication | three- or four-digit value printed on the front or back |
| Code** | of a payment card. May be referred to as CAV2, CVC2, |
| | CVN2, CVV2, or CID according to the individual |
| | Participating Payment Brands. For more information, |
| | contact the Participating Payment Brands. |
+----------+-----------------------------------------------------------+
| **Card | Customer to which a payment card is issued to or any |
| holder** | individual authorized to use the payment card. |
+----------+-----------------------------------------------------------+
| **Ca | At a minimum, cardholder data consists of the full PAN. |
| rdholder | Cardholder data may also appear in the form of the full |
| Data | PAN plus any of the following: cardholder name, |
| (CHD)** | expiration date and/or service code. |
| | |
| | See *Sensitive Authentication Data* for additional data |
| | elements that might be transmitted or processed (but not |
| | stored) as part of a payment transaction. |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **CDE** | Acronym for "Cardholder Data Environment." The CDE is |
| | comprised of: |
| | |
| | - The system components, people, and processes that |
| | store, process, or transmit cardholder data or |
| | sensitive authentication data and/or |
| | |
| | - System components that may not store, process, or |
| | transmit CHD/SAD but have unrestricted connectivity |
| | to system components that store, process, or transmit |
| | CHD/SAD. |
+----------+-----------------------------------------------------------+
| **CERT** | Acronym for "Computer Emergency Response Team." |
+----------+-----------------------------------------------------------+
| **Change | Processes and procedures to review, test, and approve |
| C | changes to systems and software for impact before |
| ontrol** | implementation. |
+----------+-----------------------------------------------------------+
| **CIS** | Acronym for "Center for Internet Security." |
+----------+-----------------------------------------------------------+
| **C | Unencrypted data. |
| leartext | |
| Data** | |
+----------+-----------------------------------------------------------+
| **Colu | Technique or technology (either software or hardware) for |
| mn-Level | encrypting contents of a specific column in a database |
| Database | versus the full contents of the entire database. |
| Encr | Alternatively, see *Disk Encryption* and *File-Level |
| yption** | Encryption*. |
+----------+-----------------------------------------------------------+
| **Co | Description of products that are stock items not |
| mmercial | specifically customized or designed for a specific |
| Off-the- | customer or user and are readily available for use. |
| Shelf | |
| (COTS)** | |
+----------+-----------------------------------------------------------+
| **Comp | See PCI DSS Appendices B and C. |
| ensating | |
| Co | |
| ntrols** | |
+----------+-----------------------------------------------------------+
| **Comp | Also referred to as "data compromise" or "data breach." |
| romise** | Intrusion into a computer system where unauthorized |
| | disclosure/theft, modification, or destruction of |
| | cardholder data is suspected. |
+----------+-----------------------------------------------------------+
| **C | Directly connected screen and/or keyboard which permits |
| onsole** | access and control of a server, mainframe computer, or |
| | other system type. See *Non-Console Access*. |
+----------+-----------------------------------------------------------+
| **Co | Individual cardholder purchasing goods, services, or |
| nsumer** | both. |
+----------+-----------------------------------------------------------+
| ** | A system or technology that is deemed by the entity to be |
| Critical | of particular importance. For example, a critical system |
| s | may be essential for the performance of a business |
| ystems** | operation or for a security function to be maintained. |
| | Examples of critical systems often include security |
| | systems, public-facing devices and systems, databases, |
| | and systems that store, process, or transmit cardholder |
| | data. |
+----------+-----------------------------------------------------------+
| **Crypt | Also referred to as "encryption algorithm." A clearly |
| ographic | specified reversible mathematical process used for |
| Alg | transforming cleartext data to encrypted data, and vice |
| orithm** | versa. See *Strong Cryptography.* |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **Crypt | A parameter used in conjunction with a cryptographic |
| ographic | algorithm that is used for operations such as: |
| Key** | |
| | - Transforming cleartext data into ciphertext data, |
| | |
| | - Transforming ciphertext data into cleartext data, |
| | |
| | - A digital signature computed from data, |
| | |
| | - Verifying a digital signature computed from data, |
| | |
| | - An authentication code computed from data, or |
| | |
| | - An exchange agreement of a shared secret. See *Strong |
| | Cryptography.* |
+----------+-----------------------------------------------------------+
| **Crypt | Key generation is one of the functions within key |
| ographic | management. The following documents provide recognized |
| Key | guidance on proper key generation: |
| Gene | |
| ration** | - *NIST Special Publication 800-133: Recommendation for |
| | Cryptographic Key Generation* |
| | |
| | - *ISO 11568-2 Financial services --- Key management |
| | (retail) --- Part 2: Symmetric ciphers, their key |
| | management and life cycle* |
| | |
| | - 4.3 Key generation |
| | |
| | - *ISO 11568-4 Financial services --- Key management |
| | (retail) --- Part 4: Asymmetric cryptosystems --- Key |
| | management and life cycle* |
| | |
| | - 6.2 Key life cycle stages --- Generation |
| | |
| | - *European Payments Council EPC 342-08 Guidelines on |
| | Algorithms Usage and Key Management* |
| | |
| | - 4.1.1 Key generation \[for symmetric algorithms\] |
| | |
| | - 4.2.1 Key generation \[for asymmetric |
| | algorithms\]. |
+----------+-----------------------------------------------------------+
| **Crypt | The set of processes and mechanisms which support |
| ographic | cryptographic key establishment and maintenance, |
| Key | including replacing older keys with new keys as |
| Mana | necessary. |
| gement** | |
+----------+-----------------------------------------------------------+
| **Crypto | The time span during which a cryptographic key can be |
| period** | used for its defined purpose. Often defined in terms of |
| | the period for which the key is active and/or the amount |
| | of ciphertext that has been produced by the key, and |
| | according to industry best practices and guidelines (for |
| | example, *NIST Special Publication 800-57*). |
+----------+-----------------------------------------------------------+
| **Cu | See PCI DSS section: *8 Approaches for Implementing and |
| stomized | Validating PCI DSS.* |
| Ap | |
| proach** | |
+----------+-----------------------------------------------------------+
| **CVSS** | Acronym for "Common Vulnerability Scoring System." Refer |
| | to *ASV Program Guide* for more information. |
+----------+-----------------------------------------------------------+
| **D | A diagram showing how data flows through an application, |
| ata-Flow | system, or network. |
| D | |
| iagram** | |
+----------+-----------------------------------------------------------+
| * | Login account predefined in a system, application, or |
| *Default | device to permit initial access when system is first put |
| A | into service. Additional default accounts may also be |
| ccount** | generated by the system as part of the installation |
| | process. |
+----------+-----------------------------------------------------------+
----------------------------------------------------------------------------
**Term** **Definition**
---------------- -----------------------------------------------------------
**Default Password on system administration, user, or service
Password** accounts predefined in a system, application, or device;
usually associated with default account. Default accounts
and passwords are published and well known, and therefore
easily guessed.
**Defined See PCI DSS section: *8 Approaches for Implementing and
Approach** Validating PCI DSS.*
**Disk Technique or technology (either software or hardware) for
Encryption** encrypting all stored data on a device (for example, a hard
disk or flash drive). Alternatively, File-Level Encryption
or Column-Level Database Encryption is used to encrypt
contents of specific files or columns.
**DMZ** Abbreviation for "demilitarized zone." Physical or logical
sub-network that provides an additional layer of security
to an organization's internal private network.
**DNS** Acronym for "Domain Name System."
**Dual Control** Process of using two or more separate entities (usually
persons) operating in concert to protect sensitive
functions or information. Both entities are equally
responsible for the physical protection of materials
involved in vulnerable transactions. No single person is
permitted to access or use the materials (for example, the
cryptographic key). For manual key generation, conveyance,
loading, storage, and retrieval, dual control requires
dividing knowledge of the key among the entities. See
*Split Knowledge*.
**ECC** Acronym for "Elliptic Curve Cryptography." See *Strong
Cryptography*.
**E-commerce A server that redirects a customer browser from a
(web) merchant's website to a different location for payment
Redirection processing during an ecommerce transaction.
Server**
**Encryption** The (reversible) transformation of data by a cryptographic
algorithm to produce cipher text, i.e., to hide the
information content of the data. See *Strong Cryptography*.
**Encryption See *Cryptographic Algorithm*.
Algorithm**
**Entity** Term used to represent the corporation, organization, or
business which is undergoing a PCI DSS assessment.
**File Integrity A change-detection solution that checks for changes,
Monitoring additions, and deletions to critical files, and notifies
(FIM)** when such changes are detected.
**File-Level Technique or technology (either software or hardware) for
Encryption** encrypting the full contents of specific files.
Alternatively, see *Disk Encryption* and *Column-Level
Database Encryption*.
**Firewall** Hardware and/or software technology that protects network
resources from unauthorized access. A firewall permits or
denies computer traffic between networks with different
security levels based upon a set of rules and other
criteria.
----------------------------------------------------------------------------
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **For | Also referred to as "computer forensics." As it relates |
| ensics** | to information security, the application of investigative |
| | tools and analysis techniques to gather evidence from |
| | computer resources to determine the cause of data |
| | compromises. |
| | |
| | Investigations into compromises of payment data are |
| | typically conducted by a PCI Forensic Investigator (PFI). |
+----------+-----------------------------------------------------------+
| **FTP** | Acronym for "File Transfer Protocol." Network protocol |
| | used to transfer data from one computer to another |
| | through a public network such as the Internet. FTP is |
| | widely viewed as an insecure protocol because passwords |
| | and file contents are sent unprotected and in clear text. |
| | FTP can be implemented securely via SSH or other |
| | technology. |
+----------+-----------------------------------------------------------+
| **H | A method to protect data that converts data into a |
| ashing** | fixed-length message digest. Hashing is a one-way |
| | (mathematical) function in which a non-secret algorithm |
| | takes any arbitrary length message as input and produces |
| | a fixed length output (usually called a "hash code" or |
| | "message digest"). Hash functions are required to have |
| | the following properties: |
| | |
| | - It is computationally infeasible to determine the |
| | original input given only the hash code, |
| | |
| | - It is computationally infeasible to find two inputs |
| | that give the same hash code. |
+----------+-----------------------------------------------------------+
| **HSM** | Acronym for "hardware security module" or "host security |
| | module." A physically and logically protected hardware |
| | device that provides a secure set of cryptographic |
| | services, used for cryptographic key-management functions |
| | and/or the decryption of account data. |
+----------+-----------------------------------------------------------+
| **IDS** | Acronym for "intrusion-detection system." |
+----------+-----------------------------------------------------------+
| **Index | A random value from a table of random values that |
| Token** | corresponds to a given PAN. |
+----------+-----------------------------------------------------------+
| **Int | The process of an individual providing authentication |
| eractive | credentials to directly log into an application or system |
| Login** | account. |
+----------+-----------------------------------------------------------+
| **IPS** | Acronym for "intrusion prevention system." |
+----------+-----------------------------------------------------------+
| **ISO** | Acronym for "International Organization for |
| | Standardization." |
+----------+-----------------------------------------------------------+
| ** | Also referred to as "issuing bank" or "issuing financial |
| Issuer** | institution." Entity that issues payment cards or |
| | performs, facilitates, or supports issuing services, |
| | including but not limited to issuing banks and issuing |
| | processors. |
+----------+-----------------------------------------------------------+
| * | Examples of issuing services include but are not limited |
| *Issuing | to authorization and card personalization. |
| se | |
| rvices** | |
+----------+-----------------------------------------------------------+
| **Keyed | A hashing function that incorporates a randomly generated |
| Crypt | secret key to provide brute force attack resistance and |
| ographic | secret authentication integrity. |
| Hash** | |
| | Appropriate keyed cryptographic hashing algorithms |
| | include but are not limited to: HMAC, CMAC, and GMAC, |
| | with an effective cryptographic strength of at least |
| | 128-bits (*NIST SP 800-131Ar2)*. |
| | |
| | Refer to the following for more information about HMAC, |
| | CMAC, and GMAC, respectively: *NIST SP 800-107r1, NIST SP |
| | 800-38B, and NIST SP 800-38D).* |
| | |
| | See *NIST SP 800-107 (Revision 1): Recommendation for |
| | Applications Using Approved Hash Algorithms* §5.3. |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **Key | A role where a person(s) is entrusted with, and |
| Cus | responsible for, performing key management duties |
| todian** | involving secret and/or private keys, key shares, or key |
| | components on behalf of an entity. |
+----------+-----------------------------------------------------------+
| **Key | A combination of hardware and software that provides an |
| Ma | integrated approach for generating, distributing, and/or |
| nagement | managing cryptographic keys for devices and applications. |
| System** | |
+----------+-----------------------------------------------------------+
| **LAN** | Acronym for "local area network." |
+----------+-----------------------------------------------------------+
| **LDAP** | Acronym for "Lightweight Directory Access Protocol." |
+----------+-----------------------------------------------------------+
| **Least | The minimum level of privileges necessary to perform the |
| Priv | roles and responsibilities of the job function. |
| ileges** | |
+----------+-----------------------------------------------------------+
| **Log** | See *Audit Log*. |
+----------+-----------------------------------------------------------+
| * | Mechanisms that limit the availability of information or |
| *Logical | information-processing resources only to authorized |
| Access | persons or applications. See *Physical Access Control*. |
| C | |
| ontrol** | |
+----------+-----------------------------------------------------------+
| **MAC** | In cryptography, an acronym for "message authentication |
| | code." See *Strong Cryptography*. |
+----------+-----------------------------------------------------------+
| * | See *Track Data*. |
| *Magneti | |
| c-Stripe | |
| Data** | |
+----------+-----------------------------------------------------------+
| **M | Method of concealing a segment of PAN when displayed or |
| asking** | printed. Masking is used when there is no business need |
| | to view the entire PAN. Masking relates to protection of |
| | PAN when displayed on screens, paper receipts, printouts, |
| | etc. |
| | |
| | See *Truncation* for protection of PAN when |
| | electronically stored, processed, or transmitted. |
+----------+-----------------------------------------------------------+
| * | Physical material, including but not limited to, |
| *Media** | electronic storage devices, removable electronic media, |
| | and paper reports. |
+----------+-----------------------------------------------------------+
| **Me | For the purposes of the PCI DSS, a merchant is defined as |
| rchant** | any entity that accepts payment cards bearing the logos |
| | of any PCI SSC Participating Payment Brand as payment for |
| | goods and/or services. |
| | |
| | A merchant that accepts payment cards as payment for |
| | goods and/or services can also be a service provider, if |
| | the services sold result in storing, processing, or |
| | transmitting cardholder data on behalf of other merchants |
| | or service providers. For example, an ISP is a merchant |
| | that accepts payment cards for monthly billing, but also |
| | is a service provider if it hosts merchants as customers. |
+----------+-----------------------------------------------------------+
| * | Acronym for "Mail-Order/Telephone-Order." |
| *MO/TO** | |
+----------+-----------------------------------------------------------+
| **Mult | Method of authenticating a user whereby at least two |
| i-Factor | factors are verified. These factors include something the |
| Authenti | user has (such as a smart card or dongle), something the |
| cation** | user knows (such as a password, passphrase, or PIN), or |
| | something the user is or does (such as fingerprints and |
| | other biometric elements). |
+----------+-----------------------------------------------------------+
------------------------------------------------------------------------------
**Term** **Definition**
------------------ -----------------------------------------------------------
**Multi-Tenant A type of Third-Party Service Provider that offers various
Service Provider** shared services to merchants and other service providers,
where customers share system resources (such as physical or
virtual servers), infrastructure, applications (including
Software as a Service (SaaS)), and/or databases. Services
may include, but are not limited to, hosting multiple
entities on a single shared server, providing e- commerce
and/or "shopping cart" services, web-based hosting
services, payment [applications,](#_bookmark62) various
cloud applications and services, and connections to payment
gateways and processors. See *Service Provider* and
*Third-Party Service Provider*.
**NAC** Acronym for "Network Access Control."
**NAT** Acronym for "Network Address Translation."
**Network A logical, physical, or virtual communication path between
Connection** devices that allows the transmission and reception of
network layer packets.
**Network A diagram showing system components and connections within
Diagram** a networked environment.
**Network Security Firewalls and other network security technologies that act
Controls (NSC)** as network policy enforcement points. NSCs typically
control network traffic between two or more logical or
physical network segments (or subnets) based on pre-defined
policies or rules.
**NIST** Acronym for "National Institute of Standards and
Technology." Non-regulatory federal agency within U.S.
Commerce Department\'s Technology Administration.
**Non-Console Logical access to a system component that occurs over a
Access** network interface rather than via a direct, physical
connection to the system component. Non-console access
includes access from within local/internal networks as well
as access from external or remote networks.
**NTP** Acronym for "Network Time Protocol."
**Organizational An organizational structure that ensures there is no
Independence** conflict of interest between the person or department
performing the activity and the person or department
assessing the activity. For example, individuals performing
assessments are organizationally separate from the
management of the environment being assessed.
**OWASP** Acronym for "Open Web Application Security Project."
**PAN** Acronym for "primary account number." Unique payment card
number (credit, debit, or prepaid cards, etc.) that
identifies the issuer and the cardholder account.
**Password / A string of characters that serve as an authentication
Passphrase** factor for a user or account.
**Patch** Update to existing software to add function or to correct a
defect.
------------------------------------------------------------------------------
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **Parti | Also referred to as "payment brand." A payment card brand |
| cipating | that, as of the time in question, is then formally |
| Payment | admitted as (or an affiliate of) a member of PCI SSC |
| Brand** | pursuant to its governing documents. At the time of |
| | writing, Participating Payment Brands include PCI SSC |
| | Founding Members and Strategic Members. |
+----------+-----------------------------------------------------------+
| * | An organization with branded payment cards or other |
| *Payment | payment card form factors. Payment brands regulate where |
| Brand** | and how the payment cards or other form factors carrying |
| | its brand or logo are used. A payment brand may be a PCI |
| | SSC Participating Payment Brand or other global or |
| | regional payment brand, scheme, or network. |
+----------+-----------------------------------------------------------+
| * | Includes physical payment cards as well as devices with |
| *Payment | functionality that emulates a payment card to initiate a |
| Card | payment transaction. Examples of such devices include, |
| Form | but are not limited to, smartphones, smartwatches, |
| Factor** | fitness bands, key tags, and wearables such as jewelry. |
+----------+-----------------------------------------------------------+
| * | For purposes of PCI DSS, any payment card form factor |
| *Payment | that bears the logo of any PCI SSC Participating Payment |
| Cards** | Brand. |
+----------+-----------------------------------------------------------+
| * | Methods used by merchants to accept payments from |
| *Payment | customers. Common payment channels include card present |
| C | (in person) and card not present (e-commerce and MO/TO). |
| hannel** | |
+----------+-----------------------------------------------------------+
| * | A web-based user interface containing one or more form |
| *Payment | elements intended to capture account data from a consumer |
| Page** | or submit captured account data. The payment page can be |
| | rendered as any one of: |
| | |
| | - A single document or instance, |
| | |
| | - A document or component displayed in an inline frame |
| | within a non-payment page, |
| | |
| | - Multiple documents or components each containing one |
| | or more form elements contained in multiple inline |
| | frames within a non- payment page. |
+----------+-----------------------------------------------------------+
| * | Any programming language commands or instructions on a |
| *Payment | payment page that are processed and/or interpreted by a |
| Page | consumer's browser, including commands or instructions |
| S | that interact with a page's document object model. |
| cripts** | Examples of programming languages are JavaScript and VB |
| | script; neither markup-languages (for example, HTML) or |
| | style-rules (for example, CSS) are programming languages. |
+----------+-----------------------------------------------------------+
| * | Sometimes referred to as "payment gateway" or "payment |
| *Payment | service provider (PSP)." Entity engaged by a merchant or |
| Pro | other entity to handle payment card transactions on their |
| cessor** | behalf. See *Acquirers.* |
+----------+-----------------------------------------------------------+
| **PCI | Acronym for "Payment Card Industry Data Security |
| DSS** | Standard." |
+----------+-----------------------------------------------------------+
| **Per | Full-time and part-time employees, temporary employees, |
| sonnel** | contractors, and consultants with security |
| | responsibilities for protecting account data or that can |
| | impact the security of account data. |
+----------+-----------------------------------------------------------+
| ** | Mechanisms that limit the access to a physical space or |
| Physical | environment to only authorized persons. See *Logical |
| Access | Access Control*. |
| C | |
| ontrol** | |
+----------+-----------------------------------------------------------+
| **PIN** | Acronym for "personal identification number." |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **PIN | A block of data used to encapsulate a PIN during |
| Block** | processing. The PIN block format defines the content of |
| | the PIN block and how it is processed to retrieve the |
| | PIN. The PIN block is composed of the PIN, the PIN |
| | length, and may contain the PAN (or a truncation thereof) |
| | depending on the approved ISO PIN Block Format used. |
+----------+-----------------------------------------------------------+
| **POI** | Acronym for "Point of Interaction," the initial point |
| | where data is read from a card. |
+----------+-----------------------------------------------------------+
| **Point | Hardware and software used by merchants to accept |
| of Sale | payments from customers. May include POI devices, PIN |
| System | pads, electronic cash registers, etc. |
| (POS)** | |
+----------+-----------------------------------------------------------+
| **Pr | Any user account with greater than basic access |
| ivileged | privileges. Typically, these accounts have elevated or |
| User** | increased privileges with more rights than a standard |
| | user account. However, the extent of privileges across |
| | different privileged accounts can vary greatly depending |
| | on the organization, job function or role, and the |
| | technology in use. |
+----------+-----------------------------------------------------------+
| **QIR** | Acronym for "Qualified Integrator or Reseller." Refer to |
| | the *QIR Program Guide* on the PCI SSC website for more |
| | information. |
+----------+-----------------------------------------------------------+
| **QSA** | Acronym for "Qualified Security Assessor." QSAs are |
| | qualified by PCI SSC to perform PCI DSS on-site |
| | assessments. Refer to the |
| | |
| | *QSA Qualification Requirements* for details about |
| | requirements for QSA Companies and Employees. |
+----------+-----------------------------------------------------------+
| **Remote | Access to an entity's network from a location outside of |
| Access** | that network. An example of technology for remote access |
| | is a VPN. |
+----------+-----------------------------------------------------------+
| **R | Media that stores digitized data that can be easily |
| emovable | removed and/or transported from one computer system to |
| El | another. Examples of removable electronic media include |
| ectronic | CD-ROM, DVD-ROM, USB flash drives, and external/portable |
| Media** | hard drives. In this context, removable electronic media |
| | does not include hot-swappable drives, tape drives used |
| | for bulk back-ups, or other media not typically used to |
| | transport data from one location for use in another. |
+----------+-----------------------------------------------------------+
| **Risk | Enterprise-wide process that identifies valuable system |
| Asse | resources and threats; quantifies loss exposures (that |
| ssment** | is, loss potential) based on estimated frequencies and |
| | costs of occurrence; and (optionally) recommends how to |
| | allocate resources to countermeasures to minimize total |
| | exposure. See *Targeted Risk Analysis*. |
+----------+-----------------------------------------------------------+
| **Risk | Process of classifying risks to identify, prioritize, and |
| R | address items in the order of importance. |
| anking** | |
+----------+-----------------------------------------------------------+
| **ROC** | Acronym for "Report on Compliance." Reporting tool used |
| | to document detailed results from an entity's PCI DSS |
| | assessment. |
+----------+-----------------------------------------------------------+
| **RSA** | Algorithm for public-key encryption. See *Strong |
| | Cryptography*. |
+----------+-----------------------------------------------------------+
| **SAQ** | Acronym for "Self-Assessment Questionnaire." Reporting |
| | tool used to document self-assessment results from an |
| | entity's PCI DSS assessment. |
+----------+-----------------------------------------------------------+
| **S | Process of identifying all system components, people, and |
| coping** | processes to be included in a PCI DSS assessment. See PCI |
| | DSS section: |
| | |
| | *4 Scope of PCI DSS Requirements*. |
+----------+-----------------------------------------------------------+
| **Secure | The process of creating and implementing applications |
| Coding** | that are resistant to tampering and/or compromise. |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| ** | An occurrence considered by an organization to have |
| Security | potential security implications to a system or its |
| Event** | environment. In the context of PCI DSS, security events |
| | identify suspicious or anomalous activity. |
+----------+-----------------------------------------------------------+
| ** | Primary person responsible for an entity's security. |
| Security | |
| O | |
| fficer** | |
+----------+-----------------------------------------------------------+
| **Segmen | Also referred to as "network segmentation" or |
| tation** | "isolation." Segmentation isolates system components that |
| | store, process, or transmit cardholder data from systems |
| | that do not. See "Segmentation" in PCI DSS section: *4 |
| | Scope of PCI DSS Requirements*. |
+----------+-----------------------------------------------------------+
| **S | A sensitive area is typically a subset of the CDE and is |
| ensitive | any area that houses systems considered critical to the |
| Area** | CDE. This includes data centers, server rooms, |
| | back-office rooms at retail locations, and any area that |
| | concentrates or aggregates cardholder data storage, |
| | processing, or transmission. Sensitive areas also include |
| | areas housing systems that manage or maintain the |
| | security of the CDE (for example, those providing network |
| | security controls or that manage physical or logical |
| | security). |
| | |
| | This excludes the areas where only point-of-sale |
| | terminals are present, such as the cashier areas in a |
| | retail store or call centers where agents are taking |
| | payments. |
+----------+-----------------------------------------------------------+
| **S | Security-related information used to authenticate |
| ensitive | cardholders and/or authorize payment card transactions. |
| Authen | This information includes, but is not limited to, card |
| tication | validation verification codes/values, full track data |
| Data | (from magnetic stripe or equivalent on a chip), PINs, and |
| (SAD)** | PIN blocks. |
+----------+-----------------------------------------------------------+
| **Se | Practice of dividing steps in a function among multiple |
| paration | individuals, to prevent a single individual from |
| of | subverting the process. |
| Duties** | |
+----------+-----------------------------------------------------------+
| * | Three-digit or four-digit value in the magnetic-stripe |
| *Service | that follows the expiration date of the payment card on |
| Code** | the track data. It is used for various things, such as |
| | defining service attributes, differentiating between |
| | international and national interchange, or identifying |
| | usage restrictions. |
+----------+-----------------------------------------------------------+
| * | Business entity that is not a payment brand, directly |
| *Service | involved in the processing, storage, or transmission of |
| Pr | cardholder data on behalf of another entity. This |
| ovider** | includes payment gateways, payment service providers |
| | (PSPs), and independent sales organizations (ISOs). This |
| | also includes companies that provide services that |
| | control or could impact the security of cardholder data. |
| | Examples include managed service providers that provide |
| | managed firewalls, IDS, and other services as well as |
| | hosting providers and other entities. |
| | |
| | If an entity provides a service that involves *only* the |
| | provision of public network access---such as a |
| | telecommunications company providing just the |
| | communication link---the entity would not be considered a |
| | service provider for that service (although they may be |
| | considered a service provider for other services). See |
| | *Multi-Tenant Service Provider* and *Third-Party Service |
| | Provider.* |
+----------+-----------------------------------------------------------+
| **SNMP** | Acronym for "Simple Network Management Protocol.". |
+----------+-----------------------------------------------------------+
| **Split | A method by which two or more entities separately have |
| Kno | key components or key shares that individually convey no |
| wledge** | knowledge of the resultant cryptographic key. |
+----------+-----------------------------------------------------------+
| **SQL** | Acronym for "Structured Query Language." |
+----------+-----------------------------------------------------------+
| **SSH** | Abbreviation for "Secure Shell." |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **SSL** | Acronym for "Secure Sockets Layer." |
+----------+-----------------------------------------------------------+
| **Strong | Cryptography is a method to protect data through a |
| Crypto | reversible encryption process, and is a foundational |
| graphy** | primitive used in many security protocols and services. |
| | Strong cryptography is based on industry-tested and |
| | accepted algorithms along with key lengths that provide a |
| | minimum of 112-bits of effective key strength and proper |
| | key-management practices*.* |
| | |
| | Effective key strength can be shorter than the actual |
| | 'bit' length of the key, which can lead to algorithms |
| | with larger keys providing lesser protection than |
| | algorithms with smaller actual, but larger effective, key |
| | sizes. *It is recommended that all new implementations |
| | use a minimum of 128-bits of effective key strength.* |
| | |
| | Examples of industry references on cryptographic |
| | algorithms and key lengths include: |
| | |
| | - *NIST Special Publication 800-57 Part 1*, |
| | |
| | - *BSI TR-02102-1*, |
| | |
| | - *ECRYPT-CSA D5.4 Algorithms, Key Size and Protocols |
| | Report (2018)*, and |
| | |
| | - *ISO/IEC 18033 Encryption algorithms,* and |
| | |
| | - *ISO/IEC 14888-3:2-81 IT Security techniques -- |
| | Digital signatures with appendix -- Part 3: Discrete |
| | logarithm based mechanisms*. |
+----------+-----------------------------------------------------------+
| **System | Any network devices, servers, computing devices, virtual |
| Comp | components, or software included in or connected to the |
| onents** | CDE, or that could impact the security of the CDE. |
+----------+-----------------------------------------------------------+
| **Syst | Anything on a system component that is required for its |
| em-level | operation, including but not limited to application |
| object** | executables and configuration files, system configuration |
| | files, static and shared libraries and DLLs, system |
| | executables, device drivers and device configuration |
| | files, and third-party components. |
+----------+-----------------------------------------------------------+
| ** | For PCI DSS purposes, a risk analysis that focuses on a |
| Targeted | specific PCI DSS requirement(s) of interest, either |
| Risk | because the requirement allows flexibility (for example, |
| An | as to frequency) or, for the Customized Approach, to |
| alysis** | explain how the entity assessed the risk and determined |
| | the customized control meets the objective of a PCI DSS |
| | requirement. |
+----------+-----------------------------------------------------------+
| **TDES** | Acronym for "Triple Data Encryption Standard." Also |
| | referred to as "3DES" or "Triple DES." |
+----------+-----------------------------------------------------------+
| ** | Abbreviation for "telephone network protocol." |
| Telnet** | |
+----------+-----------------------------------------------------------+
| **Thi | Any third party acting as a service provider on behalf of |
| rd-Party | an entity. See *Multi-Tenant Service Provider* and |
| Service | *Service Provider*. |
| Provider | |
| (TPSP)** | |
+----------+-----------------------------------------------------------+
| **Thi | Software that is acquired by, but not developed expressly |
| rd-Party | for, an entity. It may be open source, freeware, |
| So | shareware, or purchased. |
| ftware** | |
+----------+-----------------------------------------------------------+
| **TLS** | Acronym for "Transport Layer Security." |
+----------+-----------------------------------------------------------+
| * | In the context of authentication and access control, a |
| *Token** | token is a value provided by hardware or software that |
| | works with an authentication server or VPN to perform |
| | dynamic or multi-factor authentication. |
+----------+-----------------------------------------------------------+
+----------+-----------------------------------------------------------+
| **Term** | **Definition** |
+==========+===========================================================+
| **Track | Also referred to as "full track data" or "magnetic-stripe |
| Data** | data." Data encoded in the magnetic stripe or chip used |
| | for authentication and/or authorization during payment |
| | transactions. Can be the magnetic-stripe image on a chip |
| | or the track data on the magnetic stripe. |
+----------+-----------------------------------------------------------+
| **Trun | Method of rendering a full PAN unreadable by removing a |
| cation** | segment of PAN data. Truncation relates to protection of |
| | PAN when electronically stored[*,* |
| | p]{.underline}rocessed, or transmitted. |
| | |
| | See *Masking* for protection of PAN when displayed on |
| | screens, paper receipts, etc. |
+----------+-----------------------------------------------------------+
| * | Network of an entity that is within the entity's ability |
| *Trusted | to control or manage and that meets applicable PCI DSS |
| N | requirements. |
| etwork** | |
+----------+-----------------------------------------------------------+
| **U | Any network that does not meet the definition of a |
| ntrusted | "trusted network." |
| N | |
| etwork** | |
+----------+-----------------------------------------------------------+
| * | In the context of Self-Assessment Questionnaire (SAQ) |
| *Virtual | C-VT, a virtual payment terminal is web-browser-based |
| Payment | access to an acquirer, processor, or third-party service |
| Te | provider website to authorize payment card transactions, |
| rminal** | where the merchant manually enters payment card data |
| | through a web browser. Unlike physical terminals, virtual |
| | payment terminals do not read data directly from a |
| | payment card. Because payment card transactions are |
| | entered manually, virtual payment terminals are typically |
| | used instead of physical terminals in merchant |
| | environments with low transaction volumes. |
+----------+-----------------------------------------------------------+
| ** | The logical abstraction of computing resources from |
| Virtuali | physical and/or logical constraints. One common |
| zation** | abstraction is referred to as virtual machines or VMs, |
| | which takes the content of a physical machine and allows |
| | it to operate on different physical hardware and/or along |
| | with other virtual machines on the same physical |
| | hardware. Other common abstractions include, but are not |
| | limited to, containers, serverless computing, or |
| | microservices. |
+----------+-----------------------------------------------------------+
| **VPN** | Acronym for "virtual private network." |
+----------+-----------------------------------------------------------+
| * | Flaw or weakness which, if exploited, may result in an |
| *Vulnera | intentional or unintentional compromise of a system. |
| bility** | |
+----------+-----------------------------------------------------------+
| **Web | An application that is generally accessed through a web |
| Appli | browser or through web services. Web applications may be |
| cation** | available through the Internet or a private, internal |
| | network. |
+----------+-----------------------------------------------------------+