Pci-Dss Controls: PCI Security Standards Council
Pci-Dss Controls: PCI Security Standards Council
Pci-Dss Controls: PCI Security Standards Council
PCI-DSS CONTROLS
PCI Security Standards Council
OVERVIEW
PCI security standards are technical and operational requirements set by the PCI
Security Standards Council (PCI SSC) to protect cardholder data. The standards apply
to all entities that store, process or transmit cardholder data – with guidance for
software developers and manufacturers of applications and devices used in those
transactions. The Council is responsible for managing the security standards, while compliance with the PCI set of standards is
enforced by the founding members of the Council, American Express, Discover Financial Services, JCB International,
MasterCard Worldwide and Visa Inc.
The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It covers technical and operational
system components included in or connected to cardholder data. If you are a merchant who accepts or processes payment cards,
you must comply with the PCI DSS.
Source: www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf
1
PCS-Data Security Standard (DSS) Checklist
PCI-DSS CONTROLS
PCI Security Standards Council
PCI-DSS Control 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks
Objective: For requirement 4, you need to know where you send cardholder data. Here are common places where primary account
numbers (PAN) are sent:
• Processors
• Backup servers
• Third parties that store or handle PAN
• Outsourced management of systems or infrastructure
• Corporate offices
You then need to use encryption and have security policies in place when you transmit this cardholder data over open, public networks. A
note about SSL and early TLS web encryption: based on vulnerabilities in web encryption, the PCI Security Standards Council has released
policy stating that you need to transition from SSL and early TLS to secure versions of TLS by June 30, 2018.
Be sure you or your POS vendor are regularly running your software’s anti-virus scans.
2
PCS-Data Security Standard (DSS) Checklist
PCI-DSS CONTROLS
PCI Security Standards Council
Quickly implementing security updates is crucial to your security posture. Patch all critical components in the card flow pathway, including:
Requirement 9 states that you must physically limit access to areas with cardholder data, as well as document the following:
• Who has access to secure environments and why they need this access
• What, when, where, and why devices are used
• A list of authorized device users
• Locations where the device is and is not allowed
• What applications can be accessed on the device
3
PCS-Data Security Standard (DSS) Checklist
PCI-DSS CONTROLS
PCI Security Standards Council
System event logs are recorded tidbits of information regarding actions taken on computer systems like firewalls, office computers, or
printers. To fulfill requirement 10, you must review logs at least daily to search for errors, anomalies, and suspicious activities that deviate
from the norm. You’re also required to have a process in place to respond to these anomalies and exceptions.
A vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities. All external IPs and domains
exposed in the CDE are required to be scanned by a PCI Approved Scanning Vendor (ASV) at least quarterly.
A penetration test is an exhaustive, live examination designed to exploit weaknesses in your system. Just like a hacker, penetration testers
analyze network environments, identify potential vulnerabilities, and try to exploit those vulnerabilities (or coding errors). Basically, these
analysts attempt to break into your company’s network.
If you perform a PCI audit, you’ll quickly pick up on the fact that there’s a big emphasis on your documented security policies and
procedures. During an assessment, QSAs will typically verify that specific requirements are defined in company policies and procedures.
Then, they’ll follow predefined testing procedures to verify that those controls are implemented in accordance with the PCI Data Security
Standard and with written company policies.