Pci Dss Compliance Checklist
Pci Dss Compliance Checklist
We’ve created an interactive checklist to help you get started with your compliance journey.
While our checklist is not exhaustive, it provides a foundational starting point when preparing
for PCI DSS compliance.
Our checklist is in accordance with PCI v3.2.1, which is the current version of PCI DSS.
• Document ports and services justification for every inbound and outbound rule
Implementation requirements:
• Configure and implement secure firewall and router settings and rules
• Prevent public direct access between the internet and any system component in the
internal cardholder data environment
• Install personal firewall software on all internet-connected portable devices that are
also used to access the cardholder data environment
• Implement security features for any insecure services utilized within the cardholder
data environment
• Install perimeter firewalls between all wireless networks and the cardholder data
environment
• 1
Eliminate vendor defaults for passwords
Requirement 2 and other security parameters
Goal: Build and maintain a secure network and systems
Implementation requirements:
• Change all vendor-supplied defaults and remove or disable unnecessary default
accounts before installing a system on your network
• Change all wireless vendor defaults at installation for wireless environments that
connect to the cardholder data environment or that transmit cardholder data
• Define a quarterly process for regularly identifying and deleting stored cardholder
data that exceeds the retention period
• Document a key management policy and process defining the secure generation,
storage and distribution of encryption keys
• 2
Implementation requirements:
• Verify sensitive authentication data is not being stored (such as the card verification
code or PIN) after authorization, even if it is encrypted
Implementation requirements:
• Identify all locations where cardholder data is being sent over public networks and
verify strong encryption is being used
• Verify when PAN is sent over end-user messaging technologies, the PAN data is
unreadable or secured utilizing strong cryptography
• 3
Protect against malware and regularly
Requirement 5 update antivirus software
Goal: Maintain a vulnerability management program
Implementation requirements:
• Verify antivirus software is kept current, performs periodic scans, and generates
audit logs
• 4
Implementation requirements:
• Perform vulnerability assessments against web applications or use an automated
technical solution such as a web application firewall
• Ensure code reviews are being performed for all production code changes by an
individual other than the author
Implementation requirements:
• Inspect system access regularly to determine that privileges assigned are
necessary for the job function and are restricted to least privilege
• Document a policy for the management of user IDs including password policy,
lockout duration, authentication methods, and user guidance on credential usage
• 5
Implementation requirements:
• Remove or disable any inactive accounts that are 90 days old
• Ensure all non-console administrative access and remote access into the cardholder
data environment requires multi-factor authentication
• Do not use generic accounts and do not utilize shared accounts for administrative or
critical functions
Implementation requirements:
• Implement facility entry controls and security controls to limit and monitor physical
access to systems
• Maintain a list of POS devices and periodically inspect devices for tampering
or substitution
• 6
Track and monitor network access
Requirement 10
Goal: Regularly monitor and test networks
• Review and document logs and security events for all system components to
identify abnormalities or suspicious activity
Implementation requirements:
• Implement automated audit trails for all system components for the
following events:
• Verify audit logs are retained for three months which are immediately available
and one year archived
• 7
Test security systems and processes
Requirement 11
Goal: Regularly monitor and test networks
Implementation requirements:
• Perform quarterly internal vulnerability scans and complete quarterly external scans
utilizing an approved scanning vendor
• Perform internal and external penetration testing annually and after any significant
infrastructure or application upgrade or modification. Segmentation testing must be
performed bi-annually for service providers.
• 8
Establish and maintain an information
Requirement 12 security policy
Goal: Maintain an information security policy
• Document a risk assessment process which includes how to identify assets, threats,
and vulnerabilities
• Document acceptable use policies for all technologies and products in use
• Document the responsibility of your service providers and perform due diligence
against their compliance efforts
Implementation requirements:
• Formally assign information security responsibilities to the appropriate personnel
• Train all personnel on cardholder data security awareness and require personnel
to acknowledge they understand all applicable policies and procedures
• 9