Aerosol Posted January 14, 2015 Report Posted January 14, 2015 Table of ContentsDocument Changes ........................................................................................................................................................................... 2Introduction and PCI Data Security Standard Overview ................................................................................................................. 5PCI DSS Resources............................................................................................................................................................................................ 6PCI DSS Applicability Information .................................................................................................................................................... 7Relationship between PCI DSS and PA-DSS.................................................................................................................................... 9Applicability of PCI DSS to PA-DSS Applications................................................................................................................................................. 9Applicability of PCI DSS to Payment Application Vendors.................................................................................................................................... 9Scope of PCI DSS Requirements.................................................................................................................................................... 10Network Segmentation.......................................................................................................................................................................................11Wireless…………… ...........................................................................................................................................................................................11Use of Third-Party Service Providers / Outsourcing ............................................................................................................................................12Best Practices for Implementing PCI DSS into Business-as-Usual Processes........................................................................... 13For Assessors: Sampling of Business Facilities/System Components ....................................................................................... 15Compensating Controls................................................................................................................................................................... 16Instructions and Content for Report on Compliance..................................................................................................................... 17PCI DSS Assessment Process........................................................................................................................................................ 17Detailed PCI DSS Requirements and Security Assessment Procedures..................................................................................... 18Build and Maintain a Secure Network and Systems........................................................................................................................................19Requirement 1: Install and maintain a firewall configuration to protect cardholder data ...................................................................................19Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters ....................................................28Protect Cardholder Data...................................................................................................................................................................................34Requirement 3: Protect stored cardholder data...............................................................................................................................................34Requirement 4: Encrypt transmission of cardholder data across open, public networks ..................................................................................44Maintain a Vulnerability Management Program...............................................................................................................................................46Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs.....................................................46Requirement 6: Develop and maintain secure systems and applications.........................................................................................................49Implement Strong Access Control Measures..................................................................................................................................................61Requirement 7: Restrict access to cardholder data by business need to know................................................................................................61Requirement 8: Identify and authenticate access to system components........................................................................................................64Read more: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf Quote