PCI DSS4 Control List
PCI DSS4 Control List
PCI DSS4 Control List
Card Sec
PCI DSS ID Defined Approach Requirements
3.1 3.1 Processes and mechanisms for protecting stored account data
are defined and understood.
3.2 3.2 Storage of account data is kept to a minimum.
3.3 3.3 Sensitive authentication data (SAD) is not stored after
authorization.
3.4 3.4 Access to displays of full PAN and ability to copy PAN is
restricted.
3.5 3.5 Primary account number (PAN) is secured wherever it is
stored.
3.6 3.6 Cryptographic keys used to protect stored account data are
secured.
3.7 3.7 Where cryptography is used to protect stored account data,
key management processes and procedures covering all aspects of
the key lifecycle are defined and implemented.
4.1 4.1 Processes and mechanisms for protecting cardholder data with
strong cryptography during transmission over open, public
networks are defined and documented.
8.2 8.2 User identification and related accounts for users and
administrators are strictly managed throughout an account’s
lifecycle.
10.3 10.3 Audit logs are protected from destruction and unauthorized
modifications.
10.4 10.4 Audit logs are reviewed to identify anomalies or suspicious
activity.
10.5 10.5 Audit log history is retained and available for analysis.
10.6 10.6 Time-synchronization mechanisms support consistent time
settings across all systems.
10.7 10.7 Failures of critical security control systems are detected,
reported, and responded to promptly.
11.1 11.1 Processes and mechanisms for regularly testing security of
systems and networks are defined and understood.
11.2 11.2 Wireless access points are identified and monitored, and
unauthorized wireless access points are addressed.
11.3 11.3 External and internal vulnerabilities are regularly identified,
prioritized, and addressed.
11.4 11.4 External and internal penetration testing is regularly
performed, and exploitable vulnerabilities and security
weaknesses are corrected.
11.5 11.5 Network intrusions and unexpected file changes are detected
and responded to.
11.6 11.6 Unauthorized changes on payment pages are detected and
responded to.
12.1 12.1 A comprehensive information security policy that governs
and provides direction for protection of the entity’s information
assets is known and current. 12.10 Suspected and confirmed
security incidents that could impact the CDE are responded to
immediately.
12.2 12.2 Acceptable use policies for end-user technologies are defined
and implemented.
12.3 12.3 Risks to the cardholder data environment are formally
identified, evaluated, and managed.
12.4 12.4 PCI DSS compliance is managed.
12.5 12.5 PCI DSS scope is documented and validated.
12.6 12.6 Security awareness education is an ongoing activity.
12.7 12.7 Personnel are screened to reduce risks from insider threats.