PCI DSS v3.2
Implementation - Bliss or Nightmare
Requirements & Scope
● Scope includes Security Devices, Virtual Servers, Network Devices, Server
forms, Applications which are connected to the Card holder data
environment (CDE)
● Isolation of CDE from rest of the environment is not mandatory but
recommended
● Any third party service provider involved in CDE will need annual and/or on
deman PCI DSS assessments
● There are 12 high level requirements that are to be met for the entity to get
PCI Certified
Steps in PCI DSS assessment process
● To confirm the scope of the PCI DSS assessment
● To perform the environment assessment for all 12 requirements.
● To complete assessment reports, documentation viz., Self-Assessment
Questionnaire (SAQ), Report on Compliance (ROC), compensating control
documentations
● To complete the compliance attestation for service providers (PA-DSS) or
merchants
● To complete other requested documentation such as ASV scan reports for
the service providers or merchants
● To do remediation if any of the requirements are not in place and provide
report
Req 1: Install & maintain a firewall configuration protecting
cardholder data
● Establish formal process for testing and approving any firewall/routing
configuration changes
● Secure & Synchronize Router & Firewall configuration files
● Use features viz., NAT to hide private IP addresses
● Implement personal firewall or softwares for portable devices
● Limit inbound internet traffic to servers in the DMZ
● Implement anti-spoofing to detect & block fourced IP-addresses traffic
entering the network
Req 2: Do not use vendor-supplied defaults for system
passwords and other security parameters
● To remove/change all vendor supplied default passwords in the system
before connecting to the network
● To harden the devices based on industry standard viz., CIS/SANS/NIST
before installation
● Enable only necessary function & services in the servers
● Ensure Security policy & procedure have details on changing the vendor
default credentials
Req 3: Protect stored cardholder data
● To implement data retention & disposal policies for storing card holder data
for business, legal & regulatory purposes
● Not to store full track data, cvv or full pin after authorization even if
encrypted
● To mask full card number with first six and last 4 digits visible in the PAN
number
● Encrypt full PAN number anywhere if it’s stored
● Decryption keys for the above encryption to be separately stored and not to
be associated with accounts
● Fully document all the key management procedures for the decryption keys
used in the system
Req 4: Encrypt transmission of cardholder data across open,
public networks
● To implement data retention & disposal policies for storing card holder data
for business, legal & regulatory purposes
● Not to store full track data, cvv or full pin after authorization even if
encrypted
● To mask full card number with first six and last 4 digits visible in the PAN
number
● Encrypt full PAN number anywhere if it’s stored
● Decryption keys for the above encryption to be separately stored and not to
be associated with accounts
● Fully document all the key management procedures for the decryption keys
used in the systems
Req 5: Protect all systems against malware and regularly update
anti-virus software or programs
● Deploy AV for all Servers & Desktops. Don’t forget Linux Servers
● AV solution to be running up to date on new releases
● System owner shouldn’t be allowed to turn-off the AV program at his/her
discretion
● AV scan logs to be centralized and available for PCI audit
● Procedure and policies in place for management approval in case of any
alteration required on the scan or updates
Req 6: Develop and maintain secure systems and applications
● Procedure and policy in place to update the security patches provided by system
vendor
● Security patches to be updated within a month of release
● Conduct code review for custom codes for application vulnerabilities
● Change control process in place to seperate Production & Development environments
● To ensure production data not used in development environment
● Change control process in place for approvals, roll-back & testing for any system
change requests
● To conduct Security Vulnerability Assessment for public facing webservers
periodically
● To have coding practice/training in place to avoid DB, OS, Actve directory level
injection
Req 7: Restrict access to cardholder data by business need to
know
● Restrict access to cardholder data, system components, Privileged
Userids
● Documented procedure for approvals of any changes on the above
● To have a default deny all setting for any privileges for users/roles
● To open only those based on the Business/System need
● Documentation of policy and procedure in place for restricting the
cardholder data access only for those in need
Req 8: Identify and authenticate access to system components
● Unique user id for individual users
● Approvals and monitoring in place for privileged user-ids
● Revoke access to terminated/resigned users immediately
● Disable inactive users within 90 days
● Remote access to be enabled for third party only when required
● Lock out user ids with invalid attempts maximum of 6 attempts
● Implement idle session timeout within 15 minutes
● Enable 2FA for the privileged user-ids
● Strict password controls viz., password history, complex password,
encryption etc.,
● Any application IDs to be used only by systems and not by individual users
Req 9: Restrict physical access to cardholder data
● Enable physical access control to cardholder data environment
● Restrict access to public available jacks
● Implement visitor access controls including badges/log book etc.,
● Maintain strict control on securing and distribution of media
● Approvals and monitoring in place for privileged user-ids
● Destroy media securely after business required period
● Maintain list of systems and do periodical monitoring for any
tampering
● Security policies and procedure in place for restricting physical
access to the cardholder data environment
Req 10: Track and monitor all access to network resources and
cardholder data
● Automated audit trails to monitor user access, invalid attempts,
stopping and pausing of audit logs
● Do time synchronization for all the systems
● Audit trails to be secured and non-alterable
● Review logs and security events to identify suspicious activities
● Review the security events daily
● Process for responding to security controls
Req 11: Regularly test security systems and processes
● Implement process in place for quarterly review of Wireless access
points
● To maintain an inventory of wireless access points
● To have a incident response procedure if any unauthorized access
points are identified
● To run quarterly internal/external vulnerability scans and clear high
vulnerability results
● To run PEN tests with industry accepted standards
● To implement intrusion-detection/prevention systems
Req 12: Maintain a policy that addresses information security for
all personnel
● Publish and implement a organization wide security policy which is
to be reviewed annually
● To implement an annual risk assessment process
● To develop usage policies for critical systems & technologies
● Owner and contact information of critical system to be available as
part of documentation
● Hiring process to include security policy implementation
● To implement a incident response plan for any system breach
● Designate persons available to respond 24/7 to alerts

More Related Content

PPTX
Integrated Compliance
PPTX
Intacct Security and Operations
PDF
PCI DSS and PA DSS Version 3.0 Changes
PDF
PCI DSS Business as Usual
PPTX
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PPTX
Log monitoring and file integrity monitoring
PPTX
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PPTX
ControlCase Data Discovery and PCI DSS
Integrated Compliance
Intacct Security and Operations
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS Business as Usual
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Log monitoring and file integrity monitoring
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
ControlCase Data Discovery and PCI DSS

What's hot (20)

PPT
Why Use Wes Tech Solutions
PPT
Why Use Westech Solutions
PDF
Attachment 1 – mitigation measures for two factor authentication compromise
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
PPT
What You Didn't Know About Data Centre Audit Certification?
PPTX
Webinar: SecurePlanHealth Updates
PPTX
ManageEngine Firewall Analyzer training
PDF
Tatanet Corporate Presentation
PPT
Data center
PPTX
Understanding firewall policies and their effectiveness in defending against ...
PDF
SPOT - Corporate Brochure
PPTX
24/7 Outsourced NOC Services
PPTX
Log Monitoring and Fie Integrity Monitoring
PPTX
BSidesAugusta ICS SCADA Defense
PPTX
24 by 7 NOC service for MSPs
PPS
Net Monitor Presentation
PDF
The journey to ICS - Extended
PPTX
24/7 outsourced noc services
PPTX
Managed Services Presentation
PPTX
IT Security: Eliminating threats with effective network & log analysis
Why Use Wes Tech Solutions
Why Use Westech Solutions
Attachment 1 – mitigation measures for two factor authentication compromise
PCI Compliance NOT for Dummies epb 30MAR2016
What You Didn't Know About Data Centre Audit Certification?
Webinar: SecurePlanHealth Updates
ManageEngine Firewall Analyzer training
Tatanet Corporate Presentation
Data center
Understanding firewall policies and their effectiveness in defending against ...
SPOT - Corporate Brochure
24/7 Outsourced NOC Services
Log Monitoring and Fie Integrity Monitoring
BSidesAugusta ICS SCADA Defense
24 by 7 NOC service for MSPs
Net Monitor Presentation
The journey to ICS - Extended
24/7 outsourced noc services
Managed Services Presentation
IT Security: Eliminating threats with effective network & log analysis
Ad

Similar to PCI DSS v3.2 Implementation - Bliss or Nightmare (20)

PPTX
PCI DSS 3.2 - Business as Usual
PPTX
PCI DSS & PA DSS Version 3.0 Changes Webinar
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS & PA DSS Version 3.0
PPTX
Making PCI V3.0 Business as Usual (BAU)
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI DSS and PA DSS
PPTX
PCI DSS 3.2
PDF
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
PPTX
PCI presentation
PPTX
PCI DSS and PA DSS Compliance
PDF
Pci dss intro v2
PPTX
PCI DSS Business as Usual
PDF
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
PPTX
PCI DSS Business as Usual
PPT
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PPTX
How to Achieve PCI Compliance with an Enterprise Job Scheduler
PPT
PCIs_Changing_Environment_-_What_You_Need_to_Know_&_Why_You_Need_To_Know_It..ppt
PPTX
Making Compliance Business as Usual
PPT
Experience for implement PCI DSS
PCI DSS 3.2 - Business as Usual
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS Business as Usual (BAU)
PCI DSS & PA DSS Version 3.0
Making PCI V3.0 Business as Usual (BAU)
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS
PCI DSS 3.2
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
PCI presentation
PCI DSS and PA DSS Compliance
Pci dss intro v2
PCI DSS Business as Usual
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
PCI DSS Business as Usual
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
How to Achieve PCI Compliance with an Enterprise Job Scheduler
PCIs_Changing_Environment_-_What_You_Need_to_Know_&_Why_You_Need_To_Know_It..ppt
Making Compliance Business as Usual
Experience for implement PCI DSS
Ad

Recently uploaded (20)

PPTX
Very useful ppt for your banking assignments Banking.pptx
PDF
01 KEY PROVISIONS on NGPA and PROFESSIONALIZATION.pdf
PDF
Fintech as a Gateway for Rural Investment in Bangladesh
PPTX
BU22CSEN0300556_PPT.pptx presentation about
PPTX
ratio analysis presentation for graduate
PDF
2012_The dark side of valuation a jedi guide to valuing difficult to value co...
PPTX
RISK MANAGEMENT IN MEDICAL LABORATORIES 2.pptx
PPTX
Simple linear regression model an important topic in econometrics
PPT
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
PDF
Income processes in Poland: An analysis based on GRID data
PDF
Very useful ppt for your banking assignments BANKING.pptx.pdf
PDF
epic-retirement-criteria-for-funds (1).pdf
PDF
Lundin Gold Corporate Presentation August 2025
PDF
Pension Trustee Training (1).pdf From Salih Shah
PPTX
Andry Specialty Vehicles case study for Accounting
PDF
Chapterrrrrrrrrrrrrrrrrrrrrrrrr 2_AP.pdf
PDF
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
PDF
MPEDA Export License Apply Online for Seafood Export License in India.pdf
PPT
Chapter 3-elasacity and its applications
PPT
1_Chapter_1_Introduction_to_Auditing.ppt
Very useful ppt for your banking assignments Banking.pptx
01 KEY PROVISIONS on NGPA and PROFESSIONALIZATION.pdf
Fintech as a Gateway for Rural Investment in Bangladesh
BU22CSEN0300556_PPT.pptx presentation about
ratio analysis presentation for graduate
2012_The dark side of valuation a jedi guide to valuing difficult to value co...
RISK MANAGEMENT IN MEDICAL LABORATORIES 2.pptx
Simple linear regression model an important topic in econometrics
Joints.ppts qxqwcesceecsxwdsxwcdewd2wsew
Income processes in Poland: An analysis based on GRID data
Very useful ppt for your banking assignments BANKING.pptx.pdf
epic-retirement-criteria-for-funds (1).pdf
Lundin Gold Corporate Presentation August 2025
Pension Trustee Training (1).pdf From Salih Shah
Andry Specialty Vehicles case study for Accounting
Chapterrrrrrrrrrrrrrrrrrrrrrrrr 2_AP.pdf
Modern Advanced Accounting in Canada, 9th Edition by Darrell Herauf, Murray H...
MPEDA Export License Apply Online for Seafood Export License in India.pdf
Chapter 3-elasacity and its applications
1_Chapter_1_Introduction_to_Auditing.ppt

PCI DSS v3.2 Implementation - Bliss or Nightmare

  • 1. PCI DSS v3.2 Implementation - Bliss or Nightmare
  • 2. Requirements & Scope ● Scope includes Security Devices, Virtual Servers, Network Devices, Server forms, Applications which are connected to the Card holder data environment (CDE) ● Isolation of CDE from rest of the environment is not mandatory but recommended ● Any third party service provider involved in CDE will need annual and/or on deman PCI DSS assessments ● There are 12 high level requirements that are to be met for the entity to get PCI Certified
  • 3. Steps in PCI DSS assessment process ● To confirm the scope of the PCI DSS assessment ● To perform the environment assessment for all 12 requirements. ● To complete assessment reports, documentation viz., Self-Assessment Questionnaire (SAQ), Report on Compliance (ROC), compensating control documentations ● To complete the compliance attestation for service providers (PA-DSS) or merchants ● To complete other requested documentation such as ASV scan reports for the service providers or merchants ● To do remediation if any of the requirements are not in place and provide report
  • 4. Req 1: Install & maintain a firewall configuration protecting cardholder data ● Establish formal process for testing and approving any firewall/routing configuration changes ● Secure & Synchronize Router & Firewall configuration files ● Use features viz., NAT to hide private IP addresses ● Implement personal firewall or softwares for portable devices ● Limit inbound internet traffic to servers in the DMZ ● Implement anti-spoofing to detect & block fourced IP-addresses traffic entering the network
  • 5. Req 2: Do not use vendor-supplied defaults for system passwords and other security parameters ● To remove/change all vendor supplied default passwords in the system before connecting to the network ● To harden the devices based on industry standard viz., CIS/SANS/NIST before installation ● Enable only necessary function & services in the servers ● Ensure Security policy & procedure have details on changing the vendor default credentials
  • 6. Req 3: Protect stored cardholder data ● To implement data retention & disposal policies for storing card holder data for business, legal & regulatory purposes ● Not to store full track data, cvv or full pin after authorization even if encrypted ● To mask full card number with first six and last 4 digits visible in the PAN number ● Encrypt full PAN number anywhere if it’s stored ● Decryption keys for the above encryption to be separately stored and not to be associated with accounts ● Fully document all the key management procedures for the decryption keys used in the system
  • 7. Req 4: Encrypt transmission of cardholder data across open, public networks ● To implement data retention & disposal policies for storing card holder data for business, legal & regulatory purposes ● Not to store full track data, cvv or full pin after authorization even if encrypted ● To mask full card number with first six and last 4 digits visible in the PAN number ● Encrypt full PAN number anywhere if it’s stored ● Decryption keys for the above encryption to be separately stored and not to be associated with accounts ● Fully document all the key management procedures for the decryption keys used in the systems
  • 8. Req 5: Protect all systems against malware and regularly update anti-virus software or programs ● Deploy AV for all Servers & Desktops. Don’t forget Linux Servers ● AV solution to be running up to date on new releases ● System owner shouldn’t be allowed to turn-off the AV program at his/her discretion ● AV scan logs to be centralized and available for PCI audit ● Procedure and policies in place for management approval in case of any alteration required on the scan or updates
  • 9. Req 6: Develop and maintain secure systems and applications ● Procedure and policy in place to update the security patches provided by system vendor ● Security patches to be updated within a month of release ● Conduct code review for custom codes for application vulnerabilities ● Change control process in place to seperate Production & Development environments ● To ensure production data not used in development environment ● Change control process in place for approvals, roll-back & testing for any system change requests ● To conduct Security Vulnerability Assessment for public facing webservers periodically ● To have coding practice/training in place to avoid DB, OS, Actve directory level injection
  • 10. Req 7: Restrict access to cardholder data by business need to know ● Restrict access to cardholder data, system components, Privileged Userids ● Documented procedure for approvals of any changes on the above ● To have a default deny all setting for any privileges for users/roles ● To open only those based on the Business/System need ● Documentation of policy and procedure in place for restricting the cardholder data access only for those in need
  • 11. Req 8: Identify and authenticate access to system components ● Unique user id for individual users ● Approvals and monitoring in place for privileged user-ids ● Revoke access to terminated/resigned users immediately ● Disable inactive users within 90 days ● Remote access to be enabled for third party only when required ● Lock out user ids with invalid attempts maximum of 6 attempts ● Implement idle session timeout within 15 minutes ● Enable 2FA for the privileged user-ids ● Strict password controls viz., password history, complex password, encryption etc., ● Any application IDs to be used only by systems and not by individual users
  • 12. Req 9: Restrict physical access to cardholder data ● Enable physical access control to cardholder data environment ● Restrict access to public available jacks ● Implement visitor access controls including badges/log book etc., ● Maintain strict control on securing and distribution of media ● Approvals and monitoring in place for privileged user-ids ● Destroy media securely after business required period ● Maintain list of systems and do periodical monitoring for any tampering ● Security policies and procedure in place for restricting physical access to the cardholder data environment
  • 13. Req 10: Track and monitor all access to network resources and cardholder data ● Automated audit trails to monitor user access, invalid attempts, stopping and pausing of audit logs ● Do time synchronization for all the systems ● Audit trails to be secured and non-alterable ● Review logs and security events to identify suspicious activities ● Review the security events daily ● Process for responding to security controls
  • 14. Req 11: Regularly test security systems and processes ● Implement process in place for quarterly review of Wireless access points ● To maintain an inventory of wireless access points ● To have a incident response procedure if any unauthorized access points are identified ● To run quarterly internal/external vulnerability scans and clear high vulnerability results ● To run PEN tests with industry accepted standards ● To implement intrusion-detection/prevention systems
  • 15. Req 12: Maintain a policy that addresses information security for all personnel ● Publish and implement a organization wide security policy which is to be reviewed annually ● To implement an annual risk assessment process ● To develop usage policies for critical systems & technologies ● Owner and contact information of critical system to be available as part of documentation ● Hiring process to include security policy implementation ● To implement a incident response plan for any system breach ● Designate persons available to respond 24/7 to alerts