PCI:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''' | '''Payment Card Industry PCI, VISA CISP'''<br> | ||
<br> | <br> | ||
''' | '''Build and Maintain a Secure Network''' | ||
* [[PCI 1:|'''Requirement 1: Install and maintain a firewall configuration to protect data.''']] | |||
* [[PCI 2:|'''Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] | |||
<br> | <br> | ||
* [[ | '''Protect Cardholder Data''' | ||
* [[ | * [[PCI 3:|'''Requirement 3: Protect stored data.''']] | ||
* [[PCI 4:|'''Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.''']] | |||
* [[ | <br> | ||
* [[ | '''Maintain a Vulnerability Management Program''' | ||
* [[ | * [[PCI 5:|'''Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications | ||
* [[ | Implement Strong Access Control Measures.''']] | ||
* [[PCI 7:|'''Requirement 7: Restrict access to data by business need-to-know.''']] | |||
* [[ | * [[PCI 8:|'''Requirement 8: Assign a unique ID to each person with computer access.''']] | ||
* [[ | * [[PCI 9:|'''Requirement 9: Restrict physical access to cardholder data.''']] | ||
<br> | |||
* [[ | '''Regularly Monitor and Test Networks''' | ||
* [[PCI 10:|'''Requirement 10: Track and monitor all access to network resources and cardholder data.''']] | |||
* [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']] | |||
<br> | |||
'''Maintain an Information Security Policy ''' | |||
* [[PCI 12:|'''Requirement 12: Maintain a policy that addresses information security.''']] | |||
<br> | <br> | ||
--[[User:Mdpeters|Mdpeters]] | ---- | ||
<br> | |||
* Note that these Payment Card Industry (PCI) Data Security Requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data. Additionally, these security requirements apply to all “system components” which is defined as any network component, server, or application included in, or connected to, the cardholder data environment. Network components, include, but are not limited to, firewalls, switches, routers, wireless access points, network appliances, and other security appliances. Servers include, but are not limited to, web, database, authentication, DNS, mail, proxy, and NTP. Applications include all purchased and custom applications, including internal and external (web) applications.<br> | |||
<br> | |||
--[[User:Mdpeters|Mdpeters]] 07:50, 26 June 2006 (EDT) |
Revision as of 11:50, 26 June 2006
Payment Card Industry PCI, VISA CISP
Build and Maintain a Secure Network
- Requirement 1: Install and maintain a firewall configuration to protect data.
- Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Cardholder Data
- Requirement 3: Protect stored data.
- Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.
Maintain a Vulnerability Management Program
- Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications Implement Strong Access Control Measures.
- Requirement 7: Restrict access to data by business need-to-know.
- Requirement 8: Assign a unique ID to each person with computer access.
- Requirement 9: Restrict physical access to cardholder data.
Regularly Monitor and Test Networks
- Requirement 10: Track and monitor all access to network resources and cardholder data.
- Requirement 11: Regularly test security systems and processes.
Maintain an Information Security Policy
- Note that these Payment Card Industry (PCI) Data Security Requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data. Additionally, these security requirements apply to all “system components” which is defined as any network component, server, or application included in, or connected to, the cardholder data environment. Network components, include, but are not limited to, firewalls, switches, routers, wireless access points, network appliances, and other security appliances. Servers include, but are not limited to, web, database, authentication, DNS, mail, proxy, and NTP. Applications include all purchased and custom applications, including internal and external (web) applications.
--Mdpeters 07:50, 26 June 2006 (EDT)