PCI:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
 
No edit summary
Line 1: Line 1:
'''Kentucky DOI'''<br>
'''Payment Card Industry PCI, VISA CISP'''<br>
<br>
<br>
'''Applicability:'''<br>
'''Build and Maintain a Secure Network'''
* [[PCI 1:|'''Requirement 1: Install and maintain a firewall configuration to protect data.''']]
* [[PCI 2:|'''Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']]
<br>
<br>
* [[KY MANAGEMENT CONTROL:|'''MANAGEMENT CONTROL''']]
'''Protect Cardholder Data'''
* [[KY ORGANIZATION CONTROLS:|'''ORGANIZATION CONTROLS''']]
* [[PCI 3:|'''Requirement 3: Protect stored data.''']]
* [[KY CHANGES TO APPLICATIONS:|'''CHANGES TO APPLICATIONS''']]
* [[PCI 4:|'''Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks.''']]
* [[KY SYSTEM AND PROGRAM DEVELOPMENT:|'''SYSTEM AND PROGRAM DEVELOPMENT''']]
<br>
* [[KY OPERATIONS:|'''OPERATIONS''']]
'''Maintain a Vulnerability Management Program'''  
* [[KY PROCESSING CONTROLS:|'''PROCESSING CONTROLS''']]
* [[PCI 5:|'''Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications
* [[KY DOCUMENTATION:|'''DOCUMENTATION''']]
Implement Strong Access Control Measures.''']]
* [[KY OUTSIDE SERVICE CENTER CONTROLS:|'''OUTSIDE SERVICE CENTER CONTROLS''']]
* [[PCI 7:|'''Requirement 7: Restrict access to data by business need-to-know.''']]
* [[KY LOGICAL AND PHYSICAL SECURITY:|'''LOGICAL AND PHYSICAL SECURITY''']]
* [[PCI 8:|'''Requirement 8: Assign a unique ID to each person with computer access.''']]
* [[KY CONTIGENCY PLANNING:|'''CONTIGENCY PLANNING''']]
* [[PCI 9:|'''Requirement 9: Restrict physical access to cardholder data.''']]
* [[KY E-BUSINESS CONTROLS:|'''E-BUSINESS CONTROLS''']]
<br>
* [[KY WIDE AREA NETWORK (WAN) AND INTERNET CONTROLS:|'''WIDE AREA NETWORK (WAN) AND INTERNET CONTROLS''']]
'''Regularly Monitor and Test Networks'''
* [[PCI 10:|'''Requirement 10: Track and monitor all access to network resources and cardholder data.''']]
* [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']]
<br>
'''Maintain an Information Security Policy '''
* [[PCI 12:|'''Requirement 12: Maintain a policy that addresses information security.''']]
<br>
<br>
* [[KY EXHIBIT C:|'''EXHIBIT C''']]


--[[User:Mdpeters|Mdpeters]] 08:26, 23 June 2006 (EDT)
----
<br>
* Note that these Payment Card Industry (PCI) Data Security Requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data. Additionally, these security requirements apply to all “system components” which is defined as any network component, server, or application included in, or connected to, the cardholder data environment. Network components, include, but are not limited to, firewalls, switches, routers, wireless access points, network appliances, and other security appliances. Servers include, but are not limited to, web, database, authentication, DNS, mail, proxy, and NTP. Applications include all purchased and custom applications, including internal and external (web) applications.<br>
<br>
--[[User:Mdpeters|Mdpeters]] 07:50, 26 June 2006 (EDT)

Revision as of 11:50, 26 June 2006

Payment Card Industry PCI, VISA CISP

Build and Maintain a Secure Network


Protect Cardholder Data


Maintain a Vulnerability Management Program


Regularly Monitor and Test Networks


Maintain an Information Security Policy




  • Note that these Payment Card Industry (PCI) Data Security Requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data. Additionally, these security requirements apply to all “system components” which is defined as any network component, server, or application included in, or connected to, the cardholder data environment. Network components, include, but are not limited to, firewalls, switches, routers, wireless access points, network appliances, and other security appliances. Servers include, but are not limited to, web, database, authentication, DNS, mail, proxy, and NTP. Applications include all purchased and custom applications, including internal and external (web) applications.


--Mdpeters 07:50, 26 June 2006 (EDT)