PCI Compliant Requirements & PCI Compliant Services Matrix

The PCI DSS (Payment Card Industry Data Security Standards) require the use of certain technical security services. Below is a matrix of the requirements paired with actual PCI compliant services that fulfill them. Click on each PCI compliant service to read more about them.

Each service is part of a complete PCI hosting package. Download our PCI Compliant Hosting white paper to access a diagram of a PCI stack and read more about the technical, physical and administrative security required of companies that deal with credit cardholder data.

PCI Requirements PCI Compliant Services
10.6: Review logs for all system components at least daily.10.3: Record at least the following audit trail entries for all system components for each event – including user ID, type of event, data and time, success or failure indication, etc.

10.7: Retain audit trail history for at least one year, with a min. of three months immediately available for analysis (online, archived, or restorable from back-up).

daily-log-reviewDaily Log Review
Monitoring and analyzing user and system activity can help detect patterns of normal use and potentially malicious users. Daily log review is the process of regularly reviewing and reporting on log activity. While some providers may offer logging (tracking user activity, transporting and storing log events), Online Tech provides the complete logging experience with daily log review, analysis, and monthly reporting.
10.5.5: Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts.11: Deploy file integrity monitoring tools to alert personnel to unauthorized modification of critical system files, configuration files or content files. Configure the software to perform critical file comparisons at least weekly. file-integrity-monitoringFile Integrity Monitoring (FIM)
Monitoring your files and systems provides valuable insight into your technical environment and provides an additional layer of data security. File integrity monitoring (FIM) is a service that can monitor any changes made to your files.
6.6: For public-facing web applications, ensure:Verify that public-facing web applications are reviewed (using either manual or automated vulnerability security assessment tools or methods), as follows:

  • At least annually and after any changes
  • By an organization that specializes in application security
  • That all vulnerabilities are corrected, and the application is re-evaluated after corrections

Verify that a web-application firewall is in front of public-facing web applications to detect and prevent web-based attacks.

web-application-firewallWeb Application Firewall (WAF)
Protect your web servers and databases from malicious online attacks by investing in a web application firewall (WAF). A network firewall’s open port allows Internet traffic to access your websites, but it can also open up servers to potential application attacks (database commands to delete or extract data are sent through a web application to the backend database) and other malicious attacks.
8.3: Incorporate two-factor authentication for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties.(For example, remote authentication and dial-in service (RADIUS) with tokens; or other technologies that facilitate two-factor authentication. two-factor-authenticationTwo-Factor Authentication
Online Tech offers two-factor authentication for VPN (Virtual Private Network) access as an optimal security measure to protect against online fraud and unauthorized access for clients that connect to their networks from a remote location. 
11.2: Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). vulnerability-scanningVulnerability Scanning
Vulnerability scanning checks your firewalls, networks and ports. It is a web application that can detect outdated versions of software, web applications that aren’t securely coded, or misconfigured networks.
6.1: Ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. Install critical security patches within one month of release. patch-managementPatch Management
Why is patch management so important? If your servers aren’t updated and managed properly, your data and applications are left vulnerable to hackers, identity thieves and other malicious attacks against your systems.
5.1: Deploy anti-virus software on all
systems commonly affected by malicious
software (particularly personal computers
and servers).5.2: Ensure that all anti-virus mechanisms are current, actively running, and generating audit logs.
anti-virusAntivirus
Antivirus software can detect and remove malware in order to protect your data from malicious attacks. Significantly reduce your risks of data theft or unauthorized access by investing in a simple and effective solution for optimal server protection.
4.1: Use strong cryptography and security protocols (for example, SSL/TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks. ssl-certificateSSL Certificate
In order to safely transmit information online, a SSL (Secure Sockets Layer) certificate provides the encryption of sensitive data, including financial and healthcare. A SSL certificate verifies the identity of a website, allowing web browsers to display a secure website.

For more PCI resources, check out:
PCI Compliant Hosting FAQ
What Is PCI Compliance?
Benefits of PCI Compliant Hosting
PCI Glossary of Terms
Who Needs to Be PCI Compliant?
PCI Compliant Case Studies

Related Links:
Understanding Big PCI Compliance Pitfalls
PCI DSS (Payment Card Industry Data Security Standards) compliance is important to any company processing, storing, or transmitting cardholder data. However, its 12 security requirements are complex (each requirement is broken down into many different sub-categories so that at the … Continue reading →

ACH Fraud Hurts Bank Reputations
A few months ago Guardian Analytics did a study working in conjunction with the Ponemon Institute, and found that small and medium sized businesses (SMBs) are growing more upset with the account takeovers from ACH fraud (Automated Clearing House), and … Continue reading →

PCI Compliant Clouds Allow for Secure Mobile Banking
Mobile banking is growing exponentially. It’s projected within a Juniper Research study that over a billion people will be using their mobile devices to access their banking services by 2017, according to a ComputerWeekly.com report. Many users have found that … Continue reading →

References:
Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 2.0 (PDF)

facebooktwittergoogle_pluspinterestlinkedinmail
This entry was posted in PCI Compliance and tagged , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

* Copy This Password *

* Type Or Paste Password Here *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>