logo

PCI DSS


Summary

PCI DSS is the global data security standard adopted by payment card brands for all entities that process, store or transmit cardholder data and/or sensitive authentication data. It consists of several steps that mirror security best practices. The version used in this section is PCI DSS v4.0, March 2022.


Definitions

DefinitionRequirements
PCI-1_2_2. Network security controls are configured and maintained
PCI-1_2_5. Network security controls are configured and maintained
PCI-1_2_6. Network security controls are configured and maintained
PCI-1_3_1. Inbound traffic to the cardholder data environment is restricted
PCI-1_3_2. Outbound traffic to the cardholder data environment is restricted
PCI-1_4_2. Restrict inbound traffic from untrusted networks
PCI-1_4_3. Implement anti-spoofing measures
PCI-1_4_4. Network connections between trusted and untrusted networks are controlled
PCI-1_4_5. Do not disclosure of internal IP addresses and routing information
PCI-1_5_1. Implement security controls on any computing devices
PCI-2_2_2. System components are configured and managed securely
PCI-2_2_4. Remove or disable all unnecessary functionality
PCI-2_2_5. System components are configured and managed securely
PCI-2_2_6. Configure secure system parameters to prevent misuse
PCI-2_2_7. System components are configured and managed securely
PCI-2_3_1. Wireless environments are configured and managed securely
PCI-2_3_2. Wireless environments are configured and managed securely
PCI-3_2_1. Retain account data only where necessary and deleted when no longer needed
PCI-3_3_1. Sensitive authentication data (SAD) is not stored after authorization
PCI-3_3_2. Sensitive authentication data (SAD) is encrypted using strong cryptography
PCI-3_3_3. Sensitive authentication data (SAD) is not stored after authorization
PCI-3_4_1. Data is masked when displayed
PCI-3_4_2. Use secure remote-access technologies
PCI-3_5_1. Primary account number (PAN) is secured wherever it is stored
PCI-3_6_1. Protect cryptographic keys used to protect stored account data
PCI-3_7_1. Generation of strong cryptographic keys
PCI-3_7_2. Secure cryptographic key distribution
PCI-3_7_3. Secure cryptographic key storage
PCI-3_7_7. Prevention of unauthorized substitution of cryptographic keys
PCI-3_7_9. Secure transmission and storage of cryptographic keys
PCI-4_2_1. Strong cryptography during transmission
PCI-4_2_2. Strong cryptography to protect data
PCI-5_2_1. Deploy an anti-malware solution on system components
PCI-5_3_2. Anti-malware mechanisms and processes are active and monitored
PCI-5_3_4. Enable audit logs for the anti-malware solution
PCI-6_2_4. Software engineering techniques to prevent or mitigate common software attacks
PCI-6_3_3. Security vulnerabilities are identified and addressed
PCI-6_4_1. Public-facing web applications are protected against attacks
PCI-6_4_3. Public-facing web applications are protected against attacks
PCI-6_5_4. Changes to all system components are managed securely
PCI-6_5_5. Changes to all system components are managed securely
PCI-6_5_6. Changes to all system components are managed securely
PCI-7_2_2. Access to system components and data is appropriately defined and assigned
PCI-7_2_3. Required privileges are approved by authorized personnel
PCI-7_2_5. Access to system components and data is defined and assigned
PCI-7_2_6. Access to system components and data is defined and assigned
PCI-7_3_1. Access to system components and data is managed via an access control system
PCI-7_3_2. Access to system components and data is managed via an access control system
PCI-7_3_3. Access control system is set to deny by default
PCI-8_2_1. Assign a unique ID before access to system components
PCI-8_2_3. User identification for users and administrators are strictly managed
PCI-8_2_4. User identification for users and administrators are strictly managed
PCI-8_2_5. Access for terminated users is immediately revoked
PCI-8_2_6. Inactive user accounts are removed within 90 days of inactivity
PCI-8_2_8. User identification for users and administrators are strictly managed
PCI-8_3_1. Strong authentication for users and administrators is established
PCI-8_3_2. Strong authentication for users and administrators is established
PCI-8_3_3. Strong authentication for users and administrators is established
PCI-8_3_5. Initial or reset password or passphrase used by authorized user
PCI-8_3_6. Passwords or passphrases with minimum level of complexity
PCI-8_3_7. A previously used password cannot be used to gain access to an account
PCI-8_3_9. A password or passphrase cannot be used indefinitely
PCI-8_3_11. An authentication factor cannot be used by anyone other than the user assigned
PCI-8_4_1. Multi-factor authentication (MFA) is implemented to secure access
PCI-8_4_2. Multi-factor authentication (MFA) is implemented to secure access
PCI-8_4_3. Multi-factor authentication (MFA) is implemented to secure access
PCI-8_5_1. Multi-factor authentication (MFA) systems are configured to prevent misuse
PCI-8_6_3. Use of application and associated authentication factors is strictly managed
PCI-9_2_2. Physical access controls manage entry into systems containing data
PCI-9_2_3. Physical access controls manage entry into systems containing data
PCI-9_4_1. Media with cardholder data is securely stored and accessed
PCI-9_4_3. Media is secured and tracked when transported
PCI-9_4_7. Media is secured and tracked when transported
PCI-10_2_1. Audit logs are enabled and active for all system components
PCI-10_3_2. Audit logs are protected from destruction and unauthorized modifications
PCI-10_6_1. System clocks and time are synchronized
PCI-10_7_2. Failures of critical security control systems are detected and responded to promptly
PCI-11_2_1. Wireless access points are identified and monitored
PCI-12_9_1. Third-party service providers support their customers
PCI-3_6_1_1. Protect cryptographic keys used to protect stored account data
PCI-3_6_1_2. Protect cryptographic keys used to protect stored account data
PCI-10_2_1_3. Audit logs are enabled and active for all system components
PCI-10_2_1_4. Audit logs are enabled and active for all system components

Last updated

2023/09/18