logo

Database

PCI DSS

Last updated: 2023/09/18
logo

PCI DSS is the global data security standard adopted by payment card brands for all entities that process, store or transmit cardholder data and/or sensitive authentication data. It consists of several steps that mirror security best practices. The version used in this section is PCI DSS v4.0, March 2022.

Control-Requirement Mapping

DefinitionRequirements
1_2_2. Network security controls are configured and maintained
1_2_5. Network security controls are configured and maintained
1_2_6. Network security controls are configured and maintained
1_3_1. Inbound traffic to the cardholder data environment is restricted
1_3_2. Outbound traffic to the cardholder data environment is restricted
1_4_2. Restrict inbound traffic from untrusted networks
1_4_3. Implement anti-spoofing measures
1_4_4. Network connections between trusted and untrusted networks are controlled
1_4_5. Do not disclosure of internal IP addresses and routing information
1_5_1. Implement security controls on any computing devices
2_2_2. System components are configured and managed securely
2_2_4. Remove or disable all unnecessary functionality
2_2_5. System components are configured and managed securely
2_2_6. Configure secure system parameters to prevent misuse
2_2_7. System components are configured and managed securely
2_3_1. Wireless environments are configured and managed securely
2_3_2. Wireless environments are configured and managed securely
3_2_1. Retain account data only where necessary and deleted when no longer needed
3_3_1. Sensitive authentication data (SAD) is not stored after authorization
3_3_2. Sensitive authentication data (SAD) is encrypted using strong cryptography
3_3_3. Sensitive authentication data (SAD) is not stored after authorization
3_4_1. Data is masked when displayed
3_4_2. Use secure remote-access technologies
3_5_1. Primary account number (PAN) is secured wherever it is stored
3_6_1. Protect cryptographic keys used to protect stored account data
3_7_1. Generation of strong cryptographic keys
3_7_2. Secure cryptographic key distribution
3_7_3. Secure cryptographic key storage
3_7_7. Prevention of unauthorized substitution of cryptographic keys
3_7_9. Secure transmission and storage of cryptographic keys
4_2_1. Strong cryptography during transmission
4_2_2. Strong cryptography to protect data
5_2_1. Deploy an anti-malware solution on system components
5_3_2. Anti-malware mechanisms and processes are active and monitored
5_3_4. Enable audit logs for the anti-malware solution
6_2_4. Software engineering techniques to prevent or mitigate common software attacks
6_3_3. Security vulnerabilities are identified and addressed
6_4_1. Public-facing web applications are protected against attacks
6_4_3. Public-facing web applications are protected against attacks
6_5_4. Changes to all system components are managed securely
6_5_5. Changes to all system components are managed securely
6_5_6. Changes to all system components are managed securely
7_2_2. Access to system components and data is appropriately defined and assigned
7_2_3. Required privileges are approved by authorized personnel
7_2_5. Access to system components and data is defined and assigned
7_2_6. Access to system components and data is defined and assigned
7_3_1. Access to system components and data is managed via an access control system
7_3_2. Access to system components and data is managed via an access control system
7_3_3. Access control system is set to deny by default
8_2_1. Assign a unique ID before access to system components
8_2_3. User identification for users and administrators are strictly managed
8_2_4. User identification for users and administrators are strictly managed
8_2_5. Access for terminated users is immediately revoked
8_2_6. Inactive user accounts are removed within 90 days of inactivity
8_2_8. User identification for users and administrators are strictly managed
8_3_1. Strong authentication for users and administrators is established
8_3_2. Strong authentication for users and administrators is established
8_3_3. Strong authentication for users and administrators is established
8_3_5. Initial or reset password or passphrase used by authorized user
8_3_6. Passwords or passphrases with minimum level of complexity
8_3_7. A previously used password cannot be used to gain access to an account
8_3_9. A password or passphrase cannot be used indefinitely
8_3_11. An authentication factor cannot be used by anyone other than the user assigned
8_4_1. Multi-factor authentication (MFA) is implemented to secure access
8_4_2. Multi-factor authentication (MFA) is implemented to secure access
8_4_3. Multi-factor authentication (MFA) is implemented to secure access
8_5_1. Multi-factor authentication (MFA) systems are configured to prevent misuse
8_6_3. Use of application and associated authentication factors is strictly managed
9_2_2. Physical access controls manage entry into systems containing data
9_2_3. Physical access controls manage entry into systems containing data
9_4_1. Media with cardholder data is securely stored and accessed
9_4_3. Media is secured and tracked when transported
9_4_7. Media is secured and tracked when transported
10_2_1. Audit logs are enabled and active for all system components
10_3_2. Audit logs are protected from destruction and unauthorized modifications
10_6_1. System clocks and time are synchronized
10_7_2. Failures of critical security control systems are detected and responded to promptly
11_2_1. Wireless access points are identified and monitored
12_9_1. Third-party service providers support their customers
3_6_1_1. Protect cryptographic keys used to protect stored account data
3_6_1_2. Protect cryptographic keys used to protect stored account data
10_2_1_3. Audit logs are enabled and active for all system components
10_2_1_4. Audit logs are enabled and active for all system components