PCI DSS Requirements Explained
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that store, process, or transmit credit card information maintain a secure environment. The standard is organized into 12 high-level requirements that businesses must meet to protect cardholder data.
The 12 PCI DSS Requirements
- Build and Maintain a Secure Network — Install and maintain firewall configurations to protect cardholder data.
- Protect Cardholder Data — Do not store sensitive authentication data after authorization. Protect stored cardholder data through encryption and other means.
- Vulnerability Management — Protect systems against malware and keep security software up to date. Develop and maintain secure systems and applications.
- Access Control — Restrict access to cardholder data by business need-to-know. Assign a unique ID to each person with computer access. Restrict physical access to cardholder data.
- Monitoring and Testing — Track and monitor all access to network resources and cardholder data. Regularly test security systems and networks.
- Security Policies — Maintain a policy that addresses information security for all personnel.
- Secure Network Architecture — Implement network security controls such as firewalls and network segmentation.
- Strong Access Control Measures — Implement identification and authentication mechanisms for access to system components.
- Restrict Physical Access — Implement physical access controls for facilities that house systems storing cardholder data.
- Log and Monitor — Implement logging, monitoring, and alerting to detect and respond to security events.
- Test Security Systems — Regularly test security systems, networks, and applications for vulnerabilities.
- Information Security Policy — Maintain an information security policy and ensure all personnel are aware of and follow it.
Each requirement contains multiple sub-requirements and testing procedures. The exact controls you must implement depend on your SAQ type and scope. Understanding these requirements helps you prioritize security efforts and prepare for validation.