Example Pci Dss v3 It Security Policy Pcidss Compliance
Example Pci Dss v3 It Security Policy Pcidss Compliance
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) POLICY OVERVIEW 6
INTRODUCTION 6
PURPOSE 6
SCOPE & APPLICABILITY 7
POLICY 7
VIOLATIONS 7
EXCEPTIONS 7
UPDATES 7
KEY TERMINOLOGY 8
INFORMATION SECURITY GOVERNANCE STRUCTURE 10
INFORMATION SECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS 10
POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE 10
INFORMATION SECURITY CONTROLS 10
INFORMATION SECURITY PROGRAM ACTIVITIES 10
PCI DSS SECTION 1: BUILD & MAINTAIN A SECURE NETWORK 11
REQUIREMENT #1: INSTALL & MAINTAIN A FIREWALL CONFIGURATION TO PROTECT CARDHOLDER DATA 11
PCI DSS CONTROL 1.1 11
PCI DSS CONTROL 1.2 12
PCI DSS CONTROL 1.3 12
PCI DSS CONTROL 1.4 13
PCI DSS CONTROL 1.5 13
REQUIREMENT #2: DO NOT USE VENDOR-SUPPLIED DEFAULTS FOR SYSTEM PASSWORDS & OTHER SECURITY PARAMETERS 14
PCI DSS CONTROL 2.1 14
PCI DSS CONTROL 2.2 14
PCI DSS CONTROL 2.3 15
PCI DSS CONTROL 2.4 15
PCI DSS CONTROL 2.5 15
PCI DSS CONTROL 2.6 16
PCI DSS SECTION 2: PROTECT CARDHOLDER DATA 17
REQUIREMENT #3: PROTECT STORED CARDHOLDER DATA 17
PCI DSS CONTROL 3.1 17
PCI DSS CONTROL 3.2 17
PCI DSS CONTROL 3.3 18
PCI DSS CONTROL 3.4 18
PCI DSS CONTROL 3.5 18
PCI DSS CONTROL 3.6 19
PCI DSS CONTROL 3.7 19
REQUIREMENT #4: ENCRYPT TRANSMISSION OF CARDHOLDER DATA ACROSS OPEN, PUBLIC NETWORKS 20
PCI DSS CONTROL 4.1 20
PCI DSS CONTROL 4.2 20
PCI DSS CONTROL 4.3 21
PCI DSS SECTION 3: MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM 22
REQUIREMENT #5: USE & REGULARLY UPDATE ANTI-VIRUS SOFTWARE OR PROGRAMS 22
PCI DSS CONTROL 5.1 22
PCI DSS CONTROL 5.2 22
PCI DSS CONTROL 5.3 23
PCI DSS CONTROL 5.4 23
REQUIREMENT #6: DEVELOP & MAINTAIN SECURE SYSTEMS & APPLICATIONS 24
PCI DSS CONTROL 6.1 24
PCI DSS CONTROL 6.2 24
PCI DSS CONTROL 6.3 24
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 2 of 105
PCI DSS CONTROL 6.4 25
PCI DSS CONTROL 6.5 25
PCI DSS CONTROL 6.6 26
PCI DSS CONTROL 6.7 27
PCI DSS SECTION 4: IMPLEMENT STRONG ACCESS CONTROL MEASURES 28
REQUIREMENT #7: RESTRICT ACCESS TO CARDHOLDER DATA BY BUSINESS NEED TO KNOW 28
PCI DSS CONTROL 7.1 28
PCI DSS CONTROL 7.2 28
PCI DSS CONTROL 7.3 29
REQUIREMENT #8: ASSIGN A UNIQUE ID TO EACH PERSON WITH COMPUTER ACCESS 29
PCI DSS CONTROL 8.1 29
PCI DSS CONTROL 8.2 30
PCI DSS CONTROL 8.3 31
PCI DSS CONTROL 8.4 31
PCI DSS CONTROL 8.5 31
PCI DSS CONTROL 8.6 32
PCI DSS CONTROL 8.7 32
PCI DSS CONTROL 8.8 33
REQUIREMENT #9: RESTRICT PHYSICAL ACCESS TO CARDHOLDER DATA 33
PCI DSS CONTROL 9.1 33
PCI DSS CONTROL 9.2 34
PCI DSS CONTROL 9.3 34
PCI DSS CONTROL 9.4 34
PCI DSS CONTROL 9.5 35
PCI DSS CONTROL 9.6 35
PCI DSS CONTROL 9.7 35
PCI DSS CONTROL 9.8 36
PCI DSS CONTROL 9.9 36
PCI DSS CONTROL 9.10 37
PCI DSS SECTION 5: REGULARLY MONITOR & TEST NETWORKS 38
REQUIREMENT #10: TRACK & MONITOR ALL ACCESS TO NETWORK RESOURCES & CARDHOLDER DATA 38
PCI DSS CONTROL 10.1 38
PCI DSS CONTROL 10.2 38
PCI DSS CONTROL 10.3 39
PCI DSS CONTROL 10.4 39
PCI DSS CONTROL 10.5 40
PCI DSS CONTROL 10.6 40
PCI DSS CONTROL 10.7 41
PCI DSS CONTROL 10.8 41
PCI DSS CONTROL 10.9 41
REQUIREMENT #11: REGULARLY TEST SECURITY SYSTEMS & PROCESSES 42
PCI DSS CONTROL 11.1 42
PCI DSS CONTROL 11.2 42
PCI DSS CONTROL 11.3 43
PCI DSS CONTROL 11.4 43
PCI DSS CONTROL 11.5 44
PCI DSS CONTROL 11.6 44
PCI DSS SECTION 6: MAINTAIN AN INFORMATION SECURITY POLICY 45
REQUIREMENT #12: MAINTAIN A POLICY THAT ADDRESSES INFORMATION SECURITY FOR ALL PERSONNEL 45
PCI DSS CONTROL 12.1 45
PCI DSS CONTROL 12.2 45
PCI DSS CONTROL 12.3 45
PCI DSS CONTROL 12.4 46
PCI DSS CONTROL 12.5 46
PCI DSS CONTROL 12.6 47
PCI DSS CONTROL 12.7 47
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 3 of 105
PCI DSS CONTROL 12.8 48
PCI DSS CONTROL 12.9 48
PCI DSS CONTROL 12.10 49
PCI DSS CONTROL 12.11 49
APPENDICES 51
APPENDIX A: DATA CLASSIFICATION & HANDLING GUIDELINES 51
A-1: DATA CLASSIFICATION 51
A-2: LABELING 52
A-3: GENERAL ASSUMPTIONS 52
A-4: PERSONALLY IDENTIFIABLE INFORMATION (PII) 52
APPENDIX B: DATA CLASSIFICATION EXAMPLES 55
APPENDIX C: DATA RETENTION PERIODS 56
APPENDIX D: INFORMATION SECURITY ROLES & RESPONSIBILITIES 58
D-1: INFORMATION SECURITY ROLES 58
D-2: INFORMATION SECURITY RESPONSIBILITIES 58
APPENDIX E: INFORMATION SECURITY EXCEPTION REQUEST PROCEDURES 61
APPENDIX F: TYPES OF SECURITY CONTROLS 62
F-1: PREVENTATIVE CONTROLS 62
F-2: DETECTIVE CONTROLS 62
F-3: CORRECTIVE CONTROLS 62
F-4: RECOVERY CONTROLS 62
F-5: DIRECTIVE CONTROLS 62
F-6: DETERRENT CONTROLS 62
F-7: COMPENSATING CONTROLS 62
APPENDIX G: RULES OF BEHAVIOR / USER ACCEPTABLE USE 63
G-1: ACCEPTABLE USE 63
G-2: PROHIBITED USE 63
G-3: ADDITIONAL RULES FOR SECURITY & PRIVILEGED USERS 64
APPENDIX H: GUIDELINES FOR PERSONAL USE OF IT RESOURCES 65
APPENDIX I: RISK MANAGEMENT FRAMEWORK (RMF) 66
I-1: RISK MANAGEMENT OVERVIEW 66
I-2: RISK MANAGEMENT FRAMEWORK (RMF) 66
I-3: ASSESSING RISK 68
APPENDIX J: SYSTEM HARDENING 69
J-1: SERVER-CLASS SYSTEMS 69
J-2: WORKSTATION-CLASS SYSTEMS 69
J-3: NETWORK DEVICES 69
J-4: MOBILE DEVICES 70
J-5: DATABASES 70
APPENDIX K: PCI DSS SELF-ASSESSMENT QUESTIONNAIRE (SAQ) 71
K-1: SAQ OVERVIEW 71
K-2: HOW TO DETERMINE YOUR SAQ 71
ANNEX 1: MANAGEMENT DIRECTIVE TEMPLATE 72
ANNEX 2: USER ACKNOWLEDGEMENT FORM 73
ANNEX 3: CERTIFICATION OF INFORMATION SECURITY AWARENESS TRAINING FORM 74
ANNEX 4: USER EQUIPMENT RECEIPT OF ISSUE TEMPLATE 75
ANNEX 5: SERVICE PROVIDER INDEMNIFICATION & NON-DISCLOSURE AGREEMENT (NDA) TEMPLATE 76
ANNEX 6: INCIDENT RESPONSE FORM 77
ANNEX 7: INFORMATION SECURITY OFFICER (ISO) APPOINTMENT ORDERS TEMPLATE 78
ANNEX 8: ADMINISTRATOR ACCOUNT REQUEST FORM 79
ANNEX 9: CHANGE MANAGEMENT REQUEST FORM 80
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 4 of 105
ANNEX 10: CHANGE CONTROL BOARD (CCB) MEETING FORM 82
ANNEX 11: PORTS, PROTOCOLS & SERVICES DOCUMENTATION FORM 83
ANNEX 12: INCIDENT RESPONSE PLAN (IRP) TEMPLATE 84
ANNEX 13: BUSINESS IMPACT ANALYSIS (BIA) TEMPLATE 97
ANNEX 14: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (DRP) TEMPLATE 99
GLOSSARY: ACRONYMS & DEFINITIONS 103
ACRONYMS 103
DEFINITIONS 103
RECORD OF CHANGES 104
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 5 of 105
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) POLICY OVERVIEW
INTRODUCTION
The Payment Card Industry Data Security Standard (PCI DSS) Program provides definitive information on the prescribed measures
used to establish and enforce the IT security program for PCI DSS v3.2 compliance at ACME Business Consulting, Inc. (ACME).
ACME is committed to protecting its employees, partners, clients and ACME from damaging acts that are intentional or
unintentional. Effective security is a team effort involving the participation and support of every ACME user who interacts with data
and information systems. Therefore, it is the responsibility of every user to know this policy and to conduct their activities
accordingly.
Protecting company information and the systems that collect, process, and maintain this information is of critical importance.
Consequently, the security of information systems must include controls and safeguards to offset possible threats, as well as controls
to ensure accountability, availability, integrity, and confidentiality of the data:
Confidentiality – Confidentiality addresses preserving restrictions on information access and disclosure so that access is
restricted to only authorized users and services.
Integrity – Integrity addresses the concern that sensitive data has not been modified or deleted in an unauthorized and
undetected manner.
Availability – Availability addresses ensuring timely and reliable access to and use of information.
Security measures must be taken to guard against unauthorized access to, alteration, disclosure or destruction of cardholder data
and information systems. This also includes against accidental loss or destruction.
PURPOSE
The purpose of the PCI DSS Information Security Policy is to prescribe a comprehensive framework for:
Protecting the confidentiality, integrity, and availability of ACME’s payment card data and related information systems.
Protecting ACME, its employees, and its clients from illicit use of ACME’s information systems and data.
Ensuring the effectiveness of security controls over data and information systems that support ACME’s operations.
Recognizing the highly networked nature of the current computing environment and provide effective company-wide
management and oversight of those related Information Security risks.
The formation of the policy is driven by many factors, with the key factor being risk. This policy sets the ground rules under which
ACME shall operate and safeguard its data and information systems to both reduce risk and minimize the effect of potential
incidents.
This policy, including related standards and procedures, are necessary to support the management of information risks in daily
operations. The development of policy provides due care to ensure ACME users understand their day-to-day security responsibilities
and the threats that could impact the company.
Implementing consistent security controls across the company will help ACME comply with current and future legal obligations to
ensure long term due diligence in protecting the confidentiality, integrity and availability of ACME data.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 6 of 105
SCOPE & APPLICABILITY
This policy and its related standards, procedures, and guidelines apply to all ACME data, information systems, activities, and assets
owned, leased, controlled, or used by ACME, its agents, contractors, or other business partners on behalf of ACME that are within
scope of the PCI DSS. This policy applies to all ACME employees, contractors, sub-contractors, and their respective facilities
supporting ACME business operations, wherever ACME data is stored or processed, including any third-party contracted by ACME
to handle, process, transmit, store, or dispose of ACME data.
Some standards are explicitly stated for persons with a specific job function (e.g., a System Administrator); otherwise, all personnel
supporting ACME business functions shall comply with the standards. ACME departments shall use this policy and its standards or
may create a more restrictive set of policies and standards, but not one that is less restrictive, less comprehensive, or less compliant
than this policy and its standards.
This policy and its standards do not supersede any other applicable law or higher-level company directive, or existing labor
management agreement in effect as of the effective date of this policy.
Appendix D: Information Security Roles & Responsibilities provides a detailed description of ACME user roles and responsibilities, in
regards to Information Security.
ACME reserves the right to revoke, change, or supplement this policy and its standards, procedures, and guidelines at any time
without prior notice. Such changes shall be effective immediately upon approval by management, unless otherwise stated.
POLICY
ACME shall design, implement and maintain a coherent set of standards and procedures to manage risks to cardholder data, in an
effort to ensure an acceptable level of Information Security risk. Within the scope of the Cardholder Data Environment (CDE), ACME
will protect and ensure the Confidentiality, Integrity, and Availability (CIA) of all its information systems and cardholder data,
regardless of how it is created, distributed, or stored. Security controls will be tailored accordingly so that cost-effective controls
can be applied commensurate with the risk and sensitivity of the data and information system. Security controls must be designed
and maintained to ensure compliance with all legal requirements.
VIOLATIONS
Any ACME user found to have violated any policy, standard, or procedure may be subject to disciplinary action, up to and including
termination of employment. Violators of local, state, Federal, and/or international law may be reported to the appropriate law
enforcement agency for civil and/or criminal prosecution.
EXCEPTIONS
While every exception to a policy or standard potentially weakens protection mechanisms for ACME information systems and
underlying data, occasionally exceptions will exist. Procedures for requesting an exception to policies, procedures or standards are
available in Appendix E: Information Security Exception Request Procedures.
UPDATES
Updates to the PCI DSS Information Security Policy will be announced to employees via management updates or email
announcements. Changes will be noted in the Record of Changes to highlight the pertinent changes from the previous policies,
standards, procedures, and guidelines.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 7 of 105
KEY TERMINOLOGY
In the realm of IT security terminology, the National Institute of Standards and Technology (NIST) IR 7298, Revision 1, Glossary of
Key Information Security Terms, is the primary reference document that ACME uses to define common IT security terms. 1 Key
terminology to be aware of includes:
Asset Custodian: A term describing a person or entity with the responsibility to assure that the assets are properly maintained, to
assure that the assets are used for the purposes intended, and assure that information regarding the equipment is properly
documented.
Cardholder Data Environment (CDE): A term describing the area of the network that possesses cardholder data or sensitive
authentication data and those systems and segments that directly attach or support cardholder processing, storage, or transmission.
Adequate network segmentation, which isolates systems that store, process, or transmit cardholder data from those that do not,
may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment
Contract Owner: A term describing a person or entity that has been given formal responsibility for entering into and managing legal
contracts with service providers. Contract owners are formally responsible for making sure due care and due diligence is performed
with service providers, in regards to PCI DSS compliance.
Control: A term describing any management, operational, or technical method that is used to manage risk. Controls are designed to
monitor and measure specific aspects of standards to help ACME accomplish stated goals or objectives. All controls map to
standards, but not all standards map to Controls.
Control Objective: A term describing targets or desired conditions to be met that are designed to ensure that policy intent is met.
Where applicable, Control Objectives are directly linked to an industry-recognized best practice to align ACME with accepted due
care requirements.
Data: A term describing an information resource that is maintained in electronic or digital format. Data may be accessed, searched,
or retrieved via electronic networks or other electronic data processing technologies. Appendix A: Data Classification & Handling
Guidelines provides guidance on data classification and handling restrictions.
Data Owner: A term describing a person or entity that has been given formal responsibility for the security of an asset, asset
category, or the data hosted on the asset. It does not mean that the asset belongs to the owner in a legal sense. Asset owners are
formally responsible for making sure that assets are secure while they are being developed, produced, maintained, and used.
Encryption: A term describing the conversion of data from its original form to a form that can only be read by someone that can
reverse the encryption process. The purpose of encryption is to prevent unauthorized disclosure of data.
Guidelines: A term describing recommended practices that are based on industry-recognized best practices. Unlike Standards,
Guidelines allow users to apply discretion or leeway in their interpretation, implementation, or use.
Information Security: A term that covers the protection of information against unauthorized disclosure, transfer, modification, or
destruction, whether accidental or intentional. Focus is on the Confidentiality, Integrity, and Availability (CIA) of data.
Information System: A term describing an asset; a system or network that can be defined, scoped, and managed. Includes, but is
not limited to, computers, workstations, laptops, servers, routers, switches, firewalls, and mobile devices.
Least Privilege: A term describing the theory of restricting access by only allowing users or processes the least set of privileges
necessary to complete a specific job or function.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 8 of 105
Policy: A term describing a formally established requirement to guide decisions and achieve rational outcomes. Essentially, a policy
is a statement of expectation that is enforced by standards and further implemented by procedures.
Procedure: A term describing an established or official way of doing something, based on a series of actions conducted in a certain
order or manner. Procedures are the responsibility of the asset custodian to build and maintain, in support of standards and policies.
Sensitive Data: A term that covers categories of data that must be kept secure. Examples of sensitive data include Personally
Identifiable Information, Payment Card Data (PCD), and all other forms of data classified as Restricted or Confidential in Appendix
A: Data Classification & Handling Guidelines.
Service Provider: A term that includes companies that provide services that control or could impact the security of cardholder data.
Examples include managed service providers that provide managed firewalls, IDS and other services as well as hosting providers and
other entities. If a company provides a service that involves only the provision of public network access (such as a
telecommunications company providing just the communication link) that entity would not be considered a service provider for that
service (although they may be considered a service provider for other services).
Sensitive Personally Identifiable Information (sPII): sPII is commonly defined as the first name or first initial and last name, in
combination with any one or more of the following data elements: 2
Social Security Number (SSN) / Taxpayer Identification Number (TIN) / National Identification Number (NIN)
Driver License (DL) or other government-issued identification number (e.g., passport, permanent resident card, etc.)
Financial account number
Payment card number (e.g., credit or debit card)
Standard: A term describing formally established requirements in regard to processes, actions, and configurations.
2The source of this definition comes from two state laws - Oregon Consumer Identity Theft Protection Act - ORS 646A.600(11)(a) -
http://www.leg.state.or.us/ors/646a.html and Massachusetts 201 CMR 17.00” Standards For The Protection of Personal Information of
Residents of The Commonwealth - MA201CMR17.02 http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 9 of 105
INFORMATION SECURITY GOVERNANCE STRUCTURE
In accordance with ISO/IEC 27001, ACME’s ISMS incorporates the typical "Plan-Do-Check-Act" (PDCA), or Deming Cycle, approach:
Plan: This phase involves designing the ISMS, assessing IT-related risks, and selecting appropriate controls.
Do: This phase involves implementing and operating the appropriate security controls.
Check: This phase involves reviewing and evaluating the performance (efficiency and effectiveness) of the ISMS.
Act: This has involves making changes, where necessary, to bring the ISMS back to optimal performance.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 10 of 105
PCI DSS SECTION 1: BUILD & MAINTAIN A SECURE NETWORK
REQUIREMENT #1: INSTALL & MAINTAIN A FIREWALL CONFIGURATION TO PROTECT CARDHOLDER DATA
Firewalls are devices that control computer traffic allowed between ACME’s networks and untrusted networks, as well as traffic into
and out of more sensitive areas within ACME’s internal trusted networks. The Cardholder Data Environment (CDE) is an example of
a more sensitive area within ACME’s trusted network. A firewall examines all network traffic and blocks those transmissions that do
not meet the specified security criteria.
All systems must be protected from unauthorized access from untrusted networks, whether entering the system via the Internet as
e-commerce, employee Internet access through desktop browsers, employee e-mail access, dedicated connections such as
business-to-business connections, via wireless networks, or via other sources. Often, seemingly insignificant paths to and from
untrusted networks can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer
network. Other system components may provide firewall functionality, provided they meet the minimum requirements for firewalls
as provided in PCI DSS Requirement 1. Where other system components are used within the cardholder data environment to provide
firewall functionality, these devices must be included within the scope and assessment of PCI DSS Requirement 1.
Standard: Asset custodians are required to establish firewall and router configuration processes that include the following: 3
(a) Asset custodians are required to establish and maintaining a formal process for approving and testing all network
connections and changes to both firewall and router configurations; 4
(b) Asset custodians are required to establish and maintaining detailed network diagrams. Network diagrams must: 5
1. Document all connections to cardholder data, including any wireless networks;
2. Be reviewed annually; and
3. Be updated as the network changes to reflect the current architecture in place;
(c) Asset custodians asset custodians are required to establish and maintaining detailed data flow diagrams that shows all
cardholder data flows across systems and networks; A firewall is required to be installed at each Internet connection and
between any Demilitarized Zone (DMZ) and ACME’s internal networks; 6
(d) All network devices must have a documented description of any applicable groups, roles, and responsibilities associated
with the device to support configuration management and review processes; 7
(e) A documented business justification is required for all services, protocols, and ports allowed through the firewall(s),
including documentation of security features implemented for those protocols considered to be insecure; 8 and
(f) Firewall and router rule sets must be reviewed at least once every six (6) months and the review must cover: 9
1. Validation of Access Control Lists (ACLs); and
2. Vulnerability management (e.g., validating software and firmware is current).
Supplemental Guidance: Examples of insecure services, protocols, or ports include but are not limited to:
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Telnet
Post Office Protocol (POP3)
Internet Message Access Protocol (IMAP)
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 11 of 105
PCI DSS CONTROL 1.2
Control Intent: The organization builds firewall and router configurations that restrict connections between untrusted networks
and any system components in the Cardholder Data Environment (CDE).
Standard: Asset custodians are required to deploy and configure of firewalls and routers in order to restrict connections between
untrusted networks and any system components within the Cardholder Data Environment (CDE) by the following means: 10
(a) Implementing Access Control Lists (ACLs) and other applicable filters to restrict the inbound and outbound traffic to the
CDE to only that which is necessary, as defined by a business justification; 11
(b) Securing and synchronizing router and firewall configuration files; 12 and
(c) Positioning perimeter firewalls between wireless networks and the CDE. 13
Supplemental Guidance: Not all firewalls and routers have the functionality for the running configuration to be different that the
configuration loaded at startup. However, if the functionality exists, the startup configuration must be synchronized with the correct
running configuration so that a reboot of the device will not degrade network security.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: Asset custodians are required to establish and manage firewall and router configuration standards to prohibit direct public
access between the Internet and any system component in the Cardholder Data Environment (CDE) that includes, but is not limited
to: 14
(a) Demilitarized Zones (DMZ) are required to be implemented to limit inbound traffic to only system components that provide
authorized publicly accessible services, protocols, and ports; 15
(b) Inbound Internet traffic shall be limited to IP addresses within the DMZ; 16
(c) Implement anti-spoofing measures to detect and block forged source IP addresses from entering the network; 17
(d) Unauthorized outbound traffic from the CDE to the Internet are prohibited; 18
(e) Stateful inspection (dynamic packet filtering) must be implemented; 19
(f) System components that store cardholder data must be placed within an internal network zone, segregated from the DMZ
and other untrusted networks; 20 and
(g) Private IP addresses and routing information are prohibited from being disclosed to unauthorized parties. 21
Supplemental Guidance: A stateful firewall keeps track of the state of network connections (such as TCP streams or UDP
communication) and is able to hold significant attributes of each connection in memory. These attributes are collectively known as
the state of the connection, and may include such details as the IP addresses and ports involved in the connection and the sequence
numbers of the packets traversing the connection. Stateful inspection monitors incoming and outgoing packets over time, as well
as the state of the connection, and stores the data in dynamic state tables. This cumulative data is evaluated, so that filtering
decisions would not only be based on administrator-defined rules, but also on context that has been built by previous connections
as well as previous packets belonging to the same connection.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 12 of 105
PCI DSS SECTION 2: PROTECT CARDHOLDER DATA
Standard: Data owners are required to determine the business requirements for data retention and securely dispose of cardholder
data once the data is no longer necessary. This includes, but is not limited to: 37
(a) Implement a data retention and disposal policy that covers cardholder data;
(b) Limiting cardholder data retention time to that which is required for legal, regulatory, and business requirements;
(c) Conducting a quarterly process (automatic or manual) to identify and securely delete stored cardholder data that exceeds
defined retention requirements.
(d) Performing secure deletion of electronic-based cardholder data; and
(e) Shredding physical-based cardholder data.
Supplemental Guidance: Specific requirements for the retention of cardholder data are driven by business needs (e.g., cardholder
data needs to be held for X period for Y business reasons) and documentation should exist to justify the business need.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: Asset custodians are required to ensure sensitive authentication data is not stored after authorization, even if it is
encrypted. ACME is prohibited from storing: 38
(a) The full contents of any track: 39
1. Tracks are from the magnetic stripe located on the back of a card, equivalent data contained on a chip, or
elsewhere.
2. This data is alternatively called full track, track, track 1, track 2, and magnetic-stripe data.
(b) Storing the card verification code or value (three-digit or four-digit number printed on the front or back of a payment card)
used to verify card-not-present transactions; 40 and
(c) Storing the Personal Identification Number (PIN) or the encrypted PIN block. 41
Supplemental Guidance: The following data sources should be examined to verify that the full contents of any track from the
magnetic stripe on the back of card or equivalent data on a chip are not stored under any circumstance:
Incoming transaction data;
All logs (e.g., transaction, history, debugging, error);
History files;
Trace files;
Several database schemas; and
Database contents.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 17 of 105
PCI DSS SECTION 6: MAINTAIN AN INFORMATION SECURITY POLICY
REQUIREMENT #12: MAINTAIN A POLICY THAT ADDRESSES INFORMATION SECURITY FOR ALL PERSONNEL
A strong security policy sets the security tone for the whole entity and informs personnel what is expected of them. All personnel
should be aware of the sensitivity of data and their responsibilities for protecting it. For the purposes of Requirement 12, the term
“personnel” refers to full-time and part-time employees, temporary employees, contractors and consultants who are resident on
the entity’s site or otherwise have access to the Cardholder Data Environment (CDE).
Standard: ACME’s PCI DSS Information Security Policy fulfills the requirement within PCI DSS for a security policy. ACME’s
management is responsible for the annual review of the PCI DSS Information Security Policy, as well as updates, as necessary. 218
Supplemental Guidance: A company's information security policy creates the roadmap for implementing security measures to
protect its most valuable assets. All personnel should be aware of the sensitivity of data and their responsibilities for protecting it.
Procedures: While, ACME’s PCI DSS Information Security Policy establishes the documentation requirement for PCI DSS, asset
custodians and data owners are required to:
Review and update the PCI DSS Information Security Policy, as needed; and
Disseminate the PCI DSS Information Security Policy to staff and subordinates to ensure all ACME personnel who interact
with the CDE understand their requirements.
Standard: Asset custodians and data owners are required to implement a risk-assessment process that: 219
(a) Is performed at least annually and upon significant changes to the environment (e.g., acquisition, merger, relocation);
(b) Identifies critical assets, threats, and vulnerabilities; and
(c) Results in a formal risk assessment.
Supplemental Guidance: Examples of risk assessment methodologies include but are not limited to
OCTAVE;
ISO 27005; and
NIST SP 800-30.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: Asset custodians and data owners are required to develop and implement usage policies for critical technologies and
defining the proper use of these technologies. Usage policies require the following: 220
(a) Explicit approval by authorized parties; 221
(b) Authentication for use of the technology; 222
(c) A list of all such devices and personnel with access; 223
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 45 of 105
(d) A method to accurately and readily determine owner, contact information, and purpose (e.g., labeling, coding, and/or
inventorying of devices); 224
(e) Acceptable uses of the technology; 225
(f) Acceptable network locations for the technologies; 226
(g) List of company-approved products; 227
(h) Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity; 228
(i) Activation of remote-access technologies for vendors and business partners only when needed by vendors and business
partners, with immediate deactivation after use; 229 and
(j) For personnel accessing cardholder data via remote-access technologies, prohibit copy, move, and storage of cardholder
data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need. 230
Supplemental Guidance: Appendix G: Rules of Behavior / User Acceptable Use covers ACME’s rules of behavior. Examples of critical
technologies include, but are not limited to:
Remote-access technologies;
Wireless technologies;
Removable electronic media
Laptops;
Tablets;
Smart phones;
Personal data/digital assistants (PDAs),
E-mail usage; and
Internet usage.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: ACME's Human Resources (HR) department is required to ensure that information security policies, standards and
procedures clearly define information security responsibilities for all personnel.
Supplemental Guidance: Information Security roles and responsibilities are defined in Appendix D: Information Security Roles &
Responsibilities.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: ACME’s assigned Information Security Officer (ISO) is required to perform or delegate the following information security
management responsibilities: 232
(a) Establish, document, and distribute security policies and procedures; 233
(b) Monitor and analyze security alerts and information; 234
(c) Distribute and escalate security alerts to appropriate personnel; 235
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 46 of 105
(d) Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective
handling of all situations; 236
(e) Administer user accounts, including additions, deletions, and modifications; 237 and
(f) Monitor and control all access to data. 238
Supplemental Guidance: Information Security roles and responsibilities are defined in Appendix D: Information Security Roles &
Responsibilities.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: ACME’s assigned Information Security Officer (ISO), in conjunction with ACME’s Human Resources (HR) department, is
required to develop and implement a formal security awareness program to make all personnel aware of the importance of
cardholder data security, which includes: 239
(a) Educating personnel upon hire and at least annually; 240 and
(b) Requiring applicable personnel to acknowledge at least annually that they have read and understand the PCI DSS
Information Security Policy and procedures. 241
Supplemental Guidance: Awareness methods can vary depending on the role of the personnel and their level of access to the
cardholder data. If personnel are not educated about their security responsibilities, security safeguards and processes that have
been implemented may become ineffective through errors or intentional actions.
Requiring an acknowledgement by personnel in writing or electronically helps ensure that they have read and understood the
security policies/procedures, and that they have made and will continue to make a commitment to comply with these policies.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Standard: ACME's Human Resources (HR) department is responsible for screening potential personnel prior to hire to minimize the
risk of attacks from internal sources. 242
Supplemental Guidance: For those potential personnel to be hired for certain positions such as store cashiers who only have access
to one card number at a time when facilitating a transaction, this requirement is a recommendation only. Examples of background
checks include, but are not limited to:
Previous employment history;
Criminal record;
Credit history; and Reference checks.
Procedures: [insert a description of the actual procedures that you follow to meet this requirement]
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 47 of 105
APPENDICES
RESTRICTED · SIGNIFICANT DAMAGE would occur if Restricted information were to become available to
unauthorized parties either internal or external to ACME.
Potential
Impact of · Impact could include negatively affecting ACME’s competitive position, violating regulatory
Loss requirements, damaging the company’s reputation, violating contractual requirements, and
posing an identity theft risk.
PUBLIC · NO DAMAGE would occur if Public information were to become available to parties either
Potential internal or external to ACME.
Impact of
Loss · Impact would not be damaging or a risk to business operations.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 51 of 105
A-5: DATA HANDLING GUIDELINES
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 53 of 105
APPENDIX B: DATA CLASSIFICATION EXAMPLES
The table below shows examples of common data instances that are already classified to simplify the process. This list is not inclusive
of all types of data, but it establishes a baseline for what constitutes data sensitivity levels and will adjust to accommodate new
types or changes to data sensitivity levels, when necessary.
IMPORTANT: You are instructed to classify data more sensitive than this guide, if you feel that is warranted by the content.
CONFIDENTIAL
INTERNAL USE
RESTRICTED
DATA
PUBLIC
SENSITIVE DATA ELEMENTS
CLASS
Medical Data X
Workers Compensation Claim Data X
Education Data X
Dependent or Beneficiary Data X
Business Plan (including marketing strategy) X
Financial Data Related to Revenue Generation X
Sales &
Legal Billings X
Strategic
Budget-Related Data X
Unannounced Merger and Acquisition Information X
Trade Secrets (e.g., design diagrams, competitive information, etc.) X
Electronic Payment Information (Wire Payment / ACH) X
Paychecks X
Incentives or Bonuses (amounts or percentages) X
Financial Data
Operating
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 55 of 105
APPENDIX D: INFORMATION SECURITY ROLES & RESPONSIBILITIES
The ISO is accountable to the organization’s senior management for the development and
Information Security implementation of the information security program. The ISO will be the central point of
Officer (ISO) contact for setting the day-to-day direction of the information security program and its
overall goals, objectives, responsibilities, and priorities
Business or department manager with budgetary authority over the system(s) with
Asset Owners
responsibility for the basic operation and maintenance of the system(s).
Under the direction of the ISO, asset custodians (e.g., system & network administrators) are
responsible for the technical implementation and management of the PCI DSS Information
Asset Custodians Security Policy. Party responsible for certain aspects of system security, such as adding and
deleting user accounts, as authorized by the asset owner, as well as normal operations of the
system in keeping with job requirements.
All employees (and contractors) are considered both custodians and users of the information
End Users systems and data on their issued information systems and are required to uphold all
applicable PCI DSS Information Security Policy policies, procedures, standards, and guidelines.
▪ Oversee and approve the company’s information security program including the employees,
contractors and vendors who safeguard the company’s information systems and data, as well as the
physical security precautions for employees and visitors;
▪ Ensure an appropriate level of protection for the company’s information resources; whether retained
Information
in-house or under the control of outsourced contractors;
Security Officer
▪ Issue the PCI DSS Information Security Policy policies and guidance that establish a framework for an
(ISO)
Information Security Management System (ISMS);
▪ Identify protection goals, objectives and metrics consistent with corporate strategic plan;
▪ Ensure appropriate procedures are in place for Security Testing & Evaluation (ST&E) for all
information systems; and monitor, evaluate, and report to company management on the status of IT
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 58 of 105
APPENDIX I: RISK MANAGEMENT FRAMEWORK (RMF)
ACME maintains an information security risk management program to evaluate threats and vulnerabilities in order to assure the
creation of appropriate remediation plans.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 66 of 105
The Risk Management Framework (RMF) is based off of NIST SP 800-37 257:
Categorize. The information system and the information being processed, stored, and transmitted by the system, based on
the potential impact to the organization should events occur to put the system and its information at risk. The organization
assigns a security impact value (low, medium, high) for the security objectives of confidentiality, integrity, or availability for
the information and information systems that are needed by the organization to accomplish its mission, protect its assets
and individuals, fulfill its legal responsibilities, and maintain its day-to-day functions.
Select. An appropriate set of security controls are selected for the information system after categorizing and determining
the minimum security requirements. Organizations meet the minimum security requirements by selecting an appropriately
tailored set of baseline security controls based on an assessment of risk and local conditions, including the organization’s
specific security requirements, threat information, cost-benefit analyses, or special circumstances.
Implement. Security controls must be properly installed and configured in the information system. Checklists of security
settings are useful tools that have been developed to guide IT administrators and security personnel in selecting effective
security settings that will reduce the risks and protect systems from attacks. A checklist, sometimes called a security
configuration guide, lockdown guide, hardening guide, security technical implementation guide, or benchmark, is a series
of instructions for configuring an IT product to an operational environment.
Assess. Security Testing & Evaluation (ST&E) is used to determine the extent to which the controls are implemented
correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements
for the system.
Authorize. Based upon a determination of the risk to operations, organizational assets, or to individuals resulting from the
operation of the information system and the determination that this risk is acceptable.
Monitor. Assessing selected security controls in the information system on a continuous basis including documenting
changes to the system, conducting security impact analyses of the changes, and reporting the security status of the system
to appropriate organization officials on a regular basis.
257 http://csrc.nist.gov/publications/PubsSPs.html
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 67 of 105
ANNEX 12: INCIDENT RESPONSE PLAN (IRP) TEMPLATE
By the very nature of every incident being somewhat different, the guidelines provided in this Incident Response Plan (IRP) do not
comprise an exhaustive set of incident handling procedures. These guidelines document basic information about responding to
incidents that can be used regardless of hardware platform or operating system. This plan describes the stages of incident
identification and handling, with the focus on preparation and follow-up, including reporting guidelines and requirements.
PLAN OBJECTIVES
The objective of Incident Response Plan (IRP) is to:
Limit immediate incident impact to customers and business partners;
Recover from the incident;
Determine how the incident occurred;
Find out how to avoid further exploitation of the same vulnerability;
Avoid escalation and further incidents;
Assess the impact and damage in terms of financial impact and loss of image;
Update company policies, standards, procedures, and guidelines as needed; and
Determine who initiated the incident for possible criminal and/or civil prosecution.
IRP ACTIONS
Incident Responders (IR) will be their experience and best judgment to respond to potential incidents in a manner consistent with
the severity level posed by the incident. If necessary, the IR will obtain external assistance to help with the triage and cleanup
operations.
INCIDENT DISCOVERY
Denial of Service
You might be experiencing a DoS if you see…
(DoS) Examples
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 84 of 105
Malicious Software
You might be infected with malware if you see…
(malware) Examples
• Original source of the message is not an authoritative computer security group, but a government agency or an
important official person
A user receives a virus
• No links to outside sources
hoax message.
• Tone and terminology attempt to invoke panic or a sense of urgency
• Urges recipients to delete certain files and forward the message to others
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 85 of 105