CIS Controls v8 Mapping To PCI v3.2.1 Final 08-19-2021
CIS Controls v8 Mapping To PCI v3.2.1 Final 08-19-2021
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, NY 12061
518.266.3460
[email protected]
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, NY 12061
518.266.3460
[email protected]
Editors
Thomas Sager
Contributors
License for Use
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International Publi
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
To further clarify the Creative Commons license related to the CIS Controls® content, you are authorized to copy an
organization and outside of your organization for non-commercial purposes only, provided that (i) appropriate credit
you remix, transform or build upon the CIS Controls, you may not distribute the modified materials. Users of the CIS
(http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are employing th
subject to the prior approval of CIS® (Center for Internet Security, Inc.).
tives 4.0 International Public License (the link can be found at
ou are authorized to copy and redistribute the content as a framework for use by you, within your
ed that (i) appropriate credit is given to CIS, and (ii) a link to the license is provided. Additionally, if
materials. Users of the CIS Controls framework are also required to refer to
e that users are employing the most up-to-date guidance. Commercial use of the CIS Controls is
Mapping Methodology
Mapping Methodology
This page describes the methodology used to map the CIS Critical Security Controls to Payment Card Indu
Reference link for PCI DSS v3.2.1: https://www.pcisecuritystandards.org/document_library
The methodology used to create the mapping can be useful to anyone attempting to understand the relatio
The overall goal for CIS mappings is to be as specific as possible, leaning towards under-mapping versus
The general strategy used is to identify all of the aspects within a control and attempt to discern if both item
For a defensive mitigation to map to this CIS Safeguard it must have at least one of the following:
• A clearly documented process, covering both new employees and changes in access.
• All relevant enteprise access control must be covered under this process, there can be no seperation whe
• Automated tools are ideally used, such as a SSO provider or routing access control through a directory s
• The same process is followed every time a user's rights change, so a user never amasses greater rights
If the two concepts are effectively equal, they are mapped with the relationship "equivalent". If they are not
The relationships can be further analyzed to understand how similar or different the two defensive mitigatio
The relationship column will contain one of 5 possible values:
• Equivalent: The defensive mitigation contains the exact same security concept as the CIS Control.
• Superset: The CIS Control is partially or mostly related to the defensive mitigation in question, but the CIS
• Subset: The CIS Safeguard is partially or mostly related, yet is still subsumed within the defensive mitigat
• Intersects: Although the CIS Control and the defensive mitigation have many similarities, neither is contai
awareness program and another requiring an information governance program.
• No relationship: This will be represented by a blank cell.
The relationships should be read from left to right, like a sentence. CIS Safeguard X is Equivalent to this <
Examples:
CIS Safeguard 16.8 "Separate Production and Non-Production Systems" is EQUIVALENT to NIST CSF PR
CIS Safeguard 3.5 "Securely Dispose of Data" is a SUBSET of NIST CSF PR.DS-3 "Assets are formally m
The CIS Controls are written with certain principles in mind, such as only having one ask per Safeguard. T
can often be "Subset."
Mappings are available from a variety of sources online, and different individuals may make their own deci
other mapping.
If you have comments, questions, or would like to report an error, please join the CIS Controls Mappings c
https://workbench.cisecurity.org/communities/94
CIS Controls Navigator
Remember to download the CIS Controls Version 8 Guide where you can learn more about:
A free tool with a dynamic list of the CIS Safeguards that can be filtered by Implemtation Groups and
mappings to multiple frameworks.
https://www.cisecurity.org/controls/v8/
Join our community where you can discuss the CIS Controls with our global army of experts and
voluneers!
https://workbench.cisecurity.org/dashboard
CIS CIS Security
Asset Type Title
Control Safeguard Function
3 Data Protection
5 Account Management
Use processes and tools to assign and manage
accounts, including administrator accounts, as
assets and software.
Restrict Unnecessary or
9 9.4 Applications Protect Unauthorized Browser and Email
Client Extensions
11 Data Recovery
Network Infrastructure
12
Management
18 Penetration Testing
of Enterprise Assets
Superset
x Superset
Use a passive discovery tool to identify assets connected to
the enterprise’s network. Review and use scans to update
the enterprise’s asset inventory at least weekly, or more
frequently.
x Superset
of Software Assets
Equivalent
Superset
Superset
Superset
Encrypt sensitive data in transit. Example implementations
can include: Transport Layer Security (TLS) and Open x x
Secure Shell (OpenSSH).
Superset
Subset
Subset
Subset
Superset
Segment data processing and storage based on the
sensitivity of the data. Do not process sensitive data on x x
enterprise assets intended for lower sensitivity data.
Segment data processing and storage based on the
sensitivity of the data. Do not process sensitive data on x x
enterprise assets intended for lower sensitivity data.
Intersects
Intersects
Superset
Subset
Equivalent
Manage default accounts on enterprise assets and
software, such as root, administrator, and other pre-
configured vendor accounts. Example implementations can x x x
include: disabling default accounts or making them
unusable.
Manage default accounts on enterprise assets and
software, such as root, administrator, and other pre-
configured vendor accounts. Example implementations can x x x
include: disabling default accounts or making them
unusable.
Equivalent
Subset
Equivalent
Equivalent
Subset
Establish and maintain an inventory of all accounts
managed in the enterprise. The inventory must include both
user and administrator accounts. The inventory, at a
minimum, should contain the person’s name, username, x x x
start/stop dates, and department. Validate that all active Superset
accounts are authorized, on a recurring schedule at a
minimum quarterly, or more frequently.
Subset
Subset
Subset
Superset
Superset
Equivalent
Subset
Subset
ty Management
Subset
Superset
Superset
Superset
Subset
Centralize, to the extent possible, audit log collection and
x x
retention across enterprise assets.
Subset
Equivalent
Equivalent
Collect service provider logs, where supported. Example
implementations include collecting authentication and
x
authorization events, data creation and disposal events,
and user management events.
r Protections
Subset
Subset
Subset
Subset
Superset
Protect recovery data with equivalent controls to the
original data. Reference encryption or data separation, x x x
based on requirements.
Superset
Establish and maintain an isolated instance of recovery
data. Example implementations include, version controlling
x x x
backup destinations through offline, cloud, or off-site
systems or services.
Superset
Superset
Superset
Superset
Superset
Subset
Superset
Superset
Superset
Superset
Superset
d Skills Training
a security awareness program to influence behavior among the
y conscious and properly skilled to reduce cybersecurity risks to
Superset
Establish and maintain a security awareness program. The
purpose of a security awareness program is to educate the
enterprise’s workforce on how to interact with enterprise
assets and data in a secure manner. Conduct training at x x x
hire and, at a minimum, annually. Review and update
content annually, or when significant enterprise changes
occur that could impact this Safeguard.
Superset
Equivalent
Superset
ecurity
Equivalent
Establish and maintain a secure application development
process. In the process, address such items as: secure
application design standards, secure coding practices,
developer training, vulnerability management, security of
x x
third-party code, and application security testing
procedures. Review and update documentation annually, or
when significant enterprise changes occur that could
impact this Safeguard.
Superset
Establish and maintain a process to accept and address
reports of software vulnerabilities, including providing a
means for external entities to report. The process is to
include such items as: a vulnerability handling policy that
identifies reporting process, responsible party for handling
vulnerability reports, and a process for intake, assignment,
remediation, and remediation testing. As part of the
process, use a vulnerability tracking system that includes
severity ratings, and metrics for measuring timing for x x Superset
identification, analysis, and remediation of
vulnerabilities. Review and update documentation annually,
or when significant enterprise changes occur that could
impact this Safeguard.
Equivalent
Maintain separate environments for production and non-
x x
production systems.
Equivalent
Equivalent
Superset
Superset
Superset
Superset
Superset
Apply secure design principles in application architectures.
Secure design principles include the concept of least
privilege and enforcing mediation to validate every
operation that the user makes, promoting the concept of
"never trust user input." Examples include ensuring that
explicit error checking is performed and documented for all
x x
input, including for size, data type, and acceptable ranges
or formats. Secure design also means minimizing the
application infrastructure attack surface, such as turning off
unprotected ports and services, removing unnecessary
programs and files, and renaming or removing default
accounts.
If a session has been idle for more than 15 minutes, require the
8.1.8
user to re-authenticate to re-activate the terminal or session.
Retain audit trail history for at least one year, with a minimum of
10.7 three months immediately available for analysis (for example,
online, archived, or restorable from backup).
Record at least the following audit trail entries for all system
10.3
components for each event:
See 10.3.1-10.3.6
Retain audit trail history for at least one year, with a minimum of
10.7 three months immediately available for analysis (for example,
online, archived, or restorable from backup).
1.3.6
1.3.7
1.5
2.2.3
2.2.4
2.5
2.6
3.1
3.2.1
3.2.2
3.2.3
3.3
3.4
3.4.1
3.5
3.5.1
3.5.2
3.5.3
3.5.4
3.6
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
3.6.7
3.6.8
3.7
4.2
4.3
5.1.2
5.3
5.4
6.3.1
6.4
6.4.3
6.4.4
6.4.5
6.4.5.1
6.4.5.2
6.4.5.3
6.4.5.4
6.4.6
6.7
7.1.4
7.2.3
7.3
8.1.2
8.1.5
8.1.6
8.1.7
8.2
8.2.2
8.2.3
8.2.4
8.2.5
8.2.6
8.4
8.5
8.5.1
8.6
8.7
8.8
9.1
9.1.1
9.1.2
9.1.3
9.2
9.3
9.4
9.4.1
9.4.2
9.4.3
9.4.4
9.6
9.6.2
9.6.3
9.7
9.8
9.8.1
9.8.2
9.9
9.9.2
9.9.3
9.10
10.2.2
10.2.3
10.2.6
10.2.7
10.5
10.5.1
10.5.2
10.5.5
10.6.3
10.7
10.8
10.8.1
10.9
11.2.2
11.2.3
11.3.3
11.3.4
11.3.4.1
11.5.1
11.6
12.1
12.1.1
12.2
12.3
12.3.1
12.3.2
12.3.3
12.3.4
12.3.5
12.3.6
12.3.7
12.3.8
12.3.9
12.3.10
12.4
12.4.1
12.5
12.5.1
12.5.2
12.5.3
12.5.4
12.5.5
12.7
12.8
12.8.1
12.8.2
12.8.3
12.8.4
12.8.5
12.9
12.10.2
12.10.5
12.10.6
12.11
12.11.1
e following items do not map from the CIS Controls to PCI DSS.
Keep cardholder data storage to a minimum by implementing data retention and disposal policies, procedures and p
following for all cardholder data (CHD) storage:
• Limiting data storage amount and retention time to that which is required for legal, regulatory, and/or business requ
• Specific retention requirements for cardholder data
• Processes for secure deletion of data when no longer needed
• A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention.
Do not store the full contents of any track (from the magnetic stripe located on the back of a card, equivalent data co
after authorization. This data is alternatively called full track, track, track 1, track 2, and magnetic-stripe data.
Do not store the card verification code or value (three-digit or four-digit number printed on the front or back of a paym
present transactions) after authorization.
Do not store the personal identification number (PIN) or the encrypted PIN block after authorization.
Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed), such
legitimate business need can see more than the first six/last four digits of the PAN.
Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by us
approaches:
• One-way hashes based on strong cryptography, (hash must be of the entire PAN)
• Truncation (hashing cannot be used to replace the truncated segment of PAN)
• Index tokens and pads (pads must be securely stored)
• Strong cryptography with associated key-management processes and procedures.
If disk encryption is used (rather than file- or column-level database encryption), logical access must be managed se
native operating system authentication and access control mechanisms (for example, by not using local user accoun
login credentials). Decryption keys must not be associated with user accounts.
Document and implement procedures to protect keys used to secure stored cardholder data against disclosure and
Additional requirement for service providers only: Maintain a documented description of the cryptographic architectu
• Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and
• Description of the key usage for each key
• Inventory of any HSMs and other SCDs used for key management
Restrict access to cryptographic keys to the fewest number of custodians necessary.
Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all ti
• Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separa
• Within a secure cryptographic device (such as a hardware (host) security module (HSM) or PTS-approved point-of
• As at least two full-length key components or key shares, in accordance with an industry-accepted method
Store cryptographic keys in the fewest possible locations.
Fully document and implement all key-management processes and procedures for cryptographic keys used for encr
including the following:
Generation of strong cryptographic keys
Secure cryptographic key distribution
Secure cryptographic key storage
Cryptographic key changes for keys that have reached the end of their cryptoperiod (for example, after a defined pe
after a certain amount of cipher-text has been produced by a given key), as defined by the associated application ve
industry best practices and guidelines (for example, NIST Special Publication 800-57).
Retirement or replacement (for example, archiving, destruction, and/or revocation) of keys as deemed necessary wh
been weakened (for example, departure of an employee with knowledge of a clear-text key component), or keys are
compromised.
If manual clear-text cryptographic key-management operations are used, these operations must be managed using
Prevention of unauthorized substitution of cryptographic keys.
Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-cu
Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in u
parties.
Never send unprotected PANs by end-user messaging technologies (for example, e-mail, instant messaging, SMS,
Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are docume
affected parties.
For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify
threats in order to confirm whether such systems continue to not require anti-virus software.
Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifica
a case-by-case basis for a limited time period.
Ensure that security policies and operational procedures for protecting systems against malware are documented, in
parties.
Remove development, test and/or custom application accounts, user IDs, and passwords before applications becom
customers.
Follow change control processes and procedures for all changes to system components. The processes must includ
Production data (live PANs) are not used for testing or development
Removal of test data and accounts from system components before the system becomes active / goes into producti
Change control procedures must include the following:
Documentation of impact.
Documented change approval by authorized parties.
Functionality testing to verify that the change does not adversely impact the security of the system.
Back-out procedures.
Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or cha
documentation updated as applicable.
Ensure that security policies and operational procedures for developing and maintaining secure systems and applica
and known to all affected parties.
Require documented approval by authorized parties specifying required privileges.
Default “deny-all” setting.
Ensure that security policies and operational procedures for restricting access to cardholder data are documented, i
parties.
Control addition, deletion, and modification of user IDs, credentials, and other identifier objects.
Manage IDs used by third parties to access, support, or maintain system components via remote access as follows:
• Enabled only during the time period needed and disabled when not in use.
• Monitored when in use.
Limit repeated access attempts by locking out the user ID after not more than six attempts.
Set the lockout duration to a minimum of 30 minutes or until an administrator enables the user ID.
In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and ad
components by employing at least one of the following methods to authenticate all users:
• Something you know, such as a password or passphrase
• Something you have, such as a token device or smart card
• Something you are, such as a biometric.
Verify user identity before modifying any authentication credential—for example, performing password resets, provis
new keys.
Passwords/passphrases must meet the following:
• Require a minimum length of at least seven characters.
• Contain both numeric and alphabetic characters.
Alternatively, the passwords/ passphrases must have complexity and strength at least equivalent to the parameters
Change user passwords/passphrases at least once every 90 days.
Do not allow an individual to submit a new password/passphrase that is the same as any of the last four passwords/
Set passwords/passphrases for first-time use and upon reset to a unique value for each user, and change immediat
Document and communicate authentication policies and procedures to all users including:
• Guidance on selecting strong authentication credentials
• Guidance for how users should protect their authentication credentials
• Instructions not to reuse previously used passwords
• Instructions to change passwords if there is any suspicion the password could be compromised.
Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows:
• Generic user IDs are disabled or removed.
• Shared user IDs do not exist for system administration and other critical functions.
• Shared and generic user IDs are not used to administer any system components.
Additional requirement for service providers only: Service providers with remote access to customer premises (for ex
systems or servers) must use a unique authentication credential (such as a password/phrase) for each customer.
Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, cer
mechanisms must be assigned as follows:
• Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts.
• Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to g
All access to any database containing cardholder data (including access by applications, administrators, and all othe
• All user access to, user queries of, and user actions on databases are through programmatic methods.
• Only database administrators have the ability to directly access or query databases.
• Application IDs for database applications can only be used by the applications (and not by individual users or other
Ensure that security policies and operational procedures for identification and authentication are documented, in use
parties.
Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environ
Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive
correlate with other entries. Store for at least three months, unless otherwise restricted by law.
Implement physical and/or logical controls to restrict access to publicly accessible network jacks.
Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardw
Develop procedures to easily distinguish between onsite personnel and visitors, to include:
• Identifying onsite personnel and visitors (for example, assigning badges)
• Changes to access requirements
• Revoking or terminating onsite personnel and expired visitor identification (such as ID badges).
Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should includ
• Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them
devices.
• Do not install, replace, or return devices without verification.
• Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open de
• Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for examp
officer).
Ensure that security policies and operational procedures for restricting physical access to cardholder data are docum
affected parties.
Implement automated audit trails for all system components to reconstruct the following events: All actions taken by
administrative privileges
Implement automated audit trails for all system components to reconstruct the following events: Access to all audit t
Implement automated audit trails for all system components to reconstruct the following events: Initialization, stoppin
Implement automated audit trails for all system components to reconstruct the following events: Creation and deletio
Secure audit trails so they cannot be altered.
Limit viewing of audit trails to those with a job-related need.
Protect audit trail files from unauthorized modifications.
Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed
(although new data being added should not cause an alert).
Follow up exceptions and anomalies identified during the review process.
Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for
restorable from backup).
Additional requirement for service providers only: Implement a process for the timely detection and reporting of failu
systems, including but not limited to failure of:
• Firewalls
• IDS/IPS
• FIM
• Anti-virus
• Physical access controls
• Logical access controls
• Audit logging mechanisms
• Segmentation controls (if used)
Additional requirement for service providers only: Respond to failures of any critical security controls in a timely man
failures in security controls must include:
• Restoring security functions
• Identifying and documenting the duration (date and time start to end) of the security failure
• Identifying and documenting cause(s) of failure, including root cause, and documenting remediation required to ad
• Identifying and addressing any security issues that arose during the failure
• Performing a risk assessment to determine whether further actions are required as a result of the security failure
• Implementing controls to prevent cause of failure from reoccurring
• Resuming monitoring of security controls
Ensure that security policies and operational procedures for monitoring all access to network resources and cardhol
and known to all affected parties.
Perform quarterly external vulnerability scans, via an Approved Scanning Vendor (ASV) approved by the Payment C
Council (PCI SSC). Perform rescans as needed, until passing scans are achieved.
Perform internal and external scans, and rescans as needed, after any significant change. Scans must be performed
Exploitable vulnerabilities found during penetration testing are corrected and testing is repeated to verify the correcti
If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after
controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope
CDE.
Additional requirement for service providers only: If segmentation is used, confirm PCI DSS scope by performing pe
controls at least every six months and after any changes to segmentation controls/methods.
Implement a process to respond to any alerts generated by the change-detection solution.
Ensure that security policies and operational procedures for security monitoring and testing are documented, in use,
Establish, publish, maintain, and disseminate a security policy.
Review the security policy at least annually and update the policy when the environment changes.
Implement a risk-assessment process that:
• Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, r
• Identifies critical assets, threats, and vulnerabilities, and
• Results
Develop usage policies for critical technologies and define proper use of these technologies. Ensure these usage po
Explicit approval by authorized parties
Authentication for use of the technology
A list of all such devices and personnel with access
A method to accurately and readily determine owner, contact information, and purpose (for example, labeling, codin
Acceptable uses of the technology
Acceptable network locations for the technologies
List of company-approved products
Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity
Activation of remote-access technologies for vendors and business partners only when needed by vendors and busi
deactivation after use
For personnel accessing cardholder data via remote-access technologies, prohibit the copying, moving, and storage
hard drives and removable electronic media, unless explicitly authorized for a defined business need.
Where there is an authorized business need, the usage policies must require the data be protected in accordance w
Requirements.
Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.
Additional requirement for service providers only: Executive management shall establish responsibility for the protec
DSS compliance program to include:
• Overall accountability for maintaining PCI DSS compliance
• Defining a charter for a PCI DSS compliance program and communication to executive management
Assign to an individual or team the following information security management responsibilities:
Establish, document, and distribute security policies and procedures.
Monitor and analyze security alerts and information, and distribute to appropriate personnel.
Establish, document, and distribute security incident response and escalation procedures to ensure timely and effec
Administer user accounts, including additions, deletions, and modifications.
Monitor and control all access to data.
Screen potential personnel prior to hire to minimize the risk of attacks from internal sources. (Examples of backgrou
employment history, criminal record, credit history, and reference checks.)
Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared,
cardholder data, as follows:
Maintain a list of service providers including a description of the service provided.
Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the s
service providers possess or otherwise store, process or transmit on behalf of the customer, or to the extent that the
customer’s cardholder data environment.
Ensure there is an established process for engaging service providers including proper due diligence prior to engage
Maintain a program to monitor service providers’ PCI DSS compliance status at least annually.
Maintain information about which PCI DSS requirements are managed by each service provider, and which are man
Additional requirement for service providers only: Service providers acknowledge in writing to customers that they ar
cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the custom
impact the security of the customer’s cardholder data environment.
Review and test the (incident response) plan, including all elements listed in Requirement 12.10.1, at least annually.
Include alerts from security monitoring systems, including but not limited to intrusion-detection, intrusion-prevention,
monitoring systems.
Develop a process to modify and evolve the incident response plan according to lessons learned and to incorporate
Additional requirement for service providers only: Perform reviews at least quarterly to confirm personnel are followin
operational procedures. Reviews must cover the following processes:
• Daily log reviews
• Firewall rule-set reviews
• Applying configuration standards to new systems
• Responding to security alerts
• Change management processes
Additional requirement for service providers only: Maintain documentation of quarterly review process to include:
• Documenting results of the reviews
• Review and sign-off of results by personnel assigned responsibility for the PCI DSS compliance program