PCI DSS Security Controls Mapping
PCI DSS Security Controls Mapping
This document describes the PCI-DSS v3.2 Security Requirements that are directly addressed by th
those for which there is an inheritance of security features from the AWS-managed products and s
the Description of AWS Implementation details and Additional Guidance in this document are no
evaluated, assessed, and approved by the customer organization, and layered with other security
scope systems and applications for a holistic solution to meet overall security requirements.
2 Y
1.3.2 Limit inbound Internet traffic to IP addresses
within the DMZ.
2 Y
2 Y
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs
3 with changes
3 with changes
Note: Requirements 6.5.7 through 6.5.9, below, apply to web applications and application interfaces (internal or external):
4 Y
4 N
4 N
4 N
4 N
8.1.5 Manage IDs used by third parties to access,
support, or maintain system components via remote
access as follows:
• Enabled only during the time period needed and 4 N
disabled when not in use.
• Monitored when in use.
4 N
4 N
• All user access to, user queries of, and user actions
on databases are through programmatic methods. 4 Y
• Only database administrators have the ability to
directly access or query databases.
• Application IDs for database applications can only be
used by the applications (and not by individual users or
other non-application processes)
Requirement 10: Track and monitor all access to network resources and cardholder data
4 Y
4 Y
4 Y
4 Y
Requirement 12: Maintain a policy that addresses information security for all personnel
Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers
A3.4 Control and manage logical access to the cardholder data environment
AWS CloudFormation
Description of AWS Implementation AWS Resource Type(s)
Template Name (Stack)
dholder data
AWS::EC2::SecurityGroup
Segmented using Security Groups in VPC, use
AWS::EC2::NetworkAcl template-vpc-management
of a VPC public subnet to simulate a
AWS::EC2::NetworkAclEn template-vpc-production
traditional DMZ network zone
try
AWS::EC2::SecurityGroup
Security Groups, NACLs used to limit traffic to AWS::EC2::NetworkAcl template-vpc-management
the CDE AWS::EC2::NetworkAclEn template-vpc-production
try
AWS::EC2::SecurityGroup
AWS::EC2::NetworkAcl
AWS::EC2::NetworkAclEn
Segmented Public/Private Subnets in VPC, try
template-vpc-management
Security Groups and NACLs limit external AWS::EC2::Route
template-vpc-production
traffic to only required ports AWS::EC2::RouteTable
AWS::EC2::RouteTableAss
ociation
AWS::EC2::Subnet
AWS::EC2::SecurityGroup
AWS::EC2::NetworkAcl
AWS::EC2::NetworkAclEn
Segmented Public/Private Subnets in VPC, try
template-vpc-management
Security Groups and NACLs limit external AWS::EC2::Route
template-vpc-production
traffic to only required ports AWS::EC2::RouteTable
AWS::EC2::RouteTableAss
ociation
AWS::EC2::Subnet
Use of VPC restricts layer two broadcasts and All resources in template template-vpc-management
ARP spoofing template-vpc-production
AWS::EC2::SecurityGroup
Restricting traffic with inbound/outbound
AWS::EC2::NetworkAcl template-vpc-management
rules in Security Groups and NACLs, NAT for template-vpc-production
authorized external connections. AWS::EC2::NetworkAclEn template-application
try
AWS::EC2::Route
AWS::EC2::RouteTable
Placement of DBs and EC2 instances for AWS::EC2::RouteTableAss
ociation template-application
application in private-only subnets
AWS::EC2::Subnet
AWS::AutoScaling::AutoS
calingGroup
AWS::EC2::Route
AWS::EC2::RouteTable
AWS::EC2::RouteTableAss
Placement of DBs and EC2 instances for ociation template-vpc-production
application in private-only subnets AWS::EC2::Subnet template-application
AWS::AutoScaling::AutoS
calingGroup
AWS::RDS::DBInstance
N/A N/A N/A
AWS::ElasticLoadBalancin
The use of HTTPS load balancers for secure g::LoadBalancer template-application
communications, S3 bucket policies
blic networks
AWS::ElasticLoadBalancin
Use of HTTPS Elastic Load Balancers (ELBs)
g::LoadBalancer
with compliant w/TLS Policies, Enforcement AWS::EC2::SecurityGroup template-application
of AES256 encryption for HTTPS S3
s
connections
AWS::S3::BucketPolicy
ow
AWS::IAM::ManagedPolic
IAM Roles, Policies, Groups y template-iam
AWS::IAM::Group
AWS::IAM::ManagedPolic
IAM Roles, Policies, Groups y template-iam
AWS::IAM::Group
AWS::IAM::ManagedPolic
IAM will designed to deny access by default y template-iam
AWS::IAM::Group
ardholder data
AWS::CloudTrail::Trail
AWS::CloudWatch::Alarm template-iam
AWS CloudTrail records API calls to create,
delete and modify resources AWS::Logs::MetricFilter template-logging
AWS::IAM::Policy template-config-rules
AWS::Config::ConfigRule
template-vpc-management
All instances launched in VPC are synced with NTP AWS::EC2::Instance
template-vpc-production
All instances launched in VPC are synced with NTP, all template-vpc-management
AWS::EC2::Instance
log data has timestamp provided by NTP template-vpc-production
N/A N/A N/A
All instances launched in VPC are synced with AWS NTP template-vpc-management
AWS::EC2::Instance
servers which in turn obtain time from NTP.org template-vpc-production
The bucket storing theN/Alog data does not have N/A N/A
life cycle policy attached to it, to allow
organizations control over their log storage. A
AWS::S3::Bucket
sample lifecycle policy to move logs to glacier AWS::S3::BucketPolicy template-logging
after 90days and to delete them after 7 years
is included in the package as
"rArchiveLogBucket".
N/A N/A N/A
all personnel
ders
N/A
Applies to operational
procedures/practices
Applies to operational
procedures/practices
N/A
N/A
N/A
N/A
N/A
Applies to operational
procedures/practices
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Applies to operational
procedures/practices
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
The AWS deployment provides logically
separated Management and Production
processing domains to allow finer-grained
access of AWS IAM users to those
environments, through the use of separate
Management and Production VPCs, with the
expectation of separate Development VPCs to
be added as needed. Access is controlled by
user membership in IAM groups in
conjunction with AWS Security Group rules,
NACLs, and route tables.
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
The template provides NGINX proxies
in the public subnet for application
load balancing purposes. The NAXSI
project has developed a web
application filtering module for
NGINX that could help meet this
requirement.
N/A
N/A
N/A
N/A
N/A
AWS IAM only provides the means to
manage access on AWS resources.
Other components such as operating
systems will require their own access
management solutions.
N/A
N/A
N/A
N/A
N/A
Applies to operational
procedures/practices.
AWS security best practices
recommend the use of IAM for
routine access to AWS.
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A