PCI DSS is a very specific control framework which contains explicit instructions regarding how an organization should be protecting the security of cardholder data. SAQ D contains over 300 of these requirements that an organization may have to comply with. For this reason, we have reviewed the PCI DSS Report on Compliance (ROC) reporting template that PCI QSAs use when assessing the security of cardholder data environments and the expected testing requirements from SAQ D to determine which evidence the PCI Security Standards Council suggests providing for each PCI DSS control. We have listed each piece of evidence from the ROC alongside each of the controls listed within Drata to clarify what should be provided when preparing for a PCI SAQ a PCI QSA audit.
NOTE: This article was written for PCI v3.2.1
Code | PCI Requirement | Name | Example Evidence |
DCF-21 | 1.1.2(a), 1.1.2(b) | Architectural Diagram | 1. Approved Architectural Diagram |
DCF-16 | 12.2(b) | Annual Risk Assessment | 1. Most recently completed risk assessment report. |
DCF-26 | 12.10.2 | BCP/DR Tests Conducted Annually | 1. Most recently completed BCP/DR test. |
DCF-201 | 1.1.1 | Firewall and Router Configuration Standards |
|
DCF-202 | 1.1.2(a) | CDE Network Diagram |
|
DCF-203 | 1.1.2(b) | CDE Network Diagram - Review |
|
DCF-204 | 1.1.3(a) | Dataflow Diagram |
|
DCF-205 | 1.1.3(b) | Dataflow Diagram Review |
|
DCF-206 | 1.1.4(a) | Firewall Configuration |
|
DCF-207 | 1.1.4(b) | Network Diagram is consistent with Firewall Configuration |
|
DCF-208 | 1.1.5 | Network Management Roles and Responsibilities |
|
DCF-209 | 1.1.6(a) | Services, Protocols, and Ports Approval List |
|
DCF-210 | 1.1.6(b) | Insecure Services, Protocols, and Ports List |
|
DCF-211 | 1.1.7(a) | Firewall and Router Rule Review Standard |
|
DCF-212 | 1.1.7(b) | Firewall and Router Rule Review |
|
DCF-213 | 1.2.1(a) | Network Traffic Restrictions |
|
DCF-214 | 1.2.1(b) | Network Traffic Denial |
|
DCF-215 | 1.2.2 | Secured Router Configuration Files |
|
DCF-216 | 1.2.3 | Perimeter Firewalls between CDE and Wireless Networks |
|
DCF-217 | 1.3 | Prohibited Direct Public Access to Data Environment |
|
DCF-218 | 1.3.1 | DMZ Implemented |
|
DCF-219 | 1.3.2 | DMZ IP Addresses |
|
DCF-220 | 1.3.3 | Anti-Spoofing Measures |
|
DCF-221 | 1.3.4 | Explicit Authorization for CDE Outbound Traffic |
|
DCF-222 | 1.3.5 | Permit Established Connections Only |
|
DCF-223 | 1.3.6 | Cardholder Data in Internal Network Zone |
|
DCF-224 | 1.3.7(a) | Prevention of Private IP Information Disclosure |
|
DCF-225 | 1.3.7(b) | External Private IP Information Disclosure Restricted |
|
DCF-226 | 1.4(a) | Personal Firewall Installed on Portable Devices |
NOTE - Mark the control out of scope if devices cannot access the CDE outside of the network.
NOTE - This control covers employee-owned and company-owned devices.
|
DCF-227 | 1.4(b) | Personal Firewall on Portable Devices Configured Properly |
NOTE - Mark the control out of scope if devices cannot access the CDE outside of the network.
NOTE - This control covers employee-owned and company-owned devices.
|
DCF-228 | 1.5 | Firewall Security Policy |
|
DCF-229 | 2.1(a) | Default Accounts Changed |
|
DCF-230 | 2.1(b) | Unnecessary Default Accounts Removed/Disabled |
|
DCF-231 | 2.1.1(a) | Changes in Encryption Keys |
NOTE - Mark this control out of scope if there are no wireless environments connected to the cardholder data environment or transmitting cardholder data |
DCF-232 | 2.1.1(b) | SNMP Community Strings Changed |
NOTE - Mark this control out of scope if there are no wireless environments connected to the cardholder data environment or transmitting cardholder data |
DCF-233 | 2.1.1(c) | Default Passwords on Access Points Changed |
NOTE - Mark this control out of scope if there are no wireless environments connected to the cardholder data environment or transmitting cardholder data |
DCF-234 | 2.1.1(d) | Updated Firmware on Wireless Devices |
NOTE - Mark this control out of scope if there are no wireless environments connected to the cardholder data environment or transmitting cardholder data |
DCF-235 | 2.1.1(e) | Wireless Vendor Defaults Changed |
NOTE - Mark this control out of scope if there are no wireless environments connected to the cardholder data environment or transmitting cardholder data |
DCF-236 | 2.2(b) | Update Configuration Standards after New Vulnerabilities |
|
DCF-237 | 2.2(d) | System Configuration Standards |
|
DCF-238 | 2.2.1(a) | One Primary Function per Server |
NOTE - If all your assets are virtualized, then this will be covered in DCF 239 |
DCF-239 | 2.2.1(b) | One Primary Function per Virtual System Components |
|
DCF-240 | 2.2.2(a) | Enable Only Necessary System Function Services |
|
DCF-241 | 2.2.2(b) | Justify Enabled Insecure Services |
|
DCF-242 | 2.2.3 | Additional Security Features for Enabled Insecure Services |
Example: If FTP is being used, screenshots showing that all files stored on the FTP server were encrypted separately being put on the FTP server.
NOTE - If no insecure features are running, then you can mark this control out of scope. |
DCF-243 | 2.2.4(a) | Proficiency in Common Security Parameter System Settings |
|
DCF-244 | 2.2.4(b) | Common System Security Parameters in Configuration Standards |
|
DCF-245 | 2.2.4(c) | Security Parameter Settings Set Appropriately |
|
DCF-246 | 2.2.5(a) | Unnecessary Functions Removed |
|
DCF-247 | 2.2.5(b) | Enabled Functions Documented |
|
DCF-248 | 2.2.5(c) | Documented Functionality on System Components |
|
DCF-249 | 2.3(a) | Encrypted Non-Console Administrative Access |
NOTE: Non-console access refers to logical access to a system component that occurs over a network interface rather than via a direct, physical connection to the system component. Non-console access includes access from within local/internal networks as well as access from external, or remote, networks. |
DCF-250 | 2.3(b) | Insecure Remote Login Commands Prevented |
|
DCF-251 | 2.5 | Vendor Management Security Policies and Operational Procedures Documented and Accessible |
|
DCF-252 | 2.6 | Shared Hosting Provider Secure Configurations | For an example customer that can run their own applications provide the following:
|
DCF-253 | 3.1(b) | Cardholder Data Deleted Securely |
|
DCF-254 | 3.1(c) | Cardholder Data Retention Requirements |
|
DCF-255 | 3.1(d) | Quarterly Cardholder Data Retention Review |
|
DCF-256 | 3.1(e) | Cardholder Data meets Data Retention Policy Requirements |
|
DCF-257 | 3.2(a) | Sensitive Authentication Data Storage |
|
DCF-258 | 3.2(b) | Sensitive Authentication Data Secured |
|
DCF-259 | 3.2(c) | Sensitive Authentication Data Deleted after Authorization Process |
|
DCF-260 | 3.2.1 | Full Track Contents Not Stored |
|
DCF-261 | 3.2.2 | Card Verification Code Not Stored |
|
DCF-262 | 3.2.3 | PIN Not Stored |
|
DCF-263 | 3.3 | PAN is Masked when Displayed |
|
DCF-264 | 3.4 | PAN is Unreadable Anywhere it is Stored |
|
DCF-265 | 3.4.1(a) | Separate Encrypted File System Access Management |
|
DCF-266 | 3.4.1(b) | Cryptographic Keys Stored Securely |
|
DCF-267 | 3.4.1(c) | Cardholder Data on Removable Media Encrypted |
Note: If disk encryption is not used to encrypt removable media, the data stored on this media will need to be rendered unreadable through some other method. |
DCF-268 | 3.5.1 | Cryptographic Architecture Description (Service Providers Only) |
Note: Only applies to service providers. |
DCF-269 | 3.5.2 | Restricted Key Access |
|
DCF-270 | 3.5.3 | Secret and Private Keys Used for Stored Data |
|
DCF-271 | 3.5.4 | Key Storage Locations Limited |
|
DCF-272 | 3.6(b) | Guidance for Shared Key Management |
Note: Only applies to service providers. |
DCF-273 | 3.6.1 | Strong Key Generation Procedure |
|
DCF-274 | 3.6.2 | Secure Key Generation Procedure |
|
DCF-275 | 3.6.3 | Secure Key Storage Procedure |
|
DCF-276 | 3.6.4 | Key Changes for Retired Keys |
|
DCF-277 | 3.6.5(a) | Key Retirement Procedures |
|
DCF-278 | 3.6.5(b) | Replacement of Compromised Keys |
|
DCF-279 | 3.6.5(c) | Retained Keys Used for Decryption/Verification |
|
DCF-280 | 3.6.6 | Split Knowledge and Dual Control of Keys |
|
DCF-281 | 3.6.7 | Unauthorized Key Substitution |
|
DCF-282 | 3.6.8 | Former Acknowledgment of Key Custodial Responsibilities |
|
DCF-283 | 4.1(a) | Secure and Encrypted Data Transmission |
|
DCF-284 | 4.1(b) | Only Trusted Keys or Certificates Accepted |
|
DCF-285 | 4.1(c) | Insecure Versions or Configurations Not Supported |
|
DCF-286 | 4.1(d) | Proper Encryption Strength |
|
DCF-287 | 4.1(e) | TLS Enabled during Data Transmission |
Example: For browser based cardholder data transmissions, screenshots showing that HTTPS appears in the URL wherever cardholder data is collected. |
DCF-288 | 4.1.1 | Strong Encryption for Wireless Network Transmission |
|
DCF-289 | 4.2(a) | PAN Secured in Transmission via End-User Messaging Technologies |
|
DCF-290 | 4.2(b) | Unprotected PANs Not Sent via End-User Messaging Technologies |
|
DCF-291 | 5.1.1 | Anti-Virus Capability |
Examples of types of malicious software include viruses, Trojans, worms, spyware, adware, and rootkits. |
DCF-292 | 5.1.2 | Periodic Evaluation of Malware Threats |
|
DCF-293 | 5.2(a) | Anti-Virus Kept Current |
|
DCF-294 | 5.2(b) | Anti-Virus Automatic and Periodic Scans |
|
DCF-295 | 5.2(c) | Anti-Virus Audit Logs |
|
DCF-296 | 5.3 | Anti-Virus Configuration |
|
DCF-297 | 6.2(b) | Critical Patches Installed |
|
DCF-298 | 6.3(b) | Information Security in SDLC |
|
DCF-299 | 6.3(c) | Software Development in line with PCI |
|
DCF-300 | 6.3.1 | Removal of Account Information before Application Release |
|
DCF-301 | 6.3.2 | Code Review prior to Release |
|
DCF-302 | 6.4.1(b) | Separate Test and Production Environments Access Control |
|
DCF-303 | 6.4.2 | Separation of Duties in Test and Production Environments |
|
DCF-304 | 6.4.4 | Test Data Removed before System Activation |
|
DCF-305 | 6.4.5.1 | Documentation of Impact |
|
DCF-306 | 6.4.5.2 | Documentation of Authorized Party Approval |
|
DCF-307 | 6.4.5.3(a) | Functionality Testing |
|
DCF-308 | 6.4.5.3(b) | Updates for PCI Compliance Testing |
|
DCF-309 | 6.4.5.4 | Back-out Procedures |
|
DCF-310 | 6.4.6 | PCI Requirements Implemented Upon Completion of Significant Change |
|
DCF-311 | 6.5(a) | Common Coding Vulnerabilities |
|
DCF-312 | 6.5(b) | Annual Training for Developer Secure Coding Techniques |
|
DCF-313 | 6.5(c) | Application Development based on Secure Coding Guidelines |
|
DCF-314 | 6.5.1 | Injection Flaws |
|
DCF-315 | 6.5.2 | Buffer Overflow |
|
DCF-316 | 6.5.3 | Insecure Cryptographic Storage |
|
DCF-317 | 6.5.4 | Insecure Communications |
|
DCF-318 | 6.5.5 | Improper Error Handling |
|
DCF-319 | 6.5.6 | High Risk Vulnerabilities |
|
DCF-320 | 6.5.7 | Cross-Site Scripting (XSS) |
|
DCF-321 | 6.5.8 | Improper Access Control |
|
DCF-322 | 6.5.9 | Cross-Site Request Forgery (CSRF) |
|
DCF-323 | 6.5.10 | Broken Authentication and Session Management |
|
DCF-324 | 6.6 | Public-Facing Web Application Vulnerability Assessment |
|
DCF-325 | 6.7 | Policy for Secure Systems and Applications Documented and Accessible |
|
DCF-326 | 7.1 | System Access Control Policy |
|
DCF-327 | 7.1.1 | System Access Roles Defined |
|
DCF-328 | 7.1.4 | Documented Approval by Authorized Parties |
|
DCF-329 | 7.2.1 | Access Control System in Place |
|
DCF-330 | 7.2.2 | Role-Based Access Control System |
|
DCF-331 | 7.2.3 | Default "Deny All" on Access Control System |
|
DCF-332 | 7.3 | Policy for Restricting Access is Documented and Available |
|
DCF-333 | 8.1.1 | Unique User ID |
|
DCF-334 | 8.1.2 | Privileged and General User ID Authorization |
|
DCF-335 | 8.1.4 | Inactive User Accounts Removed |
|
DCF-336 | 8.1.5(a) | Access Management of Accounts Used by Remote 3rd Parties |
|
DCF-337 | 8.1.5(b) | Access to Accounts Used by Remote 3rd Parties Monitored |
|
DCF-338 | 8.1.6(a) | User ID Lockout After Repeated Access Attempts |
|
DCF-339 | 8.1.6(b) | Non-consumer Customer Password Lockout after Invalid Access Attempts (Service Provider Only) |
|
DCF-340 | 8.1.7 | Lockout Duration |
|
DCF-341 | 8.1.8 | Reauthentication of Idle Sessions |
|
DCF-342 | 8.2 | User Authentication Methods |
|
DCF-343 | 8.2.1(a) | Strong Encryption of Authentication Credentials During Transmission and Storage |
|
DCF-344 | 8.2.1(b) | Strong Encryption of Non-consumer Customer Authentication Credentials During Transmission and Storage (Service Provider Only) |
|
DCF-345 | 8.2.2 | User Identity Verification Before Modifying Authentication |
|
DCF-346 | 8.2.3(a) | Minimum Password Requirements |
|
DCF-347 | 8.2.3(b) | Minimum Password Requirements for Non-consumer Customer (Service Providers Only) |
|
DCF-348 | 8.2.4(a) | Periodic Password Change |
|
DCF-349 | 8.2.4(b) | Periodic Password Change for Non-consumer Customer (Service Providers Only) |
|
DCF-350 | 8.2.5(a) | Passwords Different from Last Four |
|
DCF-351 | 8.2.5(b) | Non-consumer Customer Passwords Different from Last Four (Service Providers Only) |
|
DCF-352 | 8.2.6 | Unique First-time Passwords |
|
DCF-353 | 8.3 | MFA for Non-Admin and Remote CDE Access |
|
DCF-354 | 8.3.1 | MFA for Non-console Access to CDE |
|
DCF-355 | 8.3.2 | MFA for Remote Network Access |
|
DCF-356 | 8.4(b) | Authentication Policy Inclusions |
|
DCF-357 | 8.5 | Shared Authentication Methods are Prohibited |
|
DCF-358 | 8.5.1 | Unique Authentication Credential for Service Providers with Remote Access (Service Providers Only) |
|
DCF-359 | 8.6 | Authentication Mechanism Use |
|
DCF-360 | 8.7(a) | Programmatic Methods for Database Access |
|
DCF-361 | 8.7(b) | Direct Access to Database Restrictions |
|
DCF-362 | 8.7(c) | Application IDs Only Used by the Application |
|
DCF-363 | 9.1 | Entry Controls in Place |
|
DCF-364 | 9.1.1(a) | Physical Access Control to Sensitive Areas |
|
DCF-365 | 9.1.1(b) | Secure Physical Access Control Mechanisms |
|
DCF-366 | 9.1.1(c) | Physical Access Control Mechanism Data Review |
|
DCF-367 | 9.1.1(d) | Physical Access Control Mechanism Data Retention |
|
DCF-368 | 9.1.2 | Restricted Physical Access to Publicly Accessible Network Jacks |
|
DCF-369 | 9.1.3 | Restricted Physical Access to Network Components |
|
DCF-370 | 9.2(a) | Onsite Identification Management |
|
DCF-371 | 9.2(b) | Onsite Identification Methods |
|
DCF-372 | 9.2(c) | Restricted Access to Badge System |
|
DCF-373 | 9.3 | Role-Based Physical Access |
|
DCF-374 | 9.4.1 | Visitors Preauthorized and Escorted |
|
DCF-375 | 9.4.2(a) | Visitor Badges |
|
DCF-376 | 9.4.2(b) | Visitor Badge Expiration |
|
DCF-377 | 9.4.3 | Visitor Badge Control |
|
DCF-378 | 9.4.4(a) | Visitor Log to Facility and Data Storage Areas |
|
DCF-379 | 9.4.4(b) | Visitor Log Inclusions |
|
DCF-380 | 9.4.4(c) | Visitor Log Retention |
|
DCF-381 | 9.5 | Media Physically Secured |
|
DCF-382 | 9.5.1 | Security Review of Media Backup Storage Location |
|
DCF-383 | 9.6(a) | Media Transfer Procedures |
|
DCF-384 | 9.6.1 | Media Classification |
|
DCF-385 | 9.6.2 | Media Transferred Securely |
|
DCF-386 | 9.6.3 | Manager Approval for Media Transfer |
|
DCF-387 | 9.7 | Media Storage and Accessibility |
|
DCF-388 | 9.7.1(a) | Media Inventory Logs |
|
DCF-389 | 9.7.1(b) | Periodic Inventory of Media Logs |
|
DCF-390 | 9.8(a) | Media Destruction |
|
DCF-391 | 9.8(b) | Periodic Media Destruction Policy |
|
DCF-392 | 9.8.1(a) | Destruction of Hardcopy Material |
|
DCF-393 | 9.8.1(b) | Storage Containers for Destroyable Material |
|
DCF-394 | 9.8.2 | Cardholder Data Unrecoverable on Electronic Media upon Deletion |
|
DCF-395 | 9.9 | Payment Card Device Management Policy |
|
DCF-396 | 9.9(a) | List of Payment Card Capture Devices Maintained |
|
DCF-397 | 9.9(b) | Payment Card Capture Devices Periodic Inspection |
|
DCF-398 | 9.9(c) | Payment Card Capture Device Training and Reporting |
|
DCF-399 | 9.9.1(a) | Payment Card Capture Device List Inclusions |
|
DCF-400 | 9.9.1(b) | Accurate and Updated Payment Card Capture Device List |
|
DCF-401 | 9.9.1(c) | Payment Card Capture Device List Updates |
|
DCF-402 | 9.9.2(a) | Payment Card Capture Device Surface Inspection |
|
DCF-403 | 9.9.2(b) | Payment Card Capture Device Inspection Procedures |
|
DCF-404 | 9.9.3(b) | Training Material for Payment Card Capture Device Tampering Awareness |
|
DCF-405 | 9.9.3(c) | Training for Payment Card Capture Device Tampering Awareness and Reporting Received |
|
DCF-406 | 10.1(a) | Audit Trails Enabled and Active |
|
DCF-407 | 10.1(b) | System Access Linked to Users |
|
DCF-408 | 10.2.1 | Audit Trail for Individual User Access to Cardholder Data |
|
DCF-409 | 10.2.2 | Audit Trail for Root Admin Privilege Access |
|
DCF-410 | 10.2.3 | Audit Trail Access |
|
DCF-411 | 10.2.4 | Invalid Logical Access Attempts |
|
DCF-412 | 10.2.5 | Audit Trail for Identification and Authentication Mechanism Changes |
|
DCF-413 | 10.2.6 | Audit Trail of Changes to Audit Logs |
|
DCF-414 | 10.2.7 | Audit Trail of System-Level Object Creation or Deletion |
|
DCF-415 | 10.3.1 | Audit Trail Entries: User Identification |
|
DCF-416 | 10.3.2 | Audit Trail Entries: Event Type |
|
DCF-417 | 10.3.3 | Audit Trail Entries: Date and Time |
|
DCF-418 | 10.3.4 | Audit Trail Entries: Pass/Fail Indication |
|
DCF-419 | 10.3.5 | Audit Trail Entries: Origination |
|
DCF-420 | 10.3.6 | Audit Trail Entries: Affected Item Name |
|
DCF-421 | 10.4 | Critical Clock Synchronization and Update |
|
DCF-422 | 10.4.1(a) | Time-related System Parameters |
|
DCF-423 | 10.4.1(b) | Time Server Peering |
|
DCF-424 | 10.4.1(c) | System Time Source |
|
DCF-425 | 10.4.2(a) | Need-to-Know Access to Time Data |
|
DCF-426 | 10.4.2(b) | Time Settings Changes Logged, Monitored, Reviewed |
|
DCF-427 | 10.4.3 | Time Settings Source |
|
DCF-428 | 10.5 | Secured Audit Trails |
|
DCF-429 | 10.5.1 | Limited Access to Audit Trails |
|
DCF-430 | 10.5.2 | Audit Trail Files Protected |
|
DCF-431 | 10.5.3 | Audit Trail Files Backed Up |
|
DCF-432 | 10.5.4 | Logs for External-Facing Technologies |
|
DCF-433 | 10.5.5 | FIM on Logs |
|
DCF-434 | 10.6.1(a) | Policy for Critical Systems Daily Log Review |
|
DCF-435 | 10.6.1(b) | Critical System Logs Reviewed Daily |
|
DCF-436 | 10.6.2(a) | Policy for Non-critical Systems Periodic Log Review |
|
DCF-437 | 10.6.2(b) | Non-critical System Review Aligned with Risk Management |
|
DCF-438 | 10.6.3(a) | Follow-up Procedures on Discovered Anomalies and Exceptions |
|
DCF-439 | 10.6.3(b) | Follow-up on Discovered Anomalies and Exceptions Performed |
|
DCF-440 | 10.7(a) | Policy for Audit Log Retention |
|
DCF-441 | 10.7(b) | Audit Log Retention Period |
|
DCF-442 | 10.7(c) | Audit Logs Available for Analysis |
|
DCF-443 | 10.8(a) | Critical Security Control System Failure Detection and Reporting |
|
DCF-444 | 10.8(b) | Critical Security Control System Failure Alert |
|
DCF-445 | 10.8.1(a) | Critical Security Control System Failure Response |
|
DCF-446 | 10.8.1(b) | Critical Security Control System Failure Documentation |
|
DCF-447 | 10.9 | Policy for Network Access Monitoring Documented and Accessible |
|
DCF-448 | 11.1(a) | Wireless Access Point Detection and Identification |
|
DCF-449 | 11.1(b) | Unauthorized Wireless Access Points Detected and Identified |
|
DCF-450 | 11.1(c) | Quarterly Wireless Scan of Wireless Access Points |
|
DCF-451 | 11.1(d) | Wireless Access Point Automated Monitoring Alerts |
|
DCF-452 | 11.1.1 | Inventory of Authorized Wireless Access Point |
|
DCF-453 | 11.1.2(a) | Incident Response Plan for Unauthorized Wireless Access Points |
|
DCF-454 | 11.1.2(b) | Actions Against Unauthorized Wireless Access Points |
|
DCF-455 | 11.2.1(a) | Quarterly Internal Vulnerability Scans |
|
DCF-456 | 11.2.1(b) | High Risk Vulnerabilities Identified and Resolved |
|
DCF-457 | 11.2.1(c) | Internal Vulnerability Scans by Competent and Independent Party |
|
DCF-458 | 11.2.2(a) | Quarterly External Vulnerability Scans |
|
DCF-459 | 11.2.2(b) | External Vulnerability Rescans Until Pass |
|
DCF-460 | 11.2.2(c) | External Vulnerability Scans by PCI-Approved Vendor |
|
DCF-461 | 11.2.3(a) | Vulnerability Scans After Significant Change |
|
DCF-462 | 11.2.3(b) | Vulnerability Rescans |
|
DCF-463 | 11.2.3(c) | Vulnerability Rescans by Competent and Independent Party |
|
DCF-464 | 11.3 | Penetration Testing Methodology |
|
DCF-465 | 11.3.1(a) | External Penetration Testing Scope |
|
DCF-466 | 11.3.1(b) | External Penetration Tests by Competent and Independent Party |
|
DCF-467 | 11.3.2(a) | Internal Penetration Testing Scope |
|
DCF-468 | 11.3.2(b) | Internal Penetration Test by Competent and Independent Party |
|
DCF-469 | 11.3.3 | Resolving Vulnerabilities from Pen Testing |
|
DCF-470 | 11.3.4(a) | Penetration Testing on All Segments |
|
DCF-471 | 11.3.4(b) | Penetration Testing Requirements |
|
DCF-472 | 11.3.4(c) | Penetration Tests for Control Segmentation Verification by Competent and Independent Party |
|
DCF-473 | 11.3.4.1(a) | Periodic Segmentation Control Penetration Testing (Service Providers Only) |
|
DCF-474 | 11.3.4.1(b) | Penetration Testing Scope (Service Providers Only) |
|
DCF-475 | 11.3.4.1(c) | Penetration Testing Verification of Segmentation Control Effectiveness (Service Providers Only) |
|
DCF-476 | 11.3.4.1(d) | Segmentation Control Penetration Tests by Competent and Independent Party (Service Providers Only) | If you are a service provider and use segmentation controls to segment your CDE from other networks:
|
DCF-477 | 11.4(c) | IDS/IPS Up to Date |
|
DCF-478 | 11.5(a) | Change Detection Mechanism in Place |
|
DCF-479 | 11.5(b) | Change Detection Mechanism Alerts |
|
DCF-480 | 11.5.1 | Change Detection Mechanism Alert Response |
|
DCF-481 | 11.6 | Policy for Security Monitoring and Testing Documented and Accessible |
|
DCF-482 | 12.3.1 | Explicit Approval for Technology Use |
|
DCF-483 | 12.3.2 | Technology Use Authentication |
|
DCF-484 | 12.3.3 | Access List of Devices and Personnel |
|
DCF-485 | 12.3.4 | Technology User Tags |
|
DCF-486 | 12.3.6 | Acceptable Network Locations |
|
DCF-487 | 12.3.7 | Company-Approved Product List |
|
DCF-488 | 12.3.8 | Automatic Disconnect of Inactive Remote-Access |
|
DCF-489 | 12.3.9 | 3rd Party Remote-Access Usage |
|
DCF-490 | 12.3.10(a) | Employee Remote-Access Usage |
|
DCF-491 | 12.3.10(b) | Cardholder Data Protection per PCI Requirements |
|
DCF-492 | 12.4 | Information Security Responsibilities |
|
DCF-493 | 12.4.1 | PCI DSS Compliance Program (Service Providers Only) |
|
DCF-494 | 12.4.1(a) | PCI DSS Compliance Accountability (Service Providers Only) |
|
DCF-495 | 12.4.1(b) | PCI DSS Compliance Program Charter (Service Providers Only) |
|
DCF-496 | 12.5(a) | Designated Information Security Official |
|
DCF-497 | 12.5.1 | Designated Entity to Maintain Security Policies and Procedures |
|
DCF-498 | 12.5.2 | Designated Entity to Monitor and Analyze Security Alerts |
|
DCF-499 | 12.5.3 | Designated Entity to Maintain Incident Response Procedures |
|
DCF-500 | 12.5.4 | Designated Entity to Administer User Accounts |
|
DCF-501 | 12.5.5 | Designated Entity to Monitor and Control Data Access |
|
DCF-502 | 12.6(a) | Cardholder Data Security Awareness Program |
|
DCF-503 | 12.6.1(a) | Multiple Methods for Security Awareness |
|
DCF-504 | 12.6.1(c) | Cardholder Data Security Awareness Training |
|
DCF-505 | 12.8.1 | List of Service Providers |
|
DCF-506 | 12.8.2 | Service Providers Agreements |
|
DCF-507 | 12.8.3 | Pre-Agreement Process for Service Providers |
|
DCF-508 | 12.8.4 | Annual PCI DSS Compliance of Service Providers Monitored |
|
DCF-509 | 12.8.5 | Specified PCI DSS Responsibilities of Service Providers |
|
DCF-510 | 12.9 | Service Providers Acknowledge Security Responsibilities (Service Providers Only) |
|
DCF-511 | 12.10.1(b)(1) | Incident Response Management |
|
DCF-512 | 12.10.1(b)(2) | Specific Incident Response Procedures (SOPs) |
|
DCF-513 | 12.10.1(b)(5) | Reporting Compromise |
|
DCF-514 | 12.10.1(b)(6) | Critical System Coverage and Response |
|
DCF-515 | 12.10.1(b)(7) | Inclusion of Incident Response Procedures from Payment Brands |
|
DCF-516 | 12.10.4 | Security Breach Response Training |
|
DCF-517 | 12.10.5 | Security Monitoring System Alerts |
|
DCF-518 | 12.10.6 | Incident Response Plan Review and Update |
|
DCF-519 | 12.11(a) | Incident Response Review Inclusions (Service Providers Only) |
|
DCF-520 | 12.11(b) | Incident Response Plan Reviewed Quarterly (Service Providers Only) |
|
DCF-521 | 12.11.1 | Quarterly Incident Response Plan Review Report (Service Providers Only) |
|