Module 5 - Payment Card Industry (PCI) Data Security Standards (DSS) Flashcards
what is PCIDSS
Payment Card Industry Data Security Standards
why was PCIDSS developed
The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment card account data security and facilitate the broad adoption of consistent data security measures globally.
what are 2 items that PCIDSS provide
- PCI DSS provides a baseline of technical and operational requirements designed to protect account data
- Consists of the 12 PCI DSS principal requirements
what else can PCIDSS be used for
to protect against threats and secure other elements in
the payment ecosystem.
who is PCIDSS intended for
- PCI DSS is intended for all entities that store, process, or
transmit CHD and/or SAD or could impact the security of
the CDE. - includes all entities involved in payment card account processing
what is considered CHD with regards to PCIDSS
- Primary Account Number (PAN)
- Cardholder Name
- Expiration Date
- Service Code
what does CHD stand for when referencing PCIDSS
Cardholder data
what does SAD stand for when talking abut PCIDSS
Sensitive authentication Data
what is considered SAD when talking about PCIDSS
- Full track data (magnetic-stripe data or equivalent on a chip)
- Card verification code
- PINs/PIN blocks
what does PAN mean with PCIDSS
Primary Account Number
IF PAN is stored with other elements of CHD, what is required
1. all information is rendered unreadable
2. only the CHD is rendered unreadable
3. only the PAN is rendered unreadable
4. this does not fit a requirement
only the PAN is required to be rendeared unreadable
thoughts about wireless networks being part of the PCIDSS network
- PCI DSS requirements and testing procedures for securing wireless environments apply and must be performed.
- Rogue wireless detection must be performed per PCI DSS Requirement 11.2.1 even when wireless is not used within the CDE and the entity has a policy that prohibits the use of wireless technology within its environment.
- This is because of the ease with which a wireless access point can be attached to a network, the difficulty in detecting its presence, and the increased risk presented
- Before wireless technology is implemented, an entity should carefully evaluate the need for the technology against the risk
- Consider deploying wireless technology only for non-sensitive data transmission
what are the 3 steps to testing PCIDSS
- Examine
- Observe
- Interview
what is in the examine testing phase of PCIDSS testing
The assessor critically evaluates data evidence. Common examples include documents (electronic or physical), screenshots, configuration files, audit logs, and data files.
what is in the observe phase of PCIDSS testing
The assessor watches an action or views something in the environment. - Examples: include personnel performing a task or process, system components performing a function