Blog

Performing an SAQ-D version 4.0 Merchant Self-Assessment

Merchants who do not qualify to assess their PCI DSS compliance using any of the simpler self-assessment questionnaires are required to use the SAQ D to validate their compliance.

External Vulnerability Scanning FAQ: What is External Vulnerability Scanning?

External vulnerability scanning is a security practice that involves scanning and assessing the external-facing network infrastructure, systems, and applications of an organization for potential vulnerabilities.

Forensic FAQs

If you've experienced a data breach, you will probably need a forensic investigation to determine the cause of the breach. Here are some forensic faqs to help you understand the process of a forensic investigation.

PCI Program FAQs: What is a PCI Program?

A PCI program is a system that acquirers use to keep track of their merchants PCI compliance, and for merchants to receive the training and tools they need to achieve PCI compliance and remain PCI compliant.

PCI DSS 4.0 SAQ Questionnaires Q&A

PCI DSS 4.0 SAQ Questionnaires Q&A: While future-dated requirements are not mandatory until March 31, 2025, it's recommended to implement them early for enhanced security.

PCI 4.0 Summary of Changes

PCI 4.0 summary of changes including new requirements that have been added to the standard.

What To Include In An Incident Response Plan

Creating an incident response plan can seem overwhelming. To simplify the process, develop your incident response plan in smaller, more manageable procedures.

How to Test Your Incident Response Plan

How to test your incident response plan and conduct tabletop exercises.

Scoping for PCI Compliance: What You Need To Know

Scoping is determining what systems are covered or need to be assessed or included as part of your PCI compliance.

Auditor Tips: Requirement 10: Audit Logs and Log Monitoring

It’s critical that you configure the log monitoring solution correctly so that the appropriate directories, files, security controls, and events are being monitored.

Auditor Tips: Requirement 11: Testing Security

If your organization is required to be PCI compliant, don’t procrastinate beginning the penetration test process.

Auditor Tips: Requirement 12: PCI Compliance Basics

a risk assessment can be the most important part of your overall security and compliance program, since it helps you identify systems, third parties, business processes, and people that are in scope for PCI compliance.

Auditor Tips: Requirement 9: Improve Your Physical Security

Once you know what systems you need to protect, put controls in place that can log and restrict access to them.

Auditor Tips: Requirement 8: Use Unique ID Credentials

Requirement 8 is all about using unique ID credentials.

Auditor Tips: Requirement 5: Implement And Update Your Anti-Malware

PCI DSS requires anti-malware software to be installed on all systems that are commonly affected by malware (e.g., Windows).

Auditor Tips: Requirement 7: Restrict Access

Cardholder data and card systems should only be accessible to those that need that information to do their jobs. Once you’ve implemented access privileges, make sure to document it.

Auditor Tips: Requirement 6: System Updating And Software Development

System administrators have the responsibility to ensure that all system components (e.g., servers, firewalls, routers, workstations) and software are updated with critical security patches within 30 days of public release.

Auditor Tips: Requirement 4: Sending Data Over Open And Public Networks

Know exactly where CHD is coming from and being sent to, inside and outside of your organization.

Auditor Tips: Requirement 3: Protect Cardholder Data

It is important to know what data you actually store, process, and/or transmit.

Auditor Tips: PCI DSS Responsibilities and Challenges

As you implement your cybersecurity program, make sure you understand why a security control is required so you can structure tools and processes around the protection each control offers.

Auditor Tips: Requirement 2: System Configuration

You are required to use industry-accepted configuration and hardening standards when setting up systems that are part of your PCI scope.

Requirement 1: Establish Secure Firewall Rules

Make sure to choose firewalls that support the necessary configuration options to protect critical systems and provide segmentation between the CDE and other internal and external networks specific to your organization.

Auditor Tips: PCI DSS Scope

To discover your PCI scope and what must be included for yourPCI compliance, you need to identify anything that processes, stores, or transmits cardholder data, and then evaluate what people and systems are communicating with your systems.

Performing an SAQ-B Version 4.0 Self-Assessment

The SAQ B is designed for merchant environments where all cardholder data is processed using standalone Point-of-Interaction (POI) terminals connected via an analog phone line.