<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[PCI-GO - Blog]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog]]></link><description><![CDATA[Blog]]></description><pubDate>Thu, 16 Oct 2025 09:11:58 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[PCI 4.0 Impact on Requirement #12]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-12]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-12#comments]]></comments><pubDate>Fri, 20 Oct 2023 07:46:18 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-12</guid><description><![CDATA[Overview  The impact of the new PCI 4.0 on the former 3.2.1 requirement 12 is in the form of:&nbsp;Reformulation, amendments, merges, moves and removals.         Terminology:The term service provider is replaced by "third-party service providers (TPSPs)"The term "annually" is replaced by "once every 12 months"The term &ldquo;system breach&rdquo; is replaced by &ldquo;compromise&rdquo;&nbsp;The term &ldquo;alerts&rdquo; is replaced by by &ldquo;suspected or confirmed security incidents.&rdquo;&nb [...] ]]></description><content:encoded><![CDATA[<h2 class="wsite-content-title">Overview</h2>  <div class="paragraph">The impact of the new PCI 4.0 on the former 3.2.1 requirement 12 is in the form of:&nbsp;<strong>Reformulation, amendments, merges, moves and removals.</strong></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-10-20-11-09-04_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:</strong><ul style="color:rgb(0, 0, 0)"><li>The term service provider is replaced by "third-party service providers (TPSPs)"</li><li>The term "annually" is replaced by "once every 12 months"</li><li>The term &ldquo;system breach&rdquo; is replaced by &ldquo;compromise&rdquo;&nbsp;</li><li>The term &ldquo;alerts&rdquo; is replaced by by &ldquo;suspected or confirmed security incidents.&rdquo;&nbsp;</li><li>The term &ldquo;system breach&rdquo; is replaced by &ldquo;suspected or confirmed security incidents.&rdquo;&nbsp;</li></ul><br /><strong>New controls:</strong>&nbsp;13 new controls<br />4.0 - 12.3.1 requires to<strong>&nbsp;</strong>perform a targeted risk analysis for any PCI DSS requirement that provides flexibility for how frequently it is performed.&nbsp;<br />4.0 - 12.3.2 Requires entities using a Customized Approach to perform a targeted risk analysis for each PCI DSS requirement that the entity meets with the customized approach.&nbsp;<br />4.0 - 12.3.3 Requires<strong>&nbsp;</strong>to document and review cryptographic cipher suites and protocols in use at least once every 12 months.&nbsp;<br />4.0 - 12.3.4 - Requires to review hardware and software technologies in use at least once every 12 months.&nbsp;<br />4.0 - 12.5.2 Requires to document and confirm PCI DSS scope at least every 12 months and upon significant change to the in-scope environment.&nbsp;<br />4.0 - 12.5.2.1 Requires service providers to document and confirm PCI DSS scope at least once every six months and upon significant change to the in-scope environment.&nbsp;<br />4.0 - 12.5.3 - Requires service providers for a documented review of the impact to PCI DSS scope and applicability of controls upon significant changes to organizational structure.&nbsp;<br />4.0 - 12.6. 2 Requires<strong>&nbsp;</strong>to review and update the security awareness program at least once every 12 months.&nbsp;<br />4.0 - 12.6.3.1 Requires security awareness trainings to include awareness of threats and vulnerabilities that could impact the security of the CDE.&nbsp;<br />4.0 - 12.6.3.2 Requires<strong>&nbsp;</strong>security awareness trainings to include awareness about the acceptable use of end- user technologies in accordance with Requirement 12.2.1.&nbsp;<br />4.0 - 12.9.2 Requires service providers to support their customers&rsquo; requests for information to meet Requirements 12.8.4 and 12.8.5.&nbsp;<br />4.0 - 12.10.4.1 Requires<strong>&nbsp;</strong>to perform a targeted risk analysis to define the frequency of periodic training for incident response personnel.&nbsp;<br />4.0 - 12.10.7 Requires<strong>&nbsp;</strong>incident response procedures to be in place and initiated upon detection of stored PAN anywhere it is not expected.&nbsp;<br /><br /><strong>Amendements</strong><br />4.0 - 12.1.3 Beside defining information security roles and responsibilities for all personnel, this requirement adds that all personnel be aware and acknowledge their information security responsibilities.&nbsp;<br />4.0 - 12.6.1 This requirement asks that the implemented security awareness program informs all personnel of their role in protecting the cardholder data beside making them aware of the entity&rsquo;s information security policy and procedures.<br />4.0 - 12.6.3 Regarding the delivery of security awareness trainings, this requirement adds the use of Multiple methods of communication are used.&nbsp;<br />4.0 - 12.8.5 This requirements asks for a list of PCI DSS requirements shared between the TPSP and the entity, beside the list managed by the entity and managed by the TPSP.<br />4.0 - 12.10.1 Regarding the content of the incident response plan, this requirement asks for Incident response procedures with specific containment and mitigation activities for different types of incidents.&nbsp;<br />4.0 - 12.10.5 Regarding the incident response plan and alerts from security monitoring systems, this requirement asks to monitor change-detection mechanisms for critical files and the change-and tamper-detection mechanism for payment pages.&nbsp;<br />4.0 - 12.4.2 Regarding the periodic reviews that service providers have to perform to confirm that personnel are performing their tasks in accordance with all security policies and operational procedures, this requirement asks that those review be performed by personnel other than those responsible for performing the given task and include Configuration reviews for network security controls.&nbsp;<br />4.0 - 12.4.2.1&nbsp;<em>This requirement asks that the conclusions of the periodic review performed by the service providers&nbsp;</em>document remediation actions taken for any tasks that were found to not be performed at Requirement 12.4.2.<br /><strong><br />Removed:</strong><br />3.2.1 -&nbsp;<strong>12.2&nbsp;</strong>Implement a risk-assessment process that:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.),&nbsp;</li><li>Identifies critical assets, threats, and vulnerabilities, and&nbsp;</li><li>Results in a formal, documented analysis of risk.&nbsp;</li></ul>3.2.1 - 12.3 Develop usage policies for critical technologies and define proper use of :&nbsp;<ul style="color:rgb(0, 0, 0)"><li>3.2.1 - 12.3.2 Authentication for use of the technology&nbsp;</li><li>3.2.1 - 12.3.3 A list of all such devices and personnel with access&nbsp;</li><li>3.2.1 - 12.3.4 A method to accurately and readily determine owner, contact information, and purpose (for example, labeling, coding, and/or inventorying of devices)</li><li>3.2.1 - 12.3.6 Acceptable network locations for the technologies&nbsp;</li><li>3.2.1 - 12.3.8 Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity&nbsp;</li><li>3.2.1 - 12.3.9 Activation of remote-access technologies for vendors and business partners only when needed by vendors and business partners, with immediate deactivation after use</li></ul>3.2.1 -&nbsp;<strong>12.3.10&nbsp;</strong>For personnel accessing cardholder data via remote-access technologies, prohibit the copying, moving, and storage of cardholder data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need.&nbsp;<br />3.2.1 -&nbsp;<strong>12.8&nbsp;</strong>Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data<br />3.2.1 -&nbsp;<strong>12.10&nbsp;</strong>Implement an incident response plan. Be prepared to respond immediately to a system breach.&nbsp;<br /><br /><strong>Moved:&nbsp;</strong><br />3.2.1 - 2.4 Requirement for maintaining an inventory of system components that are in scope for PCI DSS is Moved to 12.5.1<br />3.2.1 - 11.1.2 Requirement for implementing incident response procedures in the event unauthorized wireless access points are detected is moved to 4.0 - 12.10.5<br />3.2.1 - 11.5.1 Requirement for Implementing a process to respond to any alerts generated by the change- detection solution is moved to 4.0 - 12.10.5</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font size="3">Get your&nbsp;PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;. Fully aligned with PCI DSS V4.0. It includes the&nbsp;<strong>defined approach requirements</strong>, the&nbsp;<strong>customized approach,</strong>&nbsp;<strong>applicability notes</strong>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;<strong>prioritization approach</strong>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;<strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong>as well as to register execution of vulnerability scans and penetration tests</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title"><span>Detailed Analysis</span></h2>  <div class="paragraph">&#8203;<strong>Title:</strong><br />3.2.1 - Maintain a policy that addresses information security for all personnel.&nbsp;<br />4.0 - Support Information Security with Organizational Policies and Programs</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.1 Establish, publish, maintain, and disseminate a security policy.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.1.1 An overall information security policy is:&nbsp;<br />Established.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Published.&nbsp;</li><li>Maintained.&nbsp;</li><li>Disseminated to all relevant personnel, as well as to relevant vendors and business partners.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.1.1 Review the security policy at least annually and update the policy when the environment changes.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.1.2 The information security policy is:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Reviewed at least once every 12 months.&nbsp;</li><li>Updated as needed to reflect changes to business objectives or risks to the environment.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.2 Implement a risk-assessment process that:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.),&nbsp;</li><li>Identifies critical assets, threats, and vulnerabilities, and&nbsp;</li><li>Results in a formal, documented analysis of risk.&nbsp;</li></ul>Change:&nbsp;<span style="color:rgb(252, 18, 51)">Removal&nbsp;</span>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.3 Develop usage policies for critical technologies and define proper use of these technologies.&nbsp;<br />3.2.1 - 12.3.1&nbsp;<strong>Explicit approval by authorized parties&nbsp;</strong><br />3.2.1 - 12.3.2 Authentication for use of the technology&nbsp;&nbsp;<span style="color:rgb(252, 18, 51)">- Removed</span><br />3.2.1 - 12.3.3 A list of all such devices and personnel with access&nbsp;<span style="color:rgb(252, 18, 51)">- Removed</span><br />3.2.1 - 12.3.4 A method to accurately and readily determine owner, contact information, and purpose (for example, labeling, coding, and/or inventorying of devices)&nbsp;<span style="color:rgb(252, 18, 51)">- Removed</span><br />3.2.1 - 12.3.5&nbsp;<strong>Acceptable uses of the technology&nbsp;</strong><br />3.2.1 - 12.3.6 Acceptable network locations for the technologies&nbsp;<span style="color:rgb(252, 18, 51)">- Removed</span><br />3.2.1 - 12.3.7&nbsp;<strong>List of company-approved products&nbsp;</strong><br />3.2.1 - 12.3.8 Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity - Removed<br />3.2.1 - 12.3.9 Activation of remote-access technologies for vendors and business partners only when needed by vendors and business partners, with immediate deactivation after use<span style="color:rgb(252, 18, 51)">&nbsp;- Removed</span><br />Change:&nbsp;&nbsp;<strong>Reformulation</strong>&nbsp;+&nbsp;<span style="color:rgb(252, 18, 51)">Removal&nbsp;</span>+ Merge<br /><br />4.0 - 12.2.1 Acceptable use policies for end-user technologies are documented and implemented, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Explicit approval by authorized parties.</strong></li><li><strong>Acceptable uses of the technology.&nbsp;</strong></li><li><strong>List of products approved by the company for employee use, including hardware and software.&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;<strong>12.3.10&nbsp;</strong>For personnel accessing cardholder data via remote-access technologies, prohibit the copying, moving, and storage of cardholder data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need.&nbsp;<br />Where there is an authorized business need, the usage policies must require the data be protected in accordance with all applicable PCI DSS Requirements.&nbsp;<br />Change:<span style="color:rgb(252, 18, 51)">&nbsp;Removal and replacement by the NEW 4.0 - 3.4.2</span><br /><br />4.0 - 3.4.2 When using remote-access technologies, technical controls prevent copy and/or relocation of PAN for all personnel, except for those with documented, explicit authorization and a legitimate, defined business need.&nbsp;<br />Change: NEW to replace 3.2.1 - 12.3.10</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.4<strong>&nbsp;</strong>Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.1.3<strong>&nbsp;</strong>The security policy clearly defines information security roles and responsibilities for all personnel, and&nbsp;<strong>all personnel are aware of and acknowledge their information security responsibilities.&nbsp;</strong>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - <font color="#8d2424">2.4&nbsp;</font>Maintain an inventory of system components that are in scope for PCI DSS.<br />Change : Move under 12.5&nbsp;<br /><br />4.0 - 12.5.<strong>1&nbsp;</strong>An inventory of system components that are in scope for PCI DSS, including a description of function/use, is maintained and kept current.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 12.4.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program to include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Overall accountability for maintaining PCI DSS compliance&nbsp;</li><li>Defining a charter for a PCI DSS compliance program and communication to executive management&nbsp;</li></ul> Change: Reformulation<br /><br /><span style="color:rgb(51, 51, 51)">4.0 - 12.4.1&nbsp;</span><em><span style="color:rgb(51, 51, 51)">Additional requirement for service providers only:&nbsp;</span></em><span style="color:rgb(51, 51, 51)">Responsibility is established by executive management for the protection of cardholder data and a PCI DSS compliance program to include:&nbsp;</span><ul style="color:rgb(0, 0, 0)"><li><span style="color:rgb(51, 51, 51)">Overall accountability for maintaining PCI DSS compliance.&nbsp;</span></li><li><span style="color:rgb(51, 51, 51)">Defining a charter for a PCI DSS compliance program and communication to executive management.&nbsp;</span></li></ul><br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 12.5 Assign to an individual or team the following information security management responsibilities:&nbsp;<br />3.2.1 - 12.5.1 Establish, document, and distribute security policies and procedures.&nbsp;<br />3.2.1 - 12.5.2 Monitor and analyze security alerts and information, and distribute to appropriate personnel.&nbsp;<br />3.2.1 - 12.5.3 Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations.&nbsp;<br />3.2.1 - 12.5.4 Administer user accounts, including additions, deletions, and modifications.&nbsp;<br />3.2.1 - 12.5.5 Monitor and control all access to data.&nbsp;<br />Change: Reformulate +merge in a more global perspective<br /><br />4.0 - 12.1.4 Responsibility for information security is formally assigned to a Chief Information Security Officer or other information security knowledgeable member of executive management.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;12.6&nbsp;Implement a formal security awareness program to make all personnel aware of the cardholder data security policy and procedures.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.6.1<strong>&nbsp;</strong>A formal security awareness program is implemented to make all personnel aware of the entity&rsquo;s information security policy and procedures&nbsp;<strong>and their role in protecting the cardholder data</strong>.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;12.6.1&nbsp;Educate personnel upon hire and at least annually.&nbsp;<br />3.2.1 -&nbsp;12.6.2&nbsp;Require personnel to acknowledge at least annually that they have read and understood the security policy and procedures.&nbsp;<br />Change: Reformulate + merge +&nbsp;<strong>amendement</strong><br /><br /><strong>4.0 - 12.6.3&nbsp;</strong>Personnel receive security awareness training as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Upon hire and at least once every 12 months.&nbsp;</li><li><strong>Multiple methods of communication are used.&nbsp;</strong></li><li>Personnel acknowledge at least once every 12 months that they have read and understood the information security policy and procedures.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;12.7&nbsp;Screen potential personnel prior to hire to minimize the risk of attacks from internal sources. (Examples of background checks include previous employment history, criminal record, credit history, and reference checks.)&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.7.1&nbsp;Potential personnel who will have access to the CDE are screened, within the constraints of local laws, prior to hire to minimize the risk of attacks from internal sources.&nbsp;<br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;<strong>12.8&nbsp;</strong>Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data, as follows:&nbsp;<br />Change:&nbsp;<span style="color:rgb(252, 18, 51)">Removal</span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.8.1<strong>&nbsp;</strong>Maintain a list of service providers including a description of the service provided.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Clarification</strong><br /><br />4.0 - 12.8.1 A list of all third-party service providers (TPSPs)&nbsp;<strong>with which account data is shared or that could affect the security of account data is maintained, including a description for each of the services provided.&nbsp;</strong>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.8.2 Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the security of cardholder data the service providers possess or otherwise store, process or transmit on behalf of the customer, or to the extent that they could impact the security of the customer&rsquo;s cardholder data environment.&nbsp;<br />Change: Reformulation +&nbsp;<strong>clarification</strong><br /><br />4.0 - 12.8.2 Written agreements with TPSPs are maintained as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Written agreements are maintained with all TPSPs&nbsp;<strong>with which account data is shared or that could affect the security of the CDE.&nbsp;</strong></li><li>Written agreements include acknowledgments from TPSPs that they are responsible for the security of account data the TPSPs possess or otherwise store, process, or transmit on behalf of the entity, or to the extent that they could impact the security of the entity&rsquo;s CDE.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;<strong>12.8.3&nbsp;</strong>Ensure there is an established process for engaging service providers including proper due diligence prior to engagement.&nbsp;<br />Change: reformulation<br /><br />4.0 - 12.8.3 An established process is implemented for engaging TPSPs, including proper due diligence prior to engagement.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;12.8.4&nbsp;Maintain a program to monitor service providers&rsquo; PCI DSS compliance status at least annually.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.8.4<strong>&nbsp;</strong>A program is implemented to monitor TPSPs&rsquo; PCI DSS compliance status at least once every 12 months.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;<strong><strong>12.8.5</strong>&nbsp;</strong>Maintain information about which PCI DSS requirements are managed by each service provider, and which are managed by the entity.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.8.5<strong>&nbsp;</strong>Information is maintained about which PCI DSS requirements are managed by each TPSP, which are managed by the entity, a<strong>nd any that are shared between the TPSP and the entity.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;12.9&nbsp;<em>Additional requirement for service providers only</em>:&nbsp;Service providers acknowledge in writing to customers that they are responsible for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer&rsquo;s cardholder data environment.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.9.1&nbsp;<em>Additional requirement for service providers only:</em><strong><em>&nbsp;</em></strong>TPSPs acknowledge in writing to customers that they are responsible for the security of account data the TPSP possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer&rsquo;s CDE.&nbsp;<br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;12.10<strong>&nbsp;</strong>Implement an incident response plan. Be prepared to respond immediately to a system breach.&nbsp;<br />Change:&nbsp;<span style="color:rgb(252, 18, 51)">Removed</span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.10.1<strong>&nbsp;</strong>Create the incident response plan to be implemented in the event of system breach. Ensure the plan addresses the following, at a minimum:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Roles, responsibilities, and communication and contact strategies in the event of a compromise including notification of the payment brands, at a minimum&nbsp;</li><li>Specific incident response procedures&nbsp;</li><li>Business recovery and continuity&nbsp;<br />procedures&nbsp;</li><li>Data backup processes&nbsp;</li><li>Analysis of legal requirements for reporting compromises&nbsp;</li><li>Coverage and responses of all critical system components&nbsp;</li><li>Reference or inclusion of incident response procedures from the payment brands.&nbsp;</li></ul>Change: Reformulation +<strong>&nbsp;Amendement</strong><br /><br />4.0 - 12.10.1<strong>&nbsp;</strong>An incident response plan exists and is ready to be activated in the event of a suspected or confirmed security incident. The plan includes, but is not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Roles, responsibilities, and communication and contact strategies in the event of a suspected or confirmed security incident, including notification of payment brands and acquirers, at a minimum.&nbsp;</li><li>Incident response procedures&nbsp;<strong>with specific containment and mitigation activities for different types of incidents.&nbsp;</strong></li><li>Business recovery and continuity procedures.&nbsp;</li><li>Data backup processes.&nbsp;</li><li>Analysis of legal requirements for reporting compromises.&nbsp;</li><li>Coverage and responses of all critical system components.&nbsp;</li><li>Reference or inclusion of incident response procedures from the payment brands.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.10.2<strong>&nbsp;</strong>Review and test the plan, including all elements listed in Requirement 12.10.1, at least annually.&nbsp;<br />Change: Reformulate<br /><br />4.0 - 12.10.2<strong>&nbsp;</strong>At least once every 12 months, the security incident response plan is:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Reviewed and the content is updated as needed.&nbsp;</li><li>Tested, including all elements listed in Requirement 12.10.1.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 12.10.3<strong>&nbsp;</strong>Designate specific personnel to be available on a 24/7 basis to respond to alerts.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 12.10.3<strong>&nbsp;</strong>Specific personnel are designated to be available on a 24/7 basis to respond to suspected or confirmed security incidents.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 12.10.4 Provide appropriate training to staff with security breach response responsibilities.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.10.4<strong>&nbsp;</strong>Personnel responsible for responding to suspected and confirmed security incidents are appropriately&nbsp;<strong>and periodically trained</strong>&nbsp;on their incident response responsibilities.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.10.5 Include alerts from security monitoring systems, including but not limited to intrusion-detection, intrusion-prevention, firewalls, and file-integrity monitoring systems.&nbsp;<br />3.2.1 - 11.1.2 Implement incident response procedures in the event unauthorized wireless access points are detected.&nbsp;<br />3.2.1 - 11.5.1 Implement a process to respond to any alerts generated by the change- detection solution.&nbsp;<br />Change: Reformulation + Move + Merge +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.10.5&nbsp;The security incident response plan includes monitoring and responding to alerts from security monitoring systems, including but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Intrusion-detection and intrusion-prevention systems.&nbsp;</li><li>Network security controls.&nbsp;</li><li><strong>Change-detection mechanisms for critical files.&nbsp;</strong></li><li><strong>The change-and tamper-detection mechanism for payment pages.</strong></li><li>Detection of unauthorized wireless access points.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;12.10.6&nbsp;Develop a process to modify and evolve the incident response plan according to lessons learned and to incorporate industry developments.&nbsp;<br />Change: Reformulate<br /><br />4.0 - 12.10.6<strong>&nbsp;</strong>The security incident response plan is modified and evolved according to lessons learned and to incorporate industry developments.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.11&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Perform reviews&nbsp;<strong>at least quarterly</strong>&nbsp;to confirm personnel are following security policies and operational procedures. Reviews must cover the following processes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Daily log reviews&nbsp;</li><li>Firewall rule-set reviews&nbsp;</li><li>Applying configuration standards to new systems&nbsp;</li><li>Responding to security alerts&nbsp;</li><li>Change management processes&nbsp;</li></ul>Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0 - 12.4.2&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Reviews are performed at least once&nbsp;<strong>every three months</strong>to confirm that personnel are performing their tasks in accordance with all security policies and operational procedures.&nbsp;<strong>Reviews are performed by personnel other than those responsible for performing the given task</strong>&nbsp;and include, but are not limited to, the following tasks:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Daily log reviews.&nbsp;</li><li><strong>Configuration reviews for network security controls.&nbsp;</strong></li><li>Applying configuration standards to new systems.&nbsp;</li><li>Responding to security alerts.&nbsp;</li><li>Change-management processes.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 12.11.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Maintain documentation of quarterly review process to include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Documenting results of the reviews&nbsp;</li><li>Review and sign-off of results by personnel assigned responsibility for the PCI DSS compliance program&nbsp;</li></ul>Change: Reformulation +&nbsp;<strong>amendement</strong><br /><br />4.0&nbsp;<strong>-&nbsp;</strong>12.4.2.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Reviews conducted in accordance with Requirement 12.4.2 are documented to include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Results of the reviews.&nbsp;</li><li><strong>Documented remediation actions taken for any tasks that were found to not be performed at Requirement 12.4.2</strong>.&nbsp;</li><li>Review and sign-off of results by personnel assigned responsibility for the PCI DSS compliance program.&nbsp;</li></ul><br />&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br />&#8203;<br />4.0 - 12.3.1<strong>&nbsp;</strong>Each PCI DSS requirement that provides flexibility for how frequently it is performed (for example, requirements to be performed periodically) is supported by a targeted risk analysis that is documented and includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Identification of the assets being protected.&nbsp;</li><li>Identification of the threat(s) that the requirement is protecting against.&nbsp;</li><li>Identification of factors that contribute to the likelihood and/or impact of a threat being realized.&nbsp;</li><li>Resulting analysis that determines, and includes justification for, how frequently the requirement must be performed to minimize the likelihood of the threat being realized.&nbsp;</li><li>Review of each targeted risk analysis at least once every 12 months to determine whether the results are still valid or if an updated risk analysis is needed.&nbsp;</li><li>Performance of updated risk analyses when needed, as determined by the annual review.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br />&#8203;<br />4.0 - 12.3.2<strong>&nbsp;</strong>A targeted risk analysis is performed for each PCI DSS requirement that the entity meets with the customized approach, to include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Documented evidence detailing each element specified in Appendix D: Customized Approach (including, at a minimum, a controls matrix and risk analysis).&nbsp;</li><li>Approval of documented evidence by senior management.&nbsp;</li><li>Performance of the targeted analysis of risk at least once every 12 months.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br />&#8203;<br />4.0 - 12.3.3<strong>&nbsp;</strong>Cryptographic cipher suites and protocols in use are documented and reviewed at least once every 12 months, including at least the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>An up-to-date inventory of all cryptographic cipher suites and protocols in use, including purpose and where used.&nbsp;</li><li>Active monitoring of industry trends regarding continued viability of all cryptographic cipher suites and protocols in use.&nbsp;</li><li>A documented strategy to respond to anticipated changes in cryptographic vulnerabilities.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br /><br />4.0 - 12.3.4<strong>&nbsp;</strong>Hardware and software technologies in use are reviewed at least once every 12 months, including at least the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Analysis that the technologies continue to receive security fixes from vendors promptly.&nbsp;</li><li>Analysis that the technologies continue to support (and do not preclude) the entity&rsquo;s PCI DSS compliance.&nbsp;</li><li>Documentation of any industry announcements or trends related to a technology, such as when a vendor has announced &ldquo;end of life&rdquo; plans for a technology.&nbsp;</li><li>Documentation of a plan, approved by senior management, to remediate outdated technologies, including those for which vendors have announced &ldquo;end of life&rdquo; plans.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br />4.0 - 12.5.2 PCI DSS scope is documented and confirmed by the entity at least once every 12 months and upon significant change to the in-scope environment. At a minimum, the scoping validation includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Identifying all data flows for the various payment stages (for example, authorization, capture settlement, chargebacks, and refunds) and acceptance channels (for example, card-present, card-not-present, and e-commerce).&nbsp;</li><li>Updating all data-flow diagrams per Requirement 1.2.4.&nbsp;</li><li>Identifying all locations where account data is stored, processed, and transmitted, including but not limited to: 1) any locations outside of the currently defined CDE, 2) applications that process CHD, 3) transmissions between systems and networks, and 4) file backups.&nbsp;</li><li>Identifying all system components in the CDE, connected to the CDE, or that could impact security of the CDE.&nbsp;</li><li>Identifying all segmentation controls in use and the environment(s) from which the CDE is segmented, including justification for environments being out of scope.&nbsp;</li><li>Identifying all connections from third-party entities with access to the CDE.&nbsp;</li><li>Confirming that all identified data flows, account data, system components, segmentation controls, and connections from third parties with access to the CDE are included in scope.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br />4.0 - 12.5.2.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>PCI DSS scope is documented and confirmed by the entity at least once every six months and upon significant change to the in-scope environment. At a minimum, the scoping validation includes all the elements specified in Requirement 12.5.2.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br />4.0 - 12.5.3&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Significant changes to organizational structure result in a documented (internal) review of the impact to PCI DSS scope and applicability of controls, with results communicated to executive management.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br /><br />4.0 - 12.6.2 The security awareness program is:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Reviewed at least once every 12 months, and&nbsp;</li><li>Updated as needed to address any new threats and vulnerabilities that may impact the security of the entity&rsquo;s CDE, or the information provided to personnel about their role in protecting cardholder data.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW<br />&#8203;</span><br />4.0 - 12.6.3.1<strong>&nbsp;</strong>Security awareness training includes awareness of threats and vulnerabilities that could impact the security of the CDE, including but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Phishing and related attacks.&nbsp;</li><li>Social engineering.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br />4.0 - 12.6.3.2<strong>&nbsp;</strong>Security awareness training includes awareness about the acceptable use of end-user technologies in accordance with Requirement 12.2.1.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>&#8203;3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br /><strong>4.0 - 12.9.2&nbsp;<em>Additional requirement for service providers only:&nbsp;</em></strong>TPSPs support their customers&rsquo; requests for information to meet Requirements 12.8.4 and 12.8.5 by providing the following upon customer request:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>PCI DSS compliance status information for any service the TPSP performs on behalf of customers (Requirement 12.8.4).&nbsp;</li><li>Information about which PCI DSS requirements are the responsibility of the TPSP and which are the responsibility of the customer, including any shared responsibilities (Requirement 12.8.5).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 12.10.4.1 The frequency of periodic training for incident response personnel is defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change NEW<br /><br /><strong>4.0 - 12.10.7&nbsp;</strong>Incident response procedures are in place, to be initiated upon the detection of stored PAN anywhere it is not expected, and include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Determining what to do if PAN is discovered outside the CDE, including its retrieval, secure deletion, and/or migration into the currently defined CDE, as applicable.&nbsp;</li><li>Identifying whether sensitive authentication data is stored with PAN.&nbsp;</li><li>Determining where the account data came from and how it ended up where it was not expected.&nbsp;</li><li>Remediating data leaks or process gaps that resulted in the account data being where it was not expected.&nbsp;</li></ul></div>  <h2 class="wsite-content-title" style="text-align:center;"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-11" target="_blank">Go to Requirement #11&nbsp;</a></h2>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 Impact on Requirement #11]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-11]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-11#comments]]></comments><pubDate>Wed, 13 Sep 2023 07:36:00 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-11</guid><description><![CDATA[Overview  The impact of the new PCI 4.0 on the former 3.2.1 requirement 11 is in the form of:&nbsp;Reformulation, amendments, split, move and removal.         &#8203;Terminology:The term quarterly is replaced by "every three months"New controls:&nbsp;6 new controls4.0 - 11.1.2&nbsp;requests that&nbsp;roles and responsibilities for performing activities in Requirement 11 be documented, assigned, and understood.4.0 - 11.3.1.1&nbsp;requests that&nbsp;vulnerabilities not ranked as high-risk or criti [...] ]]></description><content:encoded><![CDATA[<h2 class="wsite-content-title">Overview</h2>  <div class="paragraph">The impact of the new PCI 4.0 on the former 3.2.1 requirement 11 is in the form of:&nbsp;<strong>Reformulation, amendments, split, move and removal.</strong></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/pci_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph">&#8203;<strong>Terminology:</strong><ul style="color:rgb(0, 0, 0)"><li>The term quarterly is replaced by "every three months"</li></ul><strong>New controls:</strong>&nbsp;6 new controls<br />4.0 - 11.1.2<strong>&nbsp;</strong>requests that<strong>&nbsp;</strong>roles and responsibilities for performing activities in Requirement 11 be documented, assigned, and understood.<br />4.0 - 11.3.1.1<strong>&nbsp;</strong>requests that<strong>&nbsp;</strong>vulnerabilities not ranked as high-risk or critical be addressed based on the risk defined in the entity&rsquo;s targeted risk analysis.<br />4.0 - 11.3.1.2<strong>&nbsp;</strong>requests to perform internal vulnerability scans via authenticated scanning and clarify how it should be done.&nbsp;&nbsp;<br />4.0 - 11.4.7 requests that service providers support their customers for external penetration testing (**)<br />4.0 - 11.5.1.1 request that service providers implement Intrusion-detection and/or intrusion-prevention techniques to detect, alert on/prevent, and address covert malware communication channels (**)<br />4.0 - 11.6.1 requests that unauthorized changes of headers and the contents of payment pages be detected and responded to.&nbsp;<br />(*) Organizations should integrate PCI-DSS requirements in terms of penetration testing in the selection process of service providers to avoid any bad surprise.&nbsp;<br />(**) The challenge here is that by definition Covert Channels are intended to be hidden. This point should be clarified by the Council.&nbsp;<br /><br /><strong>Amended:</strong><br />4.0 - 11.2.1 requests that whenever automated monitoring is used to detect wireless access point, personnel must be notified via generated alerts(*).<br />4.0 - 11.4.1<strong>&nbsp;</strong>requests that the approach to assessing and addressing the risk posed by exploitable vulnerabilities and security weaknesses found during a penetration testing be documented in the methodology.<br />4.0 - 11.4.4 request that penetration testing exploitable findings be corrected in accordance with the entity&rsquo;s assessment of the risk posed by the security issue.<br />4.0 - 11.3.1<strong>&nbsp;</strong>requests Internal vulnerability Scan tool be kept up to date with latest vulnerability information and organizational independence of the testers.<br />4.0 - 11.3.2<strong>&nbsp;</strong>requests that&nbsp;<em>ASV Program Guide&nbsp;</em>requirements for a passing external vulnerability scans are met.&nbsp;<br />4.0 - 11.4.2 requests internal penetration testing be performed per the entity&rsquo;s defined methodology, by a qualified internal resource or qualified external third-party and that organizational independence of the tester exists.<br />4.0 - 11.4.3<strong>&nbsp;</strong>requests external penetration testing be performed per the entity&rsquo;s defined methodology, by a qualified internal resource or qualified external third-party and that organizational independence of the tester exists.<br />4.0 - 11.4.5 11.4.6 request penetration tests on segmentation controls to cover all segmentation controls/methods in use, be performed according to the entity&rsquo;s defined penetration testing methodology, confirm effectiveness of any use of isolation to separate systems with differing security levels, be performed by a qualified internal resource or qualified external third party.&nbsp;<br /><br />(*) The challenge with authenticated scanning is the volume of findings these scans typically return, often numbering in the thousands.&nbsp;<br /><br /><strong>Removed:</strong>&nbsp;The following controls are removed for clarity and structure<br />3.2.1 - 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades).&nbsp;&nbsp;<br /><br /><strong>Moved:&nbsp;</strong><br />3.2.1 - 11.1.2 requiring<strong>&nbsp;</strong>incident response procedures to handle detection of unauthorized wireless access points is moved under 12.10.5<br />3.2.1 - 11.5.1 requiring<strong>&nbsp;</strong>a process to respond to alerts generated by the change-detection solution is also moved under 12.10.5</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font size="3"><span>Get your&nbsp;</span><a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a><span>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;</span><strong>defined approach requirements</strong><span>, the&nbsp;</span><strong>customized approach,</strong><span>&nbsp;</span><strong>applicability notes</strong><span>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;</span><strong>prioritization approach</strong><span>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;</span><strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong><span>as well as to register execution of vulnerability scans and penetration tests</span></font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Detailed Analysis</h2>  <div class="paragraph">&#8203;<strong>Title:</strong><br />3.2.1 - Regularly test security systems and processes.&nbsp;<br />4.0 - Test Security of Systems and Networks Regularly&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;<strong>11.1&nbsp;</strong>Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendement&nbsp;</strong><br /><br />4.0 - 11.2.1<strong>&nbsp;</strong>Authorized and unauthorized wireless access points are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>The presence of wireless (Wi-Fi) access points is tested for,&nbsp;</li><li>All authorized and unauthorized wireless access points are detected and identified,&nbsp;</li><li>Testing, detection, and identification occurs at least once every three months.&nbsp;</li><li><strong>If automated monitoring is used, personnel are notified via generated alerts.</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 11.1.1<strong>&nbsp;</strong>Maintain an inventory of authorized wireless access points including a documented business justification.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 11.2.2<strong>&nbsp;</strong>An inventory of authorized wireless access points is maintained, including a documented business justification.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.1.2<strong>&nbsp;</strong>Implement incident response procedures in the event unauthorized wireless access points are detected.&nbsp;<br />Change: MOVED to Requirement 12<br /><br />4.0 - 12.10.5<strong>&nbsp;</strong>The security incident response plan includes monitoring and responding to alerts from security monitoring systems, including but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Intrusion-detection and intrusion-prevention systems.&nbsp;</li><li>Network security controls.&nbsp;</li><li>Change-detection mechanisms for critical files.&nbsp;</li><li>The change-and tamper-detection mechanism for payment pages.&nbsp;</li><li><strong>Detection of unauthorized wireless access points</strong>.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 11.2<strong>&nbsp;</strong>Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades).&nbsp;&nbsp;<br />Change: Removed<br /><br />4.0 - NONE</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.2.1<strong>&nbsp;</strong>Perform quarterly internal vulnerability scans. Address vulnerabilities and perform rescans to verify all &ldquo;high risk&rdquo; vulnerabilities are resolved in accordance with the entity&rsquo;s vulnerability ranking (per Requirement 6.1). Scans must be performed by qualified personnel.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendments</strong><br /><br />4.0 - 11.3.1<strong>&nbsp;</strong>Internal vulnerability scans are performed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>At least once every three months.&nbsp;</li><li>High-risk and critical vulnerabilities (per the entity&rsquo;s vulnerability risk rankings defined at Requirement 6.3.1) are resolved.&nbsp;</li><li>Rescans are performed that confirm all high- risk and critical vulnerabilities (as noted above) have been resolved.&nbsp;</li><li><strong>Scan tool is kept up to date with latest vulnerability information.&nbsp;</strong></li><li>Scans are performed by qualified personnel&nbsp;<strong>and organizational independence of the tester exists</strong>.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.2.2<strong>&nbsp;</strong>Perform quarterly external vulnerability scans, via an Approved Scanning Vendor (ASV) approved by the Payment Card Industry Security Standards Council (PCI SSC). Perform rescans as needed, until passing scans are achieved.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendments</strong><br /><br />4.0 - 11.3.2<strong>&nbsp;</strong>External vulnerability scans are performed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>At least once every three months.&nbsp;</li><li>By a PCI&nbsp;<strong>SSC Approved Scanning Vendor (ASV).&nbsp;</strong></li><li><strong>Vulnerabilities are resolved and&nbsp;<em>ASV Program Guide&nbsp;</em>requirements for a passing scan are met.&nbsp;</strong></li><li>Rescans are performed as needed to confirm that vulnerabilities are resolved per the&nbsp;<em>ASV Program Guide&nbsp;</em>requirements for a passing scan.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.2.3 Perform internal and external scans, and rescans as needed, after any significant change. Scans must be performed by qualified personnel.&nbsp;<br />Change: Reformulation + split&nbsp;<br /><br />4.0 - 11.3.1.3<strong>&nbsp;</strong>Internal vulnerability scans are performed after any significant change as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>H<strong>igh-risk and critical vulnerabilities (per the entity&rsquo;s vulnerability risk rankings defined at Requirement 6.3.1) are resolved.&nbsp;</strong></li><li>Rescans are conducted as needed.&nbsp;</li><li>Scans are performed by qualified personnel and organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</li></ul><strong>4.0 -&nbsp;</strong>11.3.2.1<strong>&nbsp;</strong>External vulnerability scans are performed after any significant change as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Vulnerabilities that are scored 4.0 or higher by the CVSS are resolved.</strong></li><li>Rescans are conducted as needed.&nbsp;</li><li>Scans are performed by qualified personnel and organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 11.3&nbsp;</strong>Implement a methodology for penetration testing that includes the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115)&nbsp;</li><li>Includes coverage for the entire CDE perimeter and critical systems&nbsp;</li><li>Includes testing from both inside and outside the network&nbsp;</li><li>Includes testing to validate any segmentation and scope-reduction controls&nbsp;</li><li>Defines application-layer penetration tests to include, at a minimum, the vulnerabilities listed in Requirement 6.5&nbsp;</li><li>Defines network-layer penetration tests to include components that support network functions as well as operating systems&nbsp;</li><li>Includes review and consideration of threats and vulnerabilities experienced in the last 12 months&nbsp;</li><li>Specifies retention of penetration testing results and remediation activities results.&nbsp;</li></ul>Change: Reformulation +&nbsp;<strong>Amendeme</strong>nt<br /><br />4.0 - 11.4.1<strong>&nbsp;</strong>A penetration testing methodology is defined, documented, and implemented by the entity, and includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Industry-accepted penetration testing approaches.&nbsp;</li><li>Coverage for the entire CDE perimeter and critical systems.&nbsp;</li><li>Testing from both inside and outside the network.&nbsp;</li><li>Testing to validate any segmentation and scope- reduction controls.&nbsp;</li><li>Application-layer penetration testing to identify, at a minimum, the vulnerabilities listed in Requirement 6.2.4.&nbsp;</li><li>Network-layer penetration tests that encompass all components that support network functions as well as operating systems.&nbsp;</li><li>Review and consideration of threats and vulnerabilities experienced in the last 12 months.&nbsp;</li><li><strong>Documented approach to assessing and addressing the risk posed by exploitable vulnerabilities and security weaknesses found during penetration testing.&nbsp;</strong></li><li>Retention of penetration testing results and remediation activities results for at least 12 months.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.3.1<strong>&nbsp;</strong>Perform&nbsp;<em>external&nbsp;</em>penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment).&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendments</strong><br /><br />4.0 - 11.4.3<strong>&nbsp;</strong>External penetration testing is performed:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Per the entity&rsquo;s defined methodology&nbsp;</strong></li><li>At least once every 12 months&nbsp;</li><li>After any significant infrastructure or application upgrade or change&nbsp;</li><li><strong>By a qualified internal resource or qualified external third party&nbsp;</strong></li><li><strong>Organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.3.2<strong>&nbsp;</strong>Perform&nbsp;<em>internal&nbsp;</em>penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment).&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendments</strong><br /><br />4.0 - 11.4.2<strong>&nbsp;</strong>Internal penetration testing is performed:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Per the entity&rsquo;s defined methodology,&nbsp;</strong></li><li>At least once every 12 months&nbsp;</li><li>After any significant infrastructure or application upgrade or change&nbsp;</li><li><strong>By a qualified internal resource or qualified external third-party&nbsp;</strong></li><li><strong>Organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.3.3<strong>&nbsp;</strong>Exploitable vulnerabilities found during penetration testing are corrected and testing is repeated to verify the corrections.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendement</strong><br /><br />4.0 - 11.4.4<strong>&nbsp;</strong>Exploitable vulnerabilities and security weaknesses found during penetration testing are corrected as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>In accordance with the entity&rsquo;s assessment of the risk posed by the security issue as defined in Requirement 6.3.1.&nbsp;</strong></li><li>Penetration testing is repeated to verify the corrections.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.3.4<strong>&nbsp;</strong>If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope systems from systems in the CDE.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendments</strong><br /><br />4.0 -&nbsp;<strong>1</strong>1.4.5<strong>&nbsp;</strong>If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>At least once every 12 months and after any changes to segmentation controls/methods&nbsp;</li><li><strong>Covering all segmentation controls/methods in use</strong>.&nbsp;</li><li><strong>According to the entity&rsquo;s defined penetration testing methodology.&nbsp;</strong></li><li>Confirming that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems.&nbsp;</li><li><strong>Confirming effectiveness of any use of isolation to separate systems with differing security levels&nbsp;</strong>(see Requirement 2.2.3).&nbsp;</li><li>P<strong>erformed by a qualified internal resource or qualified external third party.&nbsp;</strong></li><li><strong>Organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.3.4.1&nbsp;<em>Additional requirement for service providers only</em>:<strong>&nbsp;</strong>If segmentation is used, confirm PCI DSS scope by performing penetration testing on segmentation controls at least every six months and after any changes to segmentation controls/methods.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendments</strong><br /><br />4.0 - 11.4.6&nbsp;<em>Additional requirement for service providers only:</em><strong><em>&nbsp;</em></strong>If segmentation is used to isolate the CDE from other networks, penetration tests are performed on segmentation controls as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>At least once every six months and after any changes to segmentation controls/methods.&nbsp;</li><li><strong>Covering all segmentation controls/methods in use</strong>.&nbsp;</li><li><strong>According to the entity&rsquo;s defined penetration testing methodology.&nbsp;</strong></li><li>Confirming that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems.&nbsp;</li><li><strong>Confirming effectiveness of any use of isolation to separate systems with differing security levels&nbsp;</strong>(see Requirement 2.2.3).&nbsp;</li><li>P<strong>erformed by a qualified internal resource or qualified external third party.&nbsp;</strong></li><li><strong>Organizational independence of the tester exists (not required to be a QSA or ASV).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.4<strong>&nbsp;</strong>Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network. Monitor all traffic at the perimeter of the cardholder data environment as well as at critical points in the cardholder data environment, and alert personnel to suspected compromises.&nbsp;<br />Keep all intrusion-detection and prevention engines, baselines, and signatures up to date.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 11.5.1<strong>&nbsp;</strong>Intrusion-detection and/or intrusion- prevention techniques are used to detect and/or prevent intrusions into the network as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All traffic is monitored at the perimeter of the CDE.&nbsp;</li><li>All traffic is monitored at critical points in the CDE.&nbsp;</li><li>Personnel are alerted to suspected compromises.&nbsp;</li><li>All intrusion-detection and prevention engines, baselines, and signatures are kept up to date.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.5<strong>&nbsp;</strong>Deploy a change-detection mechanism (for example, file-integrity monitoring tools) to alert personnel to unauthorized modification (including changes, additions, and deletions) of critical system files, configuration files, or content files; and configure the software to perform critical file comparisons at least weekly.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 11.5.2<strong>&nbsp;</strong>A change-detection mechanism (for example, file integrity monitoring tools) is deployed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>To alert personnel to unauthorized modification (including changes, additions, and deletions) of critical files.&nbsp;</li><li>To perform critical file comparisons at least once weekly.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.5.1<strong>&nbsp;</strong>Implement a process to respond to any alerts generated by the change- detection solution.&nbsp;<br />Change: Moved under 12.10.5<br /><br />4.0 - 12.10.5<strong>&nbsp;</strong>The security incident response plan includes monitoring and responding to alerts from security monitoring systems, including but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Intrusion-detection and intrusion-prevention systems.&nbsp;</li><li>Network security controls.&nbsp;</li><li><strong>Change-detection mechanisms for critical files.&nbsp;</strong></li><li>The change-and tamper-detection mechanism for payment pages.&nbsp;</li><li>Detection of unauthorized wireless access points.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 11.6<strong>&nbsp;</strong>Ensure that security policies and operational procedures for security monitoring and testing are documented, in use, and known to all affected parties.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 11.1.1<strong>&nbsp;</strong>All security policies and operational procedures that are identified in Requirement 11 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change : NEW<br /><br />4.0 - 11.1.2 Roles and responsibilities for performing activities in Requirement 11 are documented, assigned, and understood.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change : NEW<br /><br />4.0 - 11.3.1.1<strong>&nbsp;</strong>All other applicable vulnerabilities (those not ranked as high-risk or critical per the entity&rsquo;s vulnerability risk rankings defined at Requirement 6.3.1) are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Addressed based on the risk defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.&nbsp;</li><li>Rescans are conducted as needed.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change : NEW<br /><br />4.0 - 11.3.1.2<strong>&nbsp;</strong>Internal vulnerability scans are performed via authenticated scanning as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Systems that are unable to accept credentials for authenticated scanning are documented.&nbsp;</li><li>Sufficient privileges are used for those systems that accept credentials for scanning.&nbsp;</li><li>If accounts used for authenticated scanning can be used for interactive login, they are managed in accordance with Requirement 8.2.2.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change : NEW<br /><br />11.4.7&nbsp;<em>Additional requirement for multi-tenant service providers only:&nbsp;</em>Multi-tenant service providers support their customers for external penetration testing per Requirement 11.4.3 and 11.4.4.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change : NEW<br /><br />11.5.1.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Intrusion-detection and/or intrusion-prevention techniques detect, alert on/prevent, and address covert malware communication channels.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change : NEW<br /><br />11.6.1<strong>&nbsp;</strong>A change- and tamper-detection mechanism is deployed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>To alert personnel to unauthorized modification (including indicators of compromise, changes, additions, and deletions) to the HTTP headers and the contents of payment pages as received by the consumer browser.&nbsp;</li><li>The mechanism is configured to evaluate the received HTTP header and payment page.&nbsp;</li><li>The mechanism functions are performed as follows:&nbsp;<ul><li>&ndash; &nbsp;At least once every seven days&nbsp;<br /><strong>OR&nbsp;</strong></li><li>&ndash; &nbsp;Periodically (at the frequency defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1).&nbsp;</li></ul></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph" style="text-align:center;"><font size="3"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-10" target="_blank">Go to Requirement #10&nbsp;</a></font></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 10]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-10]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-10#comments]]></comments><pubDate>Wed, 12 Jul 2023 09:39:36 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-10</guid><description><![CDATA[Overview  The impact of the new PCI 4.0 on the former 3.2.1 requirement 10 is in the form of: Reformulation, Clarification, Change/amendments, Merges         Terminology:The term "firewall" is replaced by "Network Security controls"The term "Antivirus" is replaced by "Antimalware solution"The term "network resources" is replaced by "System components"New controls:&nbsp;3 new controls4.0 - 10.1.2 Roles and responsibilities for performing activities in Requirement 10 are documented, assigned, and  [...] ]]></description><content:encoded><![CDATA[<h2 class="wsite-content-title">Overview</h2>  <div class="paragraph">The impact of the new PCI 4.0 on the former 3.2.1 requirement 10 is in the form of: Reformulation, Clarification, Change/amendments, Merges<span></span></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/published/capture-d-cran-2023-07-07-16-42-08.png?1689154853" alt="Picture" style="width:513;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:</strong><ul style="color:rgb(0, 0, 0)"><li>The term "firewall" is replaced by "Network Security controls"</li><li>The term "Antivirus" is replaced by "Antimalware solution"</li><li>The term "network resources" is replaced by "System components"</li></ul><br /><strong>New controls:</strong>&nbsp;3 new controls<br />4.0 - 10.1.2 Roles and responsibilities for performing activities in Requirement 10 are documented, assigned, and understood.&nbsp;<br />4.0 - 10.7.2 The requirement to detect detected, alerted, and addressed promptly failures of critical security control systems that was only applicable to service providers in 3.2.1 is now generalized as a separated requirement.&nbsp;<br />4.0 - 10.7.3 The list of actions to be included into the response plan of failures of any critical security controls systems is now generalized to non-service providers as well as service-providers<br /><strong><br />Amended:</strong><br />4.0 - 10.6.2&nbsp; Provides additional information regarding the usage of central time servers&nbsp;<ul style="color:rgb(0, 0, 0)"><li>One or more designated time servers are in use.&nbsp;</li><li>Only the designated central time server(s)receives time from external sources.&nbsp;</li><li>Time received from external sources is based on International Atomic Time or Coordinated Universal Time (UTC).&nbsp;</li><li>Where there is more than one designated time server, the time servers peer with one another to keep accurate time.&nbsp;</li><li>Internal systems receive time information only from designated central time server(s).&nbsp;</li></ul>4.0 - 10.6.3 Clarify how PCIco expects Time synchronization to be protected&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access to time data is restricted to only personnel with a business need and changes to time settings on critical systems are logged, monitored, and reviewed.&nbsp;</li></ul>4.0 - 10.2.1.2 Requires to logs&nbsp;<strong>any interactive use of application or system accounts as part of&nbsp;</strong>actions taken by any individual with administrative access.<br /><br /><strong>Removed:</strong>&nbsp;The following controls are removed for clarity and structure<br />3.2.1 - 10.2 Implement automated audit trails for all system components to reconstruct the following events:&nbsp;<br />3.2.1 - 10.5 Secure audit trails so they cannot be altered.&nbsp;<br />3.2.1 - 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.&nbsp;<br /><br /><strong>Moved:&nbsp;</strong>NA</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font size="3">Get your&nbsp;<a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;<strong>defined approach requirements</strong>, the&nbsp;<strong>customized approach,</strong>&nbsp;<strong>applicability notes</strong>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;<strong>prioritization approach</strong>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;<strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong>as well as to register execution of vulnerability scans and penetration tests</font><br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Detailed analysis</h2>  <div class="paragraph"><strong>Title:</strong><br />3.2.1 - Track and monitor all access to network resources and cardholder data&nbsp;<br />4.0 - Log and Monitor All Access to System Components and Cardholder Data&nbsp;<br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><span>3.2.1 - 10.1 Implement audit trails to link all access to system components to each individual user.&nbsp;&nbsp;</span><br /><span>Change: Reformulation</span><br /><br /><span>4.0 - 10.2.1 Audit logs are enabled and active for all system components and cardholder data.&nbsp;</span>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.2 Implement automated audit trails for all system components to reconstruct the following events:&nbsp;<br />Change: REMOVED<br />&#8203;<br />4.0 - None</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.2.1 All individual user accesses to cardholder data&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.1 Audit logs capture all individual user access to cardholder data.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.2.2 All actions taken by any individual with root or administrative privileges&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendement</strong><br /><br />4.0 - 10.2.1.2 Audit logs capture all actions taken by any individual with administrative access,&nbsp;<strong>including any interactive use of application or system accounts.&nbsp;</strong>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.2.3 Access to all audit trails&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.3 Audit logs capture all access to audit logs.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.2.4 Invalid logical access attempts&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.4 Audit logs capture all invalid logical access attempts.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1- 10.2.5 Use of and changes to identification and authentication mechanisms&mdash;including but not limited to creation of new accounts and elevation of privileges&mdash;and all changes, additions, or deletions to accounts with root or administrative privileges&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.5 Audit logs capture all changes to identification and authentication credentials including, but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Creation of new accounts.&nbsp;</li><li>Elevation of privileges.&nbsp;</li><li>All changes, additions, or deletions to accounts with administrative access.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.2.6 Initialization, stopping, or pausing of the audit logs&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.6 Audit logs capture the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All initialization of new audit logs, and&nbsp;</li><li>All starting, stopping, or pausing of the existing audit logs.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.2.7 Creation and deletion of system- level objects&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.2.1.7 Audit logs capture all creation and deletion of system-level objects.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.3 Record at least the following audit trail entries for all system components for each event<br />3.2.1 - 10.3.1 User identification&nbsp;<br />3.2.1 - 10.3.2 Type of event&nbsp;<br />3.2.1 - 10.3.3 Date and time&nbsp;<br />3.2.1 - 10.3.4 Success or failure indication&nbsp;<br />10.3.5 Origination of event&nbsp;<br />10.3.6 Identity or name of affected data, system component, or resource&nbsp;<br />Change: Reformulation + Merge<br /><br />4.0 - 10.2.2 Audit logs record the following details for each auditable event:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>User identification.&nbsp;</li><li>Type of event.&nbsp;</li><li>Date and time.&nbsp;</li><li>Success and failure indication.&nbsp;</li><li>Origination of event.&nbsp;</li><li>Identity or name of affected data, system component, resource, or service (for example, name and protocol).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.4 Using time-synchronization technology, synchronize all critical system clocks and times and ensure that the following is implemented for acquiring, distributing, and storing time.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.6.1 System clocks and time are synchronized using time-synchronization technology.&nbsp;<br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.4.2 Time data is protected.&nbsp;<br />Change: Reformulation + amendement<br />&#8203;<br />4.0 - 10.6.3 Time synchronization settings and data are protected as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access to time data is restricted to only personnel with a business need.&nbsp;</li><li>Any changes to time settings on critical systems are logged, monitored, and reviewed.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.4.1 Critical systems have the correct and consistent time.&nbsp;<br />3.2.1 - 10.4.3 Time settings are received from industry-accepted time sources.&nbsp;<br />Change: Merge + Reformulation +&nbsp;<strong>Amendement</strong><br /><br />4.0 - 10.6.2 Systems are configured to the correct and consistent time as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>One or more designated time servers are in use.&nbsp;</strong></li><li><strong>Only the designated central time server(s)receives time from external sources.&nbsp;</strong></li><li><strong>Time received from external sources is based on International Atomic Time or Coordinated Universal Time (UTC).&nbsp;</strong></li><li>The designated time server(s) accept time updates only from specific industry-accepted external sources.&nbsp;</li><li><strong>Where there is more than one designated time server, the time servers peer with one another to keep accurate time.&nbsp;</strong></li><li><strong>Internal systems receive time information only from designated central time server(s).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.5 Secure audit trails so they cannot be altered.&nbsp;<br />Change: REMOVED<br />&#8203;<br />4.0 - None</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.5.1 Limit viewing of audit trails to those with a job-related need.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.3.1 Read access to audit logs files is limited to those with a job-related need.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.5.2 Protect audit trail files from unauthorized modifications.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Clarification</strong><br /><br />4.0 - 10.3.2 Audit log files are protected to prevent modifications&nbsp;<strong>by individuals.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter.&nbsp;<br />3.2.1 - 10.5.4 Write logs for external-facing technologies onto a secure, centralized, internal log server or media device.&nbsp;<br />Change: Reformulation + Merge<br /><br />4.0 -&nbsp; 10.3.3 Audit log files, including those for external- facing technologies, are promptly backed up to a secure, central, internal log server(s) or other media that is difficult to modify.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert).&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.3.4 File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.&nbsp;<br />Change:&nbsp;<strong>Removed</strong><br /><br />4.0 - None</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.6.1 Review the following at least daily:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All security events&nbsp;</li><li>Logs of all system components that store, process, or transmit CHD and/or SAD&nbsp;</li><li>Logs of all critical system components&nbsp;</li><li>Logs of all servers and system components that perform security functions (for example, firewalls, intrusion-detection systems/intrusion-prevention systems (IDS/IPS), authentication servers, e-commerce redirection servers, etc.).&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 10.4.1 The following audit logs are reviewed at least once daily:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All security events.&nbsp;</li><li>Logs of all system components that store, process, or transmit CHD and/or SAD.&nbsp;</li><li>Logs of all critical system components.&nbsp;</li><li>Logs of all servers and system components that perform security functions (for example, network security controls, intrusion-detection systems/intrusion-prevention systems (IDS/IPS), authentication servers).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.6.2 Review logs of all other system components periodically based on the organization&rsquo;s policies and risk management strategy, as determined by the organization&rsquo;s annual risk assessment.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Clarification (target risk analysis)&nbsp;</strong><br /><br />4.0 - 10.4.2 Logs of all other system components (those not specified in Requirement 10.4.1) are reviewed periodically.&nbsp;<br />4.0 - 10.4.2.1 The frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) is defined in the&nbsp;<strong>entity&rsquo;s targeted risk analysis</strong>, which is performed according to all elements specified in Requirement 12.3.1.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.6.3 Follow up exceptions and anomalies identified during the review process.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.4.3 Exceptions and anomalies identified during the review process are addressed.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup).&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.5.1 Retain audit log history for at least 12 months, with at least the most recent three months immediately available for analysis.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.8 Additional requirement for service providers only: Implement a process for the timely detection and reporting of failures of critical security control systems, including but not limited to failure of:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Firewalls&nbsp;</li><li>IDS/IPS&nbsp;</li><li>FIM&nbsp;</li><li>Anti-virus&nbsp;</li><li>Physical access controls&nbsp;</li><li>Logical access controls&nbsp;</li><li>Audit logging mechanisms&nbsp;</li><li>Segmentation controls (if used)&nbsp;</li></ul>Change: Reformulation +&nbsp;<strong>Clarification</strong><br /><br />4.0 - 10.7.1 Additional requirement for service providers only: Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Network security controls.&nbsp;</strong></li><li>IDS/IPS.&nbsp;</li><li>FIM.&nbsp;</li><li><strong>Anti-malware solutions.&nbsp;</strong></li><li>Physical access controls.&nbsp;</li><li>Logical access controls.&nbsp;</li><li>Audit logging mechanisms.&nbsp;</li><li>Segmentation controls (if used).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.8.1 Additional requirement for service providers only: Respond to failures of any critical security controls in a timely manner. Processes for responding to failures in security controls must include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Restoring security functions&nbsp;</li><li>Identifying and documenting the duration (date and time start to end) of the security failure&nbsp;</li><li>Identifying and documenting cause(s) of failure, including root cause, and documenting remediation required to address root cause&nbsp;</li><li>Identifying and addressing any security issues that arose during the failure&nbsp;</li><li><strong>Performing a risk assessment</strong>&nbsp;to determine whether further actions are required as a result of the security failure&nbsp;</li><li>Implementing controls to prevent cause of failure from reoccurring&nbsp;</li><li>Resuming monitoring of security controls&nbsp;</li></ul>Change: Reformulation + Clarification<br /><br />4.0 - 10.7.3 Failures of any critical security controls systems are responded to promptly, including but not limited to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Restoring security functions.&nbsp;</li><li>Identifying and documenting the duration (date and time from start to end) of the security failure.&nbsp;</li><li>Identifying and documenting the cause(s) of failure and documenting required remediation.&nbsp;</li><li>Identifying and addressing any security issues that arose during the failure.&nbsp;</li><li><strong>Determining whether further actions are required as a result of the security failure.&nbsp;</strong></li><li>Implementing controls to prevent the cause of failure from reoccurring.&nbsp;</li><li>Resuming monitoring of security controls.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 10.9 Ensure that security policies and operational procedures for monitoring all access to network resources and cardholder data are documented, in use, and known to all affected parties.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 10.1.1<strong>&nbsp;</strong>All security policies and operational procedures that are identified in Requirement 10 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">4.0 10.1.1 All security policies and operational procedures that are identified in Requirement 10 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 10.1.2 Roles and responsibilities for performing activities in Requirement 10 are documented, assigned, and understood.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1: None<br />Change: NEW<br />&#8203;<br />10.4.1.1 Automated mechanisms are used to perform audit log reviews.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change: NEW<br />&#8203;<br />4.0 - 10.7.2 Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Network security controls.&nbsp;</li><li>IDS/IPS.&nbsp;</li><li>Change-detection mechanisms.&nbsp;</li><li>Anti-malware solutions.&nbsp;</li><li>Physical access controls.&nbsp;</li><li>Logical access controls.&nbsp;</li><li>Audit logging mechanisms.&nbsp;</li><li>Segmentation controls (if used).&nbsp;</li><li>Audit log review mechanisms.&nbsp;</li><li>Automated security testing tools (if used).</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph" style="text-align:center;"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-9" target="_blank">GO TO REQUIREMENT&nbsp;9</a></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 9]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-9]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-9#comments]]></comments><pubDate>Fri, 23 Jun 2023 14:47:53 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-9</guid><description><![CDATA[The impact of the new PCI 4.0 on the former 3.2.1 requirement 9 is in the form of: Reformulation, Clarification, Change/amendment, Merge and split.         Overview  Terminology:The term "Point of interaction (POI) device" is used for "devices that capture payment card data"The abbreviation CDE replaces " ardholder data environment"&#8203;New controls:&nbsp;3 new controls4.0 - 9.5.1.2.1 Stating that the definition of&nbsp; the&nbsp; frequency of periodic POI device inspections and the type of in [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span>The impact of the new PCI 4.0 on the former 3.2.1 requirement 9 is in the form of: Reformulation, Clarification, Change/amendment, Merge and split.</span></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-06-23-16-45-30_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <h2 class="wsite-content-title">Overview</h2>  <div class="paragraph"><strong>Terminology:</strong><ul style="color:rgb(0, 0, 0)"><li>The term "Point of interaction (POI) device" is used for "devices that capture payment card data"</li><li>The abbreviation CDE replaces " ardholder data environment"</li></ul><strong><br />&#8203;New controls:</strong>&nbsp;3 new controls<br />4.0 - 9.5.1.2.1 Stating that the definition of&nbsp; the&nbsp; frequency of periodic POI device inspections and the type of inspections to perform shall be determined and documented in the entity&rsquo;s targeted risk analysis.<br />4.0 - 9.1.2<strong>&nbsp;</strong>Requires Roles and responsibilities for performing activities in Requirement 9 to be documented, assigned, and understood.&nbsp;<br />4.0 - 9.2.4 requires to lock consoles ijn sensitive areas when not in use.&nbsp;<br /><br /><strong>Changes:</strong><ul style="color:rgb(0, 0, 0)"><li>No changes</li></ul><strong>Amended:</strong><br />4.0 - 9.4.3&nbsp; Requires to record/log the location to which media are sent out.&nbsp;&nbsp;<br /><br /><strong>Removed:</strong>&nbsp;None<br /><br /><strong>Moved:</strong><ul style="color:rgb(0, 0, 0)"><li>No move</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<font size="3">Get your&nbsp;<a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;<strong>defined approach requirements</strong>, the&nbsp;<strong>customized approach,</strong>&nbsp;<strong>applicability notes</strong>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;<strong>prioritization approach</strong>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;<strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong>as well as to register execution of vulnerability scans and penetration tests.</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Detailed analysis</h2>  <div class="paragraph">&#8203;<strong>Title:</strong><br />3.2.1 - Restrict physical access to cardholder data&nbsp;<br /><br />4.0 - Restrict Physical Access to Cardholder Data&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.2.1<strong>&nbsp;</strong>Appropriate facility entry controls are in place to restrict physical access to systems in the CDE.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.1.1<strong>&nbsp;</strong>Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas. Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law.&nbsp;<br />Change: Reformulation + Clarification<br /><br />4.0 - 9.2.1.1<strong>&nbsp;</strong>Individual physical access to sensitive areas within the CDE is monitored with either video cameras or physical access control mechanisms (or both) as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Entry and exit points to/from sensitive areas within the CDE are monitored.&nbsp;</li><li>Monitoring devices or mechanisms are protected from tampering or disabling.&nbsp;</li><li>Collected data is reviewed and correlated with other entries.&nbsp;</li><li>Collected data is stored for at least three months, unless otherwise restricted by law.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.2.2<strong>&nbsp;</strong>Physical and/or logical controls are implemented to restrict use of publicly accessible network jacks within the facility.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.1.3<strong>&nbsp;</strong>Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.2.3<strong>&nbsp;</strong>Physical access to wireless access points, gateways, networking/communications hardware, and telecommunication lines within the facility is restricted.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.2<strong>&nbsp;</strong>Develop procedures to easily distinguish between onsite personnel and visitors, to include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Identifying onsite personnel and visitors (for example, assigning badges)&nbsp;</li><li>Changes to access requirements&nbsp;</li><li>Revoking or terminating onsite personnel and expired visitor identification (such as ID badges).&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 9.3.1<strong>&nbsp;</strong>Procedures are implemented for authorizing and managing physical access of personnel to the CDE, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Identifying personnel.&nbsp;</li><li>Managing changes to an individual&rsquo;s physical access requirements.&nbsp;</li><li>Revoking or terminating personnel identification.&nbsp;</li><li>Limiting access to the identification process or system to authorized personnel.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.3<strong>&nbsp;</strong>Control physical access for onsite personnel to sensitive areas as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access must be authorized and based on individual job function.&nbsp;</li><li>Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled.&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 9.3.1.1 Physical access to sensitive areas within the CDE for personnel is controlled as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access is authorized and based on individual job function.&nbsp;</li><li>Access is revoked immediately upon termination.&nbsp;</li><li>All physical access mechanisms, such as keys, access cards, etc., are returned or disabled upon termination.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1- 9.4 Implement procedures to identify and authorize visitors.&nbsp;<br />Procedures should include the following:&nbsp;<br />3.2.1 - 9.4.1<strong>&nbsp;</strong>Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained.&nbsp;<br />3.2.1 - 9.4.2<strong>&nbsp;</strong>Visitors are identified and given a badge or other identification that expires and that visibly distinguishes the visitors from onsite personnel.&nbsp;<br />Change: Reformulation + Merge<br /><br />4.0 - 9.3.2<strong>&nbsp;</strong>Procedures are implemented for authorizing and managing visitor access to the CDE, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Visitors are authorized before entering.&nbsp;</li><li>Visitors are escorted at all times.&nbsp;</li><li>Visitors are clearly identified and given a badge or other identification that expires.&nbsp;</li><li>Visitor badges or other identification visibly distinguishes visitors from personnel&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.4.3<strong>&nbsp;</strong>Visitors are asked to surrender the badge or identification before leaving the facility or at the date of expiration.&nbsp;<br />Change: Reformulation + Clarification<br /><br />4.0 - 9.3.3<strong>&nbsp;</strong>Visitor badges or identification are surrendered or deactivated before visitors leave the facility or at the date of expiration.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.4.4<strong>&nbsp;</strong>A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as computer rooms and data centers where cardholder data is stored or transmitted.&nbsp;<br />Document the visitor&rsquo;s name, the firm represented, and the onsite personnel authorizing physical access on the log.&nbsp;<br />Retain this log for a minimum of three months, unless otherwise restricted by law.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.3.4 A visitor log is used to maintain a physical record of visitor activity within the facility and within sensitive areas, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>The visitor&rsquo;s name and the organization represented.&nbsp;</li><li>The date and time of the visit.&nbsp;</li><li>The name of the personnel authorizing physical access.&nbsp;</li><li>Retaining the log for at least three months, unless otherwise restricted by law.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.5<strong>&nbsp;</strong>Physically secure all media.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.4.1<strong>&nbsp;</strong>All media with cardholder data is physically secured.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.5.1<strong>&nbsp;</strong>Store media backups in a secure location, preferably an off-site facility, such as an alternate or backup site, or a commercial storage facility. Review the location&rsquo;s security at least annually.&nbsp;<br />Change: Reformulation + Split<br /><br />4.0 - 9.4.1.1<strong>&nbsp;</strong>Offline media backups with cardholder data are stored in a secure location.&nbsp;<br />4.0 - 9.4.1.2 The security of the offline media backup location(s) with cardholder data is reviewed at least once every 12 months&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.6 Maintain strict control over the internal or external distribution of any kind of media, including the following:&nbsp;<br />3.2.1 - 9.6.2<strong>&nbsp;</strong>Send the media by secured courier or other delivery method that can be accurately tracked.&nbsp;<br />Change: Reformulation + Merge + Clarification + Amendement<br /><br />4.0 - 9.4.3 Media with cardholder data sent outside the facility is secured as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Media sent outside the facility is logged.&nbsp;</li><li>Media is sent by secured courier or other delivery method that can be accurately tracked.&nbsp;</li><li>Offsite tracking logs include details about media location.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.6.1 Classify media so the sensitivity of the data can be determined.&nbsp;<br />Change: Reformulation<br /><br />4.0- 9.4.2 All media with cardholder data is classified in accordance with the sensitivity of the data.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.6.3<strong>&nbsp;</strong>Ensure management approves any and all media that is moved from a secured area (including when media is distributed to individuals).&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.4.4<strong>&nbsp;</strong>Management approves all media with cardholder data that is moved outside the facility (including when media is distributed to individuals).&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.7 Maintain strict control over the storage and accessibility of media.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.4.5<strong>&nbsp;</strong>Inventory logs of all electronic media with cardholder data are maintained.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.7.1<strong>&nbsp;</strong>Properly maintain inventory logs of all media and conduct media inventories at least annually.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.4.5.1<strong>&nbsp;</strong>Inventories of electronic media with cardholder data are conducted at least once every 12 months.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.8<strong>&nbsp;</strong>Destroy media when it is no longer needed for business or legal reasons as follows:&nbsp;<br />3.2.1 - 9.8.1<strong>&nbsp;</strong>Shred, incinerate, or pulp hard- copy materials so that cardholder data cannot be reconstructed. Secure storage containers used for materials that are to be destroyed.&nbsp;<br /><br />Change: Reformulation + Merge<br />4.0 - 9.4.6<strong>&nbsp;</strong>Hard-copy materials with cardholder data are destroyed when no longer needed for business or legal reasons, as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Materials are cross-cut shredded, incinerated, or pulped so that cardholder data cannot be reconstructed.&nbsp;</li><li>Materials are stored in secure storage containers prior to destruction.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.8.2<strong>&nbsp;</strong>Render cardholder data on electronic media unrecoverable so that cardholder data cannot be reconstructed.&nbsp;<br />Change: Reformulation + clarification&nbsp;<br /><br />4.0 - 9.4.7 Electronic media with cardholder data is destroyed when no longer needed for business or legal reasons via one of the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>The electronic media is destroyed.&nbsp;</li><li>The cardholder data is rendered unrecoverable&nbsp; so that it cannot be reconstructed.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.9<strong>&nbsp;</strong>Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution.&nbsp;<br />Change:&nbsp; Reformulation + clarification<br /><br />4.0 - 9.5.1<strong>&nbsp;</strong>POI devices that capture payment card data via direct physical interaction with the payment card form factor are protected from tampering and unauthorized substitution, including the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Maintaining a list of POI devices.&nbsp;</li><li>Periodically inspecting POI devices to look for&nbsp;<br />tampering or unauthorized substitution.&nbsp;</li><li>Training personnel to be aware of suspicious behavior and to report tampering or unauthorized substitution of devices.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.9.1<strong>&nbsp;</strong>Maintain an up-to-date list of devices. The list should include the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Make, model of device&nbsp;</li><li>Location of device (for example, the address of the site or facility where the device is located)&nbsp;</li><li>Device serial number or other method of unique identification.&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 9.5.1.1<strong>&nbsp;</strong>An up-to-date list of POI devices is maintained, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Make and model of the device.&nbsp;</li><li>Location of device.&nbsp;</li><li>Device serial number or other methods of unique identification.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 9.9.2<strong>&nbsp;</strong>Periodically inspect device surfaces to detect tampering (for example, addition of card skimmers to devices), or substitution (for example, by checking the serial number or other device characteristics to verify it has not been swapped with a fraudulent device).&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.5.1.2<strong>&nbsp;</strong>POI device surfaces are periodically inspected to detect tampering and unauthorized substitution.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should include the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them access to modify or troubleshoot devices.&nbsp;</li><li>Do not install, replace, or return devices without verification.&nbsp;</li><li>Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices).&nbsp;</li><li>Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager or security officer).&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 9.5.1.3<strong>&nbsp;</strong>Training is provided for personnel in POI environments to be aware of attempted tampering or replacement of POI devices, and includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Verifying the identity of any third-party persons claiming to be repair or maintenance personnel, before granting them access to modify or troubleshoot devices.&nbsp;</li><li>Procedures to ensure devices are not installed, replaced, or returned without verification.&nbsp;</li><li>Being aware of suspicious behavior around devices.&nbsp;</li><li>Reporting suspicious behavior and indications of device tampering or substitution to appropriate personnel.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in use, and known to all affected parties.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 9.1.1<strong>&nbsp;</strong>All security policies and operational procedures that are identified in Requirement 9 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change: NEW<br /><br />4.0 - 9.1.2<strong>&nbsp;</strong>Roles and responsibilities for performing activities in Requirement 9 are documented, assigned, and understood.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change: New<br /><br />4.0 - 9.2.4 Access to consoles in sensitive areas is restricted via locking when not in use.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 9.5.1.2.1 The frequency of periodic POI device inspections and the type of inspections performed is defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title" style="text-align:center;"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-8" target="_blank">GO TO REQUIREMENT 8</a></h2>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 8]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-8]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-8#comments]]></comments><pubDate>Fri, 16 Jun 2023 12:24:41 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-8</guid><description><![CDATA[Impact of the new PCI 4.0 on the former 3.2.1 requirement 8 are in the form of :&nbsp;Reformulation, clarification, change/amendement, merge and move         Terminology:&nbsp;The term "non-consumer users&rdquo; is removed. This requirement do not apply to accounts used by consumers (cardholders).&nbsp;The term "authentication credentials" is replaced by "authentication factor"New controls: 6 new controls:&nbsp;4.0 - 8.1.2 Specifies that Roles and responsibilities for performing activities in re [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span>Impact of the new PCI 4.0 on the former 3.2.1 requirement 8 are in the form of :&nbsp;Reformulation, clarification, change/amendement, merge and move</span></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-06-16-14-22-48_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li>The term "non-consumer users&rdquo; is removed. This requirement do not apply to accounts used by consumers (cardholders).&nbsp;</li><li>The term "authentication credentials" is replaced by "authentication factor"</li></ul><br /><strong>New controls:</strong> 6 new controls:&nbsp;<ul><li>4.0 - 8.1.2 Specifies that Roles and responsibilities for performing activities in requirement 8 shall be documented, assigned, and understood.&nbsp;</li><li>4.0 - 8.3.10.1 Additional requirement for service providers specifying an alternative to the periodic password change</li><li>4.0 - 8.4.2 Detail how MFA shall be implemented MFA ifor all access into the CDE.&nbsp;</li><li>4.0 - 8.6.1 Specifies&nbsp;how accounts used by systems or applications for interactive login, shall be managed.</li><li>4.0 - 8.6.2 Forbid hard coding of passwords/passphrases for any application and system accounts used for interactive login .</li><li>4.0 - 8.6.3<strong>&nbsp;</strong>Specifies how<strong>&nbsp;</strong>Passwords/passphrases for any application and system accounts shall be protected.</li></ul><br /><strong>Changes:</strong>&nbsp;<ul><li>4.0 - 8.3.4<strong>&nbsp;-&nbsp;</strong>The number of invalid authentication attempts before locking out a user ID jumps to 10!</li><li>4.0 - 8.3.6 - Password minimum length jumps to 12 characters (or IF the system does not support 12 characters, a minimum length of eight characters).&nbsp;</li><li>Instead of changing passwords/passphrases at least once every 90 days, organizations could determine access to resources automatically by dynamically analyzing the security posture of accounts.</li><li>4.0 - 8.2.2 Allows usage of group/shared accounts on an exceptional basis</li></ul><br /><strong>Amended:&nbsp;</strong><ul><li>4.0 - 8.3.9 Provides an alternative to the periodic password change&nbsp;</li><li>4.0 - 8.2.6 - Require new/reset passwords/passphrases to be changed after first use</li><li>4.0 - 8.2.2 Specifies conditions for usage of group/shared accounts</li></ul><br /><strong>Removed:</strong> None<br /><br /><strong>Moved:</strong>&nbsp;<br />The requirement related to the protection of access to databases (3.2.1 - 8.7) has been moved to requirement 4.0-7.2.7</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font size="3"><span>Get your&nbsp;</span><a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a><span>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;</span><strong>defined approach requirements</strong><span>, the&nbsp;</span><strong>customized approach,</strong><span>&nbsp;</span><strong>applicability notes</strong><span>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;</span><strong>prioritization approach</strong><span>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;</span><strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong><span>as well as to register execution of vulnerability scans and penetration tests.</span></font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Detailed Analysis</h2>  <div class="paragraph"><strong>Titre</strong><br />3.2.1 - Identify and authenticate access to system components&nbsp;<br />4.0 - Identify Users and Authenticate Access to System Components&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.1.1 Assign all users a unique ID before allowing them to access system components or cardholder data.&nbsp;<br />Change:&nbsp; Reformulation<br /><br />4.0 -&nbsp;8.2.1<strong>&nbsp;</strong>All users are assigned a unique ID before access to system components or cardholder data is allowed.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">8.1.2 - Control addition, deletion, and modification of user IDs, credentials, and other identifier objects.&nbsp;<br />Change: Reformulation + clarification<br /><br />4.0 - 8.2.4<strong>&nbsp;</strong>Addition, deletion, and modification of user IDs, authentication factors, and other identifier objects are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Authorized with the appropriate approval.&nbsp;</strong></li><li><strong>Implemented with only the privileges specified on the documented approval.&nbsp;</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 8.1.3 Immediately revoke access for any terminated users.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.2.5<strong>&nbsp;</strong>Access for terminated users is immediately revoked.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 8.1.4 Remove/disable inactive user accounts within 90 days.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.2.6<strong>&nbsp;</strong>Inactive user accounts are removed or disabled within 90 days of inactivity.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.1.5 Manage IDs used by third parties to access, support, or maintain system components via remote access as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Enabled only during the time period needed and disabled when not in use.&nbsp;</li><li>Monitored when in use.&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 8.2.7<strong>&nbsp;</strong>Accounts used by third parties to access, support, or maintain system components via remote access are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Enabled only during the time period needed and disabled when not in use.&nbsp;</li><li>Use is monitored for unexpected activity.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.1.6 Limit repeated access attempts by locking out the user ID after not more than six attempts.&nbsp;<br />3.2.1 - 8.1.7 Set the lockout duration to a minimum of 30 minutes or until an administrator enables the user ID.&nbsp;<br />Change: Reformulation + merge +&nbsp;<strong>Change</strong><br /><br />4.0 -&nbsp;<strong>8.3.4&nbsp;</strong>Invalid authentication attempts are limited by:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Locking out the user ID after not more than&nbsp;<strong>10 attempts</strong>.&nbsp;</li><li>Setting the lockout duration to a minimum of 30 minutes or until the user&rsquo;s identity is confirmed&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">4.0 - 8.1.8 If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Clarification&nbsp;</strong><br /><br />4.0 -&nbsp;<strong>8.2.8&nbsp;</strong>If a&nbsp;<strong>user session</strong>&nbsp;has been idle for more than 15 minutes, the user is required to re-authenticate to re-activate the terminal or session.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators on all system components by employing at least one of the following methods to authenticate all users:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Something you know, such as a password or passphrase&nbsp;</li><li>Something you have, such as a token device or smart card&nbsp;</li><li>Something you are, such as a biometric.&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 -&nbsp;<strong>8.3.1&nbsp;</strong>All user access to system components for users and administrators is authenticated via at least one of the following authentication factors:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Something you know, such as a password or passphrase.&nbsp;</li><li>Something you have, such as a token device or smart card.&nbsp;</li><li>Something you are, such as a biometric element.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2.1 Using strong cryptography, render all authentication credentials (such as passwords/phrases) unreadable during transmission and storage on all system components.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.3.2<strong>&nbsp;</strong>Strong cryptography is used to render all authentication factors unreadable during transmission and storage on all system components.&nbsp;<br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2.2 Verify user identity before modifying any authentication credential&mdash;for example, performing password resets, provisioning new tokens, or generating new keys.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.3.3<strong>&nbsp;</strong>User identity is verified before modifying any authentication factor.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2.3 Passwords/passphrases must meet the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Require a minimum length of at least seven characters.&nbsp;</li><li>Contain both numeric and alphabetic characters.&nbsp;<br />Alternatively, the passwords/ passphrases must have complexity and strength at least equivalent to the parameters specified above.&nbsp;</li></ul>Change: Reformulation +&nbsp;&nbsp;<strong>change</strong><br /><br />4.0 -&nbsp;&nbsp;<strong>8.3.6&nbsp;</strong>If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the following minimum level of complexity:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>A minimum length of 12 characters</strong>&nbsp;(<strong>or IF the system does not support 12 characters, a minimum length of eight characters</strong>).&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2.4 Change user passwords/passphrases at least once every 90 days.&nbsp;<br />Change: Reformulation +&nbsp;<strong>amendement + clarification</strong><br /><br />4.0 -&nbsp;<strong>8.3.9&nbsp;</strong>If passwords/passphrases are used&nbsp;<strong>as the only authentication factor</strong>&nbsp;for user access (i.e., in any single-factor authentication implementation) then either:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Passwords/passphrases are changed at least once every 90 days,&nbsp;<br /><strong>OR&nbsp;</strong></li><li><strong>The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.&nbsp;</strong></li></ul>4.0 - 8.3.10&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>If passwords/passphrases are used as t<strong>he only authentication factor for customer user&nbsp;</strong>access to cardholder data (i.e., in any single- factor authentication implementation), then guidance is provided to customer users including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Guidance for customers to change their user passwords/passphrases periodically.&nbsp;</li><li>Guidance as to when, and under what circumstances, passwords/passphrases are to be changed.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 8.2.5 Do not allow an individual to submit a new password/passphrase that is the same as any of the last four passwords/passphrases he or she has used.&nbsp;<br />Change: Reformulation<br /><br />4.0 -&nbsp;<strong>8.3.7&nbsp;</strong>Individuals are not allowed to submit a new password/passphrase that is the same as any of the last four passwords/passphrases used.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.2.6 Set passwords/passphrases for first-time use and upon reset to a unique value for each user, and change immediately after the first use.&nbsp;<br />Change: Reformulation +&nbsp;<strong>Amendement</strong><br /><br />4.0 -&nbsp;<strong>8.3.5&nbsp;</strong>If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they are set and reset for each user as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Set to a unique value for first-time use and upon reset.&nbsp;</li><li><strong>Forced to be changed immediately after the first use.</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 8.3.1 Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.4.1<strong>&nbsp;</strong>MFA is implemented for all non-console access into the CDE for personnel with administrative access.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.3.2 Incorporate multi-factor authentication for all remote network access (both user and administrator, and including third-party access for support or maintenance) originating from outside the entity&rsquo;s network.&nbsp;<br />Change: Reformulation +&nbsp;<strong>clarification</strong><br /><br />4.0 - 8.4.3<strong>&nbsp;</strong>MFA is implemented for all remote network access originating from outside the entity&rsquo;s network that could access or impact the CDE as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>All remote access by all personnel, both users and administrators, originating from outside the entity&rsquo;s network.&nbsp;</strong></li><li><strong>All remote access by third parties and vendors.&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.4 Document and communicate authentication policies and procedures to all users including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Guidance on selecting strong authentication credentials&nbsp;</li><li>Guidance for how users should protect their authentication credentials&nbsp;</li><li>Instructions not to reuse previously used passwords&nbsp;</li><li>Instructions to change passwords if there is any suspicion the password could be compromised.&nbsp;</li></ul>Change: Reformulation +&nbsp;<strong>clarification</strong><br /><br />4.0 -&nbsp;<strong>8.3.8&nbsp;</strong>Authentication policies and procedures are documented and communicated to all users including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Guidance on selecting strong authentication factors.&nbsp;</li><li>Guidance for how users should protect their authentication factors.&nbsp;</li><li>Instructions not to reuse previously used passwords/passphrases.&nbsp;</li><li>Instructions to change passwords/passphrases if there is any suspicion or knowledge&nbsp;<strong>that the password/passphrases have been compromised and how to report the incident.</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><ul><li>Generic user IDs are disabled or removed.&nbsp;</li><li>Shared user IDs do not exist for system administration and other critical functions.&nbsp;</li><li>Shared and generic user IDs are not used to administer any system components.&nbsp;</li></ul></li></ul>Change: Reformulation + change/amendment<br /><br />4.0 -&nbsp;<strong>8.2.2&nbsp;</strong>Group, shared, or generic accounts, or other shared authentication credentials&nbsp;<strong>are only used when necessary on an exception basi</strong>s, and are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Account use is prevented unless needed for an exceptional circumstance.</strong></li><li><strong>Use is limited to the time needed for the exceptional circumstance.&nbsp;</strong></li><li><strong>Business justification for use is documented.&nbsp;</strong></li><li><strong>Use is explicitly approved by management.&nbsp;</strong></li><li><strong>Individual user identity is confirmed before access to an account is granted.&nbsp;</strong></li><li><strong>Every action taken is attributable to an individual user.&nbsp;</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.5.1&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Service providers with remote access to customer premises (for example, for support of POS systems or servers) must use a unique authentication credential (such as a password/phrase) for each customer.&nbsp;<br />Change: Reformulation<br />&#8203;<br />4.0 - 8.2.3 Additional requirement for service providers only: Service providers with remote access to customer premises use unique authentication factors for each customer premises.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.), use of these mechanisms must be assigned as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts.&nbsp;</li><li>Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain access.&nbsp;</li></ul>Change: Reformulation<br /><br />4.0 - 8.3.11 Where authentication factors such as physical or logical security tokens, smart cards, or certificates are used:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Factors are assigned to an individual user and not shared among multiple users.&nbsp;</li><li>Physical and/or logical controls ensure only the intended user can use that factor to gain access.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All user access to, user queries of, and user actions on databases are through programmatic methods.&nbsp;</li><li>Only database administrators have the ability to directly access or query databases.&nbsp;</li><li>Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes).&nbsp;</li></ul>Change: MOVED<br /><br />4.0 - 7.2.6&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known to all affected parties.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 8.1.1 All security policies and operational procedures that are identified in Requirement 8 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW<br />&#8203;<br />4.0 - 8.1.2 Roles and responsibilities for performing activities in Requirement 8 are documented, assigned, and understood.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change: NEW<br />&#8203;<br />4.0 - 8.3.10.1 Additional requirement for service providers only:<strong><em>&nbsp;</em></strong>If passwords/passphrases are used as the only authentication factor for customer user access (i.e., in any single-factor authentication implementation) then either:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Passwords/passphrases are changed at least once every 90 days,&nbsp;<br /><strong>OR&nbsp;</strong></li><li>The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 8.4.2 MFA is implemented for all access into the CDE.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 8.5.1 MFA systems are implemented as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>The MFA system is not susceptible to replay&nbsp;<br />attacks.&nbsp;</li><li>MFA systems cannot be bypassed by any users, including administrative users unless specifically documented, and authorized by management on an exception basis, for a limited time period.&nbsp;</li><li>At least two different types of authentication factors are used.&nbsp;</li><li>Success of all authentication factors is required before access is granted.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 8.6.1&nbsp;If accounts used by systems or applications can be used for interactive login, they are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Interactive use is prevented unless needed for an exceptional circumstance.&nbsp;</li><li>Interactive use is limited to the time needed for the exceptional circumstance.&nbsp;</li><li>Business justification for interactive use is documented.&nbsp;</li><li>Interactive use is explicitly approved by management.&nbsp;</li><li>Individual user identity is confirmed before access to account is granted.&nbsp;</li><li>Every action taken is attributable to an individual user.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong style="color:rgb(0, 0, 0)">&nbsp;</strong><span>3.2.1 - NONE</span><br /><span>Change: NEW</span><br /><br />&#8203;4.0 - 8.6.2 -&nbsp;<span style="color:rgb(0, 0, 0)">Passwords/passphrases for any application and system accounts that can be used for interactive login are not hard coded in scripts, configuration/property files, or bespoke and custom source code.</span><span style="color:rgb(0, 0, 0)">&nbsp;</span><span>3.2.1 - NONE</span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - NONE<br />Change: NEW<br /><br />4.0 - 8.6.3&nbsp;Passwords/passphrases for any application and system accounts are protected against misuse as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Passwords/passphrases are changed periodically (at the frequency defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1) and upon suspicion or confirmation of compromise.&nbsp;</li><li>Passwords/passphrases are constructed with sufficient complexity appropriate for how frequently the entity changes the passwords/passphrases.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font size="3"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-7" target="_blank">GO TO REQUIREMENT #7</a></font></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 7]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-7]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-7#comments]]></comments><pubDate>Wed, 07 Jun 2023 13:48:44 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-7</guid><description><![CDATA[Impact of the new PCI 4.0 on the former 3.2.1 requirement 7 are in the form of :&nbsp;Reformulation, clarification and amendements, removal and migration.      Terminology:&nbsp;The term "relevant" is replaced by "applicable"the terms "Development environment" and "test environment" are replaced by "Pre-production environments"the term "custom code"&nbsp; is replaced by "bespoke and custom software"&nbsp;New controls:&nbsp;4 new controls:&nbsp;4.0 - 7.1.2 requires that roles and responsibilities [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">Impact of the new PCI 4.0 on the former 3.2.1 requirement 7 are in the form of :&nbsp;<span>Reformulation, clarification and amendements, removal and migration.</span></div>  <span class='imgPusher' style='float:left;height:0px'></span><span style='display: table;width:auto;position:relative;float:left;max-width:100%;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-06-07-15-52-00_orig.png" style="margin-top: 10px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:0; max-width:100%" alt="Picture" class="galleryImageBorder wsite-image" /></a><span style="display: table-caption; caption-side: bottom; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;" class="wsite-caption"></span></span> <div class="paragraph" style="display:block;"></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>  <div class="paragraph"><strong>Terminology:&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li>The term "relevant" is replaced by "applicable"</li><li>the terms "Development environment" and "test environment" are replaced by "Pre-production environments"</li><li>the term "custom code"&nbsp; is replaced by "bespoke and custom software"&nbsp;</li></ul><br /><br /><strong>New controls:</strong>&nbsp;4 new controls:&nbsp;<br />4.0 - 7.1.2 requires that roles and responsibilities for performing activities in Requirement 7 are documented, assigned, and understood.&nbsp;<br />4.0 - 7.2.4 requires to periodically review appropriateness of all user access and access privileges&nbsp; and to handle inappropriate access as well as to seek management approval of the appropriateness of remaining access.<br />4.0 - 7.2.5 requires that all application and system accounts and related access privileges are assigned and managed appropriately.&nbsp;<br />4.0 - 7.2.5.1 requires to periodically review appropriateness of all&nbsp; application and system accounts access and access privileges&nbsp; and to handle inappropriate access as well as to seek management approval of the appropriateness of remaining access.<br /><strong>Amended</strong>:&nbsp;<br />4.0<strong>&nbsp;-&nbsp;</strong>7.2.1 requires, in addition to tyhe definition of access, to define an access control model.&nbsp;<br /><br /><strong>Removed</strong>:&nbsp;<br />Requirement 3.2.1 - 7.2<strong>&nbsp;</strong>has been removed for redundancy reason.<br />3.2.1 - 7.2<strong>&nbsp; -&nbsp;</strong>Establish an access control system(s) for systems components that restricts access based on a user&rsquo;s need to know, and is set to &ldquo;deny all&rdquo; unless specifically allowed.<br /><br /><strong>Migrated:&nbsp;</strong>One control&nbsp; from Requirement 8 has been moved into requiremet 7<br />3.2.1 - 8.7<strong>&nbsp;</strong>All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All user access to, user queries of, and user actions on databases are through programmatic methods.&nbsp;</li><li>Only database administrators have the ability to directly access or query databases.&nbsp;</li><li>Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes).&nbsp;</li></ul></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font size="3">Get your&nbsp;<a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;<strong>defined approach requirements</strong>, the&nbsp;<strong>customized approach,</strong>&nbsp;<strong>applicability notes</strong>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;<strong>prioritization approach</strong>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;<strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong>as well as to register execution of vulnerability scans and penetration tests.</font></div>  <div class="wsite-spacer" style="height:50px;"></div>  <h2 class="wsite-content-title">Detailed Analysis</h2>  <div class="paragraph">Titre<br />3.2.1 - Restrict access to cardholder data by business need to know&nbsp;<br />4.0 - Restrict Access&nbsp;<strong>to System Components and</strong>&nbsp;cardholder Data by Business Need to Know&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 7.1&nbsp;</strong>Limit access to system components and cardholder data to only those individuals whose job requires such access.&nbsp;<br />Change:&nbsp; Split, Clarification, removal<br />&#8203;<br />4.0 - 7.2.2 Access is assigned to users, including privileged users, based on:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Job classification and function.&nbsp;</li><li>Least privileges necessary to perform job responsibilities.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.1.1 Define access needs for each role, including:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>System components and data resources that each role needs to access for their job function&nbsp;</li><li>Level of privilege required (for example, user, administrator, etc.) for accessing resources&nbsp;</li></ul>Change: Reformulation, Clarification + Amendement for the definition of an access control model;<br /><br />4.0<strong>&nbsp;-&nbsp;</strong>7.2.1&nbsp;<strong>An access control model is defined</strong>&nbsp;and includes granting access as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Appropriate access depending on the entity&rsquo;s business and access needs.&nbsp;</li><li>Access to system components and data resources that is based on users&rsquo; job classification and functions.&nbsp;</li><li>The least privileges required (for example, user, administrator) to perform a job function.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 7.1.2&nbsp;</strong>Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.&nbsp;<br />Change: Reformulation + Merge with 3.2.1 - 7.1.3<br /><br />4.0 - 7.2.2 Access is assigned to users, including privileged users, based on:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Job classification and function.&nbsp;</li><li>Least privileges necessary to perform job responsibilities.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.1.3 Assign access based on individual personnel&rsquo;s job classification and function.&nbsp;<br />Change: Reformulation + Merge with 3.2.1 -7.1.2<br /><br />4.0 - 7.2.2 Access is assigned to users, including privileged users, based on:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Job classification and function.&nbsp;</li><li>Least privileges necessary to perform job responsibilities.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.1.4 Require documented approval by authorized parties specifying required privileges.&nbsp;&nbsp;<br />Change: Reformulation<br /><br />4.0 - 7.2.3<strong>&nbsp;</strong>Required privileges are approved by authorized personnel.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.2<strong>&nbsp;</strong>Establish an access control system(s) for systems components that restricts access based on a user&rsquo;s need to know, and is set to &ldquo;deny all&rdquo; unless specifically allowed.&nbsp;<br />Change: <font color="#c23b3b">Removed</font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.2.1 This access control system(s) must include the following: Coverage of all system components&nbsp;<br />Change: Split + Reformulation<br /><br />4.0 - 7.3.1<strong>&nbsp;</strong>An access control system(s) is in place that restricts access based on a user&rsquo;s need to know and covers all system components.&nbsp;<br />4.0 - 7.3.2<strong>&nbsp;</strong>This access control system(s) must include the following: The access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.2.2 Assignment of privileges to individuals based on job classification and function.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 7.3.2<strong>&nbsp;</strong>The access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">4.0 - 7.2.3<strong>&nbsp;</strong>This access control system(s) must include the following: Default &ldquo;deny-all&rdquo; setting.&nbsp;<br />Change: Reformulation<br />&#8203;<br />4.0 - 7.3.3 The access control system(s) is set to &ldquo;deny all&rdquo; by default.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and known to all affected parties.&nbsp;<br /><span>Change: Reformulation<br />&#8203;</span><br />4.0&nbsp;<strong>-&nbsp;</strong>7.1.1 All security policies and operational procedures that are identified in Requirement 7 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW<br /><br />4.0 - 7.2.5<strong>&nbsp;</strong>All application and system accounts and related access privileges are assigned and managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Based on the least privileges necessary for the operability of the system or application.&nbsp;</li><li>Access is limited to the systems, applications, or processes that specifically require their use.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW.&nbsp;<br /><br />4.0 - 7.2.5.1 All access by application and system accounts and related access privileges are reviewed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Periodically (at the frequency defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1).&nbsp;</li><li>The application/system access remains appropriate for the function being performed.&nbsp;</li><li>Any inappropriate access is addressed.&nbsp;</li><li>Management acknowledges that access remains&nbsp;<br />appropriate.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 8.7<strong>&nbsp;</strong>All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>All user access to, user queries of, and user actions on databases are through programmatic methods.&nbsp;</li><li>Only database administrators have the ability to directly access or query databases.&nbsp;</li><li>Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes).&nbsp;</li></ul>Change: <font color="#e05c5c">Move from req 8 + Reformulation</font>.<br /><br />4.0 - 7.2.6<strong>&nbsp;</strong>All user access to query repositories of stored cardholder data is restricted as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Via applications or other programmatic methods, with access and allowed actions based on user roles and least privileges.&nbsp;</li><li>Only the responsible administrator(s) can directly access or query repositories of stored CHD.&nbsp;</li></ul></div>  <div class="paragraph"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-6" target="_blank">GO TO REQUIREMENT #6</a></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 6]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-6]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-6#comments]]></comments><pubDate>Thu, 25 May 2023 12:00:02 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-6</guid><description><![CDATA[&#8203;Impact of the new PCI 4.0 on the former 3.2.1 requirement 6 are in the form of :&nbsp;Reformulation, clarification and amendements and removal &nbsp;&nbsp;         Terminology:&nbsp;The term "relevant" is replaced by "applicable"the terms "Development environment" and "test environment" are replaced by "Pre-production environments"the term "custom code"&nbsp; is replaced by "bespoke and custom software"&nbsp;New controls:&nbsp;4 new controls:&nbsp;4.0 - 6.4.3&nbsp;Require to protect payme [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">&#8203;<span>Impact of the new PCI 4.0 on the former 3.2.1 requirement 6 are in the form of :&nbsp;</span>Reformulation, clarification and amendements and removal &nbsp;&nbsp;</div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-05-25-13-58-44_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li>The term "relevant" is replaced by "applicable"</li><li>the terms "Development environment" and "test environment" are replaced by "Pre-production environments"</li><li>the term "custom code"&nbsp; is replaced by "bespoke and custom software"&nbsp;</li></ul><br /><strong>New controls:</strong>&nbsp;4 new controls:&nbsp;<br /><strong>4.0 - 6.4.3&nbsp;</strong>Require to protect payment pages on the<strong>&nbsp;</strong>the consumer&rsquo;s browser.&nbsp; It&nbsp; applies primarily to merchant e-commerce and/or processor gateways and virtual terminals which facilitate entry of cardholder information for authorization.&nbsp;&nbsp;<br /><strong>4.0 - 6.4.2</strong>&nbsp;Requires deployment of an&nbsp;<em>automated technical solution that continually detects and prevents web-based attacks&nbsp; as of 2025.</em><br /><strong>4.0 - 6.3.2&nbsp;</strong>Require organizations to manage, create an inventory and document specific application components and services utilized by an application. Organizations&nbsp; also need need to invest in tools capable of alerting on component vulnerabilities to meet Requirement 4.0 - 6.3.3.<br /><strong>4.0 - 6.1.2&nbsp;</strong>Require to document, assign and understand<strong>&nbsp;</strong>Roles and responsibilities for performing activities in Requirement 6.<br />&#8203;<br /><strong>Amended</strong>:&nbsp;<br /><strong>4.0 - 6.3.1&nbsp;</strong>Require that new security vulnerabilities are identified using industry-recognized sources for security vulnerability information, including alerts from international and national computer emergency response teams (CERTs) and that Vulnerabilities for bespoke and custom, and third-party software (for example operating systems and databases) are covered.&nbsp;<br /><strong>4.0 - 6.3.3&nbsp;</strong>Require that applicable non critical or high-security security patches/updates be installed within an appropriate time frame as determined by organizations.<br /><br /><strong>Removed</strong>:&nbsp;<br /><strong>3.2.1 - 6.3.1&nbsp;</strong>Remove development, test and/or custom application accounts, user IDs, and passwords before applications become active or are released to customers.&nbsp;</div>  <h2 class="wsite-content-title">Detailed analysis</h2>  <div class="paragraph"><strong>Title</strong><br />3.2.1 - Develop and maintain secure systems and applications&nbsp;<br />4.0 - Develop and Maintain Secure Systems and&nbsp;<strong>Software&nbsp;</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.1&nbsp;</strong>Establish a process to identify security vulnerabilities, using reputable outside sources for security vulnerability information, and assign a risk ranking (for example, as &ldquo;high,&rdquo; &ldquo;medium,&rdquo; or &ldquo;low&rdquo;) to newly discovered security vulnerabilities.&nbsp;<br /><br />Change:&nbsp; Reformulation, Clarification and amendement<br /><br /><strong>4.0 - 6.3.1&nbsp;</strong>Security vulnerabilities are identified and managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>New security vulnerabilities are identified using industry-recognized sources for security vulnerability information, including alerts from international and national computer emergency response teams (CERTs).&nbsp;</strong></li><li>Vulnerabilities are assigned a risk ranking based on industry best practices and consideration of potential impact.&nbsp;</li><li>Risk rankings identify, at a minimum, all vulnerabilities considered to be a high-risk or critical to the environment.&nbsp;</li><li><strong>Vulnerabilities for bespoke and custom, and third-party software (for example operating systems and databases) are covered.&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.2&nbsp;</strong>Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor- supplied security patches. Install critical security patches within one month of release.&nbsp;<br /><br />Change: Reformulation + Amendements/Clarification<br /><br /><strong>4.0 - 6.3.3&nbsp;</strong>All system components are protected from known vulnerabilities by installing applicable security patches/updates as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Critical or high-security patches/updates (identified according to the risk ranking process at Requirement 6.3.1) are installed within one month of release.&nbsp;</li><li><strong>All other applicable security patches/updates are installed within an appropriate time frame as determined by the entity (for example, within three months of release).&nbsp;</strong>&#8203;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.3&nbsp;</strong>Develop internal and external software applications (including web-based administrative access to applications) securely, as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>In accordance with PCI DSS (for example, secure authentication and logging)&nbsp;</li><li>Based on industry standards and/or best practices.&nbsp;</li><li>Incorporating information security throughout the software-development life cycle&nbsp;</li></ul><br />Change: Reformulation.<br /><br /><strong>4.0 - 6.2.1&nbsp;</strong>Bespoke and custom software are developed securely, as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Based on industry standards and/or best practices for secure development.&nbsp;</li><li>In accordance with PCI DSS (for example, secure authentication and logging).&nbsp;</li><li>Incorporating consideration of information security issues during each stage of the software development lifecycle.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<strong>3.2.1 - 6.3.1&nbsp;</strong>Remove development, test and/or custom application accounts, user IDs, and passwords before applications become active or are released to customers.&nbsp;<br /><br />Change: Removed</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.3.2&nbsp;</strong>Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using either manual or automated processes) to include at least the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Code changes are reviewed by individuals other than the originating code author, and by individuals knowledgeable about code-review techniques and secure coding practices.&nbsp;</li><li>Code reviews ensure code is developed according to secure coding guidelines&nbsp;</li><li>Appropriate corrections are implemented prior to release.&nbsp;</li><li>Code-review results are reviewed and approved by management prior to release.&nbsp;</li></ul><br />Change: Reformulation + Split +&nbsp;<strong>Amendement</strong><br /><br /><strong>4.0 - 6.2.3&nbsp;</strong>Bespoke and custom software is reviewed prior to being released into production or to customers, to identify and correct potential coding vulnerabilities, as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Code reviews ensure code is developed according to secure coding guidelines.&nbsp;</li><li><strong>Code reviews look for both existing and emerging software vulnerabilities.&nbsp;</strong></li><li>Appropriate corrections are implemented prior to release.&nbsp;</li></ul><br /><strong>4.0 - 6.2.3.1&nbsp;</strong>If manual code reviews are performed for bespoke and custom software prior to release to production, code changes are:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Reviewed by individuals other than the originating code author, and who are knowledgeable about code-review techniques and secure coding practices.&nbsp;</li><li>Reviewed and approved by management prior to release.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;<strong>6.4.1&nbsp;</strong>Separate development/test environments from production environments, and enforce the separation with access controls.&nbsp;<br />Change: Reformulation<br /><br /><strong>4.0 - 6.5.3&nbsp;</strong>Pre-production environments are separated from production environments and the separation is enforced with access controls.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<strong>3.2.1 - 6.4.2&nbsp;</strong>Separation of duties between development/test and production environments&nbsp;<br />Change: Reformulation and clarification<br /><br /><strong>4.0 - 6.5.4&nbsp;</strong>Roles and functions are separated between production and pre-production environments to provide accountability such that only reviewed and approved changes are deployed.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<strong>3.2.1 - 6.4.3&nbsp;</strong>Production data (live PANs) are not used for testing or development&nbsp;<br /><br />Change: Reformulation and clarification.<br /><br /><strong>4.0 - 6.5.5&nbsp;</strong>Live PANs are not used in pre-production environments, except where those environments are included in the CDE and protected in accordance with all applicable PCI DSS requirements.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<strong>3.2.1&nbsp; - 6.4.4&nbsp;</strong>Removal of test data and accounts from system components before the system becomes active / goes into production.&nbsp;<br /><br />Change: Reformulation.<br /><br /><strong>4.0 - 6.5.6&nbsp;</strong>Test data and test accounts are removed from system components before the system goes into production.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.4.5&nbsp;</strong>Change control procedures must include the following:&nbsp;<br /><strong>3.2.1 - 6.4.5.1&nbsp;</strong>Documentation of impact.&nbsp;<br /><strong>3.2.1 - 6.4.5.2&nbsp;</strong>Documented change approval by authorized parties.&nbsp;<br /><strong>3.2.1 -6.4.5.3&nbsp;</strong>Functionality testing to verify that the change does not adversely impact the security of the system.&nbsp;<br /><strong>3.2.1 -6.4.5.4&nbsp;</strong>Back-out procedures.&nbsp;<br /><br />Change: reformulation + Merge +&nbsp;<strong>Amendements</strong><br /><br /><strong>4.0 - 6.5.1&nbsp;</strong>Changes to all system components in the production environment are made according to established procedures that include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Reason for, and description of the change.&nbsp;</strong></li><li>Documentation of&nbsp;<strong>security</strong>&nbsp;impact.&nbsp;</li><li>Documented change approval by authorized parties.&nbsp;</li><li>Testing to verify that the change does not adversely impact system security.&nbsp;</li><li><strong>For bespoke and custom software changes, all updates are tested for compliance with Requirement 6.2.4 before being deployed into production.&nbsp;</strong></li><li>Procedures to address failures and return to a secure state.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;<strong>3.2.1 - 6.4.6&nbsp;</strong>Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or changed systems and networks, and documentation updated as applicable.&nbsp;<br /><br />Change: Reformulation.<br /><br /><strong>4.0 - 6.5.2&nbsp;</strong>Upon completion of a significant change, all&nbsp;<strong>applicable&nbsp;</strong>PCI DSS requirements are confirmed to be in place on all new or changed systems and networks, and documentation is updated as applicable.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.5&nbsp;</strong>Address common coding vulnerabilities in software-development processes as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Train developers at least annually in up- to-date secure coding techniques, including how to avoid common coding vulnerabilities.&nbsp;</li><li>Develop applications based on secure coding guidelines.&nbsp;</li></ul><br />Change: Reformulation, Clarification,&nbsp;<strong>Amendement</strong>&nbsp;and Split<br /><br /><strong>4.0 - 6.2.2&nbsp;</strong>Software development personnel working on bespoke and custom software are trained a<strong>t least once every 12 months</strong>&nbsp;as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>On software security relevant to their job function and development languages.&nbsp;</strong></li><li><strong>Including secure software design and secure coding techniques.&nbsp;</strong></li><li><strong>Including, if security testing tools are used, how to use the tools for detecting vulnerabilities in software.&nbsp;</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 6.5.1 -&nbsp; 6.5.10&nbsp;</strong>Injection flaws, particularly SQL injection. Also consider OS Command Injection, LDAP and XPath injection flaws as well as other injection flaws.&nbsp;<br /><strong>6.5.2&nbsp;</strong>Buffer overflows&nbsp;<br /><strong>6.5.3&nbsp;</strong>Insecure cryptographic storage&nbsp;<br /><strong>6.5.4&nbsp;</strong>Insecure communications&nbsp;<br /><strong>6.5.5&nbsp;</strong>Improper error handling&nbsp;<br /><strong>6.5.6&nbsp;</strong>All &ldquo;high risk&rdquo; vulnerabilities identified in the vulnerability identification process (as defined in PCI DSS Requirement 6.1).&nbsp;<br /><strong>6.5.7&nbsp;</strong>Cross-site scripting (XSS)&nbsp;<br /><strong>6.5.8&nbsp;</strong>Improper access control (such as insecure direct object references, failure to restrict URL access, directory traversal, and failure to restrict user access to functions).&nbsp;<br /><strong>6.5.9&nbsp;</strong>Cross-site request forgery (CSRF)&nbsp;<br /><strong>6.5.10&nbsp;</strong>Broken authentication and session management.&nbsp;<br /><br />Change: clarification + bundle<br /><br /><strong>Moved requirements for addressing common coding vulnerabilities to align all software development content under Requirement 6.2.</strong>&nbsp;&nbsp;<br />Combined methods to prevent or mitigate common software attacks into a single requirement and generalized the language describing each type of attack.&nbsp;<br /><br />4.0 - 6.2.4<strong>&nbsp;</strong>Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software, including but not limited to the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Injection attacks, including SQL, LDAP , XPath, or other command, parameter, object, fault, or injection-type flaws.&nbsp;</li><li><strong>Attacks on data and data structures, including attempts to manipulate buffers, pointers, input data, or shared data</strong>.&nbsp;</li><li>Attacks on cryptography usage, i<strong>ncluding attempts to exploit weak, insecure, or inappropriate cryptographic implementations, algorithms, cipher suites, or modes of operation.&nbsp;</strong></li><li><strong>Attacks on business logic, including attempts to abuse or bypass application features and functionalities through the manipulation of APIs, communication protocols and channels, client- side functionality, or other system/application functions and resources. This includes cross-site scripting (XSS) and cross-site request forgery (CSRF).&nbsp;</strong></li><li><strong>Attacks on access control mechanisms, including attempts to bypass or abuse identification, authentication, or authorization mechanisms, or attempts to exploit weaknesses in the implementation of such mechanisms.&nbsp;</strong></li><li>Attacks via any &ldquo;high-risk&rdquo; vulnerabilities identified in the vulnerability identification process, as defined in Requirement 6.3.1&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.6&nbsp;</strong>For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by either of the following methods:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or methods, at least annually and after any changes&nbsp;</li><li>Installing an automated technical solution that detects and prevents web- based attacks (for example, a web- application firewall) in front of public- facing web applications, to continually check all traffic.&nbsp;</li></ul><br />Change:&nbsp; Clarification +&nbsp;<strong>amendements</strong><br /><br /><strong>4.0 - 6.4.1&nbsp;</strong>For public-facing web applications, new threats and vulnerabilities are addressed on an ongoing basis and these applications are protected against known attacks as follows:&nbsp;<br />&bull; Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or methods as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>&ndash; &nbsp;At least once every 12 months and after significant changes.&nbsp;</li><li>&ndash; &nbsp;B<strong>y an entity that specializes in application security.</strong></li><li>&ndash; &nbsp;I<strong>ncluding, at a minimum, all common software attacks in Requirement 6.2.4.&nbsp;</strong></li><li>&ndash; &nbsp;<strong>All vulnerabilities are ranked in accordance with requirement 6.3.1.&nbsp;</strong></li><li><strong>&ndash; &nbsp;All vulnerabilities are corrected.&nbsp;</strong></li><li><strong>&ndash; &nbsp;The application is re-evaluated after the corrections&nbsp;</strong><br /><strong>OR&nbsp;</strong></li></ul>&bull; Installing an automated technical solution(s) that continually detects and prevents web-based attacks as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>&ndash; &nbsp;Installed in front of public-facing web applications to detect and prevent web- based attacks.&nbsp;</li><li>&ndash; &nbsp;<strong>Actively running and up to date as applicable.&nbsp;</strong></li><li><strong>&ndash; &nbsp;Generating audit logs.&nbsp;</strong></li><li><strong>&ndash; &nbsp;Configured to either block web-based attacks or generate an alert that is immediately investigated.&nbsp;</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 - 6.7&nbsp;</strong>Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties.&nbsp;<br /><br />Change: Reformulation.<br /><br /><strong>4.0 - 6.1.1&nbsp;</strong>All security policies and operational procedures that are identified in Requirement 6 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change: NEW.&nbsp;<br /><br /><strong>4.0 - 6.1.2&nbsp;</strong>Roles and responsibilities for performing activities in Requirement 6 are documented, assigned, and understood.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - None<br />Change: NEW<br /><br /><strong>4.0 - 6.3.2&nbsp;</strong>An inventory of bespoke and custom software, and third-party software components incorporated into bespoke and custom software is maintained to facilitate vulnerability and patch management.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW.&nbsp;<strong>This requirement will be superseded by Requirement 6.4.2 after 31 March 2025 when Requirement 6.4.2 becomes effective.&nbsp; The key update here is that an automated solution is explicitly required ass of 2025.</strong><br /><br /><strong>4.0 - 6.4.2&nbsp;</strong>For public-facing web applications, an automated technical solution is deployed that continually detects and prevents web-based attacks, with at least the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Is installed in front of public-facing web applications and is configured to detect and prevent web-based attacks.&nbsp;</li><li>Actively running and up to date as applicable.&nbsp;</li><li>Generating audit logs.&nbsp;</li><li>Configured to either block web-based attacks or generate an alert that is immediately investigated.&nbsp;</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW.&nbsp;<br /><br /><strong>4.0 - 6.4.3&nbsp;</strong>All payment page scripts that are loaded and executed in the consumer&rsquo;s browser are managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>A method is implemented to confirm that each script is authorized.&nbsp;</li><li>A method is implemented to assure the integrity of each script.&nbsp;</li><li>An inventory of all scripts is maintained with written justification as to why each is necessary.&nbsp;</li></ul></div>  <div class="paragraph"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-5" target="_blank">GO TO REQUIREMENT #5</a></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 5]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-5]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-5#comments]]></comments><pubDate>Thu, 20 Apr 2023 13:37:40 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-5</guid><description><![CDATA[Overview  Impact of the new PCI 4.0 on the former 3.2.1&nbsp; requirement 5 are in the form of :&nbsp;Reformulation, clarification and amendements.&nbsp;&nbsp;&nbsp;This version of requirement 5 contains quite more controls than in 3.2.1, mainly through new additions or the split of one control. It also introduces new concepts (for PCI) such as behavioral analysis, real-time scan and phishing attacks. Two controls are subjected to targeted risk analysis.         Terminology:&nbsp;The terms virus [...] ]]></description><content:encoded><![CDATA[<h2 class="wsite-content-title">Overview</h2>  <div class="paragraph">Impact of the new PCI 4.0 on the former 3.2.1&nbsp; requirement 5 are in the form of :&nbsp;<span>Reformulation, clarification and amendements.&nbsp;&nbsp;&nbsp;</span>This version of requirement 5 contains quite more controls than in 3.2.1, mainly through new additions or the split of one control. It also introduces new concepts (for PCI) such as behavioral analysis, real-time scan and phishing attacks. Two controls are subjected to <a href="https://dgozone-pci.weebly.com/blog/pci-dss-40-targeted-risk-assessments-what-is-it-about" target="_blank">targeted risk analysis</a>.</div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-04-20-14-08-24_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li>The terms virus&nbsp; and "anti-virus"&nbsp; are respectively replaced by "<strong>malicious software</strong>" and&nbsp; by "<strong>anti-malware"</strong>. This to onboard<span style="color:rgb(101, 116, 132)">&nbsp;malware variants such as&nbsp;</span><em><span style="color:rgb(101, 116, 132)">worms, trojans, ransomware, spyware, rootkits, adware, backdoors,&nbsp;</span></em><span style="color:rgb(101, 116, 132)">etc.</span></li><li>The mention "Actively running" is replaced by "<strong><u>Real-time scanning</u></strong>". This to avoid past misunderstandings. Real-time scanning should be understood as&nbsp; a type of persistent, on-access scanning.&nbsp;</li><li><strong>"Behavioral analysis"</strong>&nbsp;is incorporated as an accepted anti-malware solution scanning method, as an alternative to traditional periodic (scheduled and on-demand) and&nbsp;<em>real-time (on-access)</em>&nbsp;scans.&nbsp;&nbsp;<span style="color:rgb(60, 72, 88)">B</span><em><span style="color:rgb(68, 68, 68)">ehavior-based malware detection evaluates an object based on its intended actions before it can actually execute that behavior. An object&rsquo;s behavior, or in some cases its potential behavior, is analyzed for suspicious activities. Attempts to perform actions that are clearly abnormal or unauthorized would indicate the object is malicious, or at least suspicious.&rdquo;</span></em></li></ul><br /><strong>New controls</strong>: 5 new controls:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>4.0 - 5.1.2&nbsp; Generic statement about roles and responsibilities&nbsp;</li><li>4.0 - 5.2.3.1&nbsp;Organizations should perform a periodic assessment to determine which system components should require an anti-malware solution. Assets that are determined not to be affected by malware should be included in a list.&nbsp;The frequency of periodic evaluations of system components not at risk for malware shall be the result of a&nbsp;<strong><a href="https://dgozone-pci.weebly.com/blog/pci-dss-40-targeted-risk-assessments-what-is-it-about" target="_blank">targeted risk analysis</a>.</strong>&nbsp;&nbsp;</li><li>4.0 5.3.2.1 The frequency of periodic malware scans shall be the outcome of a&nbsp;<strong><a href="https://dgozone-pci.weebly.com/blog/pci-dss-40-targeted-risk-assessments-what-is-it-about" target="_blank">target risk analysis</a>.</strong></li><li>4.0 - 5.3.3 R<span style="color:rgb(60, 72, 88)">emovable electronic media must be automatically scanned when the media is inserted, connected, or logically mounted. The wording of the requirement, the testing procedures, and the guidance all indicate a requirement to scan the entire media/device upon connection, and not merely scan files on access.</span></li><li>4.0-5.4.1Mandatory<strong>&nbsp;detection and protection against phishing attacks.</strong>&nbsp;<span style="color:rgb(60, 72, 88)">By adding this requirement, the PCI Security Standards Council has acknowledged that email is a major attack vector and the most successful attack is phishing.&nbsp;</span></li></ul><span style="color:rgb(60, 72, 88)">&#8203;</span><br /><strong><span style="color:rgb(60, 72, 88)">Split</span></strong><span style="color:rgb(60, 72, 88)">:&nbsp;</span><br />3.2.1 - 5.2 is split into 4.0 - 5.3.1 , 5.3.2 and 5.3.4.<br /><br /><strong>Amendments</strong>:&nbsp;<br />4.0 - 5.3.1 Require that anti-malware be&nbsp;<strong>updated automatically.</strong><br />4.0 - 5.3.2 Introduce the notion of&nbsp;<strong>continuous behavioral analysis</strong>&nbsp;of systems or processes.&nbsp;<br />4.0 - 5.3.2&nbsp;In&nbsp; addition to periodic scanning, "<strong><u>real-time scanning</u></strong>" (on-access) scans&nbsp; shall also be performed every time an object is downloaded, open, modified. T<span style="color:rgb(60, 72, 88)">hose running traditional&nbsp; anti-malware tools, will need to do both periodic&nbsp;</span><em><span style="color:rgb(60, 72, 88)">and</span></em><span style="color:rgb(60, 72, 88)">&nbsp;real-time scanning which could introduce additional load to systems in scope. Most modern anti-malware platforms already include both.</span><br /><br /><strong>&#8203;Moved:</strong> None<br /><br /><strong>Removed:</strong> None</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><font color="#3387a2"><font size="3">PCI 4.0 Compliance Dashboard</font><br />&#8203;</font><span>&#8203;Get your&nbsp;</span><a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a><span>. Fully aligned with PCI DSS V4.0. It includes the&nbsp;</span><strong>defined approach requirements</strong><span>, the&nbsp;</span><strong>customized approach,</strong><span>&nbsp;</span><strong>applicability notes</strong><span>, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;</span><strong>prioritization approach</strong><span>. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;</span><strong>customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong><span>as well as to register execution of vulnerability scans and penetration tests.</span></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Detailed Analysis</h2>  <div class="paragraph"><strong>Titre</strong><br />3.2.1 - Protect all systems against malware and regularly update anti-virus software or programs&nbsp;<br />4.0 - Protect all Systems and networks from&nbsp;<strong>malicious software&nbsp;</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers).&nbsp;<br /><br />Change: Reformulation + Clarification.<br /><br />4.0 - 5.2.1An anti-malware solution(s) is deployed on all system components, except for those system components identified in periodic evaluations per Requirement 5.2.3 that concludes the system components are not at risk from malware.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1&nbsp; - 5.1.1 Ensure that anti-virus programs are capable of detecting, removing, and protecting against all known types of malicious software.&nbsp;<br /><br />Change: Reformulation.<br /><br />4.0 - 5.2.2 The deployed anti-malware solution(s):&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Detects all known types of malware.&nbsp;</li><li>Removes, blocks, or contains all known types of malware.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 5.1.2For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software.&nbsp;<br /><br />Change: Reformulation + Clarification<br /><br /><strong>4.0 -&nbsp;</strong>5.2.3Any system components that are not at risk for malware are evaluated periodically to include the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>A documented list of all system components not at risk for malware.&nbsp;</li><li>Identification and evaluation of evolving malware threats for those system components.&nbsp;</li><li>Confirmation whether such system components continue to not require anti-malware protection.&nbsp;</li></ul><br />Notes:&nbsp;<br />Organizations must perform a Targeted Risk Analysis (TRA) with the goal of establishing a frequency to review systems not at risk for malware. This review is an evaluation to determine if the threat landscape has changed and therefore may require additional controls outside of traditional anti-malware installations. There are several components which typically do not have or cannot have anti-malware agents installed such as Mainframes, Vendor Appliances, or low-level operating systems such as ESXi (VMware), Kubernetes Clusters, etc. QSAs will be looking for organizations to establish a reasonable frequency based on the TRA and demonstrate the timeframe has been followed. c<br /><span style="color:rgb(51, 51, 51)">Using industry and vendor sources to identify emerging malware and attacks on systems.&nbsp;</span><br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 5.2Ensure that all anti-virus mechanisms are maintained as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Are kept current,&nbsp;</li><li>Perform periodic scans&nbsp;</li><li>Generate audit logs which are retained per PCI DSS Requirement 10.7.&nbsp;</li></ul> <br />&#8203;Change: Reformulation&nbsp; + Split +<strong>&nbsp;amendment</strong><br /><br />4.0 - 5.3.1The anti-malware solution(s) is kept&nbsp;<strong>current via automatic updates</strong>.&nbsp;<br /><br />4.0 - 5.3.2The anti-malware solution(s):&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Performs periodic scans and active&nbsp;<strong>or real-time&nbsp;</strong><br />scans.&nbsp;<br /><strong>OR&nbsp;</strong></li><li><strong>Performs continuous behavioral analysis of systems or processes.&nbsp;</strong></li></ul> 4.0<strong>&nbsp;-&nbsp;</strong>5.3.4 Audit logs for the anti-malware solution(s) are enabled and retained in accordance with Requirement 10.5.1.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 -&nbsp;<strong>5.3&nbsp;</strong>Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period.&nbsp;<br /><br />Change: Reformulation.<br /><br /><strong>4.0 - 5.3.5&nbsp;</strong>Anti-malware mechanisms cannot be disabled or altered by users, unless specifically documented, and authorized by management on a case-by-case basis for a limited time period.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;<strong>5.4&nbsp;</strong>Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties.&nbsp;<br /><br />Change: Reformulation.&nbsp;<br /><br /><strong>4.0 - 5.1.1&nbsp;</strong>All security policies and operational procedures that are identified in Requirement 5 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 None<br />Change: <strong>NEW</strong><br /><br /><strong>4.0 - 5.1.2&nbsp;Roles and responsibilities for performing activities in Requirement 5 are documented, assigned, and understood.&nbsp;</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change: NEW<br /><br /><strong>4.0 </strong>-&nbsp;<strong>5.2.3.1 The frequency of periodic evaluations of system components identified as not at risk for malware is defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change:&nbsp;<strong>NEW</strong><br /><br /><strong>4.0 5.3.2.1 If periodic malware scans are performed to meet Requirement 5.3.2, the frequency of scans is defined in the entity&rsquo;s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.&nbsp;</strong><br />Note: This requirement requires&nbsp; a target risk assessment to&nbsp; establish a frequency for traditional scanning. QSAs will want to see documented analysis within the TRA and the organizations&rsquo; ability to demonstrate the frequency stated has been followed.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change:&nbsp;<strong>NEW</strong><br /><strong>4.0 - 5.3.3 For removable electronic media, the anti- malware solution(s):&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li><strong>Performs automatic scans of when the media is inserted, connected, or logically mounted,&nbsp;</strong><br /><strong>OR&nbsp;</strong></li><li><strong>Performs continuous behavioral analysis of systems or processes when the media is inserted, connected, or logically mounted.&nbsp;</strong></li></ul> Note:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Modern anti-malware systems will perform behavioral analysis of any file executed regardless of storage location. Organizations must ensure that traditional anti-virus/malware systems are configured to immediately scan removable media when it is inserted or mounted.&nbsp;</li><li><span style="color:rgb(60, 72, 88)">Most anti-malware solutions can be configured to scan removable media, though the functionality is usually disabled by default due to user experience implications; scanning a large USB drive with many files can take substantial time, and be quite inconvenient.</span></li><li><span style="color:rgb(60, 72, 88)">Organizations using a continuous behavioral analysis of systems or processes when the media is inserted, connected, or logically mounted are not required to enable an automatic scan of media upon insertion, connection, or logical mounting.</span></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change:&nbsp;<strong>NEW<br /></strong><br /><strong>4.0-5.4.1&nbsp;Processes and automated mechanisms are in place to detect and protect personnel against phishing attacks.</strong>&nbsp;<br />Note:<ul style="color:rgb(0, 0, 0)"><li><span style="color:rgb(60, 72, 88)">These processes and mechanisms must be more than simple warnings about potential phishing. The requirement is for processes and&nbsp;</span><em><span style="color:rgb(60, 72, 88)">automated mechanisms</span></em><span style="color:rgb(60, 72, 88)">&nbsp;that cannot just detect phishing attempts but will actually&nbsp;</span><em><span style="color:rgb(60, 72, 88)">protect</span></em><span style="color:rgb(60, 72, 88)">&nbsp;end-users.</span></li><li>This controls&nbsp; requires actions probably on email servers even if those are outside the PCI CDE.&nbsp;<span style="color:rgb(60, 72, 88)">There are solutions out there today, and some cloud-based solutions like&nbsp;</span><em><span style="color:rgb(60, 72, 88)">Gmail</span></em><span style="color:rgb(60, 72, 88)">&nbsp;and&nbsp;</span><em><span style="color:rgb(60, 72, 88)">Microsoft Defender for Office365</span></em><span style="color:rgb(60, 72, 88)">&nbsp;already have anti-phishing options included.</span></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-4" target="_blank"><font size="4">Go to requirement 4</font></a></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 4]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-4]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-4#comments]]></comments><pubDate>Fri, 07 Apr 2023 14:01:08 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-4</guid><description><![CDATA[As a continuation to our previous articles discussing the impact of PCI DSS 4.0 on PCI DSS 3.2.1, we here below cover Requirement 4.&nbsp;  Overview         Terminology: In this requirement,&nbsp;"cardholder data"&nbsp; is replaced by "PAN's""cardholder environment" is replaced by "CDE"New controls:&nbsp;2 controls have been amended to this requirement to:&nbsp;Require assignment and documentation of the Roles and responsibilities for performing activities in Requirement 4 (Req 4.1.2)Require an  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span>As a continuation to our previous articles discussing the impact of PCI DSS 4.0 on PCI DSS 3.2.1, we here below cover Requirement 4.&nbsp;</span></div>  <h2 class="wsite-content-title">Overview</h2>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-04-07-15-37-46_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Terminology:</strong> In this requirement,&nbsp;<br />"cardholder data"&nbsp; is replaced by "PAN's"<br />"cardholder environment" is replaced by "CDE"<br /><br /><strong>New controls:&nbsp;</strong><br />2 controls have been amended to this requirement to:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Require assignment and documentation of the Roles and responsibilities for performing activities in Requirement 4 (Req 4.1.2)</li><li>Require an up to date inventory of the keys and certificates used to protect PAN during transmission. Note: this implies that organizations have a clear view of all certificates and keys used and that they can maintained this inventory whenever certificates and keys are rotated and changes. For some organizations this could be quite cumbersome.&nbsp;</li></ul><strong>Amendments:&nbsp;</strong><br />Requirement 3.2.1 - 4.1 on the use of strong cryptography and security protocols for the transmission of PAN's has been amended to stress that the certificates used for this purpose be valid, not expired&nbsp; nor revoked. Note: When the sending and receiving parties are different (e.g. merchants and Processors) it is unclear if this control apply also to the sending party. If it is the case, this control may be a bit of a challenge as it the sending party has to validate a certificate on the connection endpoint. Potentially, specific codes will have be to be integrated in applications to do so and invalidate the connection should non-valide certificate be presented by the receiving party.&nbsp;<br /><br /><strong>Moved:</strong><br />None<br /><br /><strong>Removed:</strong><br />None<br /><br /><strong>&#8203;Attention point:</strong><br />Also consider in the scope of Req 4 the following NEW control of Req 3:&nbsp;<strong>3.7.9&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Where a service provider shares cryptographic keys with its customers for transmission or storage of account data, guidance on secure transmission, storage and updating of such keys is documented and distributed to the service provider&rsquo;s customers.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title"><span><font color="#3387a2">PCI 4.0 Compliance Dashboard</font></span></h2>  <div class="paragraph"><span style="font-size: medium; color: rgb(70, 70, 70);">&#8203;Get your&nbsp;</span><a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a><span style="font-size: medium; color: rgb(70, 70, 70);">. Fully aligned with PCI DSS V4.0. It includes the&nbsp;</span><strong style="color: rgb(70, 70, 70);">defined approach requirements</strong><span style="font-size: medium; color: rgb(70, 70, 70);">, the&nbsp;</span><strong style="color: rgb(70, 70, 70);">customized approach,</strong><span style="font-size: medium; color: rgb(70, 70, 70);">&nbsp;</span><strong style="color: rgb(70, 70, 70);">applicability notes</strong><span style="font-size: medium; color: rgb(70, 70, 70);">, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;</span><strong style="color: rgb(70, 70, 70);">prioritization approach</strong><span style="font-size: medium; color: rgb(70, 70, 70);">. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;</span><strong style="color: rgb(70, 70, 70);">customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong><span style="font-size: medium; color: rgb(70, 70, 70);">as well as to register execution of vulnerability scans and penetration tests.</span><br /></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title"><span>Details Analysis</span></h2>  <div class="paragraph">&#8203;Title<br />3.2.1 - Encrypt transmission of cardholder data across open, public networks&nbsp;<br /><br />4.0 - Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 4.1Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks, including the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Only trusted keys and certificates are accepted.&nbsp;</li><li>The protocol in use only supports secure versions or configurations.&nbsp;</li><li>The encryption strength is appropriate for the encryption methodology in use.&nbsp;</li></ul>Change: Reformulation+&nbsp;<strong>Amendement</strong><br /><br />4.0 - 4.2.1Strong cryptography and security protocols are implemented as follows to safeguard PAN during transmission over open, public networks:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Only trusted keys and certificates are accepted.&nbsp;</li><li><strong>Certificates used to safeguard PAN during transmission over open, public networks are confirmed as valid and are not expired or revoked.&nbsp;</strong></li><li>The protocol in use supports only secure versions or configurations and does not support fallback to, or use of insecure versions, algorithms, key sizes, or implementations.&nbsp;</li><li>The encryption strength is appropriate for the encryption methodology in use.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1&nbsp; - 4.1.1Ensure wireless networks transmitting cardholder data or connected to the cardholder data environment, use industry best practices to implement strong encryption for authentication and transmission.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 4.2.1.2 Wireless networks transmitting PAN or connected to the CDE use industry best practices to implement strong cryptography for authentication and transmission.&nbsp;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 4.2Never send unprotected PANs by end- user messaging technologies (for example, e- mail, instant messaging, SMS, chat, etc.).&nbsp;<br />Change: Reformulation<br /><br />4.0 - 4.2.2 PAN is secured with strong cryptography whenever it is sent via end-user messaging technologies.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties.&nbsp;<br />Change: Reformulation<br /><br />4.0 - 4.1.1 All security policies and operational procedures that are identified in Requirement 4 are:&nbsp;<br />&bull; Documented.&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Kept up to date.&nbsp;</li><li>In use.&nbsp;</li><li>Known to all affected parties.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change:&nbsp;<strong>NEW</strong><br /><br /><strong>4.0 - 4.1.2 Roles and responsibilities for performing activities in Requirement 4 are documented, assigned, and understood.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />Change:&nbsp;<strong>NEW</strong><br /><br /><strong>4.2.1.1 An inventory of the entity&rsquo;s trusted keys and certificates used to protect PAN during transmission is maintained</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-3" target="_blank"><font size="4">Go to requirement 3</font></a></div>]]></content:encoded></item><item><title><![CDATA[PCI 4.0 - Impact on Requirement 3]]></title><link><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-3]]></link><comments><![CDATA[https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-3#comments]]></comments><pubDate>Wed, 29 Mar 2023 15:29:07 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-3</guid><description><![CDATA[As a continuation to our previous articles discussing the impact of PCI DSS 4.0 on PCI DSS 3.2.1, we here below cover Requirement 3.&nbsp;  Overview         Change of terminologies:&nbsp;"The first 6 digits of a PAN" is replaced by "BIN"."Cardholder data" is replaced by "Account data"New controls:&nbsp;5 controls have been added to this requirement:&nbsp;4.0 - 3.1.2 Roles and responsibilities for performing activities in Requirement 3 are documented, assigned, and understood.&nbsp;4.0&nbsp;-&nbs [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span>As a continuation to our previous articles discussing the impact of PCI DSS 4.0 on PCI DSS 3.2.1, we here below cover Requirement 3.&nbsp;</span></div>  <h2 class="wsite-content-title">Overview</h2>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0;margin-right:0;text-align:center"> <a> <img src="https://dgozone-pci.weebly.com/uploads/2/6/3/2/26326685/capture-d-cran-2023-03-29-17-27-26_orig.png" alt="Picture" style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%"></div> </div></div>  <div class="paragraph"><strong>Change of terminologies</strong>:&nbsp;<ul><li>"The first 6 digits of a PAN" is replaced by "BIN".</li><li>"Cardholder data" is replaced by "Account data"</li></ul><strong>New controls</strong>:&nbsp;<br />5 controls have been added to this requirement:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>4.0 - 3.1.2 Roles and responsibilities for performing activities in Requirement 3 are documented, assigned, and understood.&nbsp;</li><li>4.0<strong>&nbsp;-&nbsp;</strong>3.3.3&nbsp;<em>Additional requirement for issuers and companies that support issuing services and store sensitive authentication data:&nbsp;</em>Any storage of sensitive authentication data is:&nbsp; Limited to that which is needed for a legitimate issuing business need and is secured. Encrypted using strong cryptography.&nbsp;</li><li>4.0 - 3.5.1.1 Hashes used to render PAN unreadable&nbsp; shall be keyed cryptographic hashes&nbsp; with associated key-management processes and procedures in accordance with Requirements 3.6 and 3.7. Note: This implies that&nbsp; organizations using SHA256 for instance for the hashing of PAN's need to use HMAC_SHA256 or similar.&nbsp;</li><li>4.0 - 3.7.9 Additional requirement for service providers only: Where a service provider shares cryptographic keys with its customers for transmission or storage of account data, guidance on secure transmission, storage and updating of such keys is documented and distributed to the service provider&rsquo;s customers.&nbsp;</li></ul><strong>Amendments</strong>:&nbsp;<br />Multiples controls have been amended to include the following controls:<ul style="color:rgb(0, 0, 0)"><li>The policies and procedures shall cover all locations of stored account data as well as sensitive authentication data (SAD) stored prior to completion of authorization.&nbsp;</li><li>Disk -level encryption shall be implemented on removable electronic media OR If used for non-removable electronic media, PAN shall also be rendered unreadable. Authentication factors allowing access to unencrypted data are stored securely. Note: This stresses that that column and field-level encryption within the database is acceptable, but databases which encrypt the entire partition (disk) are prohibited.&nbsp; Organizations which rely on disk encryption to store and/or exchange files will need to implement file-level encryption to protect files on disk. Organization&rsquo;s using Transparent Disk Encryption to protect database partitions will need to implement column-level encryption for columns which contain cardholder data.&nbsp;</li><li>Cryptographic keys used in production and test environments shall be different.&nbsp;</li><li>Inventory of cryptographic components shall cover key management systems (KMS)</li><li>A defined cryptoperiod shall be documented or each key type in use.&nbsp;</li></ul><strong>Moved</strong><br />One control of clause 12 has been moved and restated into requirement 3 (See detailed analysis)<br /><br /><strong>Removed</strong><br />None</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title"><span><font color="#3387a2">PCI 4.0 Compliance Dashboard</font></span></h2>  <div class="paragraph"><font size="3"><span style="color:rgb(70, 70, 70)">&#8203;Get your&nbsp;</span><a href="https://dgozone-pci.weebly.com/store/p57/PCI_DSS_V4.0_Compliance_Dashboard.html" target="_blank">PCI 4.0 COMPLIANCE DASHBOARD TOOL&nbsp;</a><span style="color:rgb(70, 70, 70)">. Fully aligned with PCI DSS V4.0. It includes the&nbsp;</span><strong style="color:rgb(70, 70, 70)">defined approach requirements</strong><span style="color:rgb(70, 70, 70)">, the&nbsp;</span><strong style="color:rgb(70, 70, 70)">customized approach,</strong><span style="color:rgb(70, 70, 70)">&nbsp;</span><strong style="color:rgb(70, 70, 70)">applicability notes</strong><span style="color:rgb(70, 70, 70)">, purpose, good practices &amp; further information, definition, example and defined testing procedures and&nbsp;</span><strong style="color:rgb(70, 70, 70)">prioritization approach</strong><span style="color:rgb(70, 70, 70)">. It also provides templates to register your compensating controls, controls met with remediations but also to register your customized Controls, the outcome of the&nbsp;</span><strong style="color:rgb(70, 70, 70)">customized approach risk assessments and the risk assessments for the definition of frequency periods&nbsp;</strong><span style="color:rgb(70, 70, 70)">as well as to register execution of vulnerability scans and penetration tests.</span></font></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <h2 class="wsite-content-title">Details Analysis</h2>  <div class="paragraph"><strong>Titre</strong><br />3.2.1 - Protect stored cardholder data &nbsp;/&nbsp;4.0 - Protect Stored&nbsp;<strong>Account Data&nbsp;</strong>&#8203;</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.1 Keep cardholder data storage to a minimum by implementing data retention and disposal policies, procedures and processes that include at least the following for all cardholder data (CHD) storage:<ul><li>Limiting data storage amount and retention time to that which is required for legal, regulatory, and business requirements</li><li>Processes for secure deletion of data when no longer needed</li><li>Specific retention requirements for cardholder data</li><li>A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention.</li></ul><u><br />&#8203;Change: Reformulation + Amendments</u><br /><br />4.0 -&nbsp;3.2.1<strong>&nbsp;</strong>Account data storage is kept to a minimum through implementation of data retention and disposal policies, procedures, and processes that include at least the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Coverage for all locations of stored account data.&nbsp;</strong></li><li><strong>Coverage for any sensitive authentication data (SAD) stored prior to completion of authorization.&nbsp;</strong></li><li>Limiting data storage amount and retention time to that which is required for legal or regulatory, and/or business requirements.&nbsp;</li><li>Specific retention requirements for stored account data that defines length of retention period and includes a documented business justification.&nbsp;</li><li>Processes for secure deletion or rendering account data unrecoverable when no longer needed per the retention policy.&nbsp;</li><li>A process for verifying, at least once every three months, that stored account data exceeding the defined retention period has been securely deleted or rendered unrecoverable.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1&nbsp; -&nbsp;3.2<strong>&nbsp;</strong>Do not store sensitive authentication data after authorization (even if encrypted). If sensitive authentication data is received, render all data unrecoverable upon completion of the authorization process.&nbsp;<br /><br /><u>Change: Reformulation +&nbsp;<strong><font color="#2a2a2a">Amendments&nbsp;</font></strong></u><br /><br />4.0 -&nbsp;3.3.1<strong>&nbsp;</strong>SAD is not retained after authorization, even if encrypted. All sensitive authentication data received is rendered unrecoverable upon completion of the authorization process.&nbsp;<br />4.0 - 3.3.2&nbsp;S<strong>AD that is stored electronically prior to completion of authorization is encrypted using strong cryptography.</strong></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.2.1<strong>&nbsp;</strong>Do not store the full contents of any track (from the magnetic stripe located on the back of a card, equivalent data contained on a chip, or elsewhere) after authorization. This data is alternatively called full track, track, track 1, track 2, and magnetic-stripe data&nbsp;<br /><br /><u><font size="2">Change: Reformulation</font></u><br /><br />4.0 - 3.3.1.1&nbsp;The full contents of any track are not retained upon completion of the authorization process.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.2.2<strong>&nbsp;</strong>Do not store the card verification code or value (three-digit or four-digit number printed on the front or back of a payment card used to verify card-not- present transactions) after authorization.&nbsp;<br /><br /><u>Change: Reformulation</u><br /><br />4.0 -&nbsp;3.3.1.2&nbsp;The card verification code is not retained upon completion of the authorization process.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>&#8203;</strong>3.2.1 -&nbsp;3.2.3<strong>&nbsp;</strong>Do not store the personal identification number (PIN) or the encrypted PIN block after authorization.&nbsp;<br /><br /><u>Change: Reformulation + Clarification</u><br /><br />4.0 - 3.3.1.3 The personal identification number (PIN)&nbsp;<strong>and&nbsp;</strong>the PIN block are not retained upon completion of the authorization process.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.3<strong>&nbsp;</strong>Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed), such that only personnel with a legitimate business need can see more than the first six/last four digits of the PAN.&nbsp;<br /><br /><u>&#8203;Change: Reformulation + Clarification</u><br /><br />4.0 - 3.4.1<strong>&nbsp;</strong>PAN is masked when displayed (the BIN and last four digits are the maximum numberof digits to be displayed), such that only personnel with a legitimate business need can see more thanthe BIN and last four digits of the PAN.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.4<strong>&nbsp;</strong>Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>One-way hashes based on strong cryptography, (hash must be of the entire PAN)&nbsp;</li><li>Truncation (hashing cannot be used to replace the truncated segment of PAN)&nbsp;</li><li>Index tokens and pads (pads must be securely stored)&nbsp;</li><li>Strong cryptography with associated key-management processes and procedures.&nbsp;</li></ul><br /><u>&#8203;Change:&nbsp; Reformulation, Clarification</u><br /><br />4.0 -&nbsp;3.5.1<strong>&nbsp;</strong>PAN is rendered unreadable anywhere it is stored by using any of the following approaches:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>One-way hashes based on strong cryptography of the entire PAN.&nbsp;</li><li>Truncation (hashing cannot be used to replace the truncated segment of PAN).&nbsp;</li></ul>&ndash;<strong>&nbsp;If hashed and truncated versions of the same PAN, or different truncation formats of the same PAN, are present in an environment, additional controls are in place such that the different versions cannot be correlated to reconstruct the original PAN.&nbsp;</strong><ul style="color:rgb(0, 0, 0)"><li>Index tokens.&nbsp;</li><li>Strong cryptography with associated key- management processes and procedures.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.4.1<strong>&nbsp;</strong>If disk encryption is used (rather than file- or column-level database encryption), logical access must be managed separately and independently of native operating system authentication and access control mechanisms (for example, by not using local user account databases or general network login credentials). Decryption keys must not be associated with user accounts.&nbsp;<br /><br /><u>Change : Reformulation +&nbsp;<strong>Amendments&nbsp;</strong>+ Split</u><br /><br />4.0 -&nbsp;3.5.1.2&nbsp;If disk-level or partition-level encryption (rather than file-, column-, or field-level database encryption) is used to render PAN unreadable, it is implemented only as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>On removable electronic media OR&nbsp;</strong></li><li><strong>If used for non-removable electronic media, PAN is also rendered unreadable via another mechanism that meets Requirement 3.5.1.&nbsp;</strong></li></ul><br />4.0 -&nbsp; 3.5.1.3&nbsp;If disk-level or partition-level encryption is used (rather than file-, column-, or field--level database encryption) to render PAN unreadable, it is managed as follows:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Logical access is managed separately and independently of native operating system authentication and access control mechanisms.&nbsp;</li><li>Decryption keys are not associated with user accounts.&nbsp;</li><li><strong>Authentication factors (passwords, passphrases, or cryptographic keys) that allow access to unencrypted data are stored securely.</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.5<strong>&nbsp;</strong>Document and implement procedures to protect keys used to secure stored cardholder data against disclosure and misuse:&nbsp;<br /><br /><u>Change: Reformulation + Amendments</u><br /><br />4.0 -&nbsp;3.6.1<strong>&nbsp;</strong>Procedures are defined and implemented to protect cryptographic keys used to protect stored account data against disclosure and misuse that include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access to keys is restricted to the fewest number of custodians necessary.&nbsp;</li><li>Key-encrypting keys are at least as strong as the data-encrypting keys they protect.&nbsp;</li><li>Key-encrypting keys are stored separately from data-encrypting keys.&nbsp;</li><li>Keys are stored securely in the fewest possible locations and forms.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.5.1<strong>&nbsp;<em>Additional requirement for service providers only:&nbsp;</em></strong>Maintain a documented description of the cryptographic architecture that includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and expiry date&nbsp;</li><li>Description of the key usage for each key&nbsp;</li><li>Inventory of any HSMs and other SCDs used for key management&nbsp;</li></ul><br /><u>Change : Reformulation + Clarification +&nbsp;<strong>Amendment</strong></u><br /><br />4.0 -&nbsp;3.6.1.1<strong>&nbsp;<em>Additional requirement for service providers only:&nbsp;</em></strong>A documented description of the cryptographic architecture is maintained that includes:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Details of all algorithms, protocols, and keys used for the protection of stored account data, including key strength and expiry date.&nbsp;</li><li><strong>Preventing the use of the same cryptographic keys in production and test environments.&nbsp;</strong></li><li>Description of the key usage for each key.&nbsp;</li><li>Inventory of any hardware security modules (HSMs),&nbsp;<strong>key management systems (KMS)</strong>, and other secure cryptographic devices (SCDs) used for key management, including type and location of devices, as outlined in Requirement 12.3.4.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.5.2<strong>&nbsp;</strong>Restrict access to cryptographic keys to the fewest number of custodians necessary.&nbsp;<br /><br /><u>&#8203;Change: Reformulation + Merge</u><br /><br />4.0 - &#8203;3.6.1&nbsp;Procedures are defined and implemented to protect cryptographic keys used to protect stored account data against disclosure and misuse that include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Access to keys is restricted to the fewest number of custodians necessary.&nbsp;</strong></li><li>Key-encrypting keys are at least as strong as the data-encrypting keys they protect.&nbsp;</li><li>Key-encrypting keys are stored separately from data-encrypting keys.&nbsp;</li><li>Keys are stored securely in the fewest possible locations and forms.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;3.5.3<strong>&nbsp;</strong>Store secret and private keys used to encrypt/decrypt cardholder data in one (or more) of the following forms at all times:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Encrypted with a key-encrypting key that is at least as strong as the data- encrypting key, and that is stored separately from the data-encrypting key&nbsp;</li><li>Within a secure cryptographic device (such as a hardware (host) security module (HSM) or PTS-approved point-of-interaction device)&nbsp;</li><li>As at least two full-length key components or key shares, in accordance with an industry- accepted method&nbsp;</li></ul><br /><u>Change: Reformulation + Split/Shuffling + Redundancy</u><br /><br />4.0 - 3.6.1&nbsp;Procedures are defined and implemented to protect cryptographic keys used to protect stored account data against disclosure and misuse that include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access to keys is restricted to the fewest number of custodians necessary.&nbsp;</li><li><strong>Key-encrypting keys are at least as strong as the data-encrypting keys they protect.&nbsp;</strong></li><li><strong>Key-encrypting keys are stored separately from data-encrypting keys.&nbsp;</strong></li><li>Keys are stored securely in the fewest possible locations and forms.&nbsp;</li></ul><br />4.0 -&nbsp;3.6.1.2&nbsp;Secret and private keys used to encrypt/decrypt stored account data are stored in one (or more) of the following forms at all times:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separately from the data- encrypting key.&nbsp;</strong></li><li><strong>Within a secure cryptographic device (SCD), such as a hardware security module (HSM) or PTS-approved point-of-interaction device.&nbsp;</strong></li><li><strong>As at least two full-length key components or key shares, in accordance with an industry-accepted method.</strong></li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -<strong>&nbsp;3.5.4&nbsp;</strong>Store cryptographic keys in the fewest possible locations.&nbsp;<br /><br />Change: Reformulation + Redundancy<br /><br />4.0 - 3.6.1.4&nbsp;Cryptographic keys are stored in the fewest possible locations.&nbsp;<br /><br />4.0 - 3.6.1<strong>&nbsp;</strong>Procedures are defined and implemented to protect cryptographic keys used to protect stored account data against disclosure and misuse that include:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>Access to keys is restricted to the fewest number of custodians necessary.&nbsp;</li><li>Key-encrypting keys are at least as strong as the data-encrypting keys they protect.&nbsp;</li><li>Key-encrypting keys are stored separately from data-encrypting keys.&nbsp;</li><li><strong>Keys are stored securely in the fewest possible locations and forms</strong>.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;<strong>3.6&nbsp;</strong>Fully document and implement all key- management processes and procedures for cryptographic keys used for encryption of cardholder data, including the following:&nbsp;<br /><br /><u>Change: Split</u><br /><br />4.0 - 3.7.1 to 3.7.8</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.1<strong>&nbsp;</strong>Generation of strong cryptographic keys&nbsp;<br /><br /><u>Change: Reformulation</u><br /><br />4.0 - 3.7.1<strong>&nbsp;</strong>Key-management policies and procedures are implemented to include generation of strong cryptographic keys used to protect stored account data.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.2<strong>&nbsp;</strong>Secure cryptographic key distribution&nbsp;<br /><br /><u>Change: Reformulation</u><br /><br />4.0 - 3.7.2<strong>&nbsp;</strong>Key-management policies and procedures are implemented to include secure distribution of cryptographic keys used to protect stored account data.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.3<strong>&nbsp;</strong>Secure cryptographic key storage&nbsp;<br /><br /><u>&#8203;Change: Reformulation</u><br /><br />4.0 - 3.7.3<strong>&nbsp;</strong>Key-management policies and procedures are implemented to include secure storage of cryptographic keys used to protect stored account data.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.4<strong>&nbsp;</strong>Cryptographic key changes for keys that have reached the end of their cryptoperiod (for example, after a defined period of time has passed and/or after a certain amount of cipher-text has been produced by a given key), as defined by the associated application vendor or key owner, and based on industry best practices and guidelines (for example, NIST Special Publication 800-57).&nbsp;<br /><br /><u>Change: Reformulation +&nbsp;<strong>Amendments</strong></u><br /><br />4.0 - 3.7.4<strong>&nbsp;</strong>Key management policies and procedures are implemented for cryptographic key changes for keys that have reached the end of their cryptoperiod, as defined by the associated application vendor or key owner, and based on industry best practices and guidelines, including the following:&nbsp;<ul style="color:rgb(0, 0, 0)"><li><strong>A defined cryptoperiod for each key type in use.&nbsp;</strong></li><li>A process for key changes at the end of the defined cryptoperiod.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.5<strong>&nbsp;</strong>Retirement or replacement (for example, archiving, destruction, and/or revocation) of keys as deemed necessary when the integrity of the key has been weakened (for example, departure of an employee with knowledge of a clear-text key component), or keys are suspected of being compromised.&nbsp;<br /><br />&#8203;<u>Change: Change: Reformulation + Clarification<br /></u><br />3.2.1 - 3.7.5<strong>&nbsp;</strong>Key management policies procedures are implemented to include the retirement, replacement, or destruction of keys used to protect stored account data, as deemed necessary when:&nbsp;<ul style="color:rgb(0, 0, 0)"><li>The key has reached the end of its defined cryptoperiod.&nbsp;</li><li>The integrity of the key has been weakened, including when personnel with knowledge of a cleartext key component leaves the company, or the role for which the key component was known.&nbsp;</li><li>The key is suspected of or known to be compromised.&nbsp;<br />Retired or replaced keys are not used for encryption operations.</li></ul></div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">&#8203;3.2.1 - 3.6.6<strong>&nbsp;</strong>If manual clear-text cryptographic key-management operations are used, these operations must be managed using split knowledge and dual control.&nbsp;<br /><br /><u>Change: Reformulation</u><br /><br />4.0 - 3.7.6<strong>&nbsp;</strong>Where manual cleartext cryptographic key- management operations are performed by personnel, key-management policies and procedures are implemented include managing these operations using split knowledge and dual control.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.7<strong>&nbsp;</strong>Prevention of unauthorized substitution of cryptographic keys.&nbsp;<br /><br /><u>&#8203;Change: Reformulation</u><br /><br />4.0&nbsp; - 3.7.7<strong>&nbsp;</strong>Key management policies and procedures are implemented to include the prevention of unauthorized substitution of cryptographic keys.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.6.8<strong>&nbsp;</strong>Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key- custodian responsibilities&nbsp;<br /><br /><u>&#8203;Change: Reformulation + Clarification</u><br /><br />4.0 - 3.7.8<strong>&nbsp;</strong>Key management policies and procedures are implemented to include that cryptographic key custodians formally acknowledge (in writing or electronically) that they understand and accept their key-custodian responsibilities.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - 3.7<strong>&nbsp;</strong>Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in use, and known to all affected parties.&nbsp;<br /><br /><u>Change: Reformulation</u><br /><br />4.0 - 3.1.1 All security policies and operational procedures that are identified in Requirement 3 are:<br />&bull; Documented.<br />&bull; Kept up to date.<br />&bull; In use.<br />&bull; Known to all affected parties.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 -&nbsp;12.3.10<strong>&nbsp;</strong>For personnel accessing cardholder data via remote-access technologies, prohibit the copying, moving, and storage of cardholder data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need.&nbsp;Where there is an authorized business need, the usage policies must require the data be protected in accordance with all applicable PCI DSS Requirements.&nbsp;<br /><br /><u>Change: Move and reformulation</u><br /><br />4.0&nbsp; -&nbsp;3.4.2<strong>&nbsp;</strong>When using remote-access technologies, technical controls prevent copy and/or relocation of PAN for all personnel, except for those with documented, explicit authorization and a legitimate, defined business need.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><strong>3.2.1 -&nbsp;</strong>NONE<br /><u>Change: NEW</u><br /><br />4.0 - 3.1.2<strong>&nbsp;</strong>Roles and responsibilities for performing activities in Requirement 3 are documented, assigned, and understood.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br /><u>Change:&nbsp; NEW</u><br /><br />4.0 <strong>-&nbsp;</strong>3.3.3&nbsp;<em>Additional requirement for issuers and companies that support issuing services and store sensitive authentication data:&nbsp;</em>Any storage of sensitive authentication data is:&nbsp;<br />Limited to that which is needed for a legitimate issuing business need and is secured.&nbsp;<br />Encrypted using strong cryptography.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br />&#8203;<u>Change:&nbsp; NEW</u><br /><br />4.0 - 3.5.1.1&nbsp;Hashes used to render PAN unreadable&nbsp; are keyed cryptographic hashes of the entire PAN, with associated key-management processes and procedures in accordance with Requirements 3.6 and 3.7.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br /><u>Change: NEW</u><br /><br />4.0 3.6.1.3 Access to cleartext cryptographic key components is restricted to the fewest number of custodians necessary.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph">3.2.1 - None<br /><u>Change: NEW</u><br />&#8203;<br />4.0 - 3.7.9&nbsp;<em>Additional requirement for service providers only:&nbsp;</em>Where a service provider shares cryptographic keys with its customers for transmission or storage of account data, guidance on secure transmission, storage and updating of such keys is documented and distributed to the service provider&rsquo;s customers.</div>  <div><div style="height: 20px; overflow: hidden; width: 100%;"></div> <hr class="styled-hr" style="width:100%;"></hr> <div style="height: 20px; overflow: hidden; width: 100%;"></div></div>  <div class="paragraph"><a href="https://dgozone-pci.weebly.com/blog/pci-40-impact-on-requirement-2" target="_blank"><font size="4">Go to Requirement 2</font></a></div>]]></content:encoded></item></channel></rss>