SSH and PCI on Insecure, Dirty Side
Does current PCI code require SSH connections be restricted to enumerated (specific) client IP addresses on the unsecure, dirty side? Isn’t that outside the scope of the PCI code?
Collaborate Disseminate
Does current PCI code require SSH connections be restricted to enumerated (specific) client IP addresses on the unsecure, dirty side? Isn’t that outside the scope of the PCI code?
A former employer of mine has reached out to me to assist them with PCI certification (I guess I’ll be getting a 1099-NEC from them next year as a result). Here’s the point I’m at in the questionnaire:
File-integrity monitoring tools are … Continue reading file-integrity monitoring tools for PCI compliance
An e-commerce site uses the Direct-Post method (see page 14 PCI e-commerce security).
Is the server for the e-commerce application and network it resides on in scope for PCI? There are questions in the SAQ A-EP for servers and networking … Continue reading PCI scope for a Direct-Post e-commerce site (SAQ A-EP)
There must be some kind of business that requires the use of sensitive authentication data (SAD) data. Could someone point me in the right direction on the requirement for the storage of that data?
If I install a KMS into a PCI environment, the KMS touches the keys of the payment HSM. does the KMS come into scope for a PCI audit.
I am designing a system that uses a certain biometric vector as a secondary user identification step before authorizing a payment. My system does not handle payment card details, rather the payment card processor consumes my service to aut… Continue reading Can biometric vectors (i.e. fingerprint vector) be considered as Sensitive Authentication Data (SAD) in PCI?
We will be providing a service to a client, where the end user logged on to our system can submit their payment information to Authorize .Net.
I need help figuring out if we as a service provider need to be PCI Compliant.
We will either … Continue reading PCI Compliance – Service Provider vs Merchant
I administer a few hundred servers and am going through a yearly PCI audit. This time around we need to prove that we’ve got anti-virus protection on our “systems commonly affected by malicious software (particularly personal computers an… Continue reading What is the difference between a server and an appliance for PCI purposes?
Can someone help me understand how the PCI Timeout rules change for an application like the Starbucks App? A user is able to keep their card open ready for scan for longer the 15 minutes if needed, but PCI A11y AA also requires to display … Continue reading PCI Idle Session Timeout general question
I’m hoping to clarify this:
If there is a segmented network and card data is only in one section, do the Section 6 requirements for development apply to the network segment that allows card data? Do any other requirements a… Continue reading PCI DSS Requirement 6 Clarification