Welcome to the cyber ery course on D mystifying PC Idea says compliance.
This model focuses on the goals of the P C I. D. Assessing the requirements associated with
this course is designed so that you can pick and choose the modules or portions that you may have specific questions about that I hope to address.
In general, you don't need to understand requirement for toe, understand requirement five.
So you don't necessarily need to review each video sequentially unless you want to.
This video is an introduction to the requirements of the P. C. I. B. S s.
And the learning objective of this video is to identify the six goals of the P C i. D. Assess and the corresponding requirements.
The P C I S S C developed six goals that drive the requirements associated with operating a secure cardholder data environment.
Let's start with a gold of building and maintaining of secure networks.
This is a generic gold, but its place at the forefront
because companies must do the due diligence to secure the systems that they're operating.
Requirements associated with this goal employ some of the bare minimum controls necessary to limit and protect the attack surface of your environment.
The second goal is to protect cardholder data.
Cardholder data refers to any information printed process transmitted or stored in any form that is related to a payment car.
This is another generic goal that is meant to protect the sensitivity of data associated with cards.
Merchants are to do what they can to prevent unauthorized use.
Whether the data is printed and stored locally or transmitted over an internal or public network to a remote server or a service provider, the merchant must provide protections.
The third goal is for the merchant to make sure that they have implemented a vulnerability management program.
Vulnerability Management. It's a process of systematically and continuously finding weaknesses in the entities payment card infrastructure.
The merchant is directed to be proactive in discovering the potential points of the data environment that could be exploited.
This includes security procedures, system designed implementation or internal controls that could be exploited in any way to violate the system security.
Fourth goal is putting in place access controls,
access controls, air designed to allow merchants to permit or deny the use of physical or technical means. The access sensitive cardholder data
be intent behind this. Access control is toe limit access toe only. Those who requirement to perform their job function
access controls consists of physical, a logical tools to deny access to those who do not have a need to know.
The fifth goal is to regularly monitor and test the security controls of your cardholder data environment.
Processes of controls that were put in police have to be tested to validate their effectiveness.
They also must be tested over time because the environment changes and the threats here environment evolved.
Ah control that was previously effective may lo longer prevented adversary from penetrating your network.
So by continuously monitoring your environment, you'll be better equipped to detect unauthorized access and you'll be better equipped to determine the effectiveness of your controls.
And the last goal is the implementation of a strong security policy.
Security policy is meant to establish the culture of security in the organization.
It should clearly define who is responsible for what uniform all employees of the sensitive nature of processing card holder.
Now that we've gone over the high level goals, let's go into the 12 requiring
for cryo mint groups associated with each of these goals
and we'll start with firewalls.
The P C. I s S C has mandated that the implementation of firewalls throughout the cardholder data environment to secure it,
firewalls control and monitor the traffic that enters and or exits the system or network
they can exist in in points, routers or their stand alone appliances.
Requirement to is to make sure that all vendor supplied default passwords were changed.
One of the first things that Attackers do is to check to see if the user name and password combinations of devices in the cardholder data environment our default.
If I'm able to see that you're running version 1.2 of a particular software, I may be able to look up the user name and password that came with that software and be able to immediately grant myself administrative access to that software because it's not been changed.
Requirement three is to protect stored cardholder data.
PC I requires that it must be absolutely necessary for their business to function to allow the storage of sensitive cardholder information.
If you must store data, then it must be encrypted.
Requirement for is to protect cardholder data that is being transmitted between networks.
Communication channels must be encrypted of sensitive information is being sent.
An attacker could potentially be listening on networks, and if measures to encrypt are put in place, the attacker could steal this information.
Requirement five is to design to protect all systems against malware.
It mandates that merchants install a regularly update antivirus software programs.
Antivirus is meant to thwart some malware from exploiting systems in the data environment.
Other anti malware solutions are permitted, but it is required that they be up to date that up today, antivirus be in place.
Requirement six is to ensure that a merchant practices the development in maintenance of secure software applications.
Whether developed in house or by a vendor. The merchant needs to make sure the security of the software has tested and patches are regularly implemented. To minimize risk.
Oven attacker exploiting a floor on the software
for applications developed in house secure code and practices must be in place.
Change control procedures and other secure software development practices should always be followed.
Requirement seven is to restrict access. The cardholder data by a business need to know
this process is to make sure that critical data can only be accessed by authorized personnel systems and processes
I need to know is when access rights are granted. Thio only the least amount of data and privileges needed to perform a job function
requirement. Eight. Mandates that access to systems components must be via unique identification assigned to each person with access.
This ensures that actions taken on critical data and systems are performed by and can be traced to known. An authorized users
requirements apply to all accounts with administrative capabilities and all accounts with access to store it. Cardholder data
crime. It's do not apply accounts used by customers.
Requirement nine is to restrict physical access to cardholder data.
If an attacker is physically able to access data or systems, opportunity exists for data to be compromised.
Physically. Protecting media includes all paper and electronic media containing hard holder date
Requirement. 10 Mandates that merchants track and monitor all access to network resource is and cardholder data
longing mechanisms need to be put in place to provide the ability to track to user activities.
This is an important requirement because it is necessary to provide effective forensics and vulnerable on vulnerability. Management
Requirement 11 is that the merchant must regularly test security systems and processes
vulnerabilities air being discovered continuously by malicious individuals and researchers,
and then they're being introduced by new software
system components. Processes and custom software should be tested frequently to ensure security has maintained over time.
Testing of security controls is especially important for any environmental changes, such as deploying new software or changing system configurations.
A requirement 12 is simply that the merchant maintained a policy that defines information, security policies and procedures for all personnel.
So in summary, we went over some of the goals of the P C i D. Assessing we went through each of the requirements needed to meet these goals.
And now, for a quick with
the goal of building and maintaining a secure environment has which of the following requirements
were strict physical access and require unique I. D. S.
Maintaining a security policy
firewalls in no default passwords
or strong encryption.
This one is firewalls and no default passwords.
all users, including customers, are required to have a user account on the CD.
customers do not necessarily have tohave a unique user account.
antivirus isn't required if you have other anti malware solutions in place,
You can have other anti malware solutions in support of anti virus, but it cannot take the replace
anti virus solutions.