1 / 4

What is PCI DSS Certification Compliance

PCI DSS stands for Payment Card Industry Data Security Standard. It is compliance that was made to ensure the complete safety and security of any online transactions. PCI DSS is a set of rules and requirements which is mandatory for every company and business that stores and processes the confidential online transactions of credit and debit cards. Read More @ https://www.gisconsulting.in/what-is-pci-dss-certification-compliance/

Télécharger la présentation

What is PCI DSS Certification Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is PCI DSS Certification Compliance? PCI DSS stands for Payment Card Industry Data Security Standard. It is compliance that was made to ensure the complete safety and security of any online transactions. PCI DSS is a set of rules and requirements which is mandatory for every company and business that stores and processes the confidential online transactions of credit and debit cards. Launched in 2006, PCI DSS Certification compliance has its motive to manage the security standards of PCI (Payment Card Industry) and improves the security of public accounts throughout the transaction process. What are the 12 requirements for PCI DSS certification compliance? 1.Use and maintain Firewalls

  2. Firewalls block the unauthorized and foreign entities attempting to access the private data. Firewalls are required in PCI DSS certification compliance because it prevents unauthorized access. 2.Passwords protections Any third-party products like modems, routers come with a password and other security measures, which can be easily accessed. But at many moments, these vulnerabilities can be secured by businesses. Password protection is compliance to ensure the list of all the software and devices which either requires a password or other security access. 3.Protect the personal information of Cardholder The personal data of a cardholder must be encrypted and secure with encryption keys. Regular scanning and maintenance of primary account numbers (PAN) also requires encryption. 4.Encryption of transmitted data The data of a cardholder is transmitted across multiple channels which must be encrypted. Account number of the public also should not be sent to unknown locations. 5.Proper use of antivirus Installing antivirus software is required for all the devices that store and process through PAN. The antiviruses should be regularly updated. 6.Updated software Antiviruses and other software should be updated often for security measures. These updates are required to install for all the devices that store the data of cardholders.

  3. 7.Restriction of data access Restriction of the data access is the most important requirement of PCI DSS compliance. All the third parties like staff and executives who don't need to know about the data of the cardholder should not have it. 8.Unique Ids for the access Uniques Ids should be created for different individuals. There should not be a single login option with multiple employees for the encrypted data. 9.Restriction of any physical access Any information of the cardholder should be physically kept in a safe and secure place. Whether it is handwritten or digitally typed on a hard drive should be locked in the safest location. 10.Create and maintain access logs Proper documentation of how data comes in your organization and how many times it is accessed is needed. Dealing with primary account numbers or the data of cardholders requires logging access. 11.Proper scanning and testing of vulnerabilities Regular scanning and testing of vulnerabilities is required to prevent and reduce the different threats. 12.Document policies Everything from employees to software and equipment everything needs to be documented. From where your company gets the cardholder data, where it is stored, and how it is used, everything needs to be documented.

  4. Level 2, Augusta Point, Parsvnath Exotica, Sector 53 Golf Course, Gurgaon- 122002 Tel: 1800 212 676767 info@gisconsulting.in https://www.gisconsulting.in/ **Thank-you**

More Related