Annual maintenance tasks that must be performed for PCI DSS 4.0

1. Risk Assessment

  • Identify assets that store, process, or transmit cardholder data.
  • Analyze potential threats and vulnerabilities affecting these assets.
  • Evaluate existing security measures and their effectiveness.
  • Document findings and prioritize risks based on impact and likelihood.
  • Review existing documentation for accuracy.
  • Incorporate any new systems, processes, or threats.
  • Ensure alignment with current PCI DSS standards.
  • Distribute updated documentation to relevant stakeholders.
  • Assess current policies against PCI DSS requirements.
  • Identify any gaps or outdated practices.
  • Update policies to reflect current risk landscape.
  • Communicate changes to all relevant personnel.
  • Create an inventory of all assets involved in cardholder data processing.
  • Categorize assets based on their role and sensitivity.
  • Ensure inclusion of third-party services that handle data.
  • Maintain and update the asset inventory regularly.
  • Use a risk matrix to evaluate risk levels.
  • Consider factors such as data sensitivity and regulatory requirements.
  • Document the assessment process and outcomes.
  • Prioritize risks based on potential impact.
  • Identify key stakeholders across departments.
  • Conduct interviews or workshops to gather input.
  • Encourage open discussion about risks and concerns.
  • Document perspectives for inclusion in risk assessment.
  • Review current security controls against PCI DSS criteria.
  • Identify areas where controls are lacking or ineffective.
  • Document gaps and recommend improvements.
  • Prioritize remediation efforts based on risk.
  • Assess each security control's performance against threats.
  • Identify any weaknesses or failures in controls.
  • Document findings and suggest enhancements.
  • Review findings with relevant stakeholders.
  • Define criteria for acceptable risk levels.
  • Engage stakeholders to agree on risk tolerance.
  • Document risk tolerance levels for reference.
  • Use levels to inform risk mitigation prioritization.
  • Identify strategies for each prioritized risk.
  • Document chosen strategies and rationale.
  • Assign responsibilities for each action.
  • Establish timelines for implementation.
  • Set a timeline for regular assessments.
  • Ensure alignment with PCI DSS requirements.
  • Document findings from each assessment.
  • Adjust risk management strategies based on outcomes.
  • Review past incidents for insights.
  • Document lessons learned and their implications.
  • Integrate findings into current risk assessment practices.
  • Share insights with relevant teams for awareness.
  • Develop training materials focusing on risk assessment.
  • Schedule training sessions for all relevant staff.
  • Incorporate real-life examples and case studies.
  • Assess understanding through feedback or quizzes.

2. Vulnerability Management

  • Schedule scans using automated tools.
  • Include all systems processing cardholder data.
  • Ensure scans cover both internal and external networks.
  • Generate and review reports for findings.
  • Maintain a log of scan dates and results.
  • Establish a remediation timeline based on severity.
  • Assign responsibilities for fixing vulnerabilities.
  • Verify fixes with follow-up scans.
  • Document remediation actions taken.
  • Communicate status updates to stakeholders.
  • Gather threat intelligence from reputable sources.
  • Assess the relevance of threats to your environment.
  • Adjust the management program accordingly.
  • Document changes made to the program.
  • Train staff on the updated procedures.
  • Define frequency of assessments (e.g., monthly, quarterly).
  • Incorporate regular reviews into the calendar.
  • Ensure resources are allocated for assessments.
  • Monitor compliance with the schedule.
  • Adjust schedule as needed based on findings.
  • Define criteria for assessing severity.
  • Categorize vulnerabilities as high, medium, or low risk.
  • Focus on high-risk vulnerabilities first.
  • Document decisions made during prioritization.
  • Regularly review and adjust prioritization criteria.
  • Create an inventory of all systems and applications.
  • Monitor vendor updates and patch releases.
  • Establish a patch management process.
  • Test patches in a staging environment before deployment.
  • Document all applied patches and updates.
  • Hire qualified external testers if needed.
  • Define the scope of the testing.
  • Review and approve the testing plan.
  • Analyze and document test results.
  • Remediate any identified vulnerabilities.
  • Develop training materials focusing on processes.
  • Schedule regular training sessions.
  • Include real-world examples of vulnerabilities.
  • Encourage open communication about vulnerabilities.
  • Assess staff understanding through quizzes or feedback.
  • Create a complete list of all hardware and software.
  • Regularly update the inventory with new assets.
  • Include details like asset location and owner.
  • Use automated tools for asset tracking.
  • Review inventory for accuracy periodically.
  • Create a tracking system for remediation actions.
  • Record dates, responsible parties, and status.
  • Ensure all documentation is accessible to stakeholders.
  • Review remediation logs for completeness.
  • Conduct periodic audits of remediation efforts.
  • Review existing firewall rules regularly.
  • Test rules for effectiveness against vulnerabilities.
  • Document any changes made to configurations.
  • Ensure rules align with best practices.
  • Involve relevant teams in rule updates.
  • Identify all third-party vendors accessing cardholder data.
  • Establish security requirements for vendors.
  • Request regular vulnerability assessment reports.
  • Maintain communication regarding vulnerabilities.
  • Document vendor compliance and actions.
  • Collect data on past vulnerabilities and incidents.
  • Identify patterns or recurring issues.
  • Adjust strategies based on analysis.
  • Share findings with relevant teams.
  • Use insights to enhance training programs.
  • Research and select appropriate scanning tools.
  • Configure tools to align with your network.
  • Schedule automatic scans at regular intervals.
  • Review scan reports promptly.
  • Adjust configurations as needed for accuracy.
  • Create a communication plan for sharing findings.
  • Include relevant teams in vulnerability discussions.
  • Use dashboards or reports for visibility.
  • Set up regular meetings for updates.
  • Ensure stakeholders acknowledge and act on vulnerabilities.

3. Access Control Measures

  • Identify all current access permissions.
  • Verify that permissions align with roles.
  • Remove access for users no longer with the company.
  • Document any changes made to access controls.
  • Ensure access is granted based on business need.
  • Schedule regular reviews of user access privileges.
  • Engage department heads to verify user roles.
  • Adjust privileges based on job functions.
  • Document findings and actions taken.
  • Communicate changes to users affected.
  • Assess existing access control policies.
  • Identify areas needing updates or improvements.
  • Draft revised policies and procedures.
  • Obtain necessary approvals from stakeholders.
  • Disseminate updated policies to all users.
  • Select an appropriate MFA solution.
  • Configure MFA settings for all relevant systems.
  • Communicate MFA requirements to all users.
  • Provide training on using MFA.
  • Monitor MFA implementation for compliance.
  • Review all access permissions regularly.
  • Limit access to only what is necessary for job functions.
  • Document justifications for any elevated access.
  • Adjust permissions as roles change.
  • Conduct audits to ensure compliance.
  • Identify all roles within the organization.
  • Map access permissions to each role.
  • Review role assignments for accuracy.
  • Update configurations as roles evolve.
  • Document all changes made.
  • Schedule regular training sessions.
  • Develop training materials focused on access control.
  • Include case studies and best practices.
  • Track attendance and participation.
  • Gather feedback to improve future training.
  • Implement logging mechanisms on all systems.
  • Define what data should be logged.
  • Regularly review logs for suspicious activity.
  • Investigate any anomalies found.
  • Report findings to management.
  • Create a checklist for access termination.
  • Ensure IT is notified immediately of terminations.
  • Disable access within a defined timeframe.
  • Document all termination actions taken.
  • Review this process regularly for improvements.
  • Schedule audits on a regular basis.
  • Define criteria for identifying irregularities.
  • Investigate any findings promptly.
  • Document audit results and actions taken.
  • Report significant findings to management.
  • Implement secure VPN solutions for remote access.
  • Require MFA for all remote connections.
  • Monitor remote access logs for unusual activity.
  • Conduct periodic security assessments of remote access.
  • Educate users on secure remote access practices.
  • Identify sensitive data and its access needs.
  • Define time frames for access restrictions.
  • Implement technical controls to enforce time limits.
  • Communicate time-based access policies to users.
  • Review effectiveness of time-based controls regularly.
  • Draft a detailed access management procedure.
  • Include roles and responsibilities for access changes.
  • Ensure all access requests are documented.
  • Regularly review and update the procedure.
  • Train staff on the access management process.

4. Monitoring and Testing

  • Verify log generation across all systems.
  • Check for missed or dropped events.
  • Ensure logs include timestamps and relevant details.
  • Confirm monitoring alerts are functioning as intended.
  • Document any anomalies or issues found.
  • Schedule testing with qualified team or vendor.
  • Define scope and objectives clearly.
  • Document all findings in a report.
  • Prioritize vulnerabilities based on risk.
  • Ensure retesting of remediated issues.
  • Compare current policies against PCI DSS 4.0 standards.
  • Update policies to reflect any changes.
  • Involve stakeholders for comprehensive review.
  • Document and communicate any changes.
  • Schedule annual policy reviews.
  • Define critical event thresholds based on risk.
  • Ensure thresholds align with business objectives.
  • Review and adjust thresholds based on past incidents.
  • Document the rationale for set thresholds.
  • Test alert mechanisms for responsiveness.
  • Define log retention policies per compliance requirements.
  • Test log generation from all critical systems.
  • Ensure logs are securely stored.
  • Regularly review logs for completeness.
  • Document test results and any required adjustments.
  • Schedule scans at least quarterly.
  • Use updated tools for accurate results.
  • Prioritize remediation based on severity.
  • Document scan results and actions taken.
  • Verify remediation efforts through follow-up scans.
  • Collect alerts over a defined period.
  • Categorize alerts by type and severity.
  • Assess false positive and negative rates.
  • Document findings to improve detection rules.
  • Adjust configuration based on analysis.
  • Compare configurations against security policies.
  • Document any deviations or misconfigurations.
  • Ensure rule sets are optimized for performance.
  • Review access control lists for appropriateness.
  • Schedule regular configuration backups.
  • Plan exercises with clear objectives.
  • Involve both red and blue teams.
  • Document findings and lessons learned.
  • Adjust security measures based on outcomes.
  • Schedule follow-up exercises to track improvements.
  • Create an inventory of critical systems.
  • Ensure all systems have monitoring solutions in place.
  • Review monitoring coverage and gaps.
  • Document any system additions or removals.
  • Regularly update the monitoring scope.
  • Conduct periodic audits of log data.
  • Check for consistency across logs.
  • Verify timestamps and event correlation.
  • Document findings and any required changes.
  • Ensure logs are easily accessible for investigations.
  • Analyze incident logs for patterns.
  • Identify common vulnerabilities or failures.
  • Document trends and potential solutions.
  • Communicate findings to relevant teams.
  • Adjust incident response strategies as needed.
  • Schedule training sessions at least annually.
  • Use real-world examples to illustrate concepts.
  • Assess employee understanding through quizzes.
  • Update training material as necessary.
  • Document attendance and feedback.
  • Create a review schedule for tools.
  • Evaluate tools against current threats.
  • Document effectiveness and any gaps.
  • Research and evaluate new technologies.
  • Update tools as necessary to enhance security.
  • Develop a testing plan for security measures.
  • Conduct tests in a controlled environment.
  • Document test results and any issues.
  • Adjust measures based on findings.
  • Schedule regular follow-up tests.

5. Security Policy Review

  • Identify outdated sections of the policy.
  • Consult relevant compliance frameworks and regulations.
  • Draft updates that reflect current practices.
  • Obtain necessary approvals from management.
  • Publish the updated policy for dissemination.
  • Distribute policies via email and intranet.
  • Post policies in common areas and on shared drives.
  • Host informational meetings to discuss updates.
  • Provide acknowledgment forms for employees to sign.
  • Ensure third parties receive the necessary documentation.
  • Schedule training sessions at convenient times.
  • Develop training materials covering key policy changes.
  • Utilize engaging formats like workshops or webinars.
  • Ensure attendance is tracked for compliance purposes.
  • Provide resources for further learning and questions.
  • Define a review frequency (e.g., annually, bi-annually).
  • Assign responsibility for scheduling reviews.
  • Set reminders for upcoming review dates.
  • Document the review schedule in a shared calendar.
  • Adjust the schedule based on significant organizational changes.
  • Identify stakeholders from IT, HR, Legal, etc.
  • Schedule meetings to discuss policy implications.
  • Gather feedback through surveys or interviews.
  • Incorporate stakeholder input into policy revisions.
  • Ensure stakeholders are informed of final decisions.
  • Collect data on incidents and breaches.
  • Analyze root causes and areas of policy failure.
  • Identify trends or recurring issues.
  • Document findings for future reference.
  • Use insights to inform policy updates.
  • Stay informed of relevant legal changes.
  • Review existing policies against new regulations.
  • Update policies to reflect compliance requirements.
  • Consult legal counsel if needed.
  • Communicate changes to all stakeholders.
  • Create a review report outlining changes.
  • Include dates, participants, and meeting notes.
  • Document rationale for each change made.
  • Store reports in a central repository.
  • Ensure accessibility for audits and future reviews.
  • Implement a version control software or system.
  • Label each version with a unique identifier.
  • Record change dates and responsible parties.
  • Archive previous versions for reference.
  • Ensure team members are trained on version control.
  • Create a feedback mechanism (e.g., surveys, suggestion box).
  • Encourage open and honest communication.
  • Review feedback regularly and identify common themes.
  • Make necessary adjustments to policies.
  • Communicate changes back to employees.
  • Define roles related to policy enforcement.
  • Document responsibilities for each role clearly.
  • Communicate roles to the relevant personnel.
  • Review roles regularly for relevance.
  • Provide training on compliance expectations.
  • Identify risks associated with remote work and third-party access.
  • Consult current best practices and technologies.
  • Update policies to reflect enhanced security measures.
  • Communicate updates to affected employees and vendors.
  • Monitor compliance with updated policies.
  • Research current industry standards and frameworks.
  • Compare existing policies with best practices.
  • Identify gaps and areas for improvement.
  • Draft updates to align policies with findings.
  • Engage experts for additional insights if necessary.

6. Incident Response Plan

  • Schedule regular reviews of the plan.
  • Simulate various incident scenarios.
  • Evaluate response effectiveness during tests.
  • Update documentation based on findings.
  • Get feedback from all team members involved.
  • Analyze past incident reports.
  • Identify gaps and areas for improvement.
  • Incorporate feedback from team members.
  • Revise the plan to include new procedures.
  • Communicate updates to all stakeholders.
  • Schedule regular training sessions.
  • Develop realistic incident scenarios for exercises.
  • Encourage participation from all relevant staff.
  • Evaluate performance and identify weaknesses.
  • Document training outcomes for future reference.
  • Define communication channels for reporting.
  • Identify key contacts for internal escalation.
  • Create templates for external communications.
  • Ensure all staff are aware of protocols.
  • Test communication flow during drills.
  • Outline specific roles within the team.
  • Establish a clear hierarchy for escalation.
  • Document responsibilities for each role.
  • Communicate roles to all team members.
  • Review and update regularly as needed.
  • List all critical response actions.
  • Organize checklist by incident type.
  • Ensure accessibility for all team members.
  • Review checklist effectiveness after incidents.
  • Update checklist based on new learnings.
  • Select appropriate monitoring solutions.
  • Configure alerts for suspicious activities.
  • Regularly review alert settings.
  • Train staff on interpreting alerts.
  • Maintain and update monitoring tools.
  • Compile a comprehensive list of assets.
  • Categorize assets based on sensitivity.
  • Regularly update the inventory.
  • Identify critical data for protection.
  • Use inventory to guide incident response.
  • Create a standard format for documentation.
  • Ensure all incidents are logged promptly.
  • Archive documentation securely.
  • Review archived documents periodically.
  • Make documentation accessible for audits.
  • Compile a list of relevant contacts.
  • Verify contact information is current.
  • Update records after any changes.
  • Communicate changes to the team.
  • Establish a review schedule for updates.
  • Identify applicable laws and regulations.
  • Review the plan against compliance standards.
  • Consult legal experts for guidance.
  • Update the plan as regulations change.
  • Document compliance efforts for audits.
  • Subscribe to threat intelligence feeds.
  • Analyze data for relevance to your organization.
  • Update the incident response plan with new threats.
  • Communicate findings to the response team.
  • Review threat intelligence regularly.
  • Gather all incident response team members.
  • Review the timeline of the incident.
  • Identify successes and failures.
  • Document lessons learned.
  • Update the plan based on findings.
  • Draft templates for various scenarios.
  • Identify key stakeholders for notification.
  • Schedule regular updates during incidents.
  • Ensure messages are clear and accurate.
  • Prepare a Q&A for media inquiries.

7. Third-Party Risk Management

  • Identify all third-party vendors.
  • Evaluate their PCI DSS compliance status.
  • Document findings and compliance levels.
  • Create a remediation plan for non-compliant vendors.
  • Reassess periodically based on risk factors.
  • Draft contract templates including security clauses.
  • Specify incident response timeframes and responsibilities.
  • Review existing contracts for compliance with security requirements.
  • Update contracts as necessary before renewal.
  • Ensure all parties sign updated contracts.
  • Schedule assessments at least annually.
  • Use standardized assessment tools and methods.
  • Document assessment results and action items.
  • Follow up on remediation actions.
  • Adjust assessment frequency based on risk levels.
  • Define key security criteria and metrics.
  • Assess vendors against defined criteria.
  • Document evaluation process and results.
  • Consider vendor security certifications.
  • Make engagement decisions based on evaluations.
  • Create a comprehensive vendor inventory list.
  • Include contact information and service details.
  • Regularly update the inventory for accuracy.
  • Classify vendors based on risk level.
  • Ensure access is restricted to authorized personnel.
  • Perform background checks on key personnel.
  • Review vendor security certifications and compliance reports.
  • Assess historical security incidents and responses.
  • Document due diligence findings.
  • Maintain records for future reference.
  • Establish monitoring tools and processes.
  • Schedule regular reviews of vendor security posture.
  • Document any changes in security status.
  • Alert stakeholders about significant changes.
  • Adjust risk assessments as needed.
  • Set reporting frequency and format.
  • Request incident reports and compliance updates.
  • Review submitted reports for accuracy.
  • Follow up on any discrepancies or concerns.
  • Store reports for audit purposes.
  • Establish a communication protocol for reporting issues.
  • Define escalation procedures for serious incidents.
  • Document all security issues and resolutions.
  • Coordinate with vendors for timely remediation.
  • Review effectiveness of issue resolution process.
  • Assess data encryption and storage methods.
  • Evaluate access controls and monitoring practices.
  • Review data handling procedures for compliance.
  • Document evaluation findings and recommendations.
  • Follow up on any required improvements.
  • Provide training sessions on PCI DSS requirements.
  • Distribute training materials and resources.
  • Monitor vendor understanding and compliance.
  • Require acknowledgment of training completion.
  • Update training content as standards evolve.
  • Establish criteria for contract termination.
  • Document incidents of non-compliance.
  • Communicate termination decisions to vendors.
  • Ensure secure data return or destruction.
  • Review and update termination procedures regularly.
  • Schedule regular policy reviews.
  • Incorporate feedback from stakeholders.
  • Stay informed about industry best practices.
  • Adjust policies to address new threats.
  • Communicate policy updates to all relevant parties.

8. Documentation and Reporting

  • Review all existing documentation for relevance.
  • Update any outdated materials with current information.
  • Ensure all documents are stored in an easily accessible location.
  • Communicate access procedures to relevant personnel.
  • Gather all required compliance data and documentation.
  • Compile reports in a clear and concise format.
  • Submit reports to stakeholders by established deadlines.
  • Follow up to confirm receipt and address any questions.
  • Create a log for all compliance-related activities.
  • Document training sessions, participants, and outcomes.
  • Record findings from assessments and subsequent remediation steps.
  • Ensure records are organized and easily retrievable.
  • Select a secure and accessible platform for documentation.
  • Organize documents by category for easy navigation.
  • Regularly back up the repository to prevent data loss.
  • Limit access to authorized personnel only.
  • Implement a versioning system for all documents.
  • Record changes made, including dates and responsible parties.
  • Review version control regularly to ensure accuracy.
  • Train staff on maintaining and using the versioning system.
  • Establish a timeline for periodic reviews.
  • Assign responsibilities for reviewing specific documents.
  • Document changes and updates made during each review.
  • Communicate updates to all relevant stakeholders.
  • Create a standard form for documenting exceptions.
  • Require justification for each exception request.
  • Track remediation plans and their implementation status.
  • Review exceptions regularly for validity and necessity.
  • Define a template for incident documentation.
  • Include details of the incident, response actions, and outcomes.
  • Ensure alignment with existing incident response protocols.
  • Review and update the process based on lessons learned.
  • Distribute PCI DSS policies and procedures to all employees.
  • Create an acknowledgment form for employees to sign.
  • Maintain a log of signed acknowledgments.
  • Review compliance with acknowledgment requirements regularly.
  • Create a dedicated section in compliance documentation.
  • Summarize key findings from audits and assessments.
  • Document specific action items and responsible parties.
  • Review lessons learned in future compliance planning.
  • Establish a log format for documenting communications.
  • Record dates, participants, and key discussion points.
  • Summarize findings and recommendations from auditors.
  • Review logs regularly to track progress on recommendations.
  • Evaluate current reporting formats and processes.
  • Gather feedback from stakeholders on clarity and usefulness.
  • Make necessary adjustments to enhance communication.
  • Schedule regular updates to maintain effectiveness.

9. Continuous Improvement

  • Conduct a comprehensive assessment of current compliance practices.
  • Gather feedback from relevant stakeholders and teams.
  • Analyze compliance metrics and performance reports.
  • Identify trends, strengths, and weaknesses within the program.
  • Prioritize gaps based on risk and impact.
  • Develop specific, measurable objectives for each gap.
  • Assign responsibilities and timelines for remediation.
  • Allocate necessary resources to support the improvement plan.
  • Review previous year’s compliance performance data.
  • Identify emerging threats relevant to your organization.
  • Define clear, achievable compliance goals.
  • Communicate goals to all relevant stakeholders.
  • Design training modules that cover compliance topics.
  • Schedule regular training sessions throughout the year.
  • Utilize various formats (e.g., workshops, e-learning, seminars).
  • Evaluate training effectiveness through assessments and feedback.
  • Document all security incidents and near-misses.
  • Analyze the root causes of each incident.
  • Integrate findings into the compliance program.
  • Share insights with relevant teams for continuous improvement.
  • Research relevant industry standards and best practices.
  • Compare current practices with identified benchmarks.
  • Highlight areas for potential improvement.
  • Develop action plans to implement enhancements.
  • Create a review schedule for compliance tools.
  • Assess the performance and relevance of each tool.
  • Identify any needed upgrades or replacements.
  • Document changes and communicate them to the team.
  • Identify key industry peers for collaboration.
  • Establish regular communication channels (e.g., meetings, forums).
  • Share relevant threat intelligence and insights.
  • Stay updated on shared findings and implement best practices.
  • Create a formal document for lessons learned.
  • Include detailed findings from audits and assessments.
  • Share lessons with relevant teams for awareness.
  • Review and update the compliance program based on lessons.
  • Promote security awareness campaigns within the organization.
  • Encourage feedback and suggestions from employees.
  • Recognize and reward participation in compliance initiatives.
  • Involve employees in compliance committees or task forces.
  • Evaluate the current risk assessment process.
  • Incorporate recent threat intelligence and vulnerability data.
  • Engage stakeholders in the review process.
  • Document and communicate updates to the organization.
  • Schedule regular assessments of security controls.
  • Use metrics and performance data to evaluate effectiveness.
  • Identify any weaknesses or gaps in controls.
  • Implement necessary adjustments and document changes.

Related Checklists