1. Context of the Organization
2. Leadership and Commitment
3. Risk Assessment and Treatment
4. Information Security Objectives
6. Performance Evaluation
1. Build and Maintain a Secure Network and Systems
2. Protect Cardholder Data
3. Maintain a Vulnerability Management Program
4. Implement Strong Access Control Measures
5. Regularly Monitor and Test Networks
6. Maintain an Information Security Policy