Mandatory compliance checks for PCI DSS 4.0 and the frequency of checks.

1. Establish a Secure Network Infrastructure

  • Design network topology with security zones.
  • Utilize firewalls and segmentation for protection.
  • Incorporate encryption for sensitive data.
  • Select secure hardware with built-in security features.
  • Ensure software solutions comply with security standards.
  • Establish a schedule for updates and patches.
  • Prioritize critical vulnerabilities for immediate action.
  • Test patches in a controlled environment first.
  • Document all updates and maintain an inventory.
  • Use automated tools to streamline the patching process.
  • Configure TLS for all web-based communications.
  • Enforce SSH for remote access to devices.
  • Disable insecure protocols like FTP and Telnet.
  • Regularly review and update protocol configurations.
  • Monitor for compliance with best practices.
  • Schedule assessments quarterly or bi-annually.
  • Use automated tools for initial assessments.
  • Engage third-party experts for thorough penetration testing.
  • Document findings and create a remediation plan.
  • Re-test after remediation to ensure effectiveness.
  • Identify sensitive data and critical assets.
  • Create VLANs to separate different network segments.
  • Implement access controls between segments.
  • Regularly review segmentation effectiveness.
  • Update segments as assets and needs change.
  • Deploy firewalls at network entry points.
  • Configure IDS/IPS to alert on suspicious activities.
  • Regularly update firewall and IDS/IPS rules.
  • Monitor logs for anomalies and security incidents.
  • Conduct regular reviews of firewall configurations.
  • Review and document default configurations.
  • Disable unused ports, protocols, and services.
  • Change default passwords and usernames.
  • Apply security benchmarks for device hardening.
  • Regularly audit configurations for compliance.
  • Implement NAC solutions for device identification.
  • Establish policies for device compliance.
  • Enforce guest access controls and limits.
  • Monitor and manage devices post-connection.
  • Regularly review NAC effectiveness and policies.
  • Enable logging on all network devices.
  • Centralize logs for easier analysis.
  • Set up alerts for abnormal activities.
  • Regularly review and analyze logs.
  • Maintain logs according to compliance requirements.
  • Install locks and access control systems.
  • Implement surveillance cameras in sensitive areas.
  • Restrict access to authorized personnel only.
  • Conduct regular physical security audits.
  • Document and train staff on physical security protocols.
  • Implement MFA for all remote access.
  • Enforce MFA for accessing sensitive applications.
  • Regularly review MFA methods and effectiveness.
  • Educate staff on MFA importance.
  • Test MFA systems for reliability.
  • Schedule policy reviews at least annually.
  • Incorporate feedback from security assessments.
  • Ensure policies align with regulatory requirements.
  • Communicate updates to all staff members.
  • Document revisions and maintain an archive.
  • Conduct regular security awareness training sessions.
  • Include phishing simulations and hands-on exercises.
  • Provide resources for ongoing learning.
  • Encourage reporting of security incidents.
  • Evaluate training effectiveness through assessments.

Frequency

  • Track updates in documentation and implement changes quarterly.
  • Schedule architecture reviews to assess compliance annually.

2. Manage Access Control

  • Define roles based on job functions.
  • Assign data access permissions to each role.
  • Ensure least privilege principle is applied.
  • Regularly review role definitions for relevance.
  • Schedule periodic access reviews.
  • Compare current access against job responsibilities.
  • Revoke access for users with changed roles.
  • Document all changes made during reviews.
  • Identify inactive accounts based on usage metrics.
  • Implement a timeline for account inactivity.
  • Notify users prior to account deactivation.
  • Document all deactivated accounts for future reference.
  • Define roles based on job functions.
  • Assign data access permissions to each role.
  • Ensure least privilege principle is applied.
  • Regularly review role definitions for relevance.
  • Schedule periodic access reviews.
  • Compare current access against job responsibilities.
  • Revoke access for users with changed roles.
  • Document all changes made during reviews.
  • Identify inactive accounts based on usage metrics.
  • Implement a timeline for account inactivity.
  • Notify users prior to account deactivation.
  • Document all deactivated accounts for future reference.
  • Define password length and complexity rules.
  • Implement password expiration policies.
  • Use password management tools if necessary.
  • Educate users on creating strong passwords.
  • Select suitable MFA methods (e.g., SMS, authenticator apps).
  • Require MFA for all users accessing sensitive data.
  • Test MFA implementation for usability and security.
  • Review and update MFA methods regularly.
  • Set up logging mechanisms for data access.
  • Define monitoring thresholds for alerts.
  • Regularly review logs for suspicious activities.
  • Establish incident response procedures for breaches.
  • Define the scope of background checks.
  • Obtain consent from employees and contractors.
  • Use reliable third-party services for checks.
  • Review results and take appropriate action.
  • Develop a comprehensive training program.
  • Schedule regular training sessions.
  • Include scenarios related to access control.
  • Track and document training attendance.
  • Identify physical locations of sensitive systems.
  • Implement access control mechanisms (e.g., keycards).
  • Conduct regular audits of physical access logs.
  • Train personnel on physical security protocols.
  • Create a standardized access request form.
  • Define approval hierarchy for access requests.
  • Maintain records of all access requests.
  • Review the process periodically for improvements.
  • Schedule audits at defined intervals.
  • Use checklists to assess compliance.
  • Document findings and action plans.
  • Ensure follow-up on remediation efforts.

Frequency

3. Encrypt Transmission of Cardholder Data

  • Select AES-256 or stronger encryption algorithms.
  • Apply encryption to all cardholder data during transmission.
  • Ensure encryption keys are securely managed and rotated.
  • Document encryption methods used and ensure compliance.
  • Verify SSL/TLS certificates are issued by trusted authorities.
  • Set reminders for certificate expiration and renewal.
  • Check certificate validity and chain of trust regularly.
  • Implement automated tools for certificate management.
  • Configure web servers to enforce HTTPS connections.
  • Use FTPS/SFTP for file transfers involving cardholder data.
  • Disable any insecure protocols like HTTP or FTP.
  • Ensure all endpoints support secure protocols.
  • Review and restrict cipher suites to strong options only.
  • Disable outdated or weak ciphers in configurations.
  • Regularly audit cipher configurations for compliance.
  • Document approved cipher suites for reference.
  • Stay informed on the latest encryption standards.
  • Test encryption protocols against current security threats.
  • Update protocols as needed based on vulnerability assessments.
  • Maintain documentation of changes and rationale.
  • Schedule regular vulnerability assessments at least quarterly.
  • Engage third-party services for objective penetration testing.
  • Review and prioritize findings for remediation.
  • Document assessment results and remediation efforts.
  • Conduct security assessments on all endpoints.
  • Implement endpoint protection solutions and policies.
  • Regularly update software and security configurations.
  • Maintain an inventory of compliant and non-compliant devices.
  • Set up logging and monitoring for data transmission.
  • Utilize intrusion detection systems to identify anomalies.
  • Establish response protocols for unauthorized access attempts.
  • Review logs regularly to identify potential threats.
  • Develop training materials focused on secure transmission.
  • Schedule regular training sessions for all relevant staff.
  • Assess staff understanding through quizzes or feedback.
  • Update training content based on emerging threats.
  • Create and maintain a centralized inventory list.
  • Regularly review and update the inventory for accuracy.
  • Ensure all systems are categorized by risk level.
  • Document compliance status for each system.
  • Establish a formal process for exception requests.
  • Require justification and management approval for exceptions.
  • Document all exceptions and review periodically.
  • Communicate exception policies to all relevant staff.
  • Schedule regular audits of encryption systems.
  • Engage third-party assessors for impartial evaluations.
  • Document findings and remediation actions.
  • Continuously improve encryption practices based on audit results.

Frequency

4. Regularly Test Security Systems and Processes

  • Schedule testing with qualified professionals.
  • Define scope based on critical assets.
  • Document findings and remediation steps.
  • Retest vulnerabilities to ensure they are fixed.
  • Use automated tools for scans.
  • Review scan results for critical vulnerabilities.
  • Prioritize remediation based on risk.
  • Document and track remediation efforts.
  • Create a calendar for assessments.
  • Engage relevant teams for input.
  • Ensure coverage of all systems.
  • Report findings to stakeholders.
  • Set clear timelines for remediation.
  • Assign responsibilities for each vulnerability.
  • Monitor progress regularly.
  • Document remediation actions taken.
  • Develop realistic incident scenarios.
  • Conduct tabletop exercises with stakeholders.
  • Evaluate response time and effectiveness.
  • Update procedures based on findings.
  • Define log review frequency and criteria.
  • Use automated tools for analysis.
  • Investigate any suspicious activities promptly.
  • Maintain documentation of reviews.
  • Develop a checklist based on security standards.
  • Review configurations against the checklist.
  • Identify deviations and plan remediation.
  • Document compliance status.
  • Identify reputable security firms.
  • Define assessment scope and objectives.
  • Review and act on the findings.
  • Schedule follow-up assessments.
  • Create a patch management policy.
  • Test patches in a staging environment.
  • Apply patches based on risk assessment.
  • Document patching activities.
  • Evaluate tool performance against defined metrics.
  • Test alerting mechanisms with simulated incidents.
  • Adjust configurations based on test results.
  • Document findings and improvements.
  • Establish a schedule for code reviews.
  • Utilize automated tools for static analysis.
  • Conduct manual reviews for critical code areas.
  • Document vulnerabilities and remediation efforts.
  • Develop scenarios to test employee responses.
  • Conduct tests discreetly to avoid panic.
  • Evaluate results and identify training needs.
  • Provide feedback and training to employees.

Frequency

5. Maintain an Inventory of System Components

  • Identify all components involved in cardholder data handling.
  • Document details such as type, purpose, and security features.
  • Use a centralized system for inventory management.
  • Ensure all relevant personnel have access to the inventory.
  • Set a schedule for regular inventory reviews.
  • Assign responsibilities for updating the inventory.
  • Document any changes, including additions or removals.
  • Notify stakeholders of updates to maintain awareness.

Frequency

6. Implement Security Policies and Procedures

  • Identify key stakeholders for policy development.
  • Draft policies covering data protection, access control, and incident response.
  • Ensure policies are compliant with PCI DSS requirements.
  • Distribute policies to all relevant employees and third parties.
  • Schedule annual review dates in advance.
  • Gather input from stakeholders regarding needed updates.
  • Assess changes in technology and regulatory requirements.
  • Document all changes made and communicate updates clearly.
  • Identify key stakeholders for policy development.
  • Draft policies covering data protection, access control, and incident response.
  • Ensure policies are compliant with PCI DSS requirements.
  • Distribute policies to all relevant employees and third parties.
  • Schedule annual review dates in advance.
  • Gather input from stakeholders regarding needed updates.
  • Assess changes in technology and regulatory requirements.
  • Document all changes made and communicate updates clearly.
  • Distribute policies via email and internal portals.
  • Hold informational sessions to explain policies.
  • Verify receipt and understanding through acknowledgments.
  • Provide easy access to policies for reference.
  • Develop training materials that cover key security policies.
  • Schedule regular training sessions, both in-person and online.
  • Incorporate real-world scenarios to enhance understanding.
  • Evaluate training effectiveness through quizzes and feedback.
  • Create a security roles and responsibilities matrix.
  • Assign specific tasks to individuals or teams.
  • Ensure clarity in the incident response process.
  • Regularly review and update roles as needed.
  • Define metrics for compliance assessment.
  • Implement regular audits and assessments.
  • Document findings and track remediation efforts.
  • Report compliance status to management periodically.
  • Create an anonymous reporting channel for employees.
  • Establish clear guidelines for reporting violations.
  • Investigate reported violations promptly.
  • Communicate outcomes and corrective actions taken.
  • Review contracts to include compliance clauses.
  • Perform due diligence on third-party security practices.
  • Monitor third-party compliance through regular assessments.
  • Document compliance checks and findings.
  • Create a centralized repository for documentation.
  • Log all reviews, updates, and training sessions.
  • Ensure documentation is accessible for audits.
  • Conduct regular checks to verify documentation completeness.
  • Develop an incident response plan outlining steps to take.
  • Define roles and communication channels during incidents.
  • Test the incident response plan through drills.
  • Review and update the plan post-incident.
  • Establish a feedback mechanism for incident reports.
  • Regularly review audit findings for policy gaps.
  • Incorporate lessons learned into policy updates.
  • Document changes made as a result of feedback.
  • Specify retention periods for cardholder data.
  • Implement secure disposal methods for data.
  • Regularly audit compliance with retention and disposal policies.
  • Document retention and disposal processes clearly.
  • Schedule risk assessments at defined intervals.
  • Utilize established frameworks for conducting assessments.
  • Document identified vulnerabilities and mitigation plans.
  • Review and update assessment procedures regularly.
  • Define approval authority for policy changes.
  • Create a standard operating procedure for change requests.
  • Ensure all changes are documented and communicated.
  • Review changes for compliance before implementation.

Frequency

7. Monitor and Test Networks

  • Utilize automated tools for real-time monitoring.
  • Define thresholds for alerts based on normal traffic patterns.
  • Regularly review monitoring configurations for effectiveness.
  • Ensure coverage of all network segments and assets.
  • Deploy IDPS solutions that fit network architecture.
  • Configure IDPS to detect both known and unknown threats.
  • Regularly update IDPS signature databases.
  • Review IDPS logs and alerts for suspicious activities.
  • Schedule scans at least quarterly or after significant changes.
  • Use automated tools for comprehensive scanning.
  • Prioritize vulnerabilities based on risk and impact.
  • Document and track remediation efforts.
  • Centralize log collection from all critical systems.
  • Establish retention policies based on compliance requirements.
  • Regularly review logs for anomalies and trends.
  • Secure logs against tampering and unauthorized access.
  • Conduct tests at least annually or after major changes.
  • Engage third-party testers for unbiased results.
  • Document findings and create an action plan for remediation.
  • Retest after vulnerabilities are addressed.
  • Assign dedicated staff for daily alert review.
  • Categorize alerts based on severity and response requirements.
  • Implement response protocols for high-severity alerts.
  • Document responses for future reference and improvement.
  • Select a SIEM solution that integrates with existing tools.
  • Configure SIEM to collect relevant security data sources.
  • Regularly update SIEM rules and correlations.
  • Review SIEM dashboards for real-time insights.
  • Establish a review schedule (at least quarterly).
  • Document all changes to configurations.
  • Verify that rules align with the least privilege principle.
  • Test configurations to ensure effectiveness.
  • Implement monitoring tools that capture user actions.
  • Establish retention policies for user activity logs.
  • Regularly review user activity logs for anomalies.
  • Ensure logs are protected against unauthorized access.
  • Develop a comprehensive incident response plan.
  • Schedule regular drills and simulations.
  • Review and update plans based on drill outcomes.
  • Incorporate lessons learned into training and policies.
  • Create a training schedule (at least annually).
  • Cover topics such as phishing, social engineering, and compliance.
  • Use real-world examples to illustrate threats.
  • Evaluate training effectiveness through assessments.

Frequency

8. Ensure Third-Party Compliance

  • Review PCI DSS compliance documentation from each provider.
  • Check for valid Attestation of Compliance (AOC) certificates.
  • Conduct periodic compliance reviews to ensure ongoing adherence.
  • Maintain a list of compliant third-party service providers.
  • Identify potential risks associated with each third-party provider.
  • Update contracts to clearly define security responsibilities.
  • Review and revise risk assessments at least annually.
  • Engage legal counsel to ensure compliance with regulations.
  • Assess vendor's security policies and procedures.
  • Review third-party risk assessments and audits.
  • Check for any history of data breaches or security incidents.
  • Evaluate their compliance with relevant regulations.
  • Request AOC documentation from vendors annually.
  • Verify the validity of the AOC with the issuing organization.
  • Ensure AOC reflects the correct scope of services provided.
  • Store AOC documentation securely for future reference.
  • Define key compliance metrics for monitoring.
  • Schedule regular reviews of vendor compliance status.
  • Implement alerts for significant changes in vendor security posture.
  • Communicate findings with relevant stakeholders.
  • Create an incident response plan for third-party breaches.
  • Establish communication protocols for incident reporting.
  • Document all incidents and the response actions taken.
  • Review and update the incident response process regularly.
  • Specify audit requirements in vendor contracts.
  • Schedule audits at least annually or bi-annually.
  • Review audit findings and track remediation efforts.
  • Incorporate audit results into vendor performance evaluations.
  • Clearly define the audit rights in vendor agreements.
  • Specify the frequency and scope of audits.
  • Communicate expectations for cooperation during audits.
  • Ensure contractual penalties for non-compliance.
  • Implement a vendor management system for tracking.
  • Maintain a comprehensive vendor compliance database.
  • Regularly update vendor status and compliance records.
  • Assign ownership of vendor relationships to specific team members.
  • Define data protection requirements in contracts.
  • Specify timelines for breach notifications.
  • Conduct training sessions on data protection policies.
  • Monitor compliance with data protection obligations.
  • Create a centralized repository for compliance documentation.
  • Ensure records are easily accessible for audits.
  • Regularly review and update documentation practices.
  • Maintain records for the required retention period.
  • Develop a training curriculum tailored to vendor roles.
  • Schedule regular training sessions for vendors.
  • Evaluate training effectiveness through assessments.
  • Provide resources for ongoing education and updates.

Frequency

Note

  • Keep detailed records of compliance checks.
  • Document findings and actions taken.
  • Review documentation periodically for accuracy.
  • Ensure all records are easily accessible for audits.
  • Schedule training sessions at least quarterly.
  • Use engaging materials and real-world scenarios.
  • Evaluate staff understanding through assessments.
  • Update training content as PCI DSS evolves.
  • Set a regular review schedule (e.g., annually).
  • Involve key stakeholders in policy updates.
  • Document changes and communicate to all staff.
  • Ensure policies are easily accessible to employees.
  • Conduct risk assessments at least annually.
  • Use a standardized framework for assessments.
  • Prioritize vulnerabilities based on risk level.
  • Document findings and remediation actions taken.
  • Log all access attempts and changes in real-time.
  • Implement automated monitoring for anomalies.
  • Review logs regularly for suspicious activities.
  • Ensure logs are securely stored and protected.
  • Establish a review schedule (e.g., biannually).
  • Request compliance documentation from vendors.
  • Conduct assessments or audits of vendor practices.
  • Document findings and address any compliance gaps.
  • Define roles and responsibilities within the plan.
  • Establish communication protocols for incidents.
  • Test the plan through simulation exercises.
  • Regularly update the plan based on lessons learned.
  • Implement an update schedule for system components.
  • Monitor vendor announcements for critical patches.
  • Test patches in a controlled environment before deployment.
  • Document all updates and changes made.
  • Keep a detailed log of all incidents.
  • Conduct post-incident reviews to analyze causes.
  • Identify preventive measures from reviews.
  • Share findings with relevant stakeholders.
  • Identify key stakeholders to receive updates.
  • Schedule regular compliance status meetings.
  • Use clear and concise language in communications.
  • Document all communications related to compliance.
  • Conduct evaluations at least annually.
  • Use metrics to assess control effectiveness.
  • Incorporate industry benchmarks for comparison.
  • Document all findings and action plans for improvements.

Related Checklists