Mandatory maintenance checks that must be performed for PCI DSS 4.01 Requirements.

1. Security Policy and Procedures

  • Review existing policies regularly.
  • Compare with industry standards.
  • Update policies to address new threats.
  • Incorporate feedback from stakeholders.
  • Schedule annual policy review meetings.
  • Document changes in a version history.
  • Communicate changes to all employees.
  • Ensure documentation is accessible.
  • Schedule annual training sessions.
  • Use various formats (e.g., workshops, e-learning).
  • Track attendance and completion.
  • Update training materials as policies change.
  • Define roles for policy creation.
  • Set timelines for each review stage.
  • Document approval processes.
  • Ensure transparency in policy changes.
  • Use multiple communication channels.
  • Provide summaries for quick reference.
  • Encourage questions and discussions.
  • Monitor understanding through surveys.
  • Identify key personnel for policy oversight.
  • Assign roles and responsibilities clearly.
  • Establish regular check-ins for policy management.
  • Ensure accountability within the team.
  • Create a feedback form or portal.
  • Encourage open discussions on policies.
  • Review feedback regularly.
  • Incorporate actionable suggestions.
  • Host policies on a secure intranet.
  • Provide access to remote employees.
  • Ensure third-party vendors receive necessary policies.
  • Regularly check access permissions.
  • Schedule periodic audits of policies.
  • Use both internal and external auditors.
  • Document findings and recommendations.
  • Implement changes based on audit results.
  • Identify applicable laws and regulations.
  • Regularly update policies to reflect changes.
  • Consult legal experts during updates.
  • Train employees on compliance requirements.
  • Define consequences for non-compliance.
  • Create a reporting mechanism.
  • Document incidents and responses.
  • Review processes regularly for effectiveness.
  • Define clear incident response roles.
  • Outline escalation procedures in detail.
  • Conduct drills to test response effectiveness.
  • Update procedures based on drill outcomes.
  • Monitor threat intelligence sources.
  • Assess organizational changes regularly.
  • Update policies to mitigate new risks.
  • Communicate updates promptly to all.
  • Define criteria for exceptions.
  • Create a standardized exception request form.
  • Review and approve exceptions systematically.
  • Document all approved exceptions clearly.
  • Schedule regular alignment meetings.
  • Involve stakeholders from different departments.
  • Assess business objectives against current policies.
  • Update policies to support strategic goals.

2. Network Security

  • Gather current firewall configurations and rules.
  • Review documentation against existing network needs.
  • Consult with stakeholders for necessary updates.
  • Document any changes made during the review.
  • Set reminders for the next review cycle.
  • Identify all hardware and software components.
  • Access each device and application settings.
  • Change default passwords to strong, unique passwords.
  • Document all changes made.
  • Schedule regular audits to ensure compliance.
  • Select appropriate tools for vulnerability scanning.
  • Schedule scans and testing sessions quarterly.
  • Analyze results and prioritize identified vulnerabilities.
  • Develop remediation plans for critical findings.
  • Document findings and actions taken.
  • Review current encryption protocols in use.
  • Update configurations to use strong standards (e.g., TLS 1.2+).
  • Test configurations to ensure effectiveness.
  • Document encryption settings for all devices.
  • Monitor for updates in encryption standards.
  • Create a comprehensive list of all network devices.
  • Assign unique identifiers to each component.
  • Regularly update the inventory with new additions or removals.
  • Include details like IP addresses and configurations.
  • Review inventory for accuracy at least annually.
  • Define the boundaries of the CDE.
  • Implement firewalls or VLANs to separate the CDE.
  • Restrict access to the CDE based on roles.
  • Regularly assess segregation measures for effectiveness.
  • Document all segregation methods and policies.
  • Create initial network diagrams based on current architecture.
  • Update diagrams whenever changes occur in the network.
  • Ensure clarity and detail in diagrams for all components.
  • Store diagrams in a central, accessible location.
  • Review diagrams for accuracy at least annually.
  • Identify all running services on network devices.
  • Document services that are not required.
  • Disable unnecessary services to minimize vulnerabilities.
  • Regularly audit devices for enabled services.
  • Implement a change management process for service updates.
  • Assess current remote access methods in use.
  • Implement strong authentication protocols (e.g., MFA).
  • Educate users on secure remote access practices.
  • Regularly review access logs for compliance.
  • Document all authentication policies and methods.
  • Deploy network monitoring tools to capture traffic data.
  • Establish baselines for normal traffic patterns.
  • Set alerts for unusual activities or anomalies.
  • Review logs regularly for unauthorized access attempts.
  • Document findings and actions taken during analysis.
  • Identify all hardware and software requiring updates.
  • Establish a schedule for regular patch management.
  • Test patches in a controlled environment before deployment.
  • Document applied patches and their impact.
  • Review patch management effectiveness regularly.
  • Review logging capabilities of each network device.
  • Enable logging for all critical security events.
  • Regularly review logs for suspicious activity.
  • Store logs securely and ensure retention policies are met.
  • Document logging configurations and policies.
  • Develop training materials on secure practices and threats.
  • Schedule regular training sessions (e.g., semi-annually).
  • Incorporate real-world examples and case studies.
  • Collect feedback to improve future training.
  • Document attendance and topics covered.

3. Access Control

  • Identify all users with access to the system.
  • Evaluate user roles and their necessity for access.
  • Adjust access rights based on role requirements.
  • Document access changes for accountability.
  • Select appropriate multi-factor authentication methods.
  • Enforce MFA across all access points to CDE.
  • Regularly test and update authentication mechanisms.
  • Educate users on MFA usage and importance.
  • Establish a timeline for account review post-employment.
  • Disable accounts promptly after termination or role change.
  • Verify the removal of access for inactive users.
  • Maintain logs of account status changes.
  • Schedule audits on a regular basis.
  • Use automated tools for log analysis.
  • Investigate any anomalies or unauthorized attempts.
  • Report findings and take corrective actions.
  • Define roles and associated permissions clearly.
  • Assign users to roles based on job functions.
  • Regularly review role assignments for accuracy.
  • Document the RBAC structure and changes.
  • Set a schedule for policy reviews.
  • Gather input from stakeholders during reviews.
  • Update documentation to reflect current practices.
  • Communicate changes to all relevant personnel.
  • Implement VPN or secure tunneling for remote access.
  • Require MFA for all remote connections.
  • Monitor remote access logs for suspicious activity.
  • Regularly review remote access policies.
  • Define complexity requirements (e.g., length, characters).
  • Set guidelines for password expiration and reuse.
  • Enforce policies through technical controls.
  • Educate users on creating and managing secure passwords.
  • Implement a logging mechanism for account changes.
  • Ensure logs are stored securely and reviewed regularly.
  • Establish a retention period for audit logs.
  • Document procedures for handling account change requests.
  • Schedule regular training sessions for all employees.
  • Cover topics such as phishing, password management, and MFA.
  • Assess training effectiveness through quizzes or surveys.
  • Keep training materials up to date.
  • Identify all default accounts in use.
  • Disable or rename default accounts immediately.
  • Review permissions assigned to modified accounts.
  • Document changes for compliance purposes.
  • Implement logging for all access events.
  • Set up alerts for unusual access patterns.
  • Regularly review logs and investigate anomalies.
  • Document findings and actions taken.
  • Create a schedule for third-party access reviews.
  • Evaluate the necessity of each third-party access.
  • Document findings and any changes made.
  • Communicate results to relevant stakeholders.

4. Data Protection

  • Use strong encryption methods such as AES-256.
  • Utilize secure protocols like TLS for data in transit.
  • Regularly audit encryption mechanisms.
  • Ensure encryption keys are not hard-coded in applications.
  • Test decryption processes for reliability.
  • Implement a key management policy.
  • Use hardware security modules (HSM) for key storage.
  • Conduct annual key rotation and document the process.
  • Limit access to key management systems.
  • Log all key management activities.
  • Schedule reviews at least annually.
  • Document retention periods for all data types.
  • Ensure secure disposal methods are defined.
  • Audit compliance with the disposal policy.
  • Update policies based on regulatory changes.

5. Logging and Monitoring

  • Identify all systems processing cardholder data.
  • Enable logging features on these systems.
  • Verify logging configurations to ensure they capture relevant events.
  • Test logging functionality to confirm data is recorded.
  • Schedule daily log review tasks.
  • Use automated tools to assist in log analysis.
  • Look for anomalies such as repeated failed logins.
  • Document findings and escalate suspicious activity.
  • Establish a log retention schedule.
  • Ensure logs are archived securely after three months.
  • Verify accessibility of recent logs for quick review.
  • Regularly check storage capacity for log files.
  • Select appropriate logging aggregation tools.
  • Configure tools to collect logs from all relevant systems.
  • Test the aggregation process for accuracy.
  • Ensure centralized logs are protected and accessible.
  • Define criteria for what constitutes an anomaly.
  • Create a response plan for identified anomalies.
  • Train staff on incident response procedures.
  • Document and review responses to improve processes.
  • Review logging configurations to ensure required fields are included.
  • Test logs to verify they capture all necessary details.
  • Regularly audit logs for completeness.
  • Update logging practices as needed.
  • Schedule periodic reviews of logging configurations.
  • Compare current configurations against PCI DSS requirements.
  • Document any changes made to configurations.
  • Communicate updates to relevant stakeholders.
  • Establish an audit schedule for log data.
  • Randomly sample logs to verify the integrity of data.
  • Document findings and any discrepancies noted.
  • Address and rectify identified issues promptly.
  • Identify key personnel responsible for log management.
  • Document roles and responsibilities clearly.
  • Ensure all team members are aware of their duties.
  • Review and update roles as organizational needs change.
  • Implement access controls for log storage.
  • Use encryption for stored log files.
  • Monitor access logs for unauthorized attempts.
  • Regularly review and update security measures.
  • Consult compliance requirements for log retention.
  • Define business needs that impact log retention.
  • Document and communicate the retention policy.
  • Regularly review the policy for relevance.
  • Develop training materials focused on logging importance.
  • Schedule regular training sessions for staff.
  • Include practical exercises for incident recognition.
  • Evaluate training effectiveness and make improvements.
  • Create a testing schedule for logging systems.
  • Simulate various events to test capture accuracy.
  • Document results of tests and any issues found.
  • Implement fixes for any identified deficiencies.
  • Define criteria for critical incidents.
  • Configure alert settings in logging tools.
  • Test alert functionality to ensure timely notifications.
  • Establish a communication protocol for alerts.
  • Create a comprehensive documentation template.
  • Detail each step of the logging process.
  • Ensure documentation is accessible to relevant personnel.
  • Review and update documentation regularly.

6. Incident Response

  • Assign a team responsible for the plan.
  • Update the plan with new threats and technologies.
  • Schedule annual reviews and document updates.
  • Distribute the updated plan to relevant personnel.
  • Develop training materials that reflect current threats.
  • Schedule training sessions and simulations annually.
  • Evaluate participant performance and gather feedback.
  • Update training content based on lessons learned.
  • Create a standardized incident report template.
  • Assign responsibility for documentation to team members.
  • Ensure all incidents are logged promptly.
  • Maintain a secure repository for documented incidents.
  • Identify key stakeholders and affected parties.
  • Develop templates for communication during incidents.
  • Set up a notification system for stakeholders.
  • Review and update the communication plan regularly.
  • Create a detailed role description for each team member.
  • Document responsibilities and authority levels.
  • Distribute the role definitions to all team members.
  • Review roles and responsibilities periodically.
  • Develop criteria for assessing incident severity.
  • Train team members on triage procedures.
  • Establish a response priority system based on severity.
  • Document triage decisions for future reference.
  • Schedule reviews soon after incident resolution.
  • Gather input from all involved team members.
  • Document findings and lessons learned.
  • Create action items for future improvements.
  • Develop a comprehensive asset inventory list.
  • Regularly update the inventory to reflect changes.
  • Categorize assets by criticality and location.
  • Ensure easy access to the inventory for response teams.
  • Review tool configurations regularly.
  • Schedule updates for software and hardware.
  • Test tools to ensure they function correctly.
  • Document all updates and configurations.
  • Identify external reporting requirements and agencies.
  • Create a reporting protocol for team members.
  • Train staff on when and how to report externally.
  • Document all external communications related to incidents.
  • Subscribe to relevant threat intelligence feeds.
  • Regularly analyze threat data for actionable insights.
  • Incorporate findings into the incident response plan.
  • Train staff on how to utilize threat intelligence.
  • Schedule regular reviews of the incident response plan.
  • Incorporate feedback from post-incident reviews.
  • Adjust strategies based on evolving threat landscapes.
  • Communicate updates to all relevant personnel.
  • Develop a clear reporting procedure for employees.
  • Conduct training sessions on reporting protocols.
  • Provide easy access to reporting channels.
  • Regularly remind staff of the importance of reporting.
  • Design realistic scenarios involving various departments.
  • Schedule periodic tabletop exercises.
  • Document outcomes and areas for improvement.
  • Incorporate feedback into the incident response plan.
  • Define KPIs relevant to incident response.
  • Regularly collect data on incident response performance.
  • Analyze results to identify trends and areas for improvement.
  • Report metrics to management for review.

7. Third-Party Management

  • Collect all service provider agreements.
  • Verify compliance with PCI DSS requirements.
  • Document any gaps or issues.
  • Communicate necessary changes to providers.
  • Retain documentation for audit purposes.
  • Identify all third-party providers.
  • Develop a risk assessment framework.
  • Evaluate potential risks associated with each provider.
  • Document findings and remediation actions.
  • Review assessments annually and update as necessary.
  • Request copies of security policies from providers.
  • Review policies for adequacy and compliance.
  • Verify policies are implemented and followed.
  • Document the review process and findings.
  • Reassess policies annually or as needed.
  • Create a due diligence checklist.
  • Schedule regular reviews of provider security practices.
  • Document findings and follow up on issues.
  • Use industry benchmarks for evaluation.
  • Adjust due diligence processes as necessary.
  • Specify assessment requirements in contracts.
  • Track assessment schedules for each provider.
  • Review assessment reports thoroughly.
  • Document findings and address vulnerabilities.
  • Ensure timely follow-up on recommended actions.
  • Review existing contracts for incident response clauses.
  • Amend contracts to include necessary clauses.
  • Ensure clarity on reporting timelines and responsibilities.
  • Document all contract revisions.
  • Communicate requirements to all providers.
  • Create a centralized inventory list.
  • Include contact information and service details.
  • Update inventory regularly, particularly after changes.
  • Ensure access to the inventory is restricted.
  • Review the inventory for completeness annually.
  • Set up alerts for vendor updates.
  • Regularly review vendor communications and reports.
  • Document any changes in security practices.
  • Assess impact on compliance and risk.
  • Adjust monitoring processes as needed.
  • Define a clear termination process.
  • Document steps for data access removal.
  • Ensure secure data destruction methods are specified.
  • Communicate termination procedures to all stakeholders.
  • Review and update termination procedures regularly.
  • Identify applicable security standards for each provider.
  • Request compliance documentation from providers.
  • Review and assess compliance against standards.
  • Document compliance status and any gaps.
  • Follow up on remediation for any identified issues.
  • Request access control policies from providers.
  • Evaluate the effectiveness of access controls.
  • Verify role-based access is implemented.
  • Document access control assessments.
  • Require updates as necessary based on findings.
  • Schedule regular review meetings.
  • Assess current policies against new threats.
  • Incorporate feedback from audits and assessments.
  • Document any changes made to policies.
  • Communicate updates to all relevant parties.

8. Security Awareness

  • Design a comprehensive program covering security policies.
  • Schedule training sessions at least once a year.
  • Use engaging formats like workshops and e-learning.
  • Track participation and completion rates.
  • Highlight the significance of cardholder data protection.
  • Provide examples of potential threats and their impacts.
  • Utilize real-world case studies to emphasize risks.
  • Distribute materials that outline best practices.
  • Design phishing simulation emails and scenarios.
  • Schedule tests quarterly to maintain vigilance.
  • Provide immediate feedback to participants.
  • Analyze results to identify areas for improvement.
  • Create visually appealing and informative content.
  • Distribute materials through various channels regularly.
  • Update content based on current threats.
  • Encourage sharing of materials among employees.
  • Include security training in the onboarding schedule.
  • Provide an overview of company security policies.
  • Introduce key contacts for security-related queries.
  • Assess understanding through quizzes or discussions.
  • Define clear reporting channels and procedures.
  • Communicate reporting process during training.
  • Encourage prompt reporting without fear of repercussions.
  • Follow up on reports to ensure accountability.
  • Identify roles requiring additional security training.
  • Provide tailored training focusing on specific risks.
  • Incorporate role-specific scenarios and case studies.
  • Evaluate training effectiveness through assessments.
  • Plan sessions based on evolving security trends.
  • Incorporate interactive elements like discussions or Q&A.
  • Encourage participation through incentives.
  • Track attendance and feedback for future improvements.
  • Create surveys to gauge employee knowledge and engagement.
  • Conduct feedback sessions after training sessions.
  • Analyze feedback to identify strengths and weaknesses.
  • Adjust program content based on evaluation results.
  • Establish a recognition program for security champions.
  • Publicly acknowledge employees' contributions to security.
  • Offer incentives such as gift cards or bonuses.
  • Share success stories to motivate others.
  • Host policies on an intranet or shared drive.
  • Regularly review and update policies as needed.
  • Notify employees of changes to policies promptly.
  • Encourage employees to familiarize themselves with the policies.
  • Curate a list of reputable security resources.
  • Organize webinars with industry experts.
  • Share articles and reports regularly via email.
  • Encourage participation in external security events.
  • Track incidents and categorize them by type.
  • Identify common patterns and areas lacking awareness.
  • Revise training content to address these gaps.
  • Share lessons learned with employees to prevent recurrence.

Related Checklists