E-Book, Englisch, 253 Seiten, eBook
Documentation, Compliance, and Management
E-Book, Englisch, 253 Seiten, eBook
ISBN: 978-1-4842-9288-4
Verlag: APRESS
Format: PDF
Kopierschutz: 1 - PDF Watermark
Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.
PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.What You’ll LearnKnow what it takes to be PCI compliantUnderstand and implement what is in the PCI DSSGet rid of cardholder dataEverything you need to know about segmenting your cardholder data networkKnow what documentation is needed for your PCI compliance effortsLeverage real-world experience to assist PCI compliance workWho This Book Is For
Compliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. A Brief History of PCI.- Chapter 2. Install and Maintain Network Controls.- Chapter 3. Apply Secure Configurations to all System Components- Chapter 4. Protect Stored Account Data.- Chapter 5. Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks.- Chapter 6. Protect All Systems and Networks from Malicious Software.- Chapter 7. Develop and Maintain Secure Systems and Software.- Chapter 8. Restrict Access to System Components and Cardholder Data by Business Need to Know.- Chapter 9. Identify Users and Authenticate Access to System Components.- Chapter 10. Restrict Physical Access to Cardholder Data.- Chapter 11. Log and Monitor All Access to System Components and Cardholder Data.- Chapter 12. Test Security of Systems and Networks Regularly.- Chapter 13. Support Information Security with Organizational Policies and Programs.- Chapter 14. How To Read a Service Provider Attestation of Compliance.- Chapter 15. Segmentation and tokenization.- Chapter 16. The Customized Approach, Compensating Controls, and the Targeted Risk Analysis.