Documentation, Compliance, and Management
Buch, Englisch, 253 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
ISBN: 978-1-4842-9287-7
Verlag: Apress
Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.
PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.
What You’ll Learn
- Know what it takes to be PCI compliant
- Understand and implement what is in the PCI DSS
- Get rid of cardholder data
- Everything you need to know about segmenting your cardholder data network
- Know what documentation is needed for your PCI compliance efforts
- Leverage real-world experience to assist PCI compliance work
Who This Book Is For
Compliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts.Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1. A Brief History of PCI.- Chapter 2. Install and Maintain Network Controls.- Chapter 3. Apply Secure Configurations to all System Components- Chapter 4. Protect Stored Account Data.- Chapter 5. Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks.- Chapter 6. Protect All Systems and Networks from Malicious Software.- Chapter 7. Develop and Maintain Secure Systems and Software.- Chapter 8. Restrict Access to System Components and Cardholder Data by Business Need to Know.- Chapter 9. Identify Users and Authenticate Access to System Components.- Chapter 10. Restrict Physical Access to Cardholder Data.- Chapter 11. Log and Monitor All Access to System Components and Cardholder Data.- Chapter 12. Test Security of Systems and Networks Regularly.- Chapter 13. Support Information Security with Organizational Policies and Programs.- Chapter 14. How To Read a Service Provider Attestation of Compliance.- Chapter 15. Segmentation and tokenization.- Chapter 16. The Customized Approach, Compensating Controls, and the Targeted Risk Analysis.