Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    Five Steps to PCI DSS Compliance

    By
    Darryl K. Taft
    -
    November 20, 2014
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Five Steps to PCI DSS Compliance

      1 - Five Steps to PCI DSS Compliance

      by Darryl K. Taft

      2Overcome the Culture of Undocumented Changes

      2 - Overcome the Culture of Undocumented Changes

      Tracking changes is a tedious process, but it’s essential for avoiding a data breach that could ruin the financial quarter for an organization. Documentation is important because an organization can’t protect what it doesn’t know is there. Without complete and up-to-date documentation, an organization has no way of knowing where cardholder data sits within the depths of its infrastructure and thus what layers of protection are needed where.

      3Shrink the Cardholder Data Environment

      3 - Shrink the Cardholder Data Environment

      Most organizations have no clear idea how far their cardholder data environment extends, which is important because any device not touching cardholder data does not have to meet the long list of PCI DSS requirements. Thoroughly knowing your cardholder data environment can save an organization time and money.

      4Make Network Segmentation Rock-Solid

      4 - Make Network Segmentation Rock-Solid

      If any cardholder data can leak from the “safe” environment or another segment can touch that data, your organization is out of compliance and at risk of a breach. Remember that firewalls are required on every port from the external Internet to the internal environment, so no traffic is unchecked. ACLs must also be secured, so no traffic goes through a nonsecured protocol, and unneeded services must be turned off so they can’t be used by attackers.

      5Know What to Ask a Cloud Service Provider

      5 - Know What to Ask a Cloud Service Provider

      Not all “compliant” cloud providers are created equal—make sure to ask the right questions, including “How do you segment your network to segregate traffic from different customers?” and “What security certifications do you have and what audits have your cloud platforms undergone?”

      6Assure the Needed Skills Are In-House

      6 - Assure the Needed Skills Are In-House

      Those involved with creating or supporting PCI-compliant systems should have basic training in performing daily tasks with a “PCI-centric” mindset. Ask new hire candidates how they would go about configuring firewalls to meet the PCI network administration requirements. To ensure the effectiveness of your compliance program, only hire those candidates who can provide you with a solid answer.

      PrevNext

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×