The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers. It also applies to other entities that accept, store, or transmit payment card information, cardholder data, or sensitive authentication data (SAD).
ManageEngine DataSecurity Plus — our PCI compliance software — helps address the requirements of PCI DSS by:
And doing much more.
What the PCI requirements are | What you should do | How DataSecurity Plus helps you |
---|---|---|
Requirement 2.2.4Only necessary services, protocols, daemons, and functions are enabled, and all unnecessary functions are removed or disabled. |
Identify all system functions, such as scripts, file systems, and unnecessary web servers, and remove the ones that are not in use. |
Analysis of unused filesReceive reports on files, scripts, and batch files that have not been accessed or modified for extended periods of time. |
Requirement 3.2.1Account data storage is kept to a minimum through the implementation of data retention and disposal policies as follows:
|
Periodically scan for regulated data in your CDE. Set up data retention policies and delete collected data when it is no longer needed. Locate and remove cardholder data that is stored beyond its permissible lifetime. |
PCI and cardholder data discoveryUse built-in data discovery rules to locate PCI and cardholder data stored by your organization. Create an inventory of what data is stored, where, by whom, and for how long.
|
Requirement 3.3SAD is not stored after authorization. Note: This requirement does not apply to issuers and companies that support issuing services and have a business justification to store SAD. Note: SAD includes cardholder names, primary account numbers (PANs), card verification codes, personal identification numbers (PINs), and track data. |
Examine data sources and verify that SAD is not stored after authorization. |
PCI data discoveryImplement effective data discovery with a combination of keyword-matching and pattern-matching. Together, these will help you locate card verification values, PINs, PANs, and other authentication data.
|
Requirement 3.4.2Prevent the copying and/or relocation of PANs for all personnel, except for those with authorization. |
Prohibit users from storing or copying files containing cardholder data onto their local personal computers or other media. |
Clipboard controlEnable granular control by auditing and blocking copy actions triggered on local devices and in the organizational network.
|
Requirement 3.5.1PANs are rendered unreadable anywhere they are stored, and cleartext PANs are removed. |
Identify and remove cleartext PANs stored on your storage media. |
Management of files containing sensitive dataMove or delete files containing sensitive data as a risk mitigation action. |
Requirement 3.6.1Access to cryptographic keys is restricted to the smallest number of custodians necessary. |
Examine the permissions associated with sensitive files and ensure that access is restricted to the smallest number of users. |
NTFS and share permission reportingReceive detailed reports on the NTFS and share permissions of files and folders to know which users have what permissions to them. |
Requirement 6.5.2Upon completion of a significant change, all applicable PCI DSS requirements are confirmed to be in place on all new or changed systems and networks, and the documentation is updated as applicable. |
Protect your systems with file integrity monitoring (FIM) software to examine critical files for changes made to their content and metadata. |
File change monitoringTrack accidental, inappropriate, and unauthorized changes by monitoring all file activities, including permission changes as well as file creations, modifications, and deletions. |
Requirement 7.2.1An access control model is defined and granted as follows:
Note: System components include network devices, servers, computing devices, and applications. |
Verify that the privileges assigned to privileged and non-privileged users are:
|
Effective permission analysisEnsure the confidentiality of cardholder data by analyzing and reporting on effective permissions. Verify that each user does not have more privileges than required for their role.
|
Requirement 7.2.4All user accounts and related access privileges, including third-party/vendor accounts, are reviewed as follows:
|
Review privileged user accounts periodically to make sure that the implemented access control measures are appropriate. |
Scheduled reportingSet up automatic, periodic reports on privileged users and inactive users.These reports can be emailed on a set schedule to multiple stakeholders. Security permission analysisTrack permission changes, list effective permissions, identify files that can be accessed by every employee, find users with Full Control privileges, and do even more to ensure that the principle of least privilege is followed. |
Requirement 7.2.5All application and system accounts and related access privileges are assigned and managed as follows:
|
Make sure access rights to application and system accounts are limited to what is required. |
NTFS permission reportingList users who have access to files containing cardholder data and include details on which actions each user can perform on them. |
Requirement 8.2.5Access for terminated users is immediately revoked. |
Ensure that users who are terminated from your organization are removed from file access lists. |
File ownership analysisIdentify orphaned files and files owned by stale, disabled, or inactive users to prevent malicious file change attempts by terminated employees. |
Requirement 10.2.1Audit logs are enabled for all system components and cardholder data to link all access attempts to individual users. Capture all successful and failed access attempts by all users, including ones with root or administrative privileges. |
Collect detailed logs on user activity in your CDE. Track changes made by users with administrative privileges. |
Detailed audit trailsTrack critical file access attempts, web app usage, USB usage, printer usage, and more with a centralized access audit log. Privileged user monitoringList users with privileged access to sensitive files and customize reports to monitor all the file changes they make. |
Requirement 10.2.2Record the following details for each auditable event:
|
Generate audit logs that provide the ability to trace suspicious activity back to a specific user. Audit user activity in your CDE in real time. |
Root cause analysisLeverage granular report filtering options to expedite root cause analysis and identify the extent of a breach.
|
Requirement 10.3Audit logs are protected from destruction and unauthorized modifications. Use FIM or change detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert). |
Implement FIM or change detection software to check for changes to critical files and send notifications when such changes are noted. |
PCI FIMAudit every successful and failed file access attempt in real time. Maintain a detailed audit trail for analysis.
|
Requirement 10.4Audit logs are reviewed to identify anomalies or suspicious activity. |
Use automated mechanisms to review logs periodically in order to identify potential issues and reduce the time it takes to detect a potential breach. |
Scheduled delivery of PCI compliance reportsDeliver scheduled reports to stakeholders' mailboxes in PDF, HTML, CSV, or XLSX format. |
Requirement 10.5Retain audit log history for at least 12 months, with at least the most recent three months immediately available for analysis(for example, online, archived, or restorable from a backup). |
Retain logs for at least a year so that investigators have a sufficient log history to determine the length of a potential breach and its impact. |
Long-term audit log retentionRetain audit data for long periods. You can also archive older logs and reload them at a later date to analyze file access attempts. |
Requirement 11.5.2A change-detection mechanism (for example, a FIM tool) is deployed as follows:
|
Monitor changes in system executables, application executables, configuration and parameter files, and more.Trigger alerts in the event of unexpected changes. |
FIMAudit changes made to application- and OS-critical binaries, configuration files, application files, log files, and more.
|
Requirement A3.2.5.1A data discovery methodology is implemented and confirmed as follows:
|
Periodically report on the locations of cardholder data in your file storage environment. Identify sensitive data residing outside your defined CDE. |
Multi-platform visibilityDetect sensitive cardholder and PCI data across Windows file servers, failover clusters, and Microsoft SQL Server databases. Schedule-based PCI data discoveryDiscover PCI data periodically and incrementally. |
Requirement A3.2.5.2Response procedures are implemented to be initiated upon the detection of cleartext PANs outside the CDE to include:
|
Perform remedial actions when sensitive data is discovered outside the CDE. |
Automated remediationAutomatically delete, move, or otherwise manage sensitive data when it is found outside the CDE. Ownership and access analysisFind out who owns the sensitive data and trace all user actions in the time frame under analysis. This will help you determine how the data ended up outside the CDE. |
Requirement A3.2.6Mechanisms are implemented to detect clear text PANs leaving the CDE and prevent them from doing so via an unauthorized channel, method, or process, including the generation of audit logs and alerts upon the detection of cleartext PANs leaving the CDE. Response procedures are implemented to be initiated upon the detection of attempts to remove cleartext PANs from the CDE via an unauthorized channel, method, or process. |
Implement data loss prevention solutions to detect and prevent leaks via emails, removable media, and printers. |
A unified data leak prevention platformClassify sensitive files and prevent their leakage via external storage devices, Outlook, and printers. Peripheral device usage controlRestrict the use of USB devices, wireless access points, and CD and DVD drives using central device control policies to protect against data exfiltration. |
Requirement A3.5.1A methodology is implemented for the prompt identification of attack patterns and undesirable behavior across systems—for example, using centrally managed or automated logcorrelation tools—to include at least the following:
|
Set up a solution that can identify undesirable events—such as critical file changes and intrusions—and notify administrators instantly. |
Anomaly detectionIdentify user activity anomalies such as file access attempts after business hoursor an excessive number of failed access attempts. Rapid alertsConfigure alerts for unwarranted changes in critical files, the discovery of sensitive data outside the CDE, and more. Threat detection and responseDetect ransomware intrusions and execute scripts for quarantining infected machines and preventing the spread of malware. |
Disclaimer:Fully complying with the PCI DSS v4.0 requires a variety of solutions, processes, people, and technologies. This page is provided for informational purposes only and should not be considered as legal advice for PCI DSS compliance. ManageEngine makes no warranties, express, implied, or statutory, about the information in this material.
DataSecurity Plus helps meet the requirements of numerous compliance regulations by
protecting data at rest, in use, and in motion.