PCI Requirement 11.3.3 – Exploitable Vulnerabilities Found During Penetration Testing are Corrected
PCI Requirement 11.3 – Implement a Methodology for Penetration Testing
PCI Requirement 11.3.2 – Perform Internal Penetration Testing at Least Annually
PCI Requirement 11.2.3 – Perform Internal and External Scans and Rescans as Needed
PCI Requirement 11.3.4 – Perform Penetration Tests if Segmentation is Used
How to Comply with the New PCI 3.0 Penetration Testing Requirements - Webinar | Anitian
PCI Requirement 10.5.3 – Promptly Back Up Audit Trail Files to a Centralized Log Server
PCI Requirement 12.10.1 – Create the Incident Response Plan to Be Implemented
PCI Requirement 11.4 – Use Intrusion-Detection and/or Intrusion-Prevention Techniques
PCI Requirement 11.2 – Quarterly Internal & External Vulnerability Scans
PCI Requirement 11.2.2 – Perform Quarterly External Vulnerability Scans
PCI Requirement 11.1 – Implement Processes to Test for the Presence of Wireless Access Points
PCI Requirement 11.2.1 – Perform Quarterly Internal Vulnerability Scans
PCI Requirement 11.5 – Deploy a Change-Detection Mechanisms to Alert Personnel
PCI Requirement 8.2 – Ensure Proper User-Authentication Management by Something You Know
PCI Requirement 6.5.1 – Injection Flaws
PCI Requirement 6.5.9 – Cross-Site Request Forgery
PCI Requirement 6.5.6 – All “High Risk” Vulnerabilities
PCI Requirement 6.5.4 – Insecure Communications
PCI DSS 3.2: Req. 6.4.6