PCI Requirement 11.5.1 – Implement a Process to Respond to Change-Detection Solution Alerts
PCI v4.0 - 11.5.1: Implement Intrusion Detection and/or Prevention Techniques
PCI Requirement 11.4 – Use Intrusion-Detection and/or Intrusion-Prevention Techniques
PCI Requirement 11.1 – Implement Processes to Test for the Presence of Wireless Access Points
PCI Requirement 11.2.3 – Perform Internal and External Scans and Rescans as Needed
PCI Requirement 11.2.1 – Perform Quarterly Internal Vulnerability Scans
PCI Requirement 11.3 – Implement a Methodology for Penetration Testing
PCI DSS Requirement 1.1.1 - Implementing a Change Control Program
PCI Requirement 11.3.4.1 – Confirm PCI DSS Scope by Performing Penetration Testing on Segmentation
PCI Requirement 11.2 – Quarterly Internal & External Vulnerability Scans
PCI Requirement 11.2.2 – Perform Quarterly External Vulnerability Scans
PCI Requirement 10.7 – Retain Audit Trail History for at Least One Year, with Three Months Available
PCI Requirement 12.3.8 – Automatic Disconnect of Sessions for Remote-Access Technologies
PCI Requirement 12.10.4 – Provide Training to Staff with Security Breach Responsibilities
PCI Requirement 11.3.3 – Exploitable Vulnerabilities Found During Penetration Testing are Corrected
PCI Requirement 10.5.2 – Protect Audit Trail Files from Unauthorized Modifications
PCI Requirement 7.1.3 - Assign access based on individual personnel’s job classification & function
PCI Requirement 8.1.7 – Set Lockout Duration to a Minimum of 30 Minutes
PCI Requirement 12.10.3 – Designate Specific Personnel to Be Available on a 24/7 Basis
PCI Requirement 8.2 – Ensure Proper User-Authentication Management by Something You Know
PCI Requirement 8.2.5 – New Passwords Can’t Be the Same as Any of the Last Four Passwords Used
PCI PTS 6 0 evaluation
PCI Requirement 9.10 – Ensure Policies for Restricting Physical Access to Cardholder Data are Known
Implement Solutions
11.3. Dynamic Scalability Architecture