PCI Requirement 12.2 – Implement a Risk Assessment Process
PCI v4.0 - 12.2.1: Acceptable Use Policies Are Documented and Implemented
PCI Requirement 12.3.2 – Authentication for Use of the Technology
PCI Requirement 12.6.2 – Require Personnel to Read and Understand Security Policies and Procedures
PCI Requirement 12: Maintain a Policy that Addresses Information Security for All Personnel
PCI Requirement 12.8.4 and 12.8.5 – Monitor Service Providers’ PCI DSS Compliance Status
PCI Requirement 12.5.2 – Monitor and Analyze Security Alerts and Distribute to Appropriate Personnel
PCI Requirement 9.6 – Maintain Control Over the Internal/External Distribution of Any Kind of Media
PCI Requirement 11.4 – Use Intrusion-Detection and/or Intrusion-Prevention Techniques
Introduction to PCI Requirement 2
PCI Requirement 12.4 – Ensure Security Policies & Procedures Define Responsibilities for All
PCI Requirement 12.5 – Assign Information Security Management Responsibilities to a Team
PCI Requirement 12.5.3 – Establish Security Incident Response and Escalation Procedures
PCI Requirement 10.2.6 – Initialization, Stopping, or Pausing of the Audit Logs
PCI Requirement 9.1.2 – Implement Physical Controls to Restrict Access to Accessible Network Jacks
PCI Requirement 12.9 – Service Providers are Responsible for the Security of Cardholder Data
PCI DSS and Risk Assessment
PCI Readiness Series: Requirement 11
Why the PCI DSS 12 Requirements are Critical
PCI Requirement 10.2.3 – Access to All Audit Trails