PCI Requirement 12.3 – Develop Usage Policies for Critical Technologies
PCI Requirement 12.3.6 – Acceptable Network Locations for the Technologies
PCI Requirement 12.3.2 – Authentication for Use of the Technology
PCI Requirement 12.3.4 – A Method to Accurately Determine Owner, Contact Information, and Purpose
PCI Requirement 12.3.1 – Explicit Approval by Authorized Parties
PCI v4.0 - 12.3.3: Document and Review Cryptographic Cipher Suites and Protocols in Use
PCI Requirement 12.3.10 – Prohibit the Moving of Cardholder Data onto Local Hard Drives
PCI Requirement 12.3.5 – Acceptable Uses of the Technology
PCI v4.0 - 12.3.2: Perform Targeted Risk Analyses for Customized Approach
PCI v4.0 - 12.3.1: Use Targeted Risk Analyses to Support Flexible Testing
PCI Requirement 12.3.8 – Automatic Disconnect of Sessions for Remote-Access Technologies
PCI Requirement 12.3.9 – Activation of Remote-Access Technologies for Vendors and Business Partners
PCI v4.0 - 12.3.4: Review Software and Hardware Technologies
[PCI DSS Requirement 12] : Summary of Changes from Version 3.2.1 to 4.0 Explained
PCI Requirement 12.5.3 – Establish Security Incident Response and Escalation Procedures
Policy to Prohibit Cardholder Data on Remote Technology
"Fundamentals of PCI-DSS" Course Preview: Requirement #12 (InfoSec Policy)
PCI Requirement 3.4.1 Logical Access Management
PCI Requirement 12: Maintain a Policy that Addresses Information Security for All Personnel
PCI-DSS Requirement 2