PCI Requirement 2.2 - Develop Configuration Standards for all System Components
PCI v4.0 - 2.2.6: System Security Parameters Are Configured to Prevent Misuse
PCI v4.0 - 2.2.3: Primary Functions Requiring Different Security Levels Are Managed
PCI Requirement 2.2.2 - Enable Only Necessary Services, Protocols and Daemons
PCI Requirement 2.2.4 - Configure System Security Parameters to Prevent Misuse
PCI Requirement 2.2.5 - Remove all Unnecessary Functionality
PCI v4.0 - 2.2.1: Configuration Standards Are Developed, Implemented, and Maintained
PCI DSS Requirement 2: Apply Secure Configurations to All System Components | Best Practices & Steps
PCI Requirement 2.2.3 - Implement Additional Security Features
PCI Requirement 2.1 - Always Change Vendor-Supplied Defaults
PCI v4.0 - 2.2.5: Insecure Daemons, Protocols, and Services Have Additional Security Features
PCI v4.0 - 2.2.2: Vendor Default Accounts Are Managed Properly
Requirement 2.2.3 PCI DSS 3.2.1: Implement additional security features
PCI DSS Requirement 1.2.2 Secure and Synchronize Router Configuration Files
PCI Requirement 6 – Develop and Maintain Secure Systems and Applications
Introduction to PCI Requirement 2
PCI Requirement 2.2.1 - Implement Only One Primary Function Per Server
PCI-DSS Requirement 2
PCI Requirement 5.2 – Ensure Anti-Virus Mechanisms are Current, Perform Scans, & Generate Audit Logs
PCI Requirements 3.2.1, 3.2.2 & 3.2.3 Do Not Store Tracks, Codes or PINs After Authorization