PCI Requirement 2.2.2 - Enable Only Necessary Services, Protocols and Daemons
PCI Requirement 2.2 - Develop Configuration Standards for all System Components
PCI Requirement 2.2.5 - Remove all Unnecessary Functionality
PCI DSS Requirement 1.2.2 Secure and Synchronize Router Configuration Files
PCI Requirement 2.2.4 - Configure System Security Parameters to Prevent Misuse
PCI Requirement 2.2.3 - Implement Additional Security Features
PCI Requirement 2.1 - Always Change Vendor-Supplied Defaults
PCI Requirement 2.2.1 - Implement Only One Primary Function Per Server
PCI Requirement 2.3 - Encryption
PCI Requirement 7.1 – Limit Access to System Components and Cardholder Data
PCI Requirement 2.1.1 - Change all Wireless Vendor Defaults
PCI Requirement 6.1 – Establish a Process to Identify Security Vulnerabilities
PCI DSS Requirement 1.3.2 Limit Inbound Internet Traffic
PCI Requirement 2.5 - Ensure Security Policies Are Known to All Affected Parties
PCI Requirement 10.2.4 – Invalid Logical Access Attempts
PCI Requirement 8.2.5 – New Passwords Can’t Be the Same as Any of the Last Four Passwords Used
Achieving PCI Compliance in a Microservices World
PCI DSS Requirement 1.3.6 Segregate the CDE from the DMZ
PCI DSS Requirement 1.3.1 - Establishing a DMZ
Webinar | PCI DSS - 5 Simple Techniques to reduce scope