PCI Requirement 2.4 - Maintain an Inventory of In-Scope System Components
Introduction to PCI Requirement 2
PCI Requirement 2.1 - Always Change Vendor-Supplied Defaults
PCI Requirement 6 – Develop and Maintain Secure Systems and Applications
PCI Requirement 2.3 - Encryption
PCI Requirement 2.2 - Develop Configuration Standards for all System Components
PCI Requirement 12.4.1 – Executive Management Shall Establish Responsibility
PCI Requirement 4.1 – Use Strong Cryptography & Security Protocols to Safeguard Sensitive CHD
[PCI DSS Requirement 3 ] Summary of Changes from Version 3.2.1 to 4.0 Explained
PCI Requirement 12.6.2 – Require Personnel to Read and Understand Security Policies and Procedures
PCI Requirement 11.2.2 – Perform Quarterly External Vulnerability Scans
PCI Requirement 12.9 – Service Providers are Responsible for the Security of Cardholder Data
PCI Requirement 2.6 - Shared Hosting Providers Must Protect Each Entity’s Hosted Environment
PCI Requirement 2.5 - Ensure Security Policies Are Known to All Affected Parties
PCI Requirement 2.2.5 - Remove all Unnecessary Functionality
PCI Requirement 2.2.2 - Enable Only Necessary Services, Protocols and Daemons
PCI Requirement 9.7.1 – Properly Maintain Inventory Logs of All Media
PCI Requirement 12.10 – Implement an Incident Response Plan
PCI Requirement 2.1.1 - Change all Wireless Vendor Defaults
PCI Requirement 12.6.1 – Educate Personnel Upon Hire and at Least Annually