Checks We Perform

Below is a list of all the checks we perform. Select one to view more information.
Configuration Management
Now Included!
1.0 Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).

Description:

Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).
Data Security
Now Included!
1.1 Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.

Description:

Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.
Vulnerability Management
Now Included!
1.2 Learn how to defend against malicious attacks by designing controls based on industry standards.

Description:

Learn how to defend against malicious attacks by designing controls based on industry standards.
Logical Access
Now Included!
1.3 Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).

Description:

Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).
Network Monitoring
Now Included!
1.4 Learn how to log and monitor access to system components and the Cardholder Data (CHD).

Description:

Learn how to log and monitor access to system components and the Cardholder Data (CHD).
Penetration Testing
Now Included!
1.5 Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).

Description:

Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).
Information Security Policy
Now Included!
1.6 Learn what policies are required for compliance with the PCI Data Security Standard.

Description:

Learn what policies are required for compliance with the PCI Data Security Standard.
Configuration Management
Now Included!
1.0 Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).

Description:

Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).
Data Security
Now Included!
1.1 Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.

Description:

Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.
Vulnerability Management
Now Included!
1.2 Learn how to defend against malicious attacks by designing controls based on industry standards.

Description:

Learn how to defend against malicious attacks by designing controls based on industry standards.
Logical Access
Now Included!
1.3 Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).

Description:

Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).
Network Monitoring
Now Included!
1.4 Learn how to log and monitor access to system components and the Cardholder Data (CHD).

Description:

Learn how to log and monitor access to system components and the Cardholder Data (CHD).
Penetration Testing
Now Included!
1.5 Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).

Description:

Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).
Information Security Policy
Now Included!
1.6 Learn what policies are required for compliance with the PCI Data Security Standard.

Description:

Learn what policies are required for compliance with the PCI Data Security Standard.