Checks We Perform

Below is a list of all the checks we perform. Select one to view more information.
Configuration Management
1.0 Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).

Description:

Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).
Data Security
1.1 Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.

Description:

Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.
Vulnerability Management
1.2 Learn how to defend against malicious attacks by designing controls based on industry standards.

Description:

Learn how to defend against malicious attacks by designing controls based on industry standards.
Logical Access
1.3 Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).

Description:

Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).
Network Monitoring
1.4 Learn how to log and monitor access to system components and the Cardholder Data (CHD).

Description:

Learn how to log and monitor access to system components and the Cardholder Data (CHD).
Penetration Testing
1.5 Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).

Description:

Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).
Information Security Policy
1.6 Learn what policies are required for compliance with the PCI Data Security Standard.

Description:

Learn what policies are required for compliance with the PCI Data Security Standard.
Configuration Management
1.0 Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).

Description:

Learn how to create and apply hardening standards for all system components in the Cardholder Data Environment (CDE).
Data Security
1.1 Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.

Description:

Learn about what methods are required to protect Cardholder Data (CHD) during storage, transmission, and processing.
Vulnerability Management
1.2 Learn how to defend against malicious attacks by designing controls based on industry standards.

Description:

Learn how to defend against malicious attacks by designing controls based on industry standards.
Logical Access
1.3 Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).

Description:

Learn about the best practices for establishing roles and access controls for the Cardholder Data Environment (CDE).
Network Monitoring
1.4 Learn how to log and monitor access to system components and the Cardholder Data (CHD).

Description:

Learn how to log and monitor access to system components and the Cardholder Data (CHD).
Penetration Testing
1.5 Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).

Description:

Learn what testing is required for the systems and applications in the Cardholder Data Environment (CDE).
Information Security Policy
1.6 Learn what policies are required for compliance with the PCI Data Security Standard.

Description:

Learn what policies are required for compliance with the PCI Data Security Standard.