PCI Requirement 6.5.9 – Cross-Site Request Forgery
Related Videos

PCI Requirement 6 – Develop and Maintain Secure Systems and Applications

PCI Requirement 6.2 – Ensure all Systems and Software are Protected from Known Vulnerabilities

PCI Requirement 6.3 – Develop Secure Software Applications

PCI Requirement 6.3.1 – Remove Development and Test Accounts, User IDs, and Passwords Before Release

PCI Requirement 6.3.2 – Review Custom Code Prior to Release

PCI Requirement 6.5 – Address Common Coding Vulnerabilities in Software-Development Processes

PCI Requirement 6.5.1 – 6.5.6 Recap

PCI Requirement 6.5.1 – Injection Flaws

PCI Requirement 6.5.2 – Buffer Overflow

PCI Requirement 6.5.3 – Insecure Cryptographic Storage

PCI Requirement 6.5.4 – Insecure Communications

PCI Requirement 6.5.5 – Improper Error Handling

PCI Requirement 6.5.7 – Cross-Site Scripting (XSS)

PCI Requirement 6.5.8 – Improper Access Control

Performing Code Review Prior to Release

Protecting Web Applications in AWS

Secure Code Development in AWS

Using OWASP's Kubernetes Cheat Sheet