[PCI DSS 3.0] 12.3.7 List of company-approved products
|
|
0
|
2929
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.6 Acceptable network locations for the technologies
|
|
0
|
2416
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.5 Acceptable uses of the technology
|
|
0
|
1809
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.4 A method to accurately and readily determine owner, contact information, and purpose (for exa
|
|
0
|
1834
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.3 A list of all such devices and personnel with access
|
|
0
|
1933
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.2 Authentication for use of the technology
|
|
0
|
1671
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.1 Explicit approval by authorized parties
|
|
0
|
2064
|
September 23, 2014
|
[PCI DSS 3.0] 12.3 Develop usage policies for critical technologies and define proper use of these technologies.
|
|
0
|
2148
|
September 23, 2014
|
[PCI DSS 3.0] 12.2 Implement a risk-assessment process that:
|
|
0
|
3713
|
September 23, 2014
|
[PCI DSS 3.0] 12.1.1 Review the security policy at least annually and update the policy when the environment chang
|
|
0
|
1959
|
September 23, 2014
|