[PCI DSS 3.0] 12.3.6 Acceptable network locations for the technologies
|
|
0
|
2411
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.5 Acceptable uses of the technology
|
|
0
|
1805
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.4 A method to accurately and readily determine owner, contact information, and purpose (for exa
|
|
0
|
1830
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.3 A list of all such devices and personnel with access
|
|
0
|
1930
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.2 Authentication for use of the technology
|
|
0
|
1666
|
September 23, 2014
|
[PCI DSS 3.0] 12.3.1 Explicit approval by authorized parties
|
|
0
|
2061
|
September 23, 2014
|
[PCI DSS 3.0] 12.3 Develop usage policies for critical technologies and define proper use of these technologies.
|
|
0
|
2141
|
September 23, 2014
|
[PCI DSS 3.0] 12.2 Implement a risk-assessment process that:
|
|
0
|
3709
|
September 23, 2014
|
[PCI DSS 3.0] 12.1.1 Review the security policy at least annually and update the policy when the environment chang
|
|
0
|
1953
|
September 23, 2014
|