[PCI DSS 3.0] 9.10 Ensure that security policies and operational procedures for restricting physical access to car
|
|
0
|
2371
|
September 23, 2014
|
[PCI DSS 3.0] 9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. T
|
|
0
|
2528
|
September 23, 2014
|
[PCI DSS 3.0] 9.9.2 Periodically inspect device surfaces to detect tampering (for example, addition of card skimme
|
|
0
|
2447
|
September 23, 2014
|
[PCI DSS 3.0] 9.9.1 Maintain an up-to-date list of devices. The list should include the following:
|
|
0
|
2010
|
September 23, 2014
|
[PCI DSS 3.0] 9.9 Protect devices that capture payment card data via direct physical interaction with the card fro
|
|
0
|
2004
|
September 23, 2014
|
[PCI DSS 3.0] 9.8.2 Render cardholder data on electronic media unrecoverable so that cardholder data cannot be rec
|
|
0
|
2212
|
September 23, 2014
|
[PCI DSS 3.0] 9.8.1 Shred, incinerate, or pulp hard- copy materials so that cardholder data cannot be reconstructe
|
|
0
|
2436
|
September 23, 2014
|
[PCI DSS 3.0] 9.8 Destroy media when it is no longer needed for business or legal reasons as follows:
|
|
0
|
1883
|
September 23, 2014
|
[PCI DSS 3.0] 9.7.1 Properly maintain inventory logs of all media and conduct media inventories at least annually.
|
|
0
|
2826
|
September 23, 2014
|
[PCI DSS 3.0] 9.7 Maintain strict control over the storage and accessibility of media.
|
|
0
|
1823
|
September 23, 2014
|
[PCI DSS 3.0] 9.6.3 Ensure management approves any and all media that is moved from a secured area (including when
|
|
0
|
1791
|
September 23, 2014
|
[PCI DSS 3.0] 9.6.2 Send the media by secured courier or other delivery method that can be accurately tracked.
|
|
0
|
2260
|
September 23, 2014
|
[PCI DSS 3.0] 9.6.1 Classify media so the sensitivity of the data can be determined.
|
|
0
|
3147
|
September 23, 2014
|
[PCI DSS 3.0] 9.6 Maintain strict control over the internal or external distribution of any kind of media, includi
|
|
0
|
2174
|
September 23, 2014
|
[PCI DSS 3.0] 9.5.1 Store media backups in a secure location, preferably an off-site facility, such as an alternat
|
|
0
|
2264
|
September 23, 2014
|
[PCI DSS 3.0] 9.5 Physically secure all media.
|
|
0
|
2595
|
September 23, 2014
|
[PCI DSS 3.0] 9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility a
|
|
0
|
2709
|
September 23, 2014
|
[PCI DSS 3.0] 9.4.3 Visitors are asked to surrender the badge or identification before leaving the facility or at
|
|
0
|
1612
|
September 23, 2014
|
[PCI DSS 3.0] 9.4.2 Visitors are identified and given a badge or other identification that expires and that visibl
|
|
0
|
1829
|
September 23, 2014
|
[PCI DSS 3.0] 9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardhol
|
|
0
|
2030
|
September 23, 2014
|
[PCI DSS 3.0] 9.4 Implement procedures to identify and authorize visitors.
|
|
0
|
1708
|
September 23, 2014
|
[PCI DSS 3.0] 9.3 Control physical access for onsite personnel to the sensitive areas as follows:
|
|
0
|
2285
|
September 23, 2014
|
[PCI DSS 3.0] 9.2 Develop procedures to easily distinguish between onsite personnel and visitors, to include:
|
|
0
|
2398
|
September 23, 2014
|
[PCI DSS 3.0] 9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/com
|
|
0
|
1859
|
September 23, 2014
|
[PCI DSS 3.0] 9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network j
|
|
0
|
2295
|
September 23, 2014
|
[PCI DSS 3.0] 9.1.1 Use video cameras and/or access control mechanisms to monitor individual physical access to se
|
|
0
|
4108
|
September 23, 2014
|
[PCI DSS 3.0] 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the c
|
|
0
|
2015
|
September 23, 2014
|