PCI - DSS - ISMS - Mapping
PCI - DSS - ISMS - Mapping
PCI - DSS - ISMS - Mapping
Mapping
3.3 Sensitive authentication data (SAD) is not stored after authorization A.8.26 Application security requirements
3.4 Access to displays of full PAN and ability to copy PAN is restricted A.8.11 Data masking
3.5 Primary account number (PAN) is secured wherever it is stored A.8.24 Use of cryptography
3.6 Cryptographic keys used to protect stored account data are secured A.8.24 Use of cryptography
3.7 Where cryptography is used to protect stored account data, key-
A.8.24 Use of cryptography
management processes and procedures covering all aspects of the key
A.5.19 Information Security in supplier relationships
lifecycle are defined and implemented
R4: PROTECT CARDHOLDER DATA WITH STRONG CRYPTOGRAPHY DURING TRANSMISSION OVER
OPEN, PUBLIC NETWORKS
4.1 Processes and mechanisms for protecting cardholder data with strong
A.8.24 Use of cryptography
cryptography during transmission over open, public networks are defined
5.3 Organisational roles, responsibilities and authorities
and documented
4.2 PAN is protected with strong cryptography during transmission A.8.24 Use of cryptography
6.4 Public-facing web applications are protected against attacks A.8.21 Security of network services
6.5 Changes to all system components are managed securely A.8.32 Change management
R7: RESTRICT ACCESS TO SYSTEM COMPONENTS AND CARDHOLDER DATA BY BUSINESS NEED TO
KNOW
7.1 Processes and mechanisms for restricting access to system
A.5.15 Access control
components and cardholder data by business need to know are defined
5.3 Organisational roles, responsibilities and authorities
and understood
7.2 Access to system components and data is appropriately defined and A.5.15 Access control
assigned A.5.18 Access rights
7.3 Access to system components and data is managed via an access
A.5.15 Access control
control system(s)
R8: IDENTIFY USERS AND AUTHENTICATE ACCESS TO SYSTEM COMPONENTS
8.1 Processes and mechanisms for identifying users and authenticating A.5.16 Identity management
access to system components are defined and understood 5.3 Organisational roles, responsibilities and authorities
8.2 User identification and related accounts for users and administrators A.5.16 Identity management
are strictly managed throughout an account’s lifecycle 5.3 Organisational roles, responsibilities and authorities
8.3 Strong authentication for users and administrators is established and A.8.5 Secure authentication
managed A.5.1 Policies for information security
8.4 Multi-factor authentication (MFA) is implemented to secure access
A.8.5 Secure authentication
into theCDE
8.5 Multi-factor authentication (MFA) systems are configured to prevent
A.8.5 Secure authentication
misuse
8.6 Use of application and system accounts and associated authentication
A.8.2 Privileged access rights
factors is strictly managed
R9: RESTRICT PHYSICAL ACCESS TO CARDHOLDER DATA
9.1 Processes and mechanisms for restricting physical access to cardholder A.7.1 Physical security perimeters
data are defined and understood 5.3 Organisational roles, responsibilities and authorities
A.7.2 Physical entry
9.2 Physical access controls manage entry into facilities and systems
A5.15 Access Control
containing cardholder data
A.7.4 Physical security monitoring
A.7.2 Physical entry
9.3 Physical access for personnel and visitors is authorized and managed
A.7.3 Securing offices, rooms and facilities
7.6 Working in secure areas
9.4 Media with cardholder data is securely stored, accessed, distributed,
A.7.10 Storage media
and destroyed
A.5.9 Inventory of information and other associated assets
A.7.8 Equipment siting and protection
9.5 Point-of-interaction (POI) devices are protected from tampering and
A.5.9 Inventory of information and other associated assets
unauthorized substitution
A.6.3 Information security awareness, education and training
R10: LOG AND MONITOR ALL ACCESS TO SYSTEM COMPONENTS AND CARDHOLDER DATA
A.8.15 Logging
10.1 Processes and mechanisms for logging and monitoring all access to
A.8.16 Monitoring activities
system components and cardholder data are defined and documented
5.3 Organisational roles, responsibilities and authorities
10.2 Audit logs are implemented to support the detection of anomalies
A.8.15 Logging
and suspicious activity, and the forensic analysis of events
10.3 Audit logs are protected from destruction and unauthorized A.8.15 Logging
modifications 5.3 Organisational roles, responsibilities and authorities
A.8.15 Logging
10.4 Audit logs are reviewed to identify anomalies or suspicious activity
A.8.16 Monitoring activities
10.5 Audit log history is retained and available for analysis A.8.15 Logging
10.6 Time-synchronization mechanisms support consistent time settings
A.8.17 Clock synchronization
across all systems
10.7 Failures of critical security control systems are detected, reported,
A.8.16 Monitoring activities
and responded to promptly
R11: TEST SECURITY OF SYSTEMS AND NETWORKS REGULARLY
11.1 Processes and mechanisms for regularly testing security of systems A.5.35 Independent review of information security
and networks are defined and understood 5.3 Organisational roles, responsibilities and authorities
A.8.20 Networks security
11.2 Wireless access points are identified and monitored, and
A.5.9 Inventory of information and other associated assets
unauthorized wireless access points are addressed
11.3 External and internal vulnerabilities are regularly identified,
A.5.35 Independent review of information security
prioritized, and addressed
11.4 External and internal penetration testing is regularly performed, and A.5.35 Independent review of information security
exploitable vulnerabilities and security weaknesses are corrected A.8.8 Management of technical vulnerabilities
11.5 Network intrusions and unexpected file changes are detected and A.5.26 Response to information security incidents
responded to A.8.16 Monitoring activities
11.6 Unauthorized changes on payment pages are detected and A.5.26 Response to information security incidents
responded to A.8.16 Monitoring activities
R12: SUPPORT INFORMATION SECURITY WITH ORGANIZATIONAL POLICIES AND PROGRAMS
12.1 A comprehensive information security policy that governs and A.5.1 Policies for information security
provides direction for protection of the entity’s information assets is 5.2 Policy
known and current 5.3 Organizational roles, responsibilities and authorities
12.2 Acceptable use policies for end-user technologies are defined and
A.5.10 Acceptable use of information and other associated assets
implemented
12.3 Risks to the cardholder data environment are formally identified, 6.1 Risk assessment process
evaluated, and managed A.5.9 Inventory of information and other associated assets
5.36 Compliance with policies, rules and standards for information
12.4 PCI DSS V4.0 compliance is managed
security
12.5 PCI DSS V4.0 scope is documented and validated 4.2 Interested parties
12.6 Security awareness education is an ongoing activity A.6.3 Information security awareness, education and training
12.7 Personnel are screened to reduce risks from insider threats A.6.1 Screening
12.8 Risk to information assets associated with third-party service provider
(TPSP) relationships is managed A.5.21 Managing information security in the ICT supply chain
12.9 Third-party service providers (TPSPs) support their customers’ PCI
A.5.20 Addressing information security within supplier agreements
DSS V4.0 compliance
12.10 Suspected and confirmed security incidents that could impact A.5.26 Response to information security incidents,
the CDE are responded to immediately A.8.12 Data leakage prevention