PCI-DSS DESV Topology

PCI-DSS - Designated Entities Supplemental Validation (Topology)

Designated Entities Supplemental Validation
5 BAU Control Groups
DE.4DE.2DE.1 DE.3
SCOPE
MANAGEMENT
ORG STRUCTURE
CHD MANAGEMENT
ASSET MGT
CHANGE MGT
SEGMENTATION
DE.5
VALIDATION
MANAGEMENT
POLICY GAP
ANALYSIS
RISK ASSESSMENT
PENTEST
ASV
CONTROL
ASSESSMENTS
INCIDENT REPONSE
MANAGEMENT
INCIDENCE
RESPONSE
LOGGING
MONITORING
IDS/IPS
FIM
ANTI-VIRUS
ACCESS CONTROL
MANAGEMENT
USER ACCOUNT
MGT
CHD ACCESS RBAC
PRIVILEGE
ACCESS REVIEW
DATA
CLASSIFICATION
PROGRAM
MANAGEMENT
EXECUTIVE MGT
CHARTER
ROLES
R.A.C.I.
DOCUMENT
CONBTROLS
DOCUMENT
PROCESSESS
SECURITY TRAINING
AWARENESS

Recommended

An Explanation of Enterprise Risk Management by
An Explanation of Enterprise Risk Management An Explanation of Enterprise Risk Management
An Explanation of Enterprise Risk Management Rao Chalasani
287 views4 slides
What is SIEM? A Brilliant Guide to the Basics by
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
182 views9 slides
5 Steps to Privilege Readiness (infographic) by
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)BeyondTrust
496 views1 slide
Security Metrics by
Security MetricsSecurity Metrics
Security MetricsPLN9 Security Services Pvt. Ltd.
326 views5 slides
An Intro to Resolver's InfoSec Application (RiskVision) by
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
260 views30 slides
Need Of Security Operations Over SIEM by
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEMSiemplify
466 views11 slides

More Related Content

Viewers also liked

La tecnologia frena i consumi: aumenta la produttività riducendo il costo de... by
La tecnologia frena i consumi:  aumenta la produttività riducendo il costo de...La tecnologia frena i consumi:  aumenta la produttività riducendo il costo de...
La tecnologia frena i consumi: aumenta la produttività riducendo il costo de...Manager.it
398 views13 slides
laatsch_0315TrendReport by
laatsch_0315TrendReportlaatsch_0315TrendReport
laatsch_0315TrendReportMichael Laatsch
263 views3 slides
Shiksha adhikar.ppt 2016 by
Shiksha adhikar.ppt 2016Shiksha adhikar.ppt 2016
Shiksha adhikar.ppt 2016SHIKSHAADHIKAR
676 views12 slides
CT2 Building Material Group Assignement by
CT2 Building Material Group AssignementCT2 Building Material Group Assignement
CT2 Building Material Group AssignementKhangWei Chin
224 views1 slide
Guide to health by
Guide to healthGuide to health
Guide to healthAlivia Mercer
142 views16 slides
Is ACO-Led Payment Reform Working? by
Is ACO-Led Payment Reform Working?Is ACO-Led Payment Reform Working?
Is ACO-Led Payment Reform Working?Jamie Christensen Palatnik
542 views12 slides

Viewers also liked(20)

La tecnologia frena i consumi: aumenta la produttività riducendo il costo de... by Manager.it
La tecnologia frena i consumi:  aumenta la produttività riducendo il costo de...La tecnologia frena i consumi:  aumenta la produttività riducendo il costo de...
La tecnologia frena i consumi: aumenta la produttività riducendo il costo de...
Manager.it398 views
CT2 Building Material Group Assignement by KhangWei Chin
CT2 Building Material Group AssignementCT2 Building Material Group Assignement
CT2 Building Material Group Assignement
KhangWei Chin224 views
If You Can't Beat 'Em, Join 'Em by bugcrowd
 If You Can't Beat 'Em, Join 'Em If You Can't Beat 'Em, Join 'Em
If You Can't Beat 'Em, Join 'Em
bugcrowd1K views
славинський by slavinskiy
славинськийславинський
славинський
slavinskiy156 views
Comparative of risk analysis methodologies by Ramiro Cid
Comparative of risk analysis methodologiesComparative of risk analysis methodologies
Comparative of risk analysis methodologies
Ramiro Cid3.3K views
The OCTAVE Method by Raul Calzada
The OCTAVE MethodThe OCTAVE Method
The OCTAVE Method
Raul Calzada2.7K views
Qa exploratory test charter template by Rob Swoboda
Qa exploratory test charter templateQa exploratory test charter template
Qa exploratory test charter template
Rob Swoboda8.9K views
60-Day Overpayment Reporting Final Rule – The Rule of Six: Part II by Polsinelli PC
60-Day Overpayment Reporting Final Rule – The Rule of Six: Part II60-Day Overpayment Reporting Final Rule – The Rule of Six: Part II
60-Day Overpayment Reporting Final Rule – The Rule of Six: Part II
Polsinelli PC315 views
Anatomy of uvea by drkaushikp
Anatomy of uveaAnatomy of uvea
Anatomy of uvea
drkaushikp5.8K views
The Smart City in 3 questions: Why, What  and How to succeed its implementat... by Isam Shahrour
The Smart City in 3 questions:  Why, What  and How to succeed its implementat...The Smart City in 3 questions:  Why, What  and How to succeed its implementat...
The Smart City in 3 questions: Why, What  and How to succeed its implementat...
Isam Shahrour1.1K views
Mu3 dev challenge project plan for health 2.0 launch (1) by health2dev
Mu3 dev challenge project plan   for health 2.0 launch (1)Mu3 dev challenge project plan   for health 2.0 launch (1)
Mu3 dev challenge project plan for health 2.0 launch (1)
health2dev396 views

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA

Cobit v5 High Level Controls Topology by
Cobit v5 High Level Controls TopologyCobit v5 High Level Controls Topology
Cobit v5 High Level Controls TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
38 views1 slide
Cobit & ISO 27002 Governance Topology by
Cobit & ISO 27002 Governance TopologyCobit & ISO 27002 Governance Topology
Cobit & ISO 27002 Governance TopologyJason Rusch - CISSP CGEIT CISM CISA GNSA
95 views1 slide

More from Jason Rusch - CISSP CGEIT CISM CISA GNSA(19)

Recently uploaded

We see everywhere that many people are talking about technology.docx by
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docxssuserc5935b
6 views2 slides
PORTFOLIO 1 (Bret Michael Pepito).pdf by
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
8 views6 slides
DU Series - Day 4.pptx by
DU Series - Day 4.pptxDU Series - Day 4.pptx
DU Series - Day 4.pptxUiPathCommunity
100 views28 slides
information by
informationinformation
informationkhelgishekhar
8 views4 slides
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲Infosec train
9 views6 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 views64 slides

Recently uploaded(12)

We see everywhere that many people are talking about technology.docx by ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 views
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 views
UiPath Document Understanding_Day 3.pptx by UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity103 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC244 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat98 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views

PCI-DSS DESV Topology

  • 1. Designated Entities Supplemental Validation 5 BAU Control Groups DE.4DE.2DE.1 DE.3 SCOPE MANAGEMENT ORG STRUCTURE CHD MANAGEMENT ASSET MGT CHANGE MGT SEGMENTATION DE.5 VALIDATION MANAGEMENT POLICY GAP ANALYSIS RISK ASSESSMENT PENTEST ASV CONTROL ASSESSMENTS INCIDENT REPONSE MANAGEMENT INCIDENCE RESPONSE LOGGING MONITORING IDS/IPS FIM ANTI-VIRUS ACCESS CONTROL MANAGEMENT USER ACCOUNT MGT CHD ACCESS RBAC PRIVILEGE ACCESS REVIEW DATA CLASSIFICATION PROGRAM MANAGEMENT EXECUTIVE MGT CHARTER ROLES R.A.C.I. DOCUMENT CONBTROLS DOCUMENT PROCESSESS SECURITY TRAINING AWARENESS