SlideShare a Scribd company logo
ISO27001(ISMS) / ISO27017(Cloud) / ISO27018(PIMS on Cloud) / ISO27701(PIMS) PCI DSS Ver. 3.2.1
ISMS 4
ISMS 4.1
4.2
4.3
4.4
Understanding the organization and its context
Understanding the needs and expectations of interested parties
Determining the scope of the information security management system
Information security management system
ES#3.1 Assessor’s validation of defined cardholder data environment and scope accuracy
ISMS 5
ISMS 5.1
5.2
5.3
Leadership and commitment
Policy
Organizational roles, responsibilities and authorities
12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.
12.4.1 Additional requirement for service providers only: Executive management shall establish responsibility for the protection of
cardholder data and a PCI DSS compliance program to include:
•Overall accountability for maintaining PCI DSS compliance
•Defining a charter for a PCI DSS compliance program and communication to executive management
A3.1.1 Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program
to
include:
・ Overall accountability for maintaining PCI DSS compliance
・ Defining a charter for a PCI DSS compliance program
・ Providing updates to executive management and board of directors on PCI DSS compliance initiatives and issues, including
remediation activities, at least annually
ISMS 6
ISMS 6.1
6.1.1
6.1.2
6.1.3
6.2
Actions to address risks and opportunities
General
Information security risk assessment
Information security risk treatment
Information security objectives and planning to achieve them
A3.3.1.1 Respond to failures of any critical security controls in a timely manner. Processes for responding to failures in security
controls must include:
・ Restoring security functions
・ Identifying and documenting the duration (date and time start to end) of the security failure
・ Identifying and documenting cause(s) of failure, including root cause, and documenting remediation required to address root cause
・ Identifying and addressing any security issues that arose during the failure
・ Performing a risk assessment to determine whether further actions are required as a result of the security failure.
10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as
determined by the organization’s annual risk assessment.
11.5.a Verify the use of a change-detection mechanism by observing system settings and monitored files, as well as reviewing results
from monitoring activities.
Examples of files that should be monitored:
・ System executables
・ Application executables
・ Configuration and parameter files
・ Centrally stored, historical or archived, log and audit files
・ Additional critical files determined by entity (for example, through risk assessment or other means).
12.2 Implement a risk-assessment process that:
ISMS 7
Similarity between ISO27001(ISMS) / ISO27017(Cloud) / ISO27018(PIMS on Cloud) / ISO27701(PIMS) and PCI DSS Version 3.2.1
This is Code of practice for information security controls to protect PII in public clouds acting as PII processors.
Context of the organization
Leadership
Planning
Support
ISMS 7.1
7.2
7.3
7.4
7.5
7.5.1
7.5.2
7.5.3
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communications
7.5 Documented information
7.5.1 General
7.5.2 Creating and updating
7.5.3 Control of documented information
1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected
parties.
2.5 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are
documented, in use, and known to all affected parties.
3.7 Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in use, and known
to all affected parties.
4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use,
and known to all affected parties.
5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and
known to all affected parties.
6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are
documented, in use, and known to all affected parties.
7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and
known to all affected parties.
8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is
restricted as follows:
・All user access to, user queries of, and user actions on databases are through
programmatic methods.
・Only database administrators have the ability to directly access or query databases.
・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application
processes).
8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known
ISMS 8
ISMS 8.1
8.2
8.3
8.1 Operational planning and control
8.2 Information security risk assessment
8.3 Information security risk treatment
12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.
ISMS 9
ISMS 9.1
9.2
9.3
9.1 Monitoring, measurement, analysis and evaluation
9.2 Internal audit
9.3 Management review
12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment change.
12.10.6 Develop a process to modify and evolve the incident response plan according to lessons learned and to incorporate industry
developments.
A3.1.1 Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program
to
include:
・ Providing updates to executive management and board of directors on PCI DSS compliance initiatives and issues, including
remediation activities, at least annually
ISMS 10
ISMS 10.1
10.3
Nonconformity and corrective action
Continual improvement
12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment
change.ation activities, at least annually
ISMS/CLS
ISMS/CLS A.5
ISMS/CLS A.5.1
ISMS A.5.1.1 Policies for information security (Related to Cloud Security)
Control(s): A set of policies for information security shall be defined, approved by management,
published and communicated to employees and relevant external parties.
12.1 Establish, publish, maintain, and disseminate a security policy.
12.1 Examine the information security policy and verify that the policy is published and disseminated to all relevant personnel
(including vendors and business partners).
ISMS A.5.1.2 Review of the policies for information security
Control(s): The polities for information security shall be reviewed at planned intervals of if
significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
12.1 Examine the information security policy and verify that the policy is published and disseminated to all relevant personnel
(including vendors and business partners).
12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment change.
12.1.1 Verify that the information security policy is reviewed at least annually and updated as needed to reflect changes to business
objectives or the risk environment.
ISMS/CLS A.6
ISMS/CLS A.6.1
Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Internal organization (Related to Cloud Security)
Control Objective(s): To establish a management framework to initiate and control the implementation and operation of information security within the organization.
Organization of information security (Related to Cloud Security)
Operation
Performance evaluation
Improvement
Information security policies (Related to Cloud Security)
Management direction for information security (Related to Cloud Security)
Control Objective(s): To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations.
ISMS A.6.1.1 Information security roles and responsibilities
Control(s): All information security responsibilities shall be defined and allocated.
3.5.2 Examine user access lists to verify that access to keys is restricted to the fewest number of custodians necessary.
3.6.8 Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian
responsibilities.
5.3.c Interview responsible personnel and observe processes to verify that anti-virus software cannot be disabled or altered by users,
unless specifically authorized by management on a case-by-case basis for a limited time period.
6.4.5.2 Verify that documented approval by authorized parties is present for each sampled change.
7.1.3 Select a sample of user IDs and interview responsible management personnel to verify that privileges assigned are based on
that individual’s job classification and function.
7.2.2 Assignment of privileges to individuals based on job classification and function.
9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to
individuals).
12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.
12.4.a Verify that information security policy and procedures clearly define information security responsibilities for all personnel.
12.5 Assign to an individual or team the following information security management responsibilities:
12.5 Examine information security policies and procedures to verify:
・The formal assignment of information security to a Chief Security Officer or other security-knowledgeable member of management.
・The following information security responsibilities are specifically and formally assigned:
ISMS A.6.1.2 Segregation of duties
Control(s): Conflicting duties and areas of reasonability shall be segregated to reduce
opportunities for unauthorized of unintentional
modification of misuse of the organization's assets.
6.4 Examine policies and procedures to verify the following are defined:
・Development/test environments are separate from production environments with access control in place to enforce separation.
ISMS/CLS A.6.1.3 Contact with authorities (Related to Cloud Security) 
Control(s): Appropriate contacts with relevant authorities shall be maintained.
12.10 Examine the incident response plan and related procedures to verify entity is prepared to respond immediately to a system
breach by performing the following:
ISMS A.6.1.4 Contact with special interest groups
Control(s): Appropriate contacts with special interest groups or other specialist security forms and
professional associations shall be maintained.
12.10.1.a Verify that the incident response plan includes:
・Analysis of legal requirements for reporting compromises (for example, California Bill 1386, which requires notification of affected
consumers in the event of an actual or suspected compromise for any business with California residents in their database).
・Reference or inclusion of incident response procedures from the payment brands.
ISMS A.6.1.5 Information security in project management
Control(s): Information security shall be addressed in project management, regardless of the type
of the project.
6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as
follows:
・In accordance with PCI DSS (for example, secure authentication and logging).
・Based on industry standards and/or best practices.
・Incorporate information security throughout the software development life cycle.
ISMS/CLS A.6.2
ISMS A.6.2.1 Mobile device policy
Control(s): A policy and supporting security measures shall be adopted to manage the risks
introduced by using mobile devices.
1.4 Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or
employee/owned) that connect to the Internet when outside the network (for example, laptops used by employees), and which are also
used to access the CDE. Firewall (or equivalent) configurations include:
・Specific configuration settings are defined.
・Personal firewall (or equivalent functionality) is actively running.
・Personal firewall (or equivalent functionality) is not alterable by users of the portable computing devices.
8.1.5 Manage IDs used by third parties to access, support, or maintain system components via remote access as follows:
・Enabled only during the time period needed and disabled when not in use.
・Monitored when in use.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication
12.3 Develop usage policies for critical technologies and define proper use of these technologies.
ISMS A.6.2.2 Teleworking
Control(s): A policy and supporting security measures shall be implemented to protect information
accessed, processed or stored at teleworking sites.
1.4 Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or
employee-owned) that connect to the Internet when outside the network
(for example, laptops used by employees), and which are also used to access the CDE. Firewall (or equivalent) configurations include:
  Specific configuration settings are defined.
  Personal firewall (or equivalent functionality) is actively running.
  Personal firewall (or equivalent functionality) is not alterable by users of the portable computing
devices.
8.3.2 Incorporate multi-factor authentication for all remote network access (both user and administrator, and including third-party
access for support or maintenance) originating from outside
the entity’s network.
12.3 Develop usage policies for critical technologies and define proper use of these technologies.
Mobile devices and teleworking (Related to Cloud Security)
Control Objective(s): To ensure the security of teleworking and use of mobile devices.
CLS CLD 6.3
CLS CLD 6.3.1 Shared roles and responsibilities within a cloud computing environment (Related to Cloud
Security)
Control(s): Responsibilities for shared information security roles in the use of the cloud service
should be allocated to identified parties, documented, communicated and implemented by both
the cloud service cusomer and the cloud service provider.
12.8.2 Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the security of
cardholder data the service providers possess or otherwise store, process or transmit on behalf of the customer, or to the extent that
they could impact the security of the customer’s cardholder data environment.
ISMS/CLS A.7
ISMS A.7.1
ISMS A.7.1.1 Screening
Control(s): Background verification checks on all candidates for employments shall be carried out
in accordance with relevant laws, regulations and ethics and shall be proportional to the business
requirements, the classification of the information to be accessed and the perceived risks.
12.7 Screen potential personnel prior to hire to minimize the risk of attacks from internal resources. (Examples of background checks
include previous employment history, criminal record, credit history, and reference checks.)
ISMS A.7.1.2 Terms and conditions of employment
Control(s): The contractual agreements with employees and contractors shall state their and the
organizations' responsibilities for information security.
12.6.b Personnel acknowledge, in writing or electronically and at least annually, that they have read and understand the information
security policy.
ISMS/CLS A.7.2
ISMS/CLS A.7.2.1 Management responsibilities (Related to Cloud Security)
Control(s): Management shall require all employees and contractors to apply information security
in accordance with the established policies and procedures of the organization.
12.6.b Personnel acknowledge, in writing or electronically and at least annually, that they have read and understand the information
security policy.
ISMS/CLS A.7.2.2 Information security awareness, education and training (Related to Cloud Security) 
Control(s): All employment of the organization and, where relevance contractors shall receive
appropriate awareness education and training and regular updates in organizational policies and
procedures, as relevant for their job function.
9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should include the
following:
・Verify the identity of any third-party persons claiming to be repair or maintenance
personnel, prior to granting them access to modify or troubleshoot devices.
・Do not install, replace, or return devices without verification.
・Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices).
・Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager
or security officer).
12.6 Implement a formal security awareness program to make all personnel aware of the cardholder data security policy and
procedures.
ISMS A.7.2.3 Disciplinary process
Control(s): There shall be a formal and communicated disciplinary process in place to take action
against employees who have committed an information security breach.
12.6.2 Require personnel to acknowledge at least annually that they have read and understood the security policy and procedures.
(Remarks: This written agreement from employees may be a triger to "disciplinary process" in ISMS.)
ISMS/CLS A.7.3
ISMS A.7.3.1 Termination or change of employment responsibilities
Control(s): Information security responsibilities and duties that remain valid after termination of
change of employment shall be defied, communicated to the employee or contractor and
enforced.
9.3 Control physical access for onsite personnel to sensitive areas as follows:
・ Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
9.4.2.b Verify that visitor badges or other identification expire.
9.4.3 Observe visitors leaving the facility to verify visitors are asked to surrender their badge or other identification upon departure or
expiration.
12.3.3 Verify that the usage policies define:
•A list of all critical devices, and
•A list of personnel authorized to use the devices.
ISMS/CLS A.8
ISMS/CLS A.8.1
Relationship between cloud service customers and cloud serivice providers (Related to Cloud Security)
Control Objective(s): To clarify the relationship regarding shared roles and responsibilities between the cloud service customer and the cloud service provider for information secirity management.
Human resource security (Related to Cloud Security)
A.7.1 Prior to employment 
Control Objective(s): To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered.
During employment (Related to Cloud Security) 
Control Objective(s): To ensure that employees and contractors are aware of and fulfil their information security responsibilities.
Termination and change of employment (Related to Cloud Security)
Control Objective(s): To protect the organization's interest as part of the process of changing or termination employment.
Asset Management (Related to Cloud Security)
Responsibility for assets (Related to Cloud Security) 
Control Objective(s): To identify organizational assets and define appropriate protection responsibilities.
ISMS/CLS A.8.1.1 Inventory of assets (Related to Cloud Security) 
Control(s): Information, other assets associated with information and information processing
facilities shall be identified and an inventory of these assets shall be drawn up and maintained.
ISMS A.8.1.2 Ownership of assets
Control(s): Assets maintained in the inventory shall be owned
ISMS A.8.1.3 Acceptable use of assets
Control(s): Rules for the acceptable use of information and of assets associated with information
and information processing facilities shall be identified, documented and implemented.
7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access.
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
12.3 Develop usage policies for critical technologies and define proper use of these technologies.
Identify the usage policies for all identified critical technologies reviewed to verify the following policies (12.3.1-12.3.10) are defined:
・Explicit approval from authorized parties to use the technologies.
・All technology use to be authenticated with user ID and password or other authentication item.
・A list of all devices and personnel authorized to use the devices.
・A method to accurately and readily determine owner, contact information, and purpose.
・Acceptable uses for the technology.
・Acceptable network locations for the technology.
・A list of company-approved products.
・Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity.
ISMS A.8.1.4 Return of assets
Control(s): All employees and external party users shall return all of the organizational assets in
their possession upon termination of their employment, contract or agreement.
9.3 Control physical access for onsite personnel to sensitive areas as follows:
・Access must be authorized and based on individual job function.
・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
CLS CLD 8.1.5 Removal of cloud service customer assets(Related to Cloud Security)
Control(s): Assets of the cloud service customer that are on the cloud service provider's premises
should be removed, and returned if necessary, in a timely manner upon termination of the cloud
service agreement.
(No similar or related requirements within PCI DSS v3.2.1)
ISMS/CLS A.8.2
ISMS A.8.2.1 Classification of information
Control(s): Information shall be classified in terms of legal requirements, value, criticality and
sensitivity to unauthorized disclosure or modification.
9.6.1 Classify media so the sensitivity of the data can be determined..
ISMS/CLS A.8.2.2 Labelling of information (Related to Cloud Security)
Control(s): An appropriate set of procedures for information labeling shall be developed and
implemented in accordance with the information classification scheme adopted by the
organization.
9.6.1 Verify that all media is classified so the sensitivity of the data can be determined. Describe how media was observed to be
classified so the sensitivity of the data can be determined.
ISMS A.8.2.3 Handling of assets
Control(s): Procedures for handling assets shall be developed and implemented in accordance
with the information classification scheme adopted by the organization.
3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that
include at least the following for all CHD storage:
・Limiting data storage amount and retention time to that which is required for legal,
regulatory, and/or business requirements.
・Specific retention requirements for cardholder data
・Processes for secure deletion of data when no longer needed.
・A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention.
9.6 Maintain strict control over the internal or external distribution of any kind of media, including the following:
ISMS A.8.3
ISMS A.8.3.1 Management of removable media
Control(s): Procedures shall be implemented for the management of removable media in
accordance with the classification scheme adopted by the organization.
3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that
include at least the following for all CHD storage:
9.7 Maintain strict control over the storage and accessibility of media.
Information classification (Related to Cloud Security) 
Control Objective(s): To ensure that information receives an appropriate level of protection in accordance with its importance to the organization.
Media handling
Control Objective(s): To present unauthorized disclosure, modification, remoaval or destruction of information stored on media.
2.4 Maintain an inventory of system components that are in scope for PCI DSS.
2.4.a Examine system inventory to verify that a list of hardware and software components is maintained and includes a description of
function/use for each.
3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that
include at least the following for all CHD storage:
・Limiting data storage amount and retention time to that which is required for legal,
regulatory, and/or business requirements.
・Specific retention requirements for cardholder data
・Processes for secure deletion of data when no longer needed.
・A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention.
9.9 Examine documented policies and procedures to verify they include:
・Maintaining a list of devices.
11.1 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and
unauthorized wireless access points on a quarterly basis.
12.3.3 Verify that the usage policies define:
•A list of all critical devices, and
•A list of personnel authorized to use the devices.
ISMS A.8.3.2 Disposal of media
Control(s): Media shall be disposed of securely when no longer required, using formal
procedures.
3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that
include at least the following for all CHD storage:
9.8 Destroy media when it is no longer needed for business or legal reasons as follows:
ISMS A.8.3.3 Physical media transfer
Control(s): Media containing information shall be protected against unauthorized access, misuse
or corruption during transportation.
9.6 Maintain strict control over the internal or external distribution of any kind of media, including the following:
9.6.1 Classify media so the sensitivity of the data can be determined.
9.6.2 Send the media by secured courier or other delivery method that can be accurately tracked.
9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to
individuals).
ISMS/CLS A.9
ISMS/CLS A.9.1
ISMS A.9.1.1 Access control policy
Control(s): An access control policy shall be established, documented and reviewed based on
business and information security requirements.
1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected
parties.
6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are
documented, in use, and known to all affected parties.
7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and
known to all affected parties.
8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is
restricted as follows:
・All user access to, user queries of, and user actions on databases are through
programmatic methods.
・Only database administrators have the ability to directly access or query databases.
・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application
processes).
8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known
to all affected parties.
9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in
use, and known to all affected parties.
10.9 Ensure that security policies and operational procedures for monitoring all access to network resources and cardholder data are
documented, in use, and known to all affected parties.
ISMS/CLS A.9.1.2 Access to networks and network services (Related to Cloud Security)
Control(s): Users shall only be provided with access to the network and network services that
they have been specifically authorized to use.
1.1.5 Description of groups, roles, and responsibilities for management of network components.
ISMS/CLS A.9.2
ISMS/CLS A.9.2.1 User registration and de-registration (Related to Cloud Security) 
Control(s): A formal user registration and de-registration process shall be implemented to enable
assignment of access rights.
ISMS/CLS A.9.2.2 User access provisioning (Related to Cloud Security) 
Control(s): A formal user access provisioning process shall be implemented to assign or revoke
access rights for all user types to all systems and services.
ISMS/CLS A.9.2.3 Management of privileged access rights (Related to Cloud Security) Control(s): The allocation
and use of privileged access rights shall be restricted and controlled.
2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the
network.
7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access.
7.2 Examine system settings and vendor documentation to verify that an access control system(s) is implemented as follows:
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows:
・Generic user IDs are disabled or removed.
・Shared user IDs do not exist for system administration and other critical functions.
・Shared and generic user IDs are not used to administer any system components.
A1.2 Restrict each entity’s access and privileges to its own cardholder data environment only.
User Access Management (Related to Cloud Security)
Control Objective(s): To ensure authorized user access and to prevent unauthorized access to systems and services.
Access control (Related to Cloud Security)
Business requirements of access control  (Related to Cloud Security)
Control Objective(s): To limit access to information and information processing facilities.
ISMS/CLS A.9.2.4 Management of secret authentication information of users (Related to Cloud Security) 
Control(s): The allocation of secret authentication information shall be controlled thru a formal
management process.
2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the
network.
3.2 Do not store sensitive authentication data after authorization (even if encrypted). If sensitive authentication data is received, render
all data unrecoverable upon completion of the authorization process.
4.2 Never send unprotected PANs by end-user messaging technologies (for example, e-mail, instant messaging, SMS, chat, etc.).
8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators
on all system components by employing at least one of the following methods to authenticate all users:
・Something you know, such as a password or passphrase.
・Something you have, such as a token device or smart card.
・Something you are, such as a biometric.
8.4 Document and communicate authentication policies and procedures to all users including:
・Guidance on selecting strong authentication credentials.
・Guidance for how users should protect their authentication credentials.
・Instructions not to reuse previously used passwords.
・Instructions to change passwords if there is any suspicion the password could be compromised.
8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.)
use of these mechanisms must be assigned as follows:
・Authentication mechanisms must be assigned to an individual account and not shared
among multiple accounts.
・Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain access.ISMS A.9.2.5 Review of user access rights.
Control(s): Asset owners shall review users' access rights at regular intervals.
10.2.5.b Verify all elevation of privileges is logged.
ISMS A.9.2.6 Removal or adjustment of access rights
Control(s): The access rights of all employees and external party users to information and
information processing facilities shall be removed upon termination of their employment, contract,
contract or agreement, or adjusted upon change.
2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the
network.
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows:
・Generic user IDs are disabled or removed.
・Shared user IDs do not exist for system administration and other critical functions.
・Shared and generic user IDs are not used to administer any system components.
9.2 Develop procedures to easily distinguish between onsite personnel and visitors, to include:
・Identifying onsite personnel and visitors (for example, assigning badges).
・Changes to access requirements.
ISMS A.9.3
ISMS A.9.3.1 Use of secret authentication information
Control(s): Users shall be required to follow the organization's practices in the use of secret
authentication information.
8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators
on all system components by employing at least one of the following methods to authenticate all users:
・Something you know, such as a password or passphrase.
・Something you have, such as a token device or smart card.
・Something you are, such as a biometric.
8.4 Document and communicate authentication policies and procedures to all users including:
・Guidance on selecting strong authentication credentials.
・Guidance for how users should protect their authentication credentials.
・Instructions not to reuse previously used passwords.
・Instructions to change passwords if there is any suspicion the password could be compromised.
8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators
on all system components by employing at least one of the following methods to authenticate all users:
・Something you know, such as a password or passphrase.
・Something you have, such as a token device or smart card.
・Something you are, such as a biometric.
ISMS/CLS A.9.4
User responsibilities 
Control Objective(s): To make users accountable for safeguarding their authentication information.
System and application access control (Related to Cloud Security) 
Control Objective(s): To prevent unauthorized access to systems and applications.
ISMS/CLS A.9.4.1 Information access restriction (Related to Cloud Security)
Control(s): Access to information and application system functions shall be restricted in
accordance with the access control policy.
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.)
use of these mechanisms must be assigned as follows:
・Authentication mechanisms must be assigned to an individual account and not shared
among multiple accounts.
・Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain access.
8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is
restricted as follows:
・All user access to, user queries of, and user actions on databases are through
programmatic methods.
・Only database administrators have the ability to directly access or query databases.
・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application
processes).
9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in
use, and known to all affected parties.
A1.1 Ensure that each entity only runs processes that have access to that entity’s cardholder data environment.
ISMS A.9.4.2 Secure log-on proceduresControl(s): Where required by the access control policy, access control
policy.
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication.
8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.)
use of these mechanisms must be assigned as follows:
・Authentication mechanisms must be assigned to an individual account and not shared
among multiple accounts.
・Physical and/or logical controls must be in place to ensure only the intended account
ISMS A.9.4.3 Password management system
Control(s): Password management system shall be interactive and shall ensure quality
passwords.
8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and
administrators on all system components as follows:
ISMS A.9.4.4 Use of privileged utility programs
Control(s): The use of utility programs that might be capable of overriding system and application
controls shall be restricted and tightly controlled.
2.3 Encrypt all non-console administrative access using strong cryptography.
5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized
by management on a case-by-case basis for a limited time period.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication.
8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is
restricted as follows:
  All user access to, user queries of, and user actions on databases are through programmatic methods.
  Only database administrators have the ability to directly access or query databases.
  Application IDs for database applications can only be used by the applications (and not by individual users or other non-application
processes).
10.1 Implement audit trails to link all access to system components to each individual user.
10.4.2.a Examine system configurations and timesynchronization settings to verify that access to time data is restricted to only
personnel with a business need to access time data.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example,
online, archived, or restorable from backup).
ISMS A.9.4.5 Access control to program source code
Control(s): Access to program source code shall be restricted.
6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using
either manual or automated processes) to include at least the following:
・Code changes are reviewed by individuals other than the originating code author, and
by individuals knowledgeable about code review techniques and secure coding practices.
・Code reviews ensure code is developed according to secure coding guidelines.
・Appropriate corrections are implemented prior to release.
・Code review results are reviewed and approved by management prior to release.
CLS CLD 9.5 Access control of cloud service customer data in shared virtual environment (Related to Cloud Security) 
Control Objective(s): To ensure migrate information security risks when using the shared virtual environment of cloud computing.
CLS CLD 9.5.1 Segregation in virtual computing environment (Related to Cloud Security) 
Control(s): A cloud service customer's customers virtual environment running on a cloud service
should be protected from other cloud service customers and unauthorized persons.
1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the
cardholder data environment.
2.3 Encrypt all non-console administrative access using strong cryptography.
2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet
specific requirements as detailed in Appendix A1: Additional PCI
DSS Requirements for Shared Hosting Providers.
7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.
8.7.c Examine database access control settings and database application configuration settings to verify that user direct access to or
queries of databases are restricted to database administrators
11.3.4 If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any
changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-
of-scope systems from systems in the CDE.
A1 Specifically for a PCI DSS assessment of a shared hosting provider, to verify that shared hosting providers protect entities’
(merchants and service providers) hosted environment and data, select a sample of servers (Microsoft Windows and Unix/Linux)
across a representative sample of hosted merchants and service providers, and perform A1.1 through A1.4 below:
CLS CLD 9.5.2 Virtual machine hardening (Related to Cloud Security) 
Control(s): Virtual machines in a cloud computing environment should be hardened to meet
business needs.
1.1.6 Documentation of business justification and approval for use of all services, protocols, and ports allowed, including
documentation of security features implemented for those protocols considered to be insecure.
5.1.2 For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify and evaluate
evolving malware threats in order to confirm whether such systems continue to not require anti-virus software.
5.2 Ensure that all anti-virus mechanisms are maintained as follows:
  Are kept current,
  Perform periodic scans
  Generate audit logs which are
retained per PCI DSS Requirement 10.7
ISMS/CLS A.10
ISMS/CLS A.10.1
ISMS/CLS A.10.1.1 Policy on the use of cryptographic controls. (Related to Cloud Security) 
Control(s): A policy on the use of cryptographic controls for protection of information shall be
developed and implemented.
2.3 Encrypt all non-console administrative access using strong cryptography.
Note: Where SSL/early TLS is used, the requirements in Appendix A2 must be completed.
3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the
following approaches:
・One-way hashes based on strong cryptography, (hash must be of the entire PAN).
・Truncation (hashing cannot be used to replace the truncated segment of PAN).
・Index tokens and pads (pads must be securely stored).
・Strong cryptography with associated key-management processes and procedures.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public
networks, including the following:
・Only trusted keys and certificates are accepted.
・The protocol in use only supports secure versions or configurations.
・The encryption strength is appropriate for the encryption methodology in use.
Note: Where SSL/early TLS is used, the requirements in Appendix A2 must be completed .
4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use,
and known to all affected parties.
ISMS/CLS A.10.1.2 Key management (Related to Cloud Security) 
Control(s): A policy on the use, protection and lifetime of cryptographic keys shall be developed
and implemented thru their whole lifecycle.
3.6 Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of
cardholder data, including the following:
3.6.1 Generation of strong cryptographic keys.
3.6.2 Secure cryptographic key distribution.
3.6.3 Secure cryptographic key storage.
3.6.4 Cryptographic key changes for keys that have reached the end of their cryptoperiod (for example, after a defined period of time
has passed and/or after a certain amount of cipher-text has been produced by a given key), as defined by the associated application
vendor or key owner, and based on industry best practices and guidelines (for example, NIST Special Publication 800-57).
3.6.6 If manual clear-text cryptographic key-management operations are used, these operations must be managed using split
knowledge and dual control.
3.6.7 Prevention of unauthorized substitution of cryptographic keys.
3.6.8 Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian
responsibilities.
6.5.3 Examine software-development policies and procedures and interview responsible personnel to verify that insecure
cryptographic storage is addressed by coding techniques that:
ISMS/CLS A.11
ISMS A.11.1
Cryptography (Related to Cloud Security)
Cryptographic controls (Related to Cloud Security) 
Control Objective(s): To ensure proper and effective use of cryptographic controls for protection of information shall be developed and implemented.
Physical and environmental security (Related to Cloud Security)
Secure areas 
Control Objective(s): To prevent unauthorized physical access, damage and interference to the organization's information and information processing facilities.
ISMS A.11.1.1 Physical security perimeter
Control(s): Security perimeters shall be defied and used to protect areas that contain either
sensitive or critical information and information processing facilities.
1.1.3 Current diagram that shows all cardholder data flows across systems and networks.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.1.1 Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas.
Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law.
9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks.
9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and
telecommunication lines.
ISMS A.11.1.2 Physical entry controls
Control(s): Secure areas shall be protected by appropriate entry controls to ensure that only
authorized personnel are allowed access.
9.4.2 Visitors are identified and given a badge or other identification that expires and that visibly distinguishes the visitors from onsite
personnel.
9.3 Control physical access for onsite personnel to sensitive areas as follows:
・Access must be authorized and based on individual job function.
・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
9.4 Implement procedures to identify and authorize visitors. Procedures should include the following:
9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained.
ISMS A.11.1.3 Securing offices, rooms and facilities
Control(s): Physical security for offices, rooms, and facilities shall be designed and applied.
9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as for computer rooms and data
centers where cardholder data is stored or transmitted.
Document the visitor’s name, the firm represented, and the onsite personnel authorizing physical access on the log.
Retain this log for a minimum of three months, unless otherwise restricted by law.
ISMS A.11.1.4 Protecting against external and environmental threats
Control(s): Physical protection against natural disasters, malicious attack or accidents shall be
designed and applied.
9.2 Develop procedures to easily distinguish between onsite personnel and visitors, to include:
・Identifying onsite personnel and visitors (for example, assigning badges).
・Changes to access requirements.
・Revoking or terminating onsite personnel and expired visitor identification (such as ID badges).
9.3 Control physical access for onsite personnel to sensitive areas as follows:
・Access must be authorized and based on individual job function.
・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
9.4 Implement procedures to identify and authorize visitors. Procedures should include the following:
9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained.
ISMS A.11.1.5 Working in secure areas
Control(s): Procedures for working in secure areas shall be designed and applied.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained.
9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as for computer rooms and data
centers where cardholder data is stored or transmitted. Document the visitor’s name, the firm represented, and the onsite personnel
authorizing physical access on the log.
Retain this log for a minimum of three months, unless otherwise restricted by law.
9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should include the
following:
・Verify the identity of any third-party persons claiming to be repair or maintenance
personnel, prior to granting them access to modify or troubleshoot devices.
・Do not install, replace, or return devices without verification.
・Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices).
・Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager
or security officer).
10.1 Implement audit trails to link all access to system components to each individual user.
10.1 Verify, through observation and interviewing the system administrator, that:
・Audit trails are enabled and active for system components.
・Access to system components is linked to individual users.
ISMS A.11.1.6 Delivery and loading areas
Control(s): Access point such as delivery and loading areas and other points where unauthorized
persons could enter the premises shall be controlled and, if possible, isolated form information
processing facilities to avoid unauthorized access.
9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks.
For example, network jacks located in public areas and areas accessible to visitors could be disabled and only enabled when network
access is explicitly authorized. Alternatively, processes could be implemented to ensure that visitors are escorted at all times in areas
with active network jacks.
ISMS/CLS A.11.2 Equipment (Related to Cloud Security) 
Control Objective(s): To prevent loss, damage, theft or compromise of assets and interruption to the organization's operations.
ISMS A.11.2.1 Equipment siting and protection
Control(s): Equipment shall be sited and protected to reduce the risks from env. Threats and
hazards, and opportunities for unauthorized access.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.3 Control physical access for onsite personnel to sensitive areas as follows:
・ Access must be authorized and based on individual job function.
・ Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
9.9 Examine documented policies and procedures to verify they include:
・Maintaining a list of devices.
・Periodically inspecting devices to look for tampering or substitution.
・Training personnel to be aware of suspicious behavior and to report tampering or substitution of POS devices.
ISMS A.11.2.2 Supporting utilities
Control(s): Equipment shall be protected from power failures and other disruptions caused by
failures in supporting utilities.
ISMS A.11.2.3 Cabling security
Control(s): Power and telecommunications cabling carrying data or supporting information
services shall be protected from interception, interference or damage.
ISMS A.11.2.4 Equipment maintenance
Control(s): Equipment shall be correctly maintained to ensure its continued availability and
integrity.
ISMS A.11.2.5 Removal of assets
Control(s): Equipment, information or software shall not be taken off-site w/o prior authorization.
9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to
individuals).
ISMS A.11.2.6 Security of equipment and assets off-premises
Control(s): Security shall be applied to off-site assets taking into account the different risks of
working outside the organization's premises.
1.1.2 Current diagram that identifies all connections between the cardholder data environment and other networks, including any
wireless networks.
1.1.3 Current diagram that shows all cardholder data flows across systems and networks.
9.4 Implement procedures to identify and authorize visitors.
Procedures should include the following:
2.4 Maintain an inventory of system components that are in scope for PCI DSS.
9.1.1 Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas.
Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law.
9.9 Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution.
Note: These requirements apply to card-reading devices used in card-present transactions (that is, card swipe or dip) at the point of
sale. This requirement is not intended to apply to manual key-entry components such as computer keyboards and POS keypads.
ISMS/CLS A.11.2.7 Secure disposal or re-use of equipment (Related to Cloud Security) 
Control(s): All items of equipment containing storage media shall be verified to ensure that any
sensitive data and licensed software has been removed or securely overwritten prior to disposal
or re-use.
9.8 Destroy media when it is no longer needed for business or legal reasons as follows:
9.8 Examine the periodic media destruction policy and verify that it covers all media and defines requirements for the following:
・Hard-copy materials must be crosscut shredded, incinerated, or pulped such that there
is reasonable assurance the hard-copy materials cannot be reconstructed.
・Storage containers used for materials that are to be destroyed must be secured.
・Cardholder data on electronic media must be rendered unrecoverable (e.g. via a secure wipe program in accordance with industry-
accepted standards for secure deletion, or by physically destroying the media).
ISMS A.11.2.8 Unattended user equipment
Control(s): Users shall ensure that unattended equipment has appropriate protection.
8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.)
use of these mechanisms must be assigned as follows:
9.1 Describe how consoles for the randomly selected systems were observed to be “locked” when not in use.
12.3 Develop usage policies for critical technologies and define proper use of these technologies.
・Automatic disconnect of sessions for remote-access technologies after a specific period
of inactivity.
ISMS A.11.2.9 Clear desk and clear screen policy
Control(s): A clear desk policy for papers and removable storage media and a clear screen policy
for information processing facilities shall be adopted,
8.1.8 If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session.
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication
9.1 Verify the existence of physical security controls for each computer room, data center, and other physical areas with systems in the
cardholder data environment.
  Observe a system administrator’s attempt to log into consoles for randomly selected systems in the cardholder data environment
and verify that they are “locked” to prevent unauthorized use.
ISMS/CLS A.12
ISMS/CLS A.12.1
Operations security (Related to Cloud Security)
Operational procedures and responsibilities (Related to Cloud Security) 
Control Objective(s): To endure correct and secure operations of information processing facilities.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and
telecommunication lines.
ISMS A.12.1.1 Documented operating procedures
Control(s): Operating procedures shall be documented and made available to all users who need
them.
1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected
parties.
2.5 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are
documented, in use, and known to all affected parties.
3.7 Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in use, and known
to all affected parties.
4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use,
and known to all affected parties.
5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and
known to all affected parties.
6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are
documented, in use, and known to all affected parties.
7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and
known to all affected parties.
8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is
restricted as follows:
・All user access to, user queries of, and user actions on databases are through
programmatic methods.
・Only database administrators have the ability to directly access or query databases.
・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application
processes).
8.8 Ensure that security policies and operational procedures for identification and
ISMS/CLS A.12.1.2 Change management (Related to Cloud Security) 
Control(s): Changes to the organization, business processes, information processing facilities
and systems that affect information security shall be controlled.
1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations.
6.4 Follow change control processes and procedures for all changes to system components. The processes must include the
following:
6.4.5 Change control procedures must include the following:
6.4.5.a Examine documented change-control procedures and verify procedures are defined for:
・Documentation of impact.
・Documented change approval by authorized parties.
・Functionality testing to verify that the change does not adversely impact the security of the system.
・Back-out procedures.
ISMS/CLS A12.1.3 Capacity management (Related to Cloud Security) 
Control(s): The use of resources shall be monitored, tuned and projections made of future
capacity requirements to ensure the required system performance.
(No similar or related requirements within PCI DSS v3.2.1)
ISMS A.12.1.4 Separation of development, testing and operational env.
Control(s): Development, testing, and operational environments shall be separate to reduce the
risks of unauthorized access or changes to the operational environment.
6.4.1 Separate development/test environments from production environments, and enforce the separation with access controls.
6.4.2 Separation of duties between development/test and production environments.
CLS CLD
12.1.5
Administrator's operational security (Related to Cloud Security) 
Control(s): Procedures for administrative operations of a cloud computing environment should be
defined, documented and monitored.
1.1.7.a Verify that firewall and router configuration standards require review of firewall and router rule sets at least every six months.
1.2.2.b Examine router configurations to verify they are synchronized—for example, the running (or active) configuration matches the
start-up configuration (used when machines are booted).
6.4.5.a Examine documented change control procedures and verify procedures are defined for:
  Documentation of impact
  Documented change approval by authorized parties
  Functionality testing to verify that the change does not adversely impact the security of the system
  Back-out procedures
6.4.5.4 Verify that back-out procedures are prepared for each sampled change.
6.4.6 Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or changed 
systems and networks, and documentation updated as applicable.
8.1.5 Manage IDs used by third parties to access, support, or maintain system components via remote access as follows:
  Enabled only during the time period needed and disabled when not in use.
  Monitored when in use.
ISMS A.12.2 Protection from malware 
Control Objective(s): To ensure that information and information processing facilities are protected against malware.
ISMS A.12.2.1 Controls against malware
Control(s): Detection, prevention and recovery controls to protect against malware shall be
implemented, combined with appropriate user awareness.
5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers).
5.2 Ensure that all anti-virus mechanisms are maintained as follows:
・Are kept current.
・Perform periodic scans.
・Generate audit logs which are retained per PCI DSS Requirement
5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized
by management on a case-by-case basis for a limited time period.
Note: Anti-virus solutions may be temporarily disabled only if there is legitimate technical need, as authorized by management on a
case-by-case basis. If anti-virus protection needs to be disabled for a specific purpose, it must be formally authorized. Additional
security measures may also need to be implemented for the period of time during which anti-virus protection is not active.
5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and
known to all affected parties.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example,
online, archived, or restorable from backup).
ISMS/CLS A.12.3
ISMS/CLS A.12.3.1 Information backup (Related to Cloud Security) 
Control(s): Backup copies of information, software and system images shall be taken and tested
regularly in accordance with an agreed backup policy.
3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the
following approaches:
  One-way hashes based on strong cryptography, (hash must be of the entire PAN)
  Truncation (hashing cannot be used to replace the truncated segment of PAN)
  Index tokens and pads (pads must be securely stored)
  Strong cryptography with associated key-management processes and procedures.
9.5.1 Store media backups in a secure location, preferably an off-site facility, such as an alternate or backup site, or a commercial
storage facility. Review the location’s security at least annually.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example,
online, archived, or restorable from backup).
12.10.1 Create the incident response plan to be implemented in the event of system breach. Ensure the plan addresses the following,
at a minimum:
  Business recovery and continuity procedures
  Data backup processes
ISMS/CLS A.12.4
ISMS/CLS A.12.4.1 Event logging (Related to Cloud Security) 
Control(s): Event logs recording user activities, exceptions, faults and information security events
shall be produced, kept and regularly reviewed.
10.1 Implement audit trails to link all access to system components to each individual user.
10.2 Implement automated audit trails for all system components to reconstruct the following events:
10.5 Secure audit trails so they cannot be altered.
10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without
generating alerts (although new data being added should not cause an alert).
10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.
Note: Log harvesting, parsing, and alerting tools may be used to meet this Requirement.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example,
online, archived, or restorable from backup).
ISMS A.12.4.2 Protection of log information
Control(s): Logging facilities and log information shall be protected aganst tempering and
unauthorized access.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.4 Implement procedures to identify and authorize visitors. Procedures should include the following:
10.1 Implement audit trails to link all access to system components to each individual user.
10.2 Implement automated audit trails for all system components to reconstruct the following events:
10.3 Access to all audit trails.
10.5.1 Limit viewing of audit trails to those with a job-related need.
10.5.2 Protect audit trail files from unauthorized modifications.
10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter.
10.5.4 Write logs for external-facing technologies onto a secure, centralized, internal log server or
media device.
10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without
generating alerts (although new data being added should not cause an alert).
10.6 Review logs and security events for all system components to identify anomalies or suspicious activity.
Note: Log harvesting, parsing, and alerting tools may be used to meet this Requirement.
10.6.3 Follow up exceptions and anomalies identified during the review process.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example,
online, archived, or restorable from backup).
Backup (Related to Cloud Security) 
Control Objective(s): To protect against loss of data.
Logging and monitoring (Related to Cloud Security) 
Control Objective(s): To record events and generate evidence.
ISMS/CLS A.12.4.3 Administrator and operator logs (Related to Cloud Security)
Control(s): System administrator and system operator activities shall be logged and the logs
protected and regularly reviewed.
10.2 Implement automated audit trails for all system components to reconstruct the following events:
10.2.1 All individual user accesses to cardholder data
10.2.2 All actions taken by any individual with root or administrative privileges
10.2.3 Access to all audit trails
10.2.4 Invalid logical access attempts
10.2.5 Use of and changes to identification and authentication mechanisms—including but not limited to creation of new accounts
and elevation of privileges—and all changes, additions, or deletions to accounts with root or administrative privileges
10.3 Record at least the following audit trail entries for all system components for each event:
10.2.6 Initialization, stopping, or pausing of the audit logs
10.6.1 Review the following at least daily:
  All security events
  Logs of all system components that store, process, or transmit CHD and/or SAD
  Logs of all critical system components
  Logs of all servers and system components that perform security functions (for example, firewalls, intrusion-detection
systems/intrusion-prevention systems (IDS/IPS), authentication
servers, e-commerce redirection servers, etc.).
10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as
determined by the organization’s annual risk assessment.
ISMS/CLS A.12.4.4 Clock synchronization (Related to Cloud Security)
Control(s): The clocks of all relevant information processing systems within an organization or
security domain shall be synchronized to a single reference time source.
10.4.1.a Examine the process for acquiring, distributing and storing the correct time within the organization to verify that:
  Only the designated central time server(s) receives time signals from external sources, and time signals from external sources are
based on International Atomic Time or UTC.
  Where there is more than one designated time server, the time servers peer with one another to keep accurate time,
  Systems receive time information only from designated central time server(s).
CLS CLD
12.4.5
Monitoring of Cloud Service (Related to Cloud Security) 
Control(s): The cloud service customer should have the capability to monitor aspects of the
operation of the cloud services that the cloud service customer uses.
5.2 Ensure that all anti-virus mechanisms are maintained as follows:
  Are kept current,
  Perform periodic scans
  Generate audit logs which are retained per PCI DSS Requirement 10.7.
5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized
by management on a case-by-case basis for a limited
time period.
6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendorsupplied
security patches. Install critical security patches within one month of release.
6.2.b For a sample of system components and related software, compare the list of security patches installed on each system to the
most recent vendor security-patch list, to verify the following:
  That applicable critical vendor-supplied security patches are installed within one month of release.
  All applicable vendor-supplied security patches are installed within an appropriate time frame (for example, within three months).
10.2 Implement automated audit trails for all system components to reconstruct the following events:
11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network. Monitor all
traffic at the perimeter of the cardholder data environment as well as at critical points in the cardholder data environment, and alert
personnel to suspected compromises. Keep all intrusion-detection and prevention engines, baselines, and signatures up to date.
ISMS A.12.5
ISMS A.12.5.1 Installation of software on operational systems
Control(s): Procedures shall be implemented to control the installation of software on operational
systems.
2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities
and are consistent with industry- accepted system hardening standards.
6.4.5.1 Verify that documentation of impact is included in the change control documentation for each sampled change.
ISMS/CLS A.12.6
Control of operational Software 
Control Objective(s): To ensure the integrity of operational systems.
Technical vulnerability management (Related to Cloud Security) 
Control Objective(s): To prevent exploitation of technical vulnerabilities.
ISMS/CLS A.12.6.1 Management of technical vulnerabilities (Related to Cloud Security) 
Control(s): Information about technical vulnerabilities of information systems being used shall be
obtained in a timely fashion, the organization's exposure to such vulnerabilities evaluated and
appropriate measures taken to address the associated risk,
2.2.3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure.
6.1 Establish a process to identify security vulnerabilities, using reputable outside sources for security vulnerability information, and
assign a risk ranking (for example, as “high,” “medium,” or “low”) to newly discovered security vulnerabilities.
6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied
security patches. Install critical security patches within one month of release.
Note: Critical security patches should be identified according to the risk ranking process defined in Requirement 6.1.
6.5 Address common coding vulnerabilities in software-development processes as follows:
・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities.
・Develop applications based on secure coding guidelines.
10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as
determined by the organization’s annual risk assessment.
12.2 Implement a risk assessment process, that:
・Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.),
・Identifies critical assets, threats, and vulnerabilities, and
・Results in a formal, documented analysis of risk.
Examples of risk assessment methodologies include but are not limited to OCTAVE, ISO 27005 and NIST SP 800-30.
ISMS A.12.6.2 Restrictions on software installationControl(s): Rules governing the installation of software by
users shall be established and implemented.
2.4 Maintain an inventory of system components that are in scope for PCI DSS.
2.4.a Examine system inventory to verify that a list of hardware and software components is maintained and includes a description of
function/use for each.
ISMS A.12.7
ISMS A.12.7.1 Information systems audit controls
Control(s): Audit requirements and activities involving verification of operational systems shall be
carefully planned and agreed to minimize disruptions to business processes.
ES#3.1 Assessor’s validation of defined cardholder data environment and scope accuracy.
10.2.2 All actions taken by any individual with root or administrative privileges.
10.2.3 Verify access to all audit trails is logged.
ISMS/CLS A.13
ISMS/CLS A.13.1
ISMS A.13.1.1 Network controls
Control(s): Networks shall be managed and controlled to protect information in systems and
applications.
1.1 Establish and implement firewall and router configuration standards that include the following:
1.1 Inspect the firewall and router configuration standards and other documentation specified below and verify that standards are
complete and implemented as follows:
ISMS A.13.1.2 Security of network services
Control(s): Security mechanisms, service levels and management requirements of all network
services shall be identified and included in network services agreements, whether these services
are provided in- house or outsourced,
1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the
cardholder data environment.
Note: An “untrusted network” is any network that is external to the networks belonging to the entity under review, and/or which is out of
the entity's ability to control or manage.
ISMS/CLS A.13.1.3 Segregation in networks (Related to Cloud Security) 
Control(s): Groups of information services, users and information systems shall be segregated on
networks.
Network Segmentation
Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a
PCI DSS requirement. However, it is strongly recommended as a method that may reduce:
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.
(CLD) 2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet
specific requirements as detailed in Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers.
11.3 Implement a methodology for penetration testing that includes the
following:
  Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115)
  Includes testing to validate any segmentation and scope-reduction controls
(CLD) A1 Specifically for a PCI DSS assessment of a shared hosting provider, to verify that shared hosting providers protect entities’
(merchants and service providers) hosted environment and data, select a sample of servers (Microsoft Windows and Unix/Linux)
across a representative sample of hosted merchants and service providers, and perform A1.1 through A1.4 below:
A1.2 Restrict each entity’s access and privileges to its own cardholder data environment only.
CLS CLD
13.1.4
Alignment of security management for virtual and physical networks (Related to Cloud Security) 
Control(s): Upon configuration of virtual networks, consistency of configurations between virtual
and physical networks should be verified based on the cloud service provider's network security
policy.
2.2.1 Implement only one primary function per server to prevent functions that require different security levels from co-existing on the
same server (for the both virtual technology and on-premise)
2.2.c Examine policies and interview personnel to verify that system configuration standards are applied when new systems are
configured and verified as being in place before a system is installed on the network.
ISMS A.13.2
Information systems audit considerations 
Control Objective(s): To minimize the impact of audit activities on operational systems.
Communications security (Related to Cloud Security)
Network security management (Related to Cloud Security) 
Control Objective(s): To ensure the protection of information in networks and its supporting information processing facilities.
Information transfer 
Control Objective(s): To maintain the security of information transferred within an organization and with any external entity.
ISMS A.13.2.1 Information transfer policies and procedures
Control(s): Formal transfer policies, procedures and controls shall be in place to protect the
transfer of information thru the use of all types of communication facilities.
1.1.2.a Examine diagram(s) and observe network configurations to verify that a current network diagram exists and that it documents
all connections to the cardholder data environment, including any wireless networks.
1.1.3 Current diagram that shows all cardholder data flows across systems and networks.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public
networks, including the following:
・Only trusted keys and certificates are accepted.
・The protocol in use only supports secure versions or configurations.
・The encryption strength is appropriate for the encryption methodology in use.
4.2 Never send unprotected PANs by end-user messaging technologies (for example, e- mail, instant messaging, SMS, chat, etc.).
?
ISMS A.13.2.2 Agreements on information transfer
Control(s): Agreements shall address the secure transfer of business information bet the
organization and external parties.
12.8.4 Verify that the entity maintains a program to monitor its service providers’ PCI DSS compliance status at least annually.
ISMS A.13.2.3 Electronic messagingControl(s): Information involved in electronic messaging shall be
appropriately protected.
12.3 Develop usage policies for critical technologies and define proper use of these technologies.
Note: Examples of critical technologies include, but are not limited to, remote access and wireless technologies, laptops, tablets,
removable electronic media, e-mail usage and Internet usage.
Ensure these usage policies require the following:
ISMS A.13.2.4 Confidentiality or non-disclosure agreements
Control(s): Requirements for confidentiality or non- disclosure agreements reflecting the
organization's needs for the protection of information shall be identified, regularly reviewed and
documented.
12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could
affect the security of cardholder data, as follows:
12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible
for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the
customer, or to the extent that they could impact the security of the customer’s cardholder data environment.
ISMS/CLS A.14
ISMS/CLS A.14.1
ISMS/CLS A.14.1.1 Information security requirements analysis and specification (Related to Cloud Security) 
Control(s): The information security related requirements shall be included in the requirements for
new information systems or enhancements to existing information systems.
2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities
and are consistent with industry- accepted system hardening standards. Sources of industry-accepted system hardening standards
may include, but are not limited to: ・Center for Internet Security (CIS) ・International Organization for Standardization (ISO) ・
SysAdmin Audit Network Security (SANS) Institute ・National Institute of Standards Technology (NIST)
6.3 Develop internal and external software applications (including web-based
administrative access to applications) securely, as follows: 
  In accordance with PCI DSS (for example, secure authentication and logging)
  Based on industry standards and/or best practices.
  Incorporating information security throughout the software-development life cycle
・Develop applications based on secure coding guidelines. 
6.5.a Examine software-development policies and procedures to verify that up-to-date training in secure coding techniques is
required for developers at least annually, based on industry best practices and guidance.
ISMS A.14.1.2 Securing application services on public networks
Control(s): Information involved in applications services passing over public networks shall be
protected from fraudulent activity, contract dispute and unauthorized disclosure and modification.
6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are
protected against known attacks by either of the following methods:
・Reviewing public-facing web applications via manual or automated application
vulnerability security assessment tools or methods, at least annually and after any changes.
ISMS A.14.1.3 Protecting application services transactions
Control(s): Information involved in application service transactions shall be protected to prevent
incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure,
unauthorized message duplication or replay.
1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public
networks, including the following:
・Only trusted keys and certificates are accepted.
・The protocol in use only supports secure versions or configurations.
・The encryption strength is appropriate for the encryption methodology in use.
4.2 Never send unprotected PANs by end-user messaging technologies (for example, e- mail, instant messaging, SMS, chat, etc.).
ISMS/CLS A.14.2
System acquisition, development and maintenance (Related to Cloud Security)
Security requirements of information systems (Related to Cloud Security) 
Control Objective(s): To ensure that information security is an integral part of information systems across the entire lifecycle. This also includes the requirements for information systems which provide services over
public networks.
Security in development and support processes (Related to Cloud Security) 
Control Objective(s): To endure that information security is designed and implemented within the development lifecycle of information systems.
ISMS/CLS A.14.2.1 Secure development policy (Related to Cloud Security) 
Control(s): Rules for the development of software and systems shall be established and applied
to developments within the organization.
2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities
and are consistent with industry- accepted system hardening standards.
Sources of industry-accepted system hardening standards may include, but are not limited to:
・Center for Internet Security (CIS)
・International Organization for Standardization (ISO)
・SysAdmin Audit Network Security (SANS) Institute
・National Institute of Standards Technology (NIST)
6.5 Address common coding vulnerabilities in software-development processes as follows:
・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities.
・Develop applications based on secure coding guidelines.
6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are
documented, in use, and known to all affected parties.
ISMS A.14.2.2 System change control procedures
Control(s): Changes to systems within the development lifecycle shall be controlled by the use of
formal change control procedures.
1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations
6.4 Follow change control processes and procedures for all changes to system components. The processes must include the
following:
6.4.5 Change control procedures must include the following:
6.4.5.a Examine documented change-control procedures and verify procedures are defined for:
・Documentation of impact.
・Documented change approval by authorized parties.
・Functionality testing to verify that the change does not adversely impact the security of the system.
・Back-out procedures.ISMS A.14.2.3 Technical review of applications after operating platform changes Control(s): When operating
platforms are changed, business critical applications shall be reviewed and tested to ensure there
is no adverse impact on organizational operations or security.
6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system.
ISMS A.14.2.4 Restrictions on changes to software packages
Control(s): Modifications to software packages shall be discouraged, limited to necessary
changes and all changes shall be strictly controlled.
6.4.5.2 Verify that documented approval by authorized parties is present for each sampled change.
ISMS A.14.2.5 Secure system engineering principles
Control(s): Principles for engineering secure system shall be established, documented,
maintained and applied to any information system implementation efforts,
2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities
and are consistent with industry- accepted system hardening standards.
Sources of industry-accepted system hardening standards may include, but are not limited to:
・Center for Internet Security (CIS)
・International Organization for Standardization (ISO)
・SysAdmin Audit Network Security (SANS) Institute
・National Institute of Standards Technology (NIST)
6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as
follows:
・In accordance with PCI DSS (for example, secure authentication and logging).
・Based on industry standards and/or best practices.
・Incorporate information security throughout the software development life cycle.
6.4.2 Separation of duties between development/test and production environments.
6.5 Address common coding vulnerabilities in software-development processes as follows:
・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities.
・Develop applications based on secure coding guidelines.
ISMS A.14.2.6 Secure development environment
Control(s): Organizations shall establish and appropriately protect secure development
environments for system development and integration efforts that cover the entire system
development lifecycle.
6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as
follows:
・In accordance with PCI DSS (for example, secure authentication and logging).
・Based on industry standards and/or best practices.
・Incorporate information security throughout the software development life cycle.
Note: this applies to all software developed internally as well as bespoke or custom software developed by a third party.
6.4.4 Removal of test data and accounts from system components before the system becomes active / goes into production.
ISMS A.14.2.7 Outsourced development
Control(s): The organization shall supervise and monitor the activity of outsourced system
development.
6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as
follows:
・In accordance with PCI DSS (for example, secure authentication and logging).
・Based on industry standards and/or best practices.
・Incorporate information security throughout the software development life cycle.
Note: this applies to all software developed internally as well as bespoke or custom software developed by a third party.
12.4.1 Additional requirement for service providers only: Executive management shall establish responsibility for the protection of
cardholder data and a PCI DSS compliance program to include:
・Overall accountability for maintaining PCI DSS compliance
・Defining a charter for a PCI DSS compliance program and communication to executive management
12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could
affect the security of cardholder data, as
ISMS A.14.2.8 System security testing
Control(s): Testing of security functionality shall be carried out during development.
6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system.
ISMS/CLS A.14.2.9 System acceptance testing (Related to Cloud Security)
Control(s): Acceptance testing programs and related criteria shall be established for new
information systems, upgrades, and new versions.
6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using
either manual or automated processes) to include at least the following:
  Code changes are reviewed by individuals other than the originating code author, and by individuals knowledgeable about code-
review techniques and secure coding practices.
  Code reviews ensure code is developed according to secure coding guidelines
  Appropriate corrections are implemented prior to release.
  Code-review results are reviewed and approved by management prior to release.
ISMS A.14.3
ISMS A.14.3.1 Protection of test data
Control(s): Test data shall be selected carefully, protected and controlled.
6.4.3 Production data (live PANs) are not used for testing or development.
6.4.3.a Observe testing processes and interview personnel to verify procedures are in place to ensure production data (live PANs) are
not used for testing or development.
6.4.4 Removal of test data and accounts from system components before the system becomes active / goes into production.
6.4.4.a Observe testing processes and interview personnel to verify test data and accounts are removed before a production system
becomes active.
ISMS/CLS A.15
ISMS/CLS A.15.1
ISMS/CLS A.15.1.1 Information security policy for supplier relationships. (Related to Cloud Security) 
Control(s): Information security requirements for mitigating the risks associated with supplier's
access to the organization's assets shall be agreed with the supplier and documented.
2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet specific
requirements as detailed in Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers.
12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could
affect the security of cardholder data, as follows:
12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible
for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the
customer, or to the extent that they could impact the security of the customer’s cardholder data environment.
ISMS/CLS A.15.1.2 Addressing security within supplier agreements (Related to Cloud Security) 
Control(s): All relevant information security requirements shall be established and agreed with
each supplier that may access, process, store, communicate, or provide IT infrastructure
components form the organization's information.
12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible
for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the
customer, or to the extent that they could impact the security of the customer’s cardholder data environment.
ISMS/CLS A.15.1.3 Information and communication tech supply chain (Related to Cloud Security)
Control(s): Agreements wit suppliers shall include requirements to address the information
security risks associated with information and communications tech services and product supply
chain,
12.2 Implement a risk-assessment process that:
  Is performed at least annually and upon significant changes to the environment
(for example, acquisition, merger,relocation, etc.),
  Identifies critical assets, threats, and vulnerabilities, and
  Results in a formal, documented analysis of risk.
12.8.3 Ensure there is an established process for engaging service providers including proper due diligence prior to engagement.
ISMS A.15.2
Supplier relationships (Related to Cloud Security)
Information security in supplier relationships (Related to Cloud Security) 
Control Objective(s): To endure protection of the organization's assets that is accessible by suppliers.
Supplier service delivery management 
Control Objective(s): To maintain an agreed level of information security and service delivery in line with supplier agreements.
Test data
Control Objective(s): To ensure the protection of data used for testing.
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】
Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】

More Related Content

What's hot

ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
iFour Consultancy
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
 
Tripwire Iso 27001 Wp
Tripwire Iso 27001 WpTripwire Iso 27001 Wp
Tripwire Iso 27001 Wp
ketanaagja
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
Fuangwith Sopharath
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
Mart Rovers
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
iFour Consultancy
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
khushboo
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
anilchip
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
Craig Willetts ISO Expert
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
iFour Consultancy
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
Arul Nambi
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
NQA
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
n|u - The Open Security Community
 

What's hot (20)

ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Tripwire Iso 27001 Wp
Tripwire Iso 27001 WpTripwire Iso 27001 Wp
Tripwire Iso 27001 Wp
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 

Similar to Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】

ISO20000-1 mapping to PCI 【Continuous Study】
ISO20000-1 mapping to PCI 【Continuous Study】ISO20000-1 mapping to PCI 【Continuous Study】
ISO20000-1 mapping to PCI 【Continuous Study】
Jerimi Soma
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
AvniJain836319
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
ImXaib
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
SBWebinars
 
Security
SecuritySecurity
Security
a1aass
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
Suman Garai
 
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Continual Compliance for PCI DSS, E13PA and ISO 27001/2Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
ControlCase
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
ControlCase
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
humanus2
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
PECB
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
Azra'ee Mamat
 

Similar to Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】 (20)

ISO20000-1 mapping to PCI 【Continuous Study】
ISO20000-1 mapping to PCI 【Continuous Study】ISO20000-1 mapping to PCI 【Continuous Study】
ISO20000-1 mapping to PCI 【Continuous Study】
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
 
Security
SecuritySecurity
Security
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Continual Compliance for PCI DSS, E13PA and ISO 27001/2Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 

More from Jerimi Soma

IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
IRCA ISMS Auditor Certification for Version 2022 (Since 2017)IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
Jerimi Soma
 
Another ITIL4 story of a Japanese business hotel
Another ITIL4 story of a Japanese business hotelAnother ITIL4 story of a Japanese business hotel
Another ITIL4 story of a Japanese business hotel
Jerimi Soma
 
Japan Data Privacy Auditor Certification (Since Jan. 2021)
Japan Data Privacy Auditor Certification (Since Jan. 2021)Japan Data Privacy Auditor Certification (Since Jan. 2021)
Japan Data Privacy Auditor Certification (Since Jan. 2021)
Jerimi Soma
 
ITILv3 /2011 Edition Case Study
ITILv3 /2011 Edition Case StudyITILv3 /2011 Edition Case Study
ITILv3 /2011 Edition Case Study
Jerimi Soma
 
ITIL4 Managing Professtioal
ITIL4 Managing ProfesstioalITIL4 Managing Professtioal
ITIL4 Managing Professtioal
Jerimi Soma
 
JRCA ISO27017 Cloud Security Training & Exam
JRCA ISO27017 Cloud  Security Training & ExamJRCA ISO27017 Cloud  Security Training & Exam
JRCA ISO27017 Cloud Security Training & Exam
Jerimi Soma
 
ITIL v2011 Expert 6 exams
ITIL v2011 Expert 6 examsITIL v2011 Expert 6 exams
ITIL v2011 Expert 6 exams
Jerimi Soma
 
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
Jerimi Soma
 
ISO20000-1 Training Completion in 2022
ISO20000-1 Training Completion in 2022ISO20000-1 Training Completion in 2022
ISO20000-1 Training Completion in 2022
Jerimi Soma
 
Six Sigma Black Belt
Six Sigma Black BeltSix Sigma Black Belt
Six Sigma Black Belt
Jerimi Soma
 
IRCA BCMS Lead Auditor Training & Exam
IRCA BCMS Lead Auditor Training & ExamIRCA BCMS Lead Auditor Training & Exam
IRCA BCMS Lead Auditor Training & Exam
Jerimi Soma
 
BSI ISO27001 Lead Implementer ENR-00775738
BSI ISO27001 Lead Implementer ENR-00775738BSI ISO27001 Lead Implementer ENR-00775738
BSI ISO27001 Lead Implementer ENR-00775738
Jerimi Soma
 
IRCA QMS Lead Auditor 5-day training & exam
IRCA QMS Lead Auditor 5-day training & examIRCA QMS Lead Auditor 5-day training & exam
IRCA QMS Lead Auditor 5-day training & exam
Jerimi Soma
 
IRCA ISMS Lead Auditor Training & Exam in 2014
IRCA ISMS Lead Auditor Training & Exam in 2014IRCA ISMS Lead Auditor Training & Exam in 2014
IRCA ISMS Lead Auditor Training & Exam in 2014
Jerimi Soma
 
Henry James Study
Henry James StudyHenry James Study
Henry James Study
Jerimi Soma
 
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
Jerimi Soma
 
ISO20000-1 Auditors note 【My Continuous Learning】
ISO20000-1 Auditors note 【My Continuous Learning】ISO20000-1 Auditors note 【My Continuous Learning】
ISO20000-1 Auditors note 【My Continuous Learning】
Jerimi Soma
 
Business Impact Analysis 【My Continuous Learning】
Business Impact Analysis 【My Continuous Learning】Business Impact Analysis 【My Continuous Learning】
Business Impact Analysis 【My Continuous Learning】
Jerimi Soma
 
BCMS Audit Report【My Continuous Learning】
BCMS Audit  Report【My Continuous Learning】BCMS Audit  Report【My Continuous Learning】
BCMS Audit Report【My Continuous Learning】
Jerimi Soma
 
SixSigma 【Continuous Study】
SixSigma 【Continuous Study】SixSigma 【Continuous Study】
SixSigma 【Continuous Study】
Jerimi Soma
 

More from Jerimi Soma (20)

IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
IRCA ISMS Auditor Certification for Version 2022 (Since 2017)IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
IRCA ISMS Auditor Certification for Version 2022 (Since 2017)
 
Another ITIL4 story of a Japanese business hotel
Another ITIL4 story of a Japanese business hotelAnother ITIL4 story of a Japanese business hotel
Another ITIL4 story of a Japanese business hotel
 
Japan Data Privacy Auditor Certification (Since Jan. 2021)
Japan Data Privacy Auditor Certification (Since Jan. 2021)Japan Data Privacy Auditor Certification (Since Jan. 2021)
Japan Data Privacy Auditor Certification (Since Jan. 2021)
 
ITILv3 /2011 Edition Case Study
ITILv3 /2011 Edition Case StudyITILv3 /2011 Edition Case Study
ITILv3 /2011 Edition Case Study
 
ITIL4 Managing Professtioal
ITIL4 Managing ProfesstioalITIL4 Managing Professtioal
ITIL4 Managing Professtioal
 
JRCA ISO27017 Cloud Security Training & Exam
JRCA ISO27017 Cloud  Security Training & ExamJRCA ISO27017 Cloud  Security Training & Exam
JRCA ISO27017 Cloud Security Training & Exam
 
ITIL v2011 Expert 6 exams
ITIL v2011 Expert 6 examsITIL v2011 Expert 6 exams
ITIL v2011 Expert 6 exams
 
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
QSA training & exam in 2017, 2018, 2019, 2020, 2021 and PCIP in 2022 - 2025
 
ISO20000-1 Training Completion in 2022
ISO20000-1 Training Completion in 2022ISO20000-1 Training Completion in 2022
ISO20000-1 Training Completion in 2022
 
Six Sigma Black Belt
Six Sigma Black BeltSix Sigma Black Belt
Six Sigma Black Belt
 
IRCA BCMS Lead Auditor Training & Exam
IRCA BCMS Lead Auditor Training & ExamIRCA BCMS Lead Auditor Training & Exam
IRCA BCMS Lead Auditor Training & Exam
 
BSI ISO27001 Lead Implementer ENR-00775738
BSI ISO27001 Lead Implementer ENR-00775738BSI ISO27001 Lead Implementer ENR-00775738
BSI ISO27001 Lead Implementer ENR-00775738
 
IRCA QMS Lead Auditor 5-day training & exam
IRCA QMS Lead Auditor 5-day training & examIRCA QMS Lead Auditor 5-day training & exam
IRCA QMS Lead Auditor 5-day training & exam
 
IRCA ISMS Lead Auditor Training & Exam in 2014
IRCA ISMS Lead Auditor Training & Exam in 2014IRCA ISMS Lead Auditor Training & Exam in 2014
IRCA ISMS Lead Auditor Training & Exam in 2014
 
Henry James Study
Henry James StudyHenry James Study
Henry James Study
 
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
 
ISO20000-1 Auditors note 【My Continuous Learning】
ISO20000-1 Auditors note 【My Continuous Learning】ISO20000-1 Auditors note 【My Continuous Learning】
ISO20000-1 Auditors note 【My Continuous Learning】
 
Business Impact Analysis 【My Continuous Learning】
Business Impact Analysis 【My Continuous Learning】Business Impact Analysis 【My Continuous Learning】
Business Impact Analysis 【My Continuous Learning】
 
BCMS Audit Report【My Continuous Learning】
BCMS Audit  Report【My Continuous Learning】BCMS Audit  Report【My Continuous Learning】
BCMS Audit Report【My Continuous Learning】
 
SixSigma 【Continuous Study】
SixSigma 【Continuous Study】SixSigma 【Continuous Study】
SixSigma 【Continuous Study】
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Personally Identifiable Information (ISO27701) on cloud and PCI DSS Conformity 【Continuous Study】

  • 1. ISO27001(ISMS) / ISO27017(Cloud) / ISO27018(PIMS on Cloud) / ISO27701(PIMS) PCI DSS Ver. 3.2.1 ISMS 4 ISMS 4.1 4.2 4.3 4.4 Understanding the organization and its context Understanding the needs and expectations of interested parties Determining the scope of the information security management system Information security management system ES#3.1 Assessor’s validation of defined cardholder data environment and scope accuracy ISMS 5 ISMS 5.1 5.2 5.3 Leadership and commitment Policy Organizational roles, responsibilities and authorities 12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel. 12.4.1 Additional requirement for service providers only: Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program to include: •Overall accountability for maintaining PCI DSS compliance •Defining a charter for a PCI DSS compliance program and communication to executive management A3.1.1 Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program to include: ・ Overall accountability for maintaining PCI DSS compliance ・ Defining a charter for a PCI DSS compliance program ・ Providing updates to executive management and board of directors on PCI DSS compliance initiatives and issues, including remediation activities, at least annually ISMS 6 ISMS 6.1 6.1.1 6.1.2 6.1.3 6.2 Actions to address risks and opportunities General Information security risk assessment Information security risk treatment Information security objectives and planning to achieve them A3.3.1.1 Respond to failures of any critical security controls in a timely manner. Processes for responding to failures in security controls must include: ・ Restoring security functions ・ Identifying and documenting the duration (date and time start to end) of the security failure ・ Identifying and documenting cause(s) of failure, including root cause, and documenting remediation required to address root cause ・ Identifying and addressing any security issues that arose during the failure ・ Performing a risk assessment to determine whether further actions are required as a result of the security failure. 10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as determined by the organization’s annual risk assessment. 11.5.a Verify the use of a change-detection mechanism by observing system settings and monitored files, as well as reviewing results from monitoring activities. Examples of files that should be monitored: ・ System executables ・ Application executables ・ Configuration and parameter files ・ Centrally stored, historical or archived, log and audit files ・ Additional critical files determined by entity (for example, through risk assessment or other means). 12.2 Implement a risk-assessment process that: ISMS 7 Similarity between ISO27001(ISMS) / ISO27017(Cloud) / ISO27018(PIMS on Cloud) / ISO27701(PIMS) and PCI DSS Version 3.2.1 This is Code of practice for information security controls to protect PII in public clouds acting as PII processors. Context of the organization Leadership Planning Support
  • 2. ISMS 7.1 7.2 7.3 7.4 7.5 7.5.1 7.5.2 7.5.3 7.1 Resources 7.2 Competence 7.3 Awareness 7.4 Communications 7.5 Documented information 7.5.1 General 7.5.2 Creating and updating 7.5.3 Control of documented information 1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties. 2.5 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are documented, in use, and known to all affected parties. 3.7 Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in use, and known to all affected parties. 4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties. 5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties. 6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties. 7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and known to all affected parties. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows: ・All user access to, user queries of, and user actions on databases are through programmatic methods. ・Only database administrators have the ability to directly access or query databases. ・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes). 8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known ISMS 8 ISMS 8.1 8.2 8.3 8.1 Operational planning and control 8.2 Information security risk assessment 8.3 Information security risk treatment 12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel. ISMS 9 ISMS 9.1 9.2 9.3 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit 9.3 Management review 12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment change. 12.10.6 Develop a process to modify and evolve the incident response plan according to lessons learned and to incorporate industry developments. A3.1.1 Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program to include: ・ Providing updates to executive management and board of directors on PCI DSS compliance initiatives and issues, including remediation activities, at least annually ISMS 10 ISMS 10.1 10.3 Nonconformity and corrective action Continual improvement 12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment change.ation activities, at least annually ISMS/CLS ISMS/CLS A.5 ISMS/CLS A.5.1 ISMS A.5.1.1 Policies for information security (Related to Cloud Security) Control(s): A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties. 12.1 Establish, publish, maintain, and disseminate a security policy. 12.1 Examine the information security policy and verify that the policy is published and disseminated to all relevant personnel (including vendors and business partners). ISMS A.5.1.2 Review of the policies for information security Control(s): The polities for information security shall be reviewed at planned intervals of if significant changes occur to ensure their continuing suitability, adequacy and effectiveness. 12.1 Examine the information security policy and verify that the policy is published and disseminated to all relevant personnel (including vendors and business partners). 12.1.1 Review the security policy at least annually and update the policy when business objectives or the risk environment change. 12.1.1 Verify that the information security policy is reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment. ISMS/CLS A.6 ISMS/CLS A.6.1 Code of practice for information security controls based on ISO/IEC 27002 for cloud services Internal organization (Related to Cloud Security) Control Objective(s): To establish a management framework to initiate and control the implementation and operation of information security within the organization. Organization of information security (Related to Cloud Security) Operation Performance evaluation Improvement Information security policies (Related to Cloud Security) Management direction for information security (Related to Cloud Security) Control Objective(s): To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations.
  • 3. ISMS A.6.1.1 Information security roles and responsibilities Control(s): All information security responsibilities shall be defined and allocated. 3.5.2 Examine user access lists to verify that access to keys is restricted to the fewest number of custodians necessary. 3.6.8 Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian responsibilities. 5.3.c Interview responsible personnel and observe processes to verify that anti-virus software cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period. 6.4.5.2 Verify that documented approval by authorized parties is present for each sampled change. 7.1.3 Select a sample of user IDs and interview responsible management personnel to verify that privileges assigned are based on that individual’s job classification and function. 7.2.2 Assignment of privileges to individuals based on job classification and function. 9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to individuals). 12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel. 12.4.a Verify that information security policy and procedures clearly define information security responsibilities for all personnel. 12.5 Assign to an individual or team the following information security management responsibilities: 12.5 Examine information security policies and procedures to verify: ・The formal assignment of information security to a Chief Security Officer or other security-knowledgeable member of management. ・The following information security responsibilities are specifically and formally assigned: ISMS A.6.1.2 Segregation of duties Control(s): Conflicting duties and areas of reasonability shall be segregated to reduce opportunities for unauthorized of unintentional modification of misuse of the organization's assets. 6.4 Examine policies and procedures to verify the following are defined: ・Development/test environments are separate from production environments with access control in place to enforce separation. ISMS/CLS A.6.1.3 Contact with authorities (Related to Cloud Security)  Control(s): Appropriate contacts with relevant authorities shall be maintained. 12.10 Examine the incident response plan and related procedures to verify entity is prepared to respond immediately to a system breach by performing the following: ISMS A.6.1.4 Contact with special interest groups Control(s): Appropriate contacts with special interest groups or other specialist security forms and professional associations shall be maintained. 12.10.1.a Verify that the incident response plan includes: ・Analysis of legal requirements for reporting compromises (for example, California Bill 1386, which requires notification of affected consumers in the event of an actual or suspected compromise for any business with California residents in their database). ・Reference or inclusion of incident response procedures from the payment brands. ISMS A.6.1.5 Information security in project management Control(s): Information security shall be addressed in project management, regardless of the type of the project. 6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as follows: ・In accordance with PCI DSS (for example, secure authentication and logging). ・Based on industry standards and/or best practices. ・Incorporate information security throughout the software development life cycle. ISMS/CLS A.6.2 ISMS A.6.2.1 Mobile device policy Control(s): A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices. 1.4 Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or employee/owned) that connect to the Internet when outside the network (for example, laptops used by employees), and which are also used to access the CDE. Firewall (or equivalent) configurations include: ・Specific configuration settings are defined. ・Personal firewall (or equivalent functionality) is actively running. ・Personal firewall (or equivalent functionality) is not alterable by users of the portable computing devices. 8.1.5 Manage IDs used by third parties to access, support, or maintain system components via remote access as follows: ・Enabled only during the time period needed and disabled when not in use. ・Monitored when in use. 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication 12.3 Develop usage policies for critical technologies and define proper use of these technologies. ISMS A.6.2.2 Teleworking Control(s): A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites. 1.4 Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or employee-owned) that connect to the Internet when outside the network (for example, laptops used by employees), and which are also used to access the CDE. Firewall (or equivalent) configurations include:   Specific configuration settings are defined.   Personal firewall (or equivalent functionality) is actively running.   Personal firewall (or equivalent functionality) is not alterable by users of the portable computing devices. 8.3.2 Incorporate multi-factor authentication for all remote network access (both user and administrator, and including third-party access for support or maintenance) originating from outside the entity’s network. 12.3 Develop usage policies for critical technologies and define proper use of these technologies. Mobile devices and teleworking (Related to Cloud Security) Control Objective(s): To ensure the security of teleworking and use of mobile devices.
  • 4. CLS CLD 6.3 CLS CLD 6.3.1 Shared roles and responsibilities within a cloud computing environment (Related to Cloud Security) Control(s): Responsibilities for shared information security roles in the use of the cloud service should be allocated to identified parties, documented, communicated and implemented by both the cloud service cusomer and the cloud service provider. 12.8.2 Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the security of cardholder data the service providers possess or otherwise store, process or transmit on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment. ISMS/CLS A.7 ISMS A.7.1 ISMS A.7.1.1 Screening Control(s): Background verification checks on all candidates for employments shall be carried out in accordance with relevant laws, regulations and ethics and shall be proportional to the business requirements, the classification of the information to be accessed and the perceived risks. 12.7 Screen potential personnel prior to hire to minimize the risk of attacks from internal resources. (Examples of background checks include previous employment history, criminal record, credit history, and reference checks.) ISMS A.7.1.2 Terms and conditions of employment Control(s): The contractual agreements with employees and contractors shall state their and the organizations' responsibilities for information security. 12.6.b Personnel acknowledge, in writing or electronically and at least annually, that they have read and understand the information security policy. ISMS/CLS A.7.2 ISMS/CLS A.7.2.1 Management responsibilities (Related to Cloud Security) Control(s): Management shall require all employees and contractors to apply information security in accordance with the established policies and procedures of the organization. 12.6.b Personnel acknowledge, in writing or electronically and at least annually, that they have read and understand the information security policy. ISMS/CLS A.7.2.2 Information security awareness, education and training (Related to Cloud Security)  Control(s): All employment of the organization and, where relevance contractors shall receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function. 9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should include the following: ・Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them access to modify or troubleshoot devices. ・Do not install, replace, or return devices without verification. ・Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices). ・Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager or security officer). 12.6 Implement a formal security awareness program to make all personnel aware of the cardholder data security policy and procedures. ISMS A.7.2.3 Disciplinary process Control(s): There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach. 12.6.2 Require personnel to acknowledge at least annually that they have read and understood the security policy and procedures. (Remarks: This written agreement from employees may be a triger to "disciplinary process" in ISMS.) ISMS/CLS A.7.3 ISMS A.7.3.1 Termination or change of employment responsibilities Control(s): Information security responsibilities and duties that remain valid after termination of change of employment shall be defied, communicated to the employee or contractor and enforced. 9.3 Control physical access for onsite personnel to sensitive areas as follows: ・ Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled. 9.4.2.b Verify that visitor badges or other identification expire. 9.4.3 Observe visitors leaving the facility to verify visitors are asked to surrender their badge or other identification upon departure or expiration. 12.3.3 Verify that the usage policies define: •A list of all critical devices, and •A list of personnel authorized to use the devices. ISMS/CLS A.8 ISMS/CLS A.8.1 Relationship between cloud service customers and cloud serivice providers (Related to Cloud Security) Control Objective(s): To clarify the relationship regarding shared roles and responsibilities between the cloud service customer and the cloud service provider for information secirity management. Human resource security (Related to Cloud Security) A.7.1 Prior to employment  Control Objective(s): To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered. During employment (Related to Cloud Security)  Control Objective(s): To ensure that employees and contractors are aware of and fulfil their information security responsibilities. Termination and change of employment (Related to Cloud Security) Control Objective(s): To protect the organization's interest as part of the process of changing or termination employment. Asset Management (Related to Cloud Security) Responsibility for assets (Related to Cloud Security)  Control Objective(s): To identify organizational assets and define appropriate protection responsibilities.
  • 5. ISMS/CLS A.8.1.1 Inventory of assets (Related to Cloud Security)  Control(s): Information, other assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintained. ISMS A.8.1.2 Ownership of assets Control(s): Assets maintained in the inventory shall be owned ISMS A.8.1.3 Acceptable use of assets Control(s): Rules for the acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented and implemented. 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access. 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 12.3 Develop usage policies for critical technologies and define proper use of these technologies. Identify the usage policies for all identified critical technologies reviewed to verify the following policies (12.3.1-12.3.10) are defined: ・Explicit approval from authorized parties to use the technologies. ・All technology use to be authenticated with user ID and password or other authentication item. ・A list of all devices and personnel authorized to use the devices. ・A method to accurately and readily determine owner, contact information, and purpose. ・Acceptable uses for the technology. ・Acceptable network locations for the technology. ・A list of company-approved products. ・Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity. ISMS A.8.1.4 Return of assets Control(s): All employees and external party users shall return all of the organizational assets in their possession upon termination of their employment, contract or agreement. 9.3 Control physical access for onsite personnel to sensitive areas as follows: ・Access must be authorized and based on individual job function. ・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled. CLS CLD 8.1.5 Removal of cloud service customer assets(Related to Cloud Security) Control(s): Assets of the cloud service customer that are on the cloud service provider's premises should be removed, and returned if necessary, in a timely manner upon termination of the cloud service agreement. (No similar or related requirements within PCI DSS v3.2.1) ISMS/CLS A.8.2 ISMS A.8.2.1 Classification of information Control(s): Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorized disclosure or modification. 9.6.1 Classify media so the sensitivity of the data can be determined.. ISMS/CLS A.8.2.2 Labelling of information (Related to Cloud Security) Control(s): An appropriate set of procedures for information labeling shall be developed and implemented in accordance with the information classification scheme adopted by the organization. 9.6.1 Verify that all media is classified so the sensitivity of the data can be determined. Describe how media was observed to be classified so the sensitivity of the data can be determined. ISMS A.8.2.3 Handling of assets Control(s): Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization. 3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that include at least the following for all CHD storage: ・Limiting data storage amount and retention time to that which is required for legal, regulatory, and/or business requirements. ・Specific retention requirements for cardholder data ・Processes for secure deletion of data when no longer needed. ・A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention. 9.6 Maintain strict control over the internal or external distribution of any kind of media, including the following: ISMS A.8.3 ISMS A.8.3.1 Management of removable media Control(s): Procedures shall be implemented for the management of removable media in accordance with the classification scheme adopted by the organization. 3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that include at least the following for all CHD storage: 9.7 Maintain strict control over the storage and accessibility of media. Information classification (Related to Cloud Security)  Control Objective(s): To ensure that information receives an appropriate level of protection in accordance with its importance to the organization. Media handling Control Objective(s): To present unauthorized disclosure, modification, remoaval or destruction of information stored on media. 2.4 Maintain an inventory of system components that are in scope for PCI DSS. 2.4.a Examine system inventory to verify that a list of hardware and software components is maintained and includes a description of function/use for each. 3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that include at least the following for all CHD storage: ・Limiting data storage amount and retention time to that which is required for legal, regulatory, and/or business requirements. ・Specific retention requirements for cardholder data ・Processes for secure deletion of data when no longer needed. ・A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention. 9.9 Examine documented policies and procedures to verify they include: ・Maintaining a list of devices. 11.1 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis. 12.3.3 Verify that the usage policies define: •A list of all critical devices, and •A list of personnel authorized to use the devices.
  • 6. ISMS A.8.3.2 Disposal of media Control(s): Media shall be disposed of securely when no longer required, using formal procedures. 3.1 Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that include at least the following for all CHD storage: 9.8 Destroy media when it is no longer needed for business or legal reasons as follows: ISMS A.8.3.3 Physical media transfer Control(s): Media containing information shall be protected against unauthorized access, misuse or corruption during transportation. 9.6 Maintain strict control over the internal or external distribution of any kind of media, including the following: 9.6.1 Classify media so the sensitivity of the data can be determined. 9.6.2 Send the media by secured courier or other delivery method that can be accurately tracked. 9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to individuals). ISMS/CLS A.9 ISMS/CLS A.9.1 ISMS A.9.1.1 Access control policy Control(s): An access control policy shall be established, documented and reviewed based on business and information security requirements. 1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties. 6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties. 7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and known to all affected parties. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows: ・All user access to, user queries of, and user actions on databases are through programmatic methods. ・Only database administrators have the ability to directly access or query databases. ・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes). 8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known to all affected parties. 9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in use, and known to all affected parties. 10.9 Ensure that security policies and operational procedures for monitoring all access to network resources and cardholder data are documented, in use, and known to all affected parties. ISMS/CLS A.9.1.2 Access to networks and network services (Related to Cloud Security) Control(s): Users shall only be provided with access to the network and network services that they have been specifically authorized to use. 1.1.5 Description of groups, roles, and responsibilities for management of network components. ISMS/CLS A.9.2 ISMS/CLS A.9.2.1 User registration and de-registration (Related to Cloud Security)  Control(s): A formal user registration and de-registration process shall be implemented to enable assignment of access rights. ISMS/CLS A.9.2.2 User access provisioning (Related to Cloud Security)  Control(s): A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services. ISMS/CLS A.9.2.3 Management of privileged access rights (Related to Cloud Security) Control(s): The allocation and use of privileged access rights shall be restricted and controlled. 2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network. 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access. 7.2 Examine system settings and vendor documentation to verify that an access control system(s) is implemented as follows: 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: 8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows: ・Generic user IDs are disabled or removed. ・Shared user IDs do not exist for system administration and other critical functions. ・Shared and generic user IDs are not used to administer any system components. A1.2 Restrict each entity’s access and privileges to its own cardholder data environment only. User Access Management (Related to Cloud Security) Control Objective(s): To ensure authorized user access and to prevent unauthorized access to systems and services. Access control (Related to Cloud Security) Business requirements of access control  (Related to Cloud Security) Control Objective(s): To limit access to information and information processing facilities.
  • 7. ISMS/CLS A.9.2.4 Management of secret authentication information of users (Related to Cloud Security)  Control(s): The allocation of secret authentication information shall be controlled thru a formal management process. 2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network. 3.2 Do not store sensitive authentication data after authorization (even if encrypted). If sensitive authentication data is received, render all data unrecoverable upon completion of the authorization process. 4.2 Never send unprotected PANs by end-user messaging technologies (for example, e-mail, instant messaging, SMS, chat, etc.). 8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators on all system components by employing at least one of the following methods to authenticate all users: ・Something you know, such as a password or passphrase. ・Something you have, such as a token device or smart card. ・Something you are, such as a biometric. 8.4 Document and communicate authentication policies and procedures to all users including: ・Guidance on selecting strong authentication credentials. ・Guidance for how users should protect their authentication credentials. ・Instructions not to reuse previously used passwords. ・Instructions to change passwords if there is any suspicion the password could be compromised. 8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.) use of these mechanisms must be assigned as follows: ・Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts. ・Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain access.ISMS A.9.2.5 Review of user access rights. Control(s): Asset owners shall review users' access rights at regular intervals. 10.2.5.b Verify all elevation of privileges is logged. ISMS A.9.2.6 Removal or adjustment of access rights Control(s): The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract, contract or agreement, or adjusted upon change. 2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network. 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: 8.5 Do not use group, shared, or generic IDs, passwords, or other authentication methods as follows: ・Generic user IDs are disabled or removed. ・Shared user IDs do not exist for system administration and other critical functions. ・Shared and generic user IDs are not used to administer any system components. 9.2 Develop procedures to easily distinguish between onsite personnel and visitors, to include: ・Identifying onsite personnel and visitors (for example, assigning badges). ・Changes to access requirements. ISMS A.9.3 ISMS A.9.3.1 Use of secret authentication information Control(s): Users shall be required to follow the organization's practices in the use of secret authentication information. 8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators on all system components by employing at least one of the following methods to authenticate all users: ・Something you know, such as a password or passphrase. ・Something you have, such as a token device or smart card. ・Something you are, such as a biometric. 8.4 Document and communicate authentication policies and procedures to all users including: ・Guidance on selecting strong authentication credentials. ・Guidance for how users should protect their authentication credentials. ・Instructions not to reuse previously used passwords. ・Instructions to change passwords if there is any suspicion the password could be compromised. 8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators on all system components by employing at least one of the following methods to authenticate all users: ・Something you know, such as a password or passphrase. ・Something you have, such as a token device or smart card. ・Something you are, such as a biometric. ISMS/CLS A.9.4 User responsibilities  Control Objective(s): To make users accountable for safeguarding their authentication information. System and application access control (Related to Cloud Security)  Control Objective(s): To prevent unauthorized access to systems and applications.
  • 8. ISMS/CLS A.9.4.1 Information access restriction (Related to Cloud Security) Control(s): Access to information and application system functions shall be restricted in accordance with the access control policy. 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: 8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.) use of these mechanisms must be assigned as follows: ・Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts. ・Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain access. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows: ・All user access to, user queries of, and user actions on databases are through programmatic methods. ・Only database administrators have the ability to directly access or query databases. ・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes). 9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in use, and known to all affected parties. A1.1 Ensure that each entity only runs processes that have access to that entity’s cardholder data environment. ISMS A.9.4.2 Secure log-on proceduresControl(s): Where required by the access control policy, access control policy. 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication. 8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.) use of these mechanisms must be assigned as follows: ・Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts. ・Physical and/or logical controls must be in place to ensure only the intended account ISMS A.9.4.3 Password management system Control(s): Password management system shall be interactive and shall ensure quality passwords. 8.1 Define and implement policies and procedures to ensure proper user identification management for non-consumer users and administrators on all system components as follows: ISMS A.9.4.4 Use of privileged utility programs Control(s): The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlled. 2.3 Encrypt all non-console administrative access using strong cryptography. 5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period. 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows:   All user access to, user queries of, and user actions on databases are through programmatic methods.   Only database administrators have the ability to directly access or query databases.   Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes). 10.1 Implement audit trails to link all access to system components to each individual user. 10.4.2.a Examine system configurations and timesynchronization settings to verify that access to time data is restricted to only personnel with a business need to access time data. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). ISMS A.9.4.5 Access control to program source code Control(s): Access to program source code shall be restricted. 6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using either manual or automated processes) to include at least the following: ・Code changes are reviewed by individuals other than the originating code author, and by individuals knowledgeable about code review techniques and secure coding practices. ・Code reviews ensure code is developed according to secure coding guidelines. ・Appropriate corrections are implemented prior to release. ・Code review results are reviewed and approved by management prior to release. CLS CLD 9.5 Access control of cloud service customer data in shared virtual environment (Related to Cloud Security)  Control Objective(s): To ensure migrate information security risks when using the shared virtual environment of cloud computing.
  • 9. CLS CLD 9.5.1 Segregation in virtual computing environment (Related to Cloud Security)  Control(s): A cloud service customer's customers virtual environment running on a cloud service should be protected from other cloud service customers and unauthorized persons. 1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the cardholder data environment. 2.3 Encrypt all non-console administrative access using strong cryptography. 2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet specific requirements as detailed in Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers. 7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities. 8.7.c Examine database access control settings and database application configuration settings to verify that user direct access to or queries of databases are restricted to database administrators 11.3.4 If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out- of-scope systems from systems in the CDE. A1 Specifically for a PCI DSS assessment of a shared hosting provider, to verify that shared hosting providers protect entities’ (merchants and service providers) hosted environment and data, select a sample of servers (Microsoft Windows and Unix/Linux) across a representative sample of hosted merchants and service providers, and perform A1.1 through A1.4 below: CLS CLD 9.5.2 Virtual machine hardening (Related to Cloud Security)  Control(s): Virtual machines in a cloud computing environment should be hardened to meet business needs. 1.1.6 Documentation of business justification and approval for use of all services, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure. 5.1.2 For systems considered to be not commonly affected by malicious software, perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software. 5.2 Ensure that all anti-virus mechanisms are maintained as follows:   Are kept current,   Perform periodic scans   Generate audit logs which are retained per PCI DSS Requirement 10.7 ISMS/CLS A.10 ISMS/CLS A.10.1 ISMS/CLS A.10.1.1 Policy on the use of cryptographic controls. (Related to Cloud Security)  Control(s): A policy on the use of cryptographic controls for protection of information shall be developed and implemented. 2.3 Encrypt all non-console administrative access using strong cryptography. Note: Where SSL/early TLS is used, the requirements in Appendix A2 must be completed. 3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: ・One-way hashes based on strong cryptography, (hash must be of the entire PAN). ・Truncation (hashing cannot be used to replace the truncated segment of PAN). ・Index tokens and pads (pads must be securely stored). ・Strong cryptography with associated key-management processes and procedures. 4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks, including the following: ・Only trusted keys and certificates are accepted. ・The protocol in use only supports secure versions or configurations. ・The encryption strength is appropriate for the encryption methodology in use. Note: Where SSL/early TLS is used, the requirements in Appendix A2 must be completed . 4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties. ISMS/CLS A.10.1.2 Key management (Related to Cloud Security)  Control(s): A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented thru their whole lifecycle. 3.6 Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of cardholder data, including the following: 3.6.1 Generation of strong cryptographic keys. 3.6.2 Secure cryptographic key distribution. 3.6.3 Secure cryptographic key storage. 3.6.4 Cryptographic key changes for keys that have reached the end of their cryptoperiod (for example, after a defined period of time has passed and/or after a certain amount of cipher-text has been produced by a given key), as defined by the associated application vendor or key owner, and based on industry best practices and guidelines (for example, NIST Special Publication 800-57). 3.6.6 If manual clear-text cryptographic key-management operations are used, these operations must be managed using split knowledge and dual control. 3.6.7 Prevention of unauthorized substitution of cryptographic keys. 3.6.8 Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian responsibilities. 6.5.3 Examine software-development policies and procedures and interview responsible personnel to verify that insecure cryptographic storage is addressed by coding techniques that: ISMS/CLS A.11 ISMS A.11.1 Cryptography (Related to Cloud Security) Cryptographic controls (Related to Cloud Security)  Control Objective(s): To ensure proper and effective use of cryptographic controls for protection of information shall be developed and implemented. Physical and environmental security (Related to Cloud Security) Secure areas  Control Objective(s): To prevent unauthorized physical access, damage and interference to the organization's information and information processing facilities.
  • 10. ISMS A.11.1.1 Physical security perimeter Control(s): Security perimeters shall be defied and used to protect areas that contain either sensitive or critical information and information processing facilities. 1.1.3 Current diagram that shows all cardholder data flows across systems and networks. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.1.1 Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas. Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law. 9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks. 9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines. ISMS A.11.1.2 Physical entry controls Control(s): Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access. 9.4.2 Visitors are identified and given a badge or other identification that expires and that visibly distinguishes the visitors from onsite personnel. 9.3 Control physical access for onsite personnel to sensitive areas as follows: ・Access must be authorized and based on individual job function. ・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled. 9.4 Implement procedures to identify and authorize visitors. Procedures should include the following: 9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained. ISMS A.11.1.3 Securing offices, rooms and facilities Control(s): Physical security for offices, rooms, and facilities shall be designed and applied. 9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as for computer rooms and data centers where cardholder data is stored or transmitted. Document the visitor’s name, the firm represented, and the onsite personnel authorizing physical access on the log. Retain this log for a minimum of three months, unless otherwise restricted by law. ISMS A.11.1.4 Protecting against external and environmental threats Control(s): Physical protection against natural disasters, malicious attack or accidents shall be designed and applied. 9.2 Develop procedures to easily distinguish between onsite personnel and visitors, to include: ・Identifying onsite personnel and visitors (for example, assigning badges). ・Changes to access requirements. ・Revoking or terminating onsite personnel and expired visitor identification (such as ID badges). 9.3 Control physical access for onsite personnel to sensitive areas as follows: ・Access must be authorized and based on individual job function. ・Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled. 9.4 Implement procedures to identify and authorize visitors. Procedures should include the following: 9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained. ISMS A.11.1.5 Working in secure areas Control(s): Procedures for working in secure areas shall be designed and applied. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained. 9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as for computer rooms and data centers where cardholder data is stored or transmitted. Document the visitor’s name, the firm represented, and the onsite personnel authorizing physical access on the log. Retain this log for a minimum of three months, unless otherwise restricted by law. 9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices. Training should include the following: ・Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them access to modify or troubleshoot devices. ・Do not install, replace, or return devices without verification. ・Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices). ・Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager or security officer). 10.1 Implement audit trails to link all access to system components to each individual user. 10.1 Verify, through observation and interviewing the system administrator, that: ・Audit trails are enabled and active for system components. ・Access to system components is linked to individual users. ISMS A.11.1.6 Delivery and loading areas Control(s): Access point such as delivery and loading areas and other points where unauthorized persons could enter the premises shall be controlled and, if possible, isolated form information processing facilities to avoid unauthorized access. 9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks. For example, network jacks located in public areas and areas accessible to visitors could be disabled and only enabled when network access is explicitly authorized. Alternatively, processes could be implemented to ensure that visitors are escorted at all times in areas with active network jacks. ISMS/CLS A.11.2 Equipment (Related to Cloud Security)  Control Objective(s): To prevent loss, damage, theft or compromise of assets and interruption to the organization's operations.
  • 11. ISMS A.11.2.1 Equipment siting and protection Control(s): Equipment shall be sited and protected to reduce the risks from env. Threats and hazards, and opportunities for unauthorized access. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.3 Control physical access for onsite personnel to sensitive areas as follows: ・ Access must be authorized and based on individual job function. ・ Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are returned or disabled. 9.9 Examine documented policies and procedures to verify they include: ・Maintaining a list of devices. ・Periodically inspecting devices to look for tampering or substitution. ・Training personnel to be aware of suspicious behavior and to report tampering or substitution of POS devices. ISMS A.11.2.2 Supporting utilities Control(s): Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilities. ISMS A.11.2.3 Cabling security Control(s): Power and telecommunications cabling carrying data or supporting information services shall be protected from interception, interference or damage. ISMS A.11.2.4 Equipment maintenance Control(s): Equipment shall be correctly maintained to ensure its continued availability and integrity. ISMS A.11.2.5 Removal of assets Control(s): Equipment, information or software shall not be taken off-site w/o prior authorization. 9.6.3 Ensure management approves any and all media that is moved from a secured area (including when media is distributed to individuals). ISMS A.11.2.6 Security of equipment and assets off-premises Control(s): Security shall be applied to off-site assets taking into account the different risks of working outside the organization's premises. 1.1.2 Current diagram that identifies all connections between the cardholder data environment and other networks, including any wireless networks. 1.1.3 Current diagram that shows all cardholder data flows across systems and networks. 9.4 Implement procedures to identify and authorize visitors. Procedures should include the following: 2.4 Maintain an inventory of system components that are in scope for PCI DSS. 9.1.1 Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas. Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law. 9.9 Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution. Note: These requirements apply to card-reading devices used in card-present transactions (that is, card swipe or dip) at the point of sale. This requirement is not intended to apply to manual key-entry components such as computer keyboards and POS keypads. ISMS/CLS A.11.2.7 Secure disposal or re-use of equipment (Related to Cloud Security)  Control(s): All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use. 9.8 Destroy media when it is no longer needed for business or legal reasons as follows: 9.8 Examine the periodic media destruction policy and verify that it covers all media and defines requirements for the following: ・Hard-copy materials must be crosscut shredded, incinerated, or pulped such that there is reasonable assurance the hard-copy materials cannot be reconstructed. ・Storage containers used for materials that are to be destroyed must be secured. ・Cardholder data on electronic media must be rendered unrecoverable (e.g. via a secure wipe program in accordance with industry- accepted standards for secure deletion, or by physically destroying the media). ISMS A.11.2.8 Unattended user equipment Control(s): Users shall ensure that unattended equipment has appropriate protection. 8.6 Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.) use of these mechanisms must be assigned as follows: 9.1 Describe how consoles for the randomly selected systems were observed to be “locked” when not in use. 12.3 Develop usage policies for critical technologies and define proper use of these technologies. ・Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity. ISMS A.11.2.9 Clear desk and clear screen policy Control(s): A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adopted, 8.1.8 If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session. 8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication 9.1 Verify the existence of physical security controls for each computer room, data center, and other physical areas with systems in the cardholder data environment.   Observe a system administrator’s attempt to log into consoles for randomly selected systems in the cardholder data environment and verify that they are “locked” to prevent unauthorized use. ISMS/CLS A.12 ISMS/CLS A.12.1 Operations security (Related to Cloud Security) Operational procedures and responsibilities (Related to Cloud Security)  Control Objective(s): To endure correct and secure operations of information processing facilities. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines.
  • 12. ISMS A.12.1.1 Documented operating procedures Control(s): Operating procedures shall be documented and made available to all users who need them. 1.5 Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties. 2.5 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are documented, in use, and known to all affected parties. 3.7 Ensure that security policies and operational procedures for protecting stored cardholder data are documented, in use, and known to all affected parties. 4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties. 5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties. 6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties. 7.3 Ensure that security policies and operational procedures for restricting access to cardholder data are documented, in use, and known to all affected parties. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows: ・All user access to, user queries of, and user actions on databases are through programmatic methods. ・Only database administrators have the ability to directly access or query databases. ・Application IDs for database applications can only be used by the applications (and not by individual users or other non-application processes). 8.8 Ensure that security policies and operational procedures for identification and ISMS/CLS A.12.1.2 Change management (Related to Cloud Security)  Control(s): Changes to the organization, business processes, information processing facilities and systems that affect information security shall be controlled. 1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations. 6.4 Follow change control processes and procedures for all changes to system components. The processes must include the following: 6.4.5 Change control procedures must include the following: 6.4.5.a Examine documented change-control procedures and verify procedures are defined for: ・Documentation of impact. ・Documented change approval by authorized parties. ・Functionality testing to verify that the change does not adversely impact the security of the system. ・Back-out procedures. ISMS/CLS A12.1.3 Capacity management (Related to Cloud Security)  Control(s): The use of resources shall be monitored, tuned and projections made of future capacity requirements to ensure the required system performance. (No similar or related requirements within PCI DSS v3.2.1) ISMS A.12.1.4 Separation of development, testing and operational env. Control(s): Development, testing, and operational environments shall be separate to reduce the risks of unauthorized access or changes to the operational environment. 6.4.1 Separate development/test environments from production environments, and enforce the separation with access controls. 6.4.2 Separation of duties between development/test and production environments. CLS CLD 12.1.5 Administrator's operational security (Related to Cloud Security)  Control(s): Procedures for administrative operations of a cloud computing environment should be defined, documented and monitored. 1.1.7.a Verify that firewall and router configuration standards require review of firewall and router rule sets at least every six months. 1.2.2.b Examine router configurations to verify they are synchronized—for example, the running (or active) configuration matches the start-up configuration (used when machines are booted). 6.4.5.a Examine documented change control procedures and verify procedures are defined for:   Documentation of impact   Documented change approval by authorized parties   Functionality testing to verify that the change does not adversely impact the security of the system   Back-out procedures 6.4.5.4 Verify that back-out procedures are prepared for each sampled change. 6.4.6 Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or changed  systems and networks, and documentation updated as applicable. 8.1.5 Manage IDs used by third parties to access, support, or maintain system components via remote access as follows:   Enabled only during the time period needed and disabled when not in use.   Monitored when in use. ISMS A.12.2 Protection from malware  Control Objective(s): To ensure that information and information processing facilities are protected against malware.
  • 13. ISMS A.12.2.1 Controls against malware Control(s): Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness. 5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers). 5.2 Ensure that all anti-virus mechanisms are maintained as follows: ・Are kept current. ・Perform periodic scans. ・Generate audit logs which are retained per PCI DSS Requirement 5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period. Note: Anti-virus solutions may be temporarily disabled only if there is legitimate technical need, as authorized by management on a case-by-case basis. If anti-virus protection needs to be disabled for a specific purpose, it must be formally authorized. Additional security measures may also need to be implemented for the period of time during which anti-virus protection is not active. 5.4 Ensure that security policies and operational procedures for protecting systems against malware are documented, in use, and known to all affected parties. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). ISMS/CLS A.12.3 ISMS/CLS A.12.3.1 Information backup (Related to Cloud Security)  Control(s): Backup copies of information, software and system images shall be taken and tested regularly in accordance with an agreed backup policy. 3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches:   One-way hashes based on strong cryptography, (hash must be of the entire PAN)   Truncation (hashing cannot be used to replace the truncated segment of PAN)   Index tokens and pads (pads must be securely stored)   Strong cryptography with associated key-management processes and procedures. 9.5.1 Store media backups in a secure location, preferably an off-site facility, such as an alternate or backup site, or a commercial storage facility. Review the location’s security at least annually. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). 12.10.1 Create the incident response plan to be implemented in the event of system breach. Ensure the plan addresses the following, at a minimum:   Business recovery and continuity procedures   Data backup processes ISMS/CLS A.12.4 ISMS/CLS A.12.4.1 Event logging (Related to Cloud Security)  Control(s): Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed. 10.1 Implement audit trails to link all access to system components to each individual user. 10.2 Implement automated audit trails for all system components to reconstruct the following events: 10.5 Secure audit trails so they cannot be altered. 10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert). 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity. Note: Log harvesting, parsing, and alerting tools may be used to meet this Requirement. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). ISMS A.12.4.2 Protection of log information Control(s): Logging facilities and log information shall be protected aganst tempering and unauthorized access. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.4 Implement procedures to identify and authorize visitors. Procedures should include the following: 10.1 Implement audit trails to link all access to system components to each individual user. 10.2 Implement automated audit trails for all system components to reconstruct the following events: 10.3 Access to all audit trails. 10.5.1 Limit viewing of audit trails to those with a job-related need. 10.5.2 Protect audit trail files from unauthorized modifications. 10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter. 10.5.4 Write logs for external-facing technologies onto a secure, centralized, internal log server or media device. 10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert). 10.6 Review logs and security events for all system components to identify anomalies or suspicious activity. Note: Log harvesting, parsing, and alerting tools may be used to meet this Requirement. 10.6.3 Follow up exceptions and anomalies identified during the review process. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). Backup (Related to Cloud Security)  Control Objective(s): To protect against loss of data. Logging and monitoring (Related to Cloud Security)  Control Objective(s): To record events and generate evidence.
  • 14. ISMS/CLS A.12.4.3 Administrator and operator logs (Related to Cloud Security) Control(s): System administrator and system operator activities shall be logged and the logs protected and regularly reviewed. 10.2 Implement automated audit trails for all system components to reconstruct the following events: 10.2.1 All individual user accesses to cardholder data 10.2.2 All actions taken by any individual with root or administrative privileges 10.2.3 Access to all audit trails 10.2.4 Invalid logical access attempts 10.2.5 Use of and changes to identification and authentication mechanisms—including but not limited to creation of new accounts and elevation of privileges—and all changes, additions, or deletions to accounts with root or administrative privileges 10.3 Record at least the following audit trail entries for all system components for each event: 10.2.6 Initialization, stopping, or pausing of the audit logs 10.6.1 Review the following at least daily:   All security events   Logs of all system components that store, process, or transmit CHD and/or SAD   Logs of all critical system components   Logs of all servers and system components that perform security functions (for example, firewalls, intrusion-detection systems/intrusion-prevention systems (IDS/IPS), authentication servers, e-commerce redirection servers, etc.). 10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as determined by the organization’s annual risk assessment. ISMS/CLS A.12.4.4 Clock synchronization (Related to Cloud Security) Control(s): The clocks of all relevant information processing systems within an organization or security domain shall be synchronized to a single reference time source. 10.4.1.a Examine the process for acquiring, distributing and storing the correct time within the organization to verify that:   Only the designated central time server(s) receives time signals from external sources, and time signals from external sources are based on International Atomic Time or UTC.   Where there is more than one designated time server, the time servers peer with one another to keep accurate time,   Systems receive time information only from designated central time server(s). CLS CLD 12.4.5 Monitoring of Cloud Service (Related to Cloud Security)  Control(s): The cloud service customer should have the capability to monitor aspects of the operation of the cloud services that the cloud service customer uses. 5.2 Ensure that all anti-virus mechanisms are maintained as follows:   Are kept current,   Perform periodic scans   Generate audit logs which are retained per PCI DSS Requirement 10.7. 5.3 Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case basis for a limited time period. 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendorsupplied security patches. Install critical security patches within one month of release. 6.2.b For a sample of system components and related software, compare the list of security patches installed on each system to the most recent vendor security-patch list, to verify the following:   That applicable critical vendor-supplied security patches are installed within one month of release.   All applicable vendor-supplied security patches are installed within an appropriate time frame (for example, within three months). 10.2 Implement automated audit trails for all system components to reconstruct the following events: 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network. Monitor all traffic at the perimeter of the cardholder data environment as well as at critical points in the cardholder data environment, and alert personnel to suspected compromises. Keep all intrusion-detection and prevention engines, baselines, and signatures up to date. ISMS A.12.5 ISMS A.12.5.1 Installation of software on operational systems Control(s): Procedures shall be implemented to control the installation of software on operational systems. 2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry- accepted system hardening standards. 6.4.5.1 Verify that documentation of impact is included in the change control documentation for each sampled change. ISMS/CLS A.12.6 Control of operational Software  Control Objective(s): To ensure the integrity of operational systems. Technical vulnerability management (Related to Cloud Security)  Control Objective(s): To prevent exploitation of technical vulnerabilities.
  • 15. ISMS/CLS A.12.6.1 Management of technical vulnerabilities (Related to Cloud Security)  Control(s): Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization's exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk, 2.2.3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure. 6.1 Establish a process to identify security vulnerabilities, using reputable outside sources for security vulnerability information, and assign a risk ranking (for example, as “high,” “medium,” or “low”) to newly discovered security vulnerabilities. 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches. Install critical security patches within one month of release. Note: Critical security patches should be identified according to the risk ranking process defined in Requirement 6.1. 6.5 Address common coding vulnerabilities in software-development processes as follows: ・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities. ・Develop applications based on secure coding guidelines. 10.6.2 Review logs of all other system components periodically based on the organization’s policies and risk management strategy, as determined by the organization’s annual risk assessment. 12.2 Implement a risk assessment process, that: ・Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.), ・Identifies critical assets, threats, and vulnerabilities, and ・Results in a formal, documented analysis of risk. Examples of risk assessment methodologies include but are not limited to OCTAVE, ISO 27005 and NIST SP 800-30. ISMS A.12.6.2 Restrictions on software installationControl(s): Rules governing the installation of software by users shall be established and implemented. 2.4 Maintain an inventory of system components that are in scope for PCI DSS. 2.4.a Examine system inventory to verify that a list of hardware and software components is maintained and includes a description of function/use for each. ISMS A.12.7 ISMS A.12.7.1 Information systems audit controls Control(s): Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimize disruptions to business processes. ES#3.1 Assessor’s validation of defined cardholder data environment and scope accuracy. 10.2.2 All actions taken by any individual with root or administrative privileges. 10.2.3 Verify access to all audit trails is logged. ISMS/CLS A.13 ISMS/CLS A.13.1 ISMS A.13.1.1 Network controls Control(s): Networks shall be managed and controlled to protect information in systems and applications. 1.1 Establish and implement firewall and router configuration standards that include the following: 1.1 Inspect the firewall and router configuration standards and other documentation specified below and verify that standards are complete and implemented as follows: ISMS A.13.1.2 Security of network services Control(s): Security mechanisms, service levels and management requirements of all network services shall be identified and included in network services agreements, whether these services are provided in- house or outsourced, 1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the cardholder data environment. Note: An “untrusted network” is any network that is external to the networks belonging to the entity under review, and/or which is out of the entity's ability to control or manage. ISMS/CLS A.13.1.3 Segregation in networks (Related to Cloud Security)  Control(s): Groups of information services, users and information systems shall be segregated on networks. Network Segmentation Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement. However, it is strongly recommended as a method that may reduce: 1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment. (CLD) 2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet specific requirements as detailed in Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers. 11.3 Implement a methodology for penetration testing that includes the following:   Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115)   Includes testing to validate any segmentation and scope-reduction controls (CLD) A1 Specifically for a PCI DSS assessment of a shared hosting provider, to verify that shared hosting providers protect entities’ (merchants and service providers) hosted environment and data, select a sample of servers (Microsoft Windows and Unix/Linux) across a representative sample of hosted merchants and service providers, and perform A1.1 through A1.4 below: A1.2 Restrict each entity’s access and privileges to its own cardholder data environment only. CLS CLD 13.1.4 Alignment of security management for virtual and physical networks (Related to Cloud Security)  Control(s): Upon configuration of virtual networks, consistency of configurations between virtual and physical networks should be verified based on the cloud service provider's network security policy. 2.2.1 Implement only one primary function per server to prevent functions that require different security levels from co-existing on the same server (for the both virtual technology and on-premise) 2.2.c Examine policies and interview personnel to verify that system configuration standards are applied when new systems are configured and verified as being in place before a system is installed on the network. ISMS A.13.2 Information systems audit considerations  Control Objective(s): To minimize the impact of audit activities on operational systems. Communications security (Related to Cloud Security) Network security management (Related to Cloud Security)  Control Objective(s): To ensure the protection of information in networks and its supporting information processing facilities. Information transfer  Control Objective(s): To maintain the security of information transferred within an organization and with any external entity.
  • 16. ISMS A.13.2.1 Information transfer policies and procedures Control(s): Formal transfer policies, procedures and controls shall be in place to protect the transfer of information thru the use of all types of communication facilities. 1.1.2.a Examine diagram(s) and observe network configurations to verify that a current network diagram exists and that it documents all connections to the cardholder data environment, including any wireless networks. 1.1.3 Current diagram that shows all cardholder data flows across systems and networks. 4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks, including the following: ・Only trusted keys and certificates are accepted. ・The protocol in use only supports secure versions or configurations. ・The encryption strength is appropriate for the encryption methodology in use. 4.2 Never send unprotected PANs by end-user messaging technologies (for example, e- mail, instant messaging, SMS, chat, etc.). ? ISMS A.13.2.2 Agreements on information transfer Control(s): Agreements shall address the secure transfer of business information bet the organization and external parties. 12.8.4 Verify that the entity maintains a program to monitor its service providers’ PCI DSS compliance status at least annually. ISMS A.13.2.3 Electronic messagingControl(s): Information involved in electronic messaging shall be appropriately protected. 12.3 Develop usage policies for critical technologies and define proper use of these technologies. Note: Examples of critical technologies include, but are not limited to, remote access and wireless technologies, laptops, tablets, removable electronic media, e-mail usage and Internet usage. Ensure these usage policies require the following: ISMS A.13.2.4 Confidentiality or non-disclosure agreements Control(s): Requirements for confidentiality or non- disclosure agreements reflecting the organization's needs for the protection of information shall be identified, regularly reviewed and documented. 12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data, as follows: 12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment. ISMS/CLS A.14 ISMS/CLS A.14.1 ISMS/CLS A.14.1.1 Information security requirements analysis and specification (Related to Cloud Security)  Control(s): The information security related requirements shall be included in the requirements for new information systems or enhancements to existing information systems. 2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry- accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: ・Center for Internet Security (CIS) ・International Organization for Standardization (ISO) ・ SysAdmin Audit Network Security (SANS) Institute ・National Institute of Standards Technology (NIST) 6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as follows:    In accordance with PCI DSS (for example, secure authentication and logging)   Based on industry standards and/or best practices.   Incorporating information security throughout the software-development life cycle ・Develop applications based on secure coding guidelines.  6.5.a Examine software-development policies and procedures to verify that up-to-date training in secure coding techniques is required for developers at least annually, based on industry best practices and guidance. ISMS A.14.1.2 Securing application services on public networks Control(s): Information involved in applications services passing over public networks shall be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification. 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by either of the following methods: ・Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or methods, at least annually and after any changes. ISMS A.14.1.3 Protecting application services transactions Control(s): Information involved in application service transactions shall be protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replay. 1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment. 4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks, including the following: ・Only trusted keys and certificates are accepted. ・The protocol in use only supports secure versions or configurations. ・The encryption strength is appropriate for the encryption methodology in use. 4.2 Never send unprotected PANs by end-user messaging technologies (for example, e- mail, instant messaging, SMS, chat, etc.). ISMS/CLS A.14.2 System acquisition, development and maintenance (Related to Cloud Security) Security requirements of information systems (Related to Cloud Security)  Control Objective(s): To ensure that information security is an integral part of information systems across the entire lifecycle. This also includes the requirements for information systems which provide services over public networks. Security in development and support processes (Related to Cloud Security)  Control Objective(s): To endure that information security is designed and implemented within the development lifecycle of information systems.
  • 17. ISMS/CLS A.14.2.1 Secure development policy (Related to Cloud Security)  Control(s): Rules for the development of software and systems shall be established and applied to developments within the organization. 2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry- accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: ・Center for Internet Security (CIS) ・International Organization for Standardization (ISO) ・SysAdmin Audit Network Security (SANS) Institute ・National Institute of Standards Technology (NIST) 6.5 Address common coding vulnerabilities in software-development processes as follows: ・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities. ・Develop applications based on secure coding guidelines. 6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties. ISMS A.14.2.2 System change control procedures Control(s): Changes to systems within the development lifecycle shall be controlled by the use of formal change control procedures. 1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations 6.4 Follow change control processes and procedures for all changes to system components. The processes must include the following: 6.4.5 Change control procedures must include the following: 6.4.5.a Examine documented change-control procedures and verify procedures are defined for: ・Documentation of impact. ・Documented change approval by authorized parties. ・Functionality testing to verify that the change does not adversely impact the security of the system. ・Back-out procedures.ISMS A.14.2.3 Technical review of applications after operating platform changes Control(s): When operating platforms are changed, business critical applications shall be reviewed and tested to ensure there is no adverse impact on organizational operations or security. 6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system. ISMS A.14.2.4 Restrictions on changes to software packages Control(s): Modifications to software packages shall be discouraged, limited to necessary changes and all changes shall be strictly controlled. 6.4.5.2 Verify that documented approval by authorized parties is present for each sampled change. ISMS A.14.2.5 Secure system engineering principles Control(s): Principles for engineering secure system shall be established, documented, maintained and applied to any information system implementation efforts, 2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry- accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: ・Center for Internet Security (CIS) ・International Organization for Standardization (ISO) ・SysAdmin Audit Network Security (SANS) Institute ・National Institute of Standards Technology (NIST) 6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as follows: ・In accordance with PCI DSS (for example, secure authentication and logging). ・Based on industry standards and/or best practices. ・Incorporate information security throughout the software development life cycle. 6.4.2 Separation of duties between development/test and production environments. 6.5 Address common coding vulnerabilities in software-development processes as follows: ・Train developers at least annually in up-to-date secure coding techniques, including how to avoid common coding vulnerabilities. ・Develop applications based on secure coding guidelines. ISMS A.14.2.6 Secure development environment Control(s): Organizations shall establish and appropriately protect secure development environments for system development and integration efforts that cover the entire system development lifecycle. 6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as follows: ・In accordance with PCI DSS (for example, secure authentication and logging). ・Based on industry standards and/or best practices. ・Incorporate information security throughout the software development life cycle. Note: this applies to all software developed internally as well as bespoke or custom software developed by a third party. 6.4.4 Removal of test data and accounts from system components before the system becomes active / goes into production.
  • 18. ISMS A.14.2.7 Outsourced development Control(s): The organization shall supervise and monitor the activity of outsourced system development. 6.3 Develop internal and external software applications (including web-based administrative access to applications) securely, as follows: ・In accordance with PCI DSS (for example, secure authentication and logging). ・Based on industry standards and/or best practices. ・Incorporate information security throughout the software development life cycle. Note: this applies to all software developed internally as well as bespoke or custom software developed by a third party. 12.4.1 Additional requirement for service providers only: Executive management shall establish responsibility for the protection of cardholder data and a PCI DSS compliance program to include: ・Overall accountability for maintaining PCI DSS compliance ・Defining a charter for a PCI DSS compliance program and communication to executive management 12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data, as ISMS A.14.2.8 System security testing Control(s): Testing of security functionality shall be carried out during development. 6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system. ISMS/CLS A.14.2.9 System acceptance testing (Related to Cloud Security) Control(s): Acceptance testing programs and related criteria shall be established for new information systems, upgrades, and new versions. 6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using either manual or automated processes) to include at least the following:   Code changes are reviewed by individuals other than the originating code author, and by individuals knowledgeable about code- review techniques and secure coding practices.   Code reviews ensure code is developed according to secure coding guidelines   Appropriate corrections are implemented prior to release.   Code-review results are reviewed and approved by management prior to release. ISMS A.14.3 ISMS A.14.3.1 Protection of test data Control(s): Test data shall be selected carefully, protected and controlled. 6.4.3 Production data (live PANs) are not used for testing or development. 6.4.3.a Observe testing processes and interview personnel to verify procedures are in place to ensure production data (live PANs) are not used for testing or development. 6.4.4 Removal of test data and accounts from system components before the system becomes active / goes into production. 6.4.4.a Observe testing processes and interview personnel to verify test data and accounts are removed before a production system becomes active. ISMS/CLS A.15 ISMS/CLS A.15.1 ISMS/CLS A.15.1.1 Information security policy for supplier relationships. (Related to Cloud Security)  Control(s): Information security requirements for mitigating the risks associated with supplier's access to the organization's assets shall be agreed with the supplier and documented. 2.6 Shared hosting providers must protect each entity’s hosted environment and cardholder data. These providers must meet specific requirements as detailed in Appendix A1: Additional PCI DSS Requirements for Shared Hosting Providers. 12.8 Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data, as follows: 12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment. ISMS/CLS A.15.1.2 Addressing security within supplier agreements (Related to Cloud Security)  Control(s): All relevant information security requirements shall be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components form the organization's information. 12.9 Additional requirement for service providers only: Service providers acknowledge in writing to customers that they are responsible for the security of cardholder data the service provider possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment. ISMS/CLS A.15.1.3 Information and communication tech supply chain (Related to Cloud Security) Control(s): Agreements wit suppliers shall include requirements to address the information security risks associated with information and communications tech services and product supply chain, 12.2 Implement a risk-assessment process that:   Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger,relocation, etc.),   Identifies critical assets, threats, and vulnerabilities, and   Results in a formal, documented analysis of risk. 12.8.3 Ensure there is an established process for engaging service providers including proper due diligence prior to engagement. ISMS A.15.2 Supplier relationships (Related to Cloud Security) Information security in supplier relationships (Related to Cloud Security)  Control Objective(s): To endure protection of the organization's assets that is accessible by suppliers. Supplier service delivery management  Control Objective(s): To maintain an agreed level of information security and service delivery in line with supplier agreements. Test data Control Objective(s): To ensure the protection of data used for testing.