PCI (Payment Card Industry Security Standard)_Req 3.4.1

PCI (Payment Card Industry Security Standard)

Protect stored cardholder data

Req 3.4.1

3.4.1 If disk encryption is used (rather than file- or column-level database encryption) logical access must be managed separately and independently of native operating system authentication and access control mechanisms (for example by not using local user account databases or general network login credentials). Decryption keys must not be associated with user accounts. Note: this requirement applies in addition to all other PCI DSS encryption and key-management requirements.

The intent of this requirement is to address the acceptability of disk-level encryption for rendering cardholder data unreadable. Disk-level encryption encrypts the entire disk/partition on a computer and automatically decrypts the information when an authorized user requests it. Many disk encryption solutions intercept operating system read/write operations and carry out the appropriate cryptographic transformations without any special action by the user other than supplying a password or pass phrase upon system startup or at the beginning of a session. Based on these characteristics of disk-level encryption to be compliant with this requirement the method cannot:

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video