PCI (Payment Card Industry Security Standard)_Req 12.3.4

PCI (Payment Card Industry Security Standard)

Maintain a policy that addresses information security for all personnel

Req 12.3.4

12.3.4 A method to accurately and readily determine owner contact information and purpose (for example labeling coding and/or inventorying of devices)

Malicious individuals may breach physical security and place their own devices on the network as a “back door.” Personnel may also bypass procedures and install devices. An accurate inventory with proper device labeling allows for quick identification of non-approved installations. Consider establishing an official naming convention for devices and log all devices with established inventory controls. Logical labeling may be employed with information such as codes that can correlate the device to its owner contact information and purpose.


Click here to Start your FREE trial today!

Explainer video


What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video