PCI (Payment Card Industry Security Standard)_Test 9.9

PCI (Payment Card Industry Security Standard)

Restrict physical access to cardholder data

Test 9.9

9.9 Examine documented policies and procedures to verify they include: – Maintaining a list of devices – Periodically inspecting devices to look for tampering or substitution – Training personnel to be aware of suspicious behavior and to report tampering or substitution of devices.

Criminals attempt to steal cardholder data by stealing and/or manipulating card-reading devices and terminals. For example they will try to steal devices so they can learn how to break into them and they often try to replace legitimate devices with fraudulent devices that send them payment card information every time a card is entered. Criminals will also try to add “skimming” components to the outside of devices which are designed to capture payment card details before they even enter the device-for example by attaching an additional card reader on top of the legitimate card reader so that the payment card details are captured twice: once by the criminal’s component and then by the device’s legitimate component. In this way transactions may still be completed without interruption while the criminal is “skimming” the payment card information during the process. This requirement is recommended but not required for manual key-entry components such as computer keyboards and POS keypads. Additional best practices on skimming prevention are available on the PCI SSC website.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video