PCI (Payment Card Industry Security Standard)_Req 9.8

PCI (Payment Card Industry Security Standard)

Restrict physical access to cardholder data

Req 9.8

9.8 Destroy media when it is no longer needed for business or legal reasons as follows:

If steps are not taken to destroy information contained on hard disks portable drives CD/DVDs or paper prior to disposal malicious individuals may be able to retrieve information from the disposed media leading to a data compromise. For example malicious individuals may use a technique known as “dumpster diving” where they search through trashcans and recycle bins looking for information they can use to launch an attack. Securing storage containers used for materials that are going to be destroyed prevents sensitive information from being captured while the materials are being collected. For example “to-be-shredded” containers could have a lock preventing access to its contents or physic ally prevent access to the inside of the container. Examples of methods for securely destroying electronic media include secure wiping degaussing or physical destruction (such as grinding or shredding hard disks).

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video