Address: Level 26,Fortune Financial Center,No.5 Dongsanhuanzhong Rd,Chaoyang District,Beijing Contact: Wang He Mobile: 18601920470 Tel: 010-57750598 Fax: 010-57750350 E-mail: wanghe@ugtech.com.cn |
PCI DSS is the abbreviation for Payment Card Industry Data Security Standard. It is a data security standard for the third party payment industry. It was created by the initial founders of PCI SSC, Visa, MasterCard, American Express, Discover Financial Services, and JCB etc. Its purpose is to adopt consistent international data security precautions. PCI DSS has security standard requirements on all industries that include credit card information, which include security management, policy, procedures, network architecture, and software design requirements list etc., to fully protect the safety of the trade. PCI DSS is suitable for all types of entities that involves the process of card holder data, which include but not limited to, merchants, process institutes, purchasers, issuers, service providers, and other entities that store, process or transmit card holder data. PCI DSS includes a set of basic requirements to protect card holder data, and might add additional control measures, to further lower risks. PCI DSS Certification Process
Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program 5. Protect all systems against malware and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications
Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need to know 8. Identify and authenticate access to system components 9. Restrict physical access to cardholder data
Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes
Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel
|