From c69a5f3925d992d34013e1d569ce357f29c451bf Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 1 Oct 2025 16:47:12 +0300
Subject: [PATCH 1/9] Add SUSE SLE 16 platform to build procedure
---
CMakeLists.txt | 5 ++
build_product | 1 +
products/sle16/CMakeLists.txt | 10 ++++
products/sle16/product.yml | 47 +++++++++++++++++++
products/sle16/transforms/constants.xslt | 9 ++++
products/sle16/transforms/table-style.xslt | 5 ++
.../transforms/xccdf-apply-overlay-stig.xslt | 8 ++++
.../sle16/transforms/xccdf2table-cce.xslt | 9 ++++
.../xccdf2table-profileccirefs.xslt | 9 ++++
ssg/constants.py | 5 +-
10 files changed, 106 insertions(+), 2 deletions(-)
create mode 100644 products/sle16/CMakeLists.txt
create mode 100644 products/sle16/product.yml
create mode 100644 products/sle16/transforms/constants.xslt
create mode 100644 products/sle16/transforms/table-style.xslt
create mode 100644 products/sle16/transforms/xccdf-apply-overlay-stig.xslt
create mode 100644 products/sle16/transforms/xccdf2table-cce.xslt
create mode 100644 products/sle16/transforms/xccdf2table-profileccirefs.xslt
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 774519b55e5..1bcf28ed86f 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -117,6 +117,7 @@ option(SSG_PRODUCT_RHEL10 "If enabled, the RHEL10 SCAP content will be built" ${
option(SSG_PRODUCT_RHV4 "If enabled, the RHV4 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
option(SSG_PRODUCT_SLE12 "If enabled, the SLE12 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
option(SSG_PRODUCT_SLE15 "If enabled, the SLE15 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
+option(SSG_PRODUCT_SLE16 "If enabled, the SLE16 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
option(SSG_PRODUCT_SLMICRO5 "If enabled, the SLE Micro 5 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
option(SSG_PRODUCT_SLMICRO6 "If enabled, the SLE Micro 6 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
option(SSG_PRODUCT_TENCENTOS4 "If enabled, the TencentOS Server 4 SCAP content will be built" ${SSG_PRODUCT_DEFAULT})
@@ -358,6 +359,7 @@ message(STATUS "RHEL 10: ${SSG_PRODUCT_RHEL10}")
message(STATUS "RHV 4: ${SSG_PRODUCT_RHV4}")
message(STATUS "SUSE 12: ${SSG_PRODUCT_SLE12}")
message(STATUS "SUSE 15: ${SSG_PRODUCT_SLE15}")
+message(STATUS "SUSE 16: ${SSG_PRODUCT_SLE16}")
message(STATUS "SLE Micro 5: ${SSG_PRODUCT_SLMICRO5}")
message(STATUS "SLE Micro 6: ${SSG_PRODUCT_SLMICRO6}")
message(STATUS "TencentOS Server 4: ${SSG_PRODUCT_TENCENTOS4}")
@@ -478,6 +480,9 @@ endif()
if(SSG_PRODUCT_SLE15)
add_subdirectory("products/sle15" "sle15")
endif()
+if(SSG_PRODUCT_SLE16)
+ add_subdirectory("products/sle16" "sle16")
+endif()
if(SSG_PRODUCT_SLMICRO5)
add_subdirectory("products/slmicro5" "slmicro5")
endif()
diff --git a/build_product b/build_product
index 567375462b9..bb288933456 100755
--- a/build_product
+++ b/build_product
@@ -383,6 +383,7 @@ all_cmake_products=(
RHV4
SLE12
SLE15
+ SLE16
SLMICRO5
SLMICRO6
TENCENTOS4
diff --git a/products/sle16/CMakeLists.txt b/products/sle16/CMakeLists.txt
new file mode 100644
index 00000000000..c105c69cd8a
--- /dev/null
+++ b/products/sle16/CMakeLists.txt
@@ -0,0 +1,10 @@
+# Sometimes our users will try to do: "cd sle16; cmake ." That needs to error in a nice way.
+if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_CURRENT_SOURCE_DIR}")
+ message(FATAL_ERROR "cmake has to be used on the root CMakeLists.txt, see the Building ComplianceAsCode section in the Developer Guide!")
+endif()
+
+set(PRODUCT "sle16")
+ssg_build_product("sle16")
+
+
+ssg_build_html_cce_table(${PRODUCT})
diff --git a/products/sle16/product.yml b/products/sle16/product.yml
new file mode 100644
index 00000000000..c6550fdbd65
--- /dev/null
+++ b/products/sle16/product.yml
@@ -0,0 +1,47 @@
+product: sle16
+full_name: SUSE Linux Enterprise Server 16
+type: platform
+
+families:
+ - suse
+
+major_version_ordinal: 16
+
+benchmark_id: SLE-16
+benchmark_root: "../../linux_os/guide"
+
+profiles_root: "./profiles"
+
+init_system: "systemd"
+
+pkg_manager: "zypper"
+pkg_manager_config_file: "/etc/zypp/zypp.conf"
+
+aide_bin_path: "/usr/bin/aide"
+
+cpes_root: "../../shared/applicability"
+cpes:
+ - sle16:
+ name: "cpe:/o:suse:sles:16.0"
+ title: "SUSE Linux Enterprise Server 16.0"
+ check_id: installed_OS_is_sle16
+
+platform_package_overrides:
+ login_defs: "shadow"
+ grub2: "grub2"
+ sssd: "sssd"
+ crontabs: "cronie"
+ passwd: "shadow"
+
+reference_uris:
+ suse-base-sle16: 'not_publicly_available'
+
+dconf_gdm_dir: "gdm.d"
+
+sysctl_remediate_drop_in_file: "true"
+journald_conf_dir_path: /etc/systemd/journal.d
+xwindows_packages:
+ - xorg-x11-server
+ - xorg-x11-server-extra
+ - xorg-x11-server-Xvfb
+ - xwayland
diff --git a/products/sle16/transforms/constants.xslt b/products/sle16/transforms/constants.xslt
new file mode 100644
index 00000000000..830c77a787d
--- /dev/null
+++ b/products/sle16/transforms/constants.xslt
@@ -0,0 +1,9 @@
+
+
+
+
+SUSE Linux Enterprise Server 16.0
+SLES 16
+sle16
+
+
diff --git a/products/sle16/transforms/table-style.xslt b/products/sle16/transforms/table-style.xslt
new file mode 100644
index 00000000000..8b6caeab8cd
--- /dev/null
+++ b/products/sle16/transforms/table-style.xslt
@@ -0,0 +1,5 @@
+
+
+
+
+
diff --git a/products/sle16/transforms/xccdf-apply-overlay-stig.xslt b/products/sle16/transforms/xccdf-apply-overlay-stig.xslt
new file mode 100644
index 00000000000..4789419b80a
--- /dev/null
+++ b/products/sle16/transforms/xccdf-apply-overlay-stig.xslt
@@ -0,0 +1,8 @@
+
+
+
+
+
+
+
+
diff --git a/products/sle16/transforms/xccdf2table-cce.xslt b/products/sle16/transforms/xccdf2table-cce.xslt
new file mode 100644
index 00000000000..f156a669566
--- /dev/null
+++ b/products/sle16/transforms/xccdf2table-cce.xslt
@@ -0,0 +1,9 @@
+
+
+
+
+
+
+
+
+
diff --git a/products/sle16/transforms/xccdf2table-profileccirefs.xslt b/products/sle16/transforms/xccdf2table-profileccirefs.xslt
new file mode 100644
index 00000000000..9d8d3e5faf1
--- /dev/null
+++ b/products/sle16/transforms/xccdf2table-profileccirefs.xslt
@@ -0,0 +1,9 @@
+
+
+
+
+
+
+
+
+
diff --git a/ssg/constants.py b/ssg/constants.py
index 0dd3752b308..de789d849aa 100644
--- a/ssg/constants.py
+++ b/ssg/constants.py
@@ -59,7 +59,7 @@
'openembedded',
'rhel8', 'rhel9', 'rhel10',
'rhv4',
- 'sle12', 'sle15', 'slmicro5', 'slmicro6',
+ 'sle12', 'sle15', 'sle16', 'slmicro5', 'slmicro6',
'tencentos4',
'ubuntu2204', 'ubuntu2404'
]
@@ -238,6 +238,7 @@
"Red Hat Virtualization 4": "rhv4",
"SUSE Linux Enterprise 12": "sle12",
"SUSE Linux Enterprise 15": "sle15",
+ "SUSE Linux Enterprise 16": "sle16",
"SUSE Linux Enterprise Micro 5": "slmicro5",
"SUSE Linux Enterprise Micro 6": "slmicro6",
"TencentOS Server 4": "tencentos4",
@@ -315,7 +316,7 @@
"multi_platform_rhcos": ["rhcos4"],
"multi_platform_rhel": ["rhel8", "rhel9", "rhel10"],
"multi_platform_rhv": ["rhv4"],
- "multi_platform_sle": ["sle12", "sle15"],
+ "multi_platform_sle": ["sle12", "sle15", "sle16"],
"multi_platform_slmicro": ["slmicro5", "slmicro6"],
"multi_platform_tencentos": ["tencentos4"],
"multi_platform_ubuntu": ["ubuntu2204", "ubuntu2404"],
From 28011f2abb4a4201acf9f542facb7a0c8621aa97 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 1 Oct 2025 17:46:14 +0300
Subject: [PATCH 2/9] Add initial profile for SLE16 platform
---
controls/base_sle16.yml | 23 +++++++
products/sle16/profiles/base.profile | 19 ++++++
shared/checks/oval/installed_OS_is_sle16.xml | 69 ++++++++++++++++++++
3 files changed, 111 insertions(+)
create mode 100644 controls/base_sle16.yml
create mode 100644 products/sle16/profiles/base.profile
create mode 100644 shared/checks/oval/installed_OS_is_sle16.xml
diff --git a/controls/base_sle16.yml b/controls/base_sle16.yml
new file mode 100644
index 00000000000..da44120a375
--- /dev/null
+++ b/controls/base_sle16.yml
@@ -0,0 +1,23 @@
+---
+policy: Basis System Security Profile for SUSE Linux Enterprise 16
+title: asis System Security Profile SUSE Linux Enterprise 16
+id: base_sle16
+version: '1.0'
+source: not_publicly_available
+reference_type: suse-base-sle16
+
+levels:
+ - id: high
+ - id: medium
+ - id: low
+
+product: sle16
+
+controls:
+ - id: SLES-16-16016015
+ levels:
+ - high
+ title: SLES 16 must be a vendor-supported release.
+ rules:
+ - installed_OS_is_vendor_supported
+ status: automated
diff --git a/products/sle16/profiles/base.profile b/products/sle16/profiles/base.profile
new file mode 100644
index 00000000000..b1b0d2f46d3
--- /dev/null
+++ b/products/sle16/profiles/base.profile
@@ -0,0 +1,19 @@
+documentation_complete: true
+
+metadata:
+ version: 1.0
+ SMEs:
+ - svet-se
+ - rumch-se
+ - teacup-on-rockingchair
+
+reference: not_publicly_available
+
+title: 'General System Security Profile for SUSE Linux Enterprise (SLES) 16'
+
+description: |-
+ This profile contains configuration checks that align to the
+ General System Security Profile for SUSE Linux Enterprise (SLES) 16.
+
+selections:
+ - base_sle16:all
diff --git a/shared/checks/oval/installed_OS_is_sle16.xml b/shared/checks/oval/installed_OS_is_sle16.xml
new file mode 100644
index 00000000000..282e64eb0c8
--- /dev/null
+++ b/shared/checks/oval/installed_OS_is_sle16.xml
@@ -0,0 +1,69 @@
+
+
+
+ SUSE Linux Enterprise 16
+
+ multi_platform_all
+
+
+
+ The operating system installed on the system is
+ SUSE Linux Enterprise 15.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ unix
+
+
+
+
+
+
+
+
+ ^16.*$
+
+
+ sled-release
+
+
+
+
+
+
+
+ ^16.*$
+
+
+ sles-release
+
+
+
+
+
+
+
+ ^16.*$
+
+
+ SLES_SAP-release
+
+
+
From dbd33b840cdaf53ffa8ade0cddd029458b4fbaa9 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Sun, 5 Oct 2025 15:07:40 +0300
Subject: [PATCH 3/9] Add skeleton implementation for PCI-DSS and ANSSI minimal
profiles for SLES16
---
controls/anssi_sle16.yml | 863 ++++
controls/base_sle16.yml | 25 +
controls/pcidss_4_sle16.yml | 3540 +++++++++++++++++
products/sle16/product.yml | 2 +
.../sle16/profiles/anssi_bp28_minimal.profile | 28 +
products/sle16/profiles/pci-dss-4.profile | 17 +
6 files changed, 4475 insertions(+)
create mode 100644 controls/anssi_sle16.yml
create mode 100644 controls/pcidss_4_sle16.yml
create mode 100644 products/sle16/profiles/anssi_bp28_minimal.profile
create mode 100644 products/sle16/profiles/pci-dss-4.profile
diff --git a/controls/anssi_sle16.yml b/controls/anssi_sle16.yml
new file mode 100644
index 00000000000..c0e622eefa7
--- /dev/null
+++ b/controls/anssi_sle16.yml
@@ -0,0 +1,863 @@
+---
+policy: 'ANSSI-BP-028'
+title: 'Configuration Recommendations of a GNU/Linux System'
+id: anssi_sle16
+version: '2.0'
+source: https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
+product: sle16
+
+levels:
+ - id: minimal
+ - id: intermediary
+ inherits_from:
+ - minimal
+ - id: enhanced
+ inherits_from:
+ - intermediary
+ - id: high
+ inherits_from:
+ - enhanced
+
+reference_type: anssi_sle16
+
+controls:
+ - id: R1
+ title: Hardware Support
+ levels:
+ - enhanced
+ description: >-
+ It is recommended to apply the configuration recommendations for Hardware support
+ mentioned in ANSSI DAT-24.
+ notes: >-
+ This requirement can be checked, but remediation requires manual reinstall of the OS.
+ The content automation cannot really configure the BIOS, but can in some cases,
+ check settings that are visible to the OS. Like for example the NX/DX setting.
+ status: partial
+
+ # R8 It is recommended to use hardware with support for hardware random number generator
+ # R9 Disable VT-x AMD-V technologies
+ # TODO: can we reliably check cpuinfo flags?
+ # R10 IOMMU must enabled if the hardware supports it
+ - id: R2
+ title: Hardware configuration
+ levels:
+ - intermediary
+ description: >-
+ It is recommended to apply the configuration recommendations for BIOS/UEFI mentioned in
+ ANSSI DAT-24.
+ notes: >-
+ Configurations recommended for this requirement are to be performed at the BIOS level.
+ status: manual
+
+ # From ANSSI DAT-24
+ # R11 Password protect the BIOS
+ # R12 Deactivate peripherals not needed
+ # R13 The boot order list should give highest preference to component on which final OS is installed
+ # R14 Enable NX/XD bit
+ # - bios_enable_execution_restrictions # Doesn't have check
+ # R15 Disable VT-x/AMD-V functionality
+ # R16 Enable IOMMU
+ - id: R3
+ title: UEFI Secure boot activation
+ levels:
+ - intermediary
+ description: >-
+ It is recommended to apply UEFI Secure Boot configuration of the distribution.
+ notes: >-
+ Secure Boot needs to be enabled in the UEFI Setup program.
+ Enabling Secure Boot can't be accomplished from the operating system.
+ Also, OVAL doesn't provide any reliable ways to detect the Secure Boot status.
+ Therefore, we will not provide any rules to automate this requirement.
+ We recommend checking the Secure Boot status using the `mokutil --sb-state` or `bootctl status`
+ commands.
+ status: manual
+
+ - id: R4
+ title: Replacing of preloaded keys
+ levels:
+ - high
+ description: >-
+ It is recommended to replace the UEFI preloaded keys with new keys used to sign;
+ the bootloader and Linux kernel, or; the image of the Linux kernel in EFI format.
+ notes: >-
+ This requirement is not generally automatable. The Machine Owner Key (MOK) could
+ be used to add keys to the Secure Boot db key database but manual interaction is
+ required to navigate the UEFI console and input the key password.
+ On systems where MOK utility is not supported, one will need to access the UEFI
+ firmware interface to add new keys.
+ We have no automation support for UEFI interfaces and the steps for each hardware
+ manufacturer can vary.
+ status: manual
+
+ - id: R5
+ title: Boot loader password
+ levels:
+ - intermediary
+ description: >-
+ A password protecting the boot loader must exist.
+ This password must prevent any user from changing their configuration options.
+ status: pending
+
+ - id: R6
+ title: Protecting kernel command line parameters
+ levels:
+ - high
+ description: >-
+ It is recommended that UEFI Secure Boot is used to protect the Linux Kernel
+ command line parameters during boot.
+ notes: >-
+ To protect the Linux Kernel command line one needs to create an Unified Kernel Image and use
+ it with the UEFI Secure Boot mechanism.
+ To check if the Kernel image contains the kernel command one needs to inspect the binary, on
+ the command line one can use the objdump command. But unfortunately OVAL is not able to
+ inspect kernel images.
+ Also, it is not trivial to automate creation of such image or configuration of the
+ Secure Boot mechanism.
+ status: manual
+
+ - id: R7
+ title: IOMMU Configuration Guidelines
+ levels:
+ - enhanced
+ description: >-
+ The iommu = force directive must be added to the list of kernel parameters
+ during startup in addition to those already present in the configuration
+ files of the bootloader (/boot/grub/menu.lst or /etc/default/grub).
+ status: pending
+
+ - id: R8
+ title: Memory configuration options
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R9
+ title: Kernel configuration options
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R10
+ title: Disabling the loading of kernel modules
+ levels:
+ - enhanced
+ description: >-
+ The loading of the kernel modules can be blocked by the activation of the
+ sysctl kernel.modules_disabled:
+ Prohibition of loading modules (except those already loaded to this point)
+ kernel.modules_disabled = 1
+ status: pending
+
+ - id: R11
+ title: Yama module sysctl configuration
+ levels:
+ - intermediary
+ description: >-
+ It is recommended to load the Yama security module at startup (by example
+ passing the security = yama argument to the kernel) and configure the
+ sysctl kernel.yama.ptrace_scope to a value of at least 1.
+ status: pending
+
+ - id: R12
+ title: IPv4 configuration options
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R13
+ title: Disabling IPv6
+ levels:
+ - intermediary
+ notes: >-
+ When IPv6 is not in use, disable it, otherwise secure the IPv6 stack.
+ This control hardens the IPv6 stack, to disable it use the related rules instead.
+ status: pending
+
+ - id: R14
+ title: File system configuration options
+ levels:
+ - intermediary
+ notes: >-
+ The rule for the /proc file system is not implemented
+ status: pending
+
+ - id: R15
+ title: Compile options for memory management
+ levels:
+ - high
+ status: pending
+ notes: >-
+ The special case of direct access to physical memory is not handled.
+
+ - id: R16
+ title: Compile options for kernel data structures
+ levels:
+ - high
+ status: pending
+
+ - id: R17
+ title: Compile options for the memory allocator
+ levels:
+ - high
+ status: pending
+
+ - id: R18
+ title: Compile options for the management of kernel module
+ levels:
+ - high
+ status: pending
+
+ - id: R19
+ title: Compile options for abnormal situations
+ levels:
+ - high
+ status: pending
+
+ - id: R20
+ title: Compile options for kernel security functions
+ levels:
+ - high
+ status: pending
+
+ - id: R21
+ title: Compile options for the compiler plugins
+ levels:
+ - high
+ status: pending
+
+ - id: R22
+ title: Compile options for the IP stack
+ levels:
+ - high
+ notes: >-
+ This control doesn't disable the IPv6 stack, to disable it select the related rule.
+ status: pending
+
+ - id: R23
+ title: Compile options for various kernel behaviors
+ levels:
+ - high
+ notes: >-
+ If the system can function without support for kernel modules, module support should be disabled
+ by setting CONFIG_MODULES=n.
+ status: pending
+
+ - id: R24
+ title: Compile options for 32-bit architectures
+ levels:
+ - high
+ notes: >-
+ Unless a X86 32bit kernel is explicitly supported by one of products in the project, this
+ requirement is set to not applicable.
+ status: not applicable
+
+ - id: R25
+ title: Compile options for x86_64 architectures
+ levels:
+ - high
+ status: pending
+
+ - id: R26
+ title: Compile options for ARM architectures
+ levels:
+ - high
+ notes: >-
+ Unless a ARM 32bit kernel is explicitly supported by one of products in the project, this
+ requirement is set to not applicable.
+ status: not applicable
+
+ - id: R27
+ title: Compile options for ARM 64 architectures
+ levels:
+ - high
+ status: pending
+
+ - id: R28
+ title: Partitioning type
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R29
+ title: Access Restrictions on /boot
+ levels:
+ - enhanced
+ description: >-
+ When possible, it is recommended not to automatically mount the /boot partition.
+ In any case, access to the /boot folder should only be allowed for the root user.
+ notes: >-
+ The /boot partition mounted is essential to perform certain administrative actions, for
+ example updating the kernel. Therefore, for better stability, in this requirement only rules
+ to restrict the access to /boot are selected. It is not changed how the /boot is mounted.
+ status: pending
+
+ - id: R30
+ title: Removal of unused user accounts
+ levels:
+ - minimal
+ description: >-
+ Unused user accounts must be deleted from the system.
+ notes: >-
+ The definition of unused user accounts is broad. It can include accounts
+ whose owners don't use the system anymore, or users created by services
+ or applications that should not be used.
+ Automation by itself cannot discern which accounts are used or not.
+ status: manual
+
+ - id: R31
+ title: User password strength
+ levels:
+ - minimal
+ notes: >-
+ The rules selected below establish a general password strength baseline
+ of 100 bits, based on the recommendations of the technical note
+ "Recommandations relatives à l'authentification multifacteur et aux mots de passe"
+ (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)
+
+ The baseline should be reviewed and tailored to the system's use case and needs.
+ status: pending
+
+ - id: R32
+ title: Configuring a timeout on local user sessions
+ levels:
+ - intermediary
+ description: >-
+ Local user sessions (console TTY, graphical session) must be locked after a certain period
+ of inactivity.
+ notes: >-
+ ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable
+ number.
+ status: pending
+
+ - id: R33
+ title: Use of dedicated administration accounts
+ levels:
+ - intermediary
+ notes: >-
+ By disabling direct root logins proper accountability is ensured.
+ Users will login first, then escalate to privileged (root) access.
+ Change of privilege operations must be based on executables to monitor the activities
+ performed (for example sudo).
+ Nonetheless, the content automation cannot ensure that each administrator was given a
+ nominative administration account separate from his normal user account.
+ status: pending
+
+ - id: R34
+ title: Deactivation of service accounts
+ levels:
+ - intermediary
+ notes: >-
+ It is difficult to generally identify the system's service accounts.
+ UIDs of such accounts are generally between SYS_UID_MIN and SYS_UID_MAX, but their values
+ are not enforced by the OS and can be changed over time.
+ Assisting rules could list users which are not disabled for manual review.
+ status: manual
+
+ - id: R35
+ title: Uniqueness and exclusivity of system service accounts
+ levels:
+ - intermediary
+ description: >-
+ Each service must have its own system account and be dedicated to it exclusively.
+ notes: >-
+ It is not trivial to identify whether a user account is a service account.
+ UIDs of such accounts are generally between SYS_UID_MIN and SYS_UID_MAX, but their values
+ are not enforced by the OS and can be changed over time.
+ status: manual
+
+ - id: R36
+ title: Changing the default value of UMASK
+ levels:
+ - enhanced
+ description: >-
+ The default value of UMASK for the shells must be set to 0077 in order to allow read and
+ write access to its owner only. This value can be defined in the configuration file
+ /etc/profile that most shells (bash, dash, ksh…) will use.
+ The default value of UMASK for services must be determined for each service, but in most
+ cases, it should be set to 0027 (or more restrictive). This allows read access to its owner
+ and its group, and a full access to its owner. For services such as systemd, this value can
+ be defined directly in the configuration file of the service with the directive UMask=0027.
+ notes: >-
+ There are cases of Systemd services which would stop working in case umask
+ would be configured to 0027 for all services. One such example is the
+ Cups service which needs to create sockets which need to be available for
+ all users. Therefore, this part of the requirement can't be automated.
+ status: pending
+
+ - id: R37
+ title: Using access control features
+ levels:
+ - enhanced
+ description: >-
+ It is recommended to use the mandatory access control (MAC) features in
+ addition to the traditional Unix user model (DAC), or possibly combine
+ them with partitioning mechanisms.
+ notes: >-
+ Other partitioning mechanisms can include chroot and containers and are not contemplated
+ in this requirement.
+ status: pending
+
+ - id: R38
+ title: Group dedicated to the use of sudo
+ levels:
+ - enhanced
+ description: >-
+ A group dedicated to the use of sudo must be created, and only members of this
+ group are allowed to execute sudo.
+ status: pending
+
+ - id: R39
+ title: Sudo configuration guidelines
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R40
+ title: Privileges of target sudo users
+ description: The targeted users of a rule should be, as much as possible, non privileged users.
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R41
+ title: Limiting the number of commands requiring the use of the EXEC option
+ levels:
+ - enhanced
+ description: >-
+ The commands requiring the execution of sub-processes (EXEC tag) must be
+ explicitly listed and their use should be reduced to a strict minimum.
+ notes: >-
+ Human review is required to assess if the set of commands requiring EXEC is minimal.
+ An auxiliary rule could list rules containing EXEC tag, for analysis.
+ status: manual
+
+ - id: R42
+ title: Good use of negation in a sudoers file
+ levels:
+ - intermediary
+ description: The sudoers configuration rules should not involve negation.
+ status: pending
+
+ - id: R43
+ title: Explicit arguments in sudo specifications
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R44
+ title: Editing files with sudo
+ levels:
+ - intermediary
+ description: A file requiring sudo to be edited, must be edited through the sudoedit command.
+ notes: >-
+ In R62 we established that the sudoers files should not use negations, thus the approach
+ for this requirement is to ensure that sudoedit is the only text editor allowed.
+ But it is difficult to ensure that allowed binaries aren't text editors without human
+ review.
+ status: manual
+
+ - id: R45
+ title: Enable AppArmor security profiles
+ levels:
+ - enhanced
+ description: >-
+ All AppArmor security profiles on the system must be enabled by default.
+ status: pending
+
+ - id: R46
+ title: Activate SELinux with the Targeted Policy
+ levels:
+ - high
+ description: >-
+ It is recommended to enable the targeted policy when the distribution
+ supports it and that it does not operate another security module than SELinux.
+ status: pending
+
+ - id: R47
+ title: Containment of unprivileged interactive users
+ levels:
+ - high
+ description: >-
+ Interactive non-privileged users of a system must be confined by associating them with a SELinux
+ confined user.
+ notes: Interactive users who still need to perform administrative tasks should not be confined
+ with user_u.
+ status: manual
+
+ - id: R48
+ title: Setting SELinux booleans
+ levels:
+ - high
+ description: >-
+ It is recommended to set the following Booleans:
+ allow_execheap to off, forbids processes to make their heap executable;
+ allow_execmem to off, forbids processes to have both write and execute rights on memory pages;
+ allow_execstack to off, forbids processes to make their stack executable;
+ secure_mode_insmod to on, prohibits dynamic loading of modules by any process;
+ ssh_sysadm_login to off, forbids SSH logins to connect directly in sysadmin role.
+ notes: In RHEL, the SELinux boolean allow_execheap is renamed to selinuxuser_execheap, and the
+ boolean allow_execstack is renamed to selinuxuser_execstack. And allow_execmem is not available,
+ deny_execmem provides the same functionality.
+ status: pending
+
+ - id: R49
+ title: Uninstalling SELinux Policy Debugging Tools
+ levels:
+ - high
+ description: >-
+ SELinux policy manipulation and debugging tools should not be installed
+ on a machine in production.
+ status: pending
+
+ - id: R50
+ title: Rights to access sensitive files and directories
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R51
+ title: Sensitive and trusted files
+ levels:
+ - enhanced
+ description: >-
+ All sensitive files and those contributing to the authentication mechanisms
+ must be set up as soon as the system is installed. If default secrets are
+ preconfigured, they must be replaced during, or immediately after, the
+ installation phase of the system.
+ notes: >-
+ This concerns two aspects, the first is administrative, and involves prompt
+ installation of secrets or trusted elements by the sysadmin.
+ The second involves removal of any default secret or trusted element
+ configured by the operating system during install process, e.g. default
+ known passwords.
+ status: documentation
+
+ - id: R52
+ title: Securing access for named sockets and pipes
+ levels:
+ - intermediary
+ notes: |-
+ The requirement states that all sockets and named pipes within all mounted
+ file systems should be checked. The check should look at the permissions
+ of the socket / pipe and compare them with permissions of the directory
+ which contains the particular socket. In case permissions of the directory
+ are less stricter than permissions of the socket, this should be
+ considered a finding. Since different use cases can require different
+ permissions for named pipes / sockets, it is not possible to perform this
+ check automatically.
+ status: manual
+
+ - id: R53
+ title: Files or directories without a known user or group
+ levels:
+ - minimal
+ status: automated
+ controls:
+ - base_sle16:SLES-16-16016025
+ - base_sle16:SLES-16-16016030
+
+ - id: R54
+ title: Sticky bit and write access rights
+ levels:
+ - minimal
+ status: pending
+
+ - id: R55
+ title: Temporary directories dedicated to accounts
+ levels:
+ - intermediary
+ description: >-
+ Each user or service account must have its own temporary directory
+ and dispose of it exclusively.
+ notes: The approach of the selected rules is to use and configure pam_namespace module.
+ status: pending
+
+ - id: R56
+ title: Executables with setuid and setgid bits
+ levels:
+ - minimal
+ notes: >-
+ Only programs specifically designed to be used with setuid or setgid bits can have these privilege
+ bits set.
+ This requirement considers apropriate for setuid and setgid bits the binaries that are installed
+ from
+ recognized and authorized repositories (covered in R15).
+ The remediation resets the sticky bit to intended value by vendor/developer, any finding after
+ remediation
+ should be reviewed.
+ status: pending
+
+ - id: R57
+ title: Executable with special rights setuid root and setgid root
+ levels:
+ - enhanced
+ description: >-
+ The executables with setuid executables root and setgid root special rights should be as few
+ as possible.
+ When only administrators are expected to execute them, these special rights should
+ be removed and prefer them commands like su or sudo, which can be monitored
+ notes: There could be rules to list all executables with setuid root or setgid root rights.
+ status: manual
+
+ - id: R58
+ title: Installation of packages reduced to the bare necessities
+ levels:
+ - minimal
+ description: >-
+ The selection of packages installed should be as small as possible,
+ limiting itself to select only what is required.
+ notes: >-
+ It is not possible to automatically decide in general way if a package is required or not for
+ given system.
+ As a future improvement, there could be rules assisting assessment by listing the installed
+ packages.
+ status: manual
+
+ - id: R59
+ title: Official package repositories
+ levels:
+ - minimal
+ description: Only up-to-date official repositories of the distribution must be used.
+ notes: >-
+ It is not trivial to distinguish an official repository from an unofficial one.
+ We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary
+ or behind a proxy).
+ One approach to check the origin of installed packages is to check the signature of the packages.
+ If the public key of a repository is not installed, the repo is not trusted.
+ status: pending
+
+ - id: R60
+ title: Hardened package repositories
+ levels:
+ - enhanced
+ description: >-
+ When the distribution provides several types of repositories, preference
+ should be given to those containing packages subject to additional
+ hardening measures.
+ Between two packages providing the same service, those subject to hardening
+ (at compilation, installation, or default configuration) must be preferred.
+ status: not applicable
+
+ - id: R61
+ title: Regular updates
+ levels:
+ - minimal
+ notes: Check the vendor CVE feed and configure automatic install of security related updates.
+ status: pending
+
+ - id: R62
+ title: Minimization of installed services
+ levels:
+ - minimal
+ description: >-
+ Only the components strictly necessary to the service provided by the system should
+ be installed.
+ Those whose presence can not be justified should be disabled, removed or deleted.
+ status: manual # The list of essential services is not objective.
+ notes: >-
+ Performing a minimal install is a good starting point, but doesn't provide any assurance
+ over any package installed later.
+ Manual review is required to assess if the installed services are minimal.
+ In general, use of obsolete or insecure services is not recommended and we remove some
+ of these in this recommendation.
+
+ - id: R63
+ title: Minimization of services configuration
+ levels:
+ - intermediary
+ description: >-
+ Services are often installed with default configurations that enable features potentially
+ problematic from a security point of view.
+ The features configured at the level of launched services should be limited to the strict
+ minimum.
+ notes: >-
+ Define a list of most problematic components or features to be hardened or restricted.
+ status: manual
+
+ - id: R64
+ title: Least privilege for the services
+ levels:
+ - enhanced
+ description: >-
+ The deployed services must have their access restricted to the system
+ strict minimum, especially when it comes to files, processes or network.
+ notes: >-
+ SELinux policies limit the privileges of services and daemons just to those which are required.
+ The policies should be enough to restrict the services' privileges to its essentials, but the
+ automated content cannot assess whether they are the minimum required for the deployment.
+ status: pending
+
+ - id: R65
+ title: Services partitioning
+ levels:
+ - enhanced
+ notes: >-
+ Using automation to restrict access and chroot services is not generally reliable.
+ status: manual
+
+ - id: R66
+ title: Virtualization components hardening
+ levels:
+ - high
+ description: >-
+ Each component supporting the virtualization must be hardened, especially
+ by applying technical measures to counter the exploit attempts.
+ notes: >-
+ We cannot easily automate securing of virtualization technologies in a general way.
+ It may be interesting to point out virtualization components that are installed and
+ should be hardened.
+ status: manual
+
+ - id: R67
+ title: Secure remote authentication with PAM
+ levels:
+ - intermediary
+ description: |-
+ When authentication takes place through a remote application (network),
+ the authentication protocol used by PAM must be secure (flow encryption,
+ remote server authentication, anti-replay mechanisms, ...).
+ notes: |-
+ In systems where remote authentication is handled through sssd service, PAM delegates
+ requests for remote authentication to sssd service through a local Unix socket. The sssd
+ service can use IPA, AD or LDAP as a remote database containing information required for authentication.
+ In case LDAP is configured manually, there are several configuration options which should be chedked.
+ status: pending
+
+ - id: R68
+ title: Protecting stored passwords
+ levels:
+ - minimal
+ description: Any password must be protected by cryptographic mechanisms.
+ notes: >-
+ The selection of rules doesn't cover the use of hardware devices to protect the passwords.
+ status: supported
+
+ - id: R69
+ title: Securing access to remote user databases
+ levels:
+ - intermediary
+ description: |-
+ When the user databases are stored on a remote network service, NSS must
+ be configured to establish a secure link that allows, at minimum, to
+ authenticate the server and protect the communication channel.
+ notes: |-
+ A nsswitch service connecting to remote database is provided by sssd. This is checked in requirement R67.
+ Another such service is winbind which is by default configured to connect securely to Samba domains.
+ Other relevant services are NIS and Hesiod. These should not be used.
+ status: pending
+
+ - id: R70
+ title: Separation of System Accounts and Directory Administrator
+ levels:
+ - intermediary
+ status: manual
+
+ - id: R71
+ title: Implement a logging system
+ levels:
+ - enhanced
+ description: >-
+ The configuration of the service must be performed according to the
+ 'Security Recommendations for the architecture of a logging system'
+ (DAT-PA-012 v2.0) accessible on the ANSSI website
+ (https://www.ssi.gouv.fr/journalisation).
+ notes: >-
+ A lot of recommendations and requirements from the DAT-PA-012 document are administrative and
+ hard to automate.
+ The rules selected below address a few of the aspects that can be covered, keep in mind that
+ these configurations should
+ be customized for the systems deployment requirements.
+ status: pending
+
+ - id: R72
+ title: Service Activity Logs
+ levels:
+ - enhanced
+ description: >-
+ Each service must have a dedicated event logging journal on the system.
+ This log must only be accessible by the syslog server, and must not be readable,
+ editable or deletable by the service directly.
+ status: documentation # How to enable syslog for each service installed in the system
+
+ - id: R73
+ title: Logging activity by auditd
+ levels:
+ - enhanced
+ description: >-
+ The logging of the system activity must be done through the auditd service.
+ status: pending
+
+ - id: R74
+ title: Configuring the local messaging service
+ levels:
+ - intermediary
+ status: pending
+
+ - id: R75
+ title: Messaging Aliases for Service Accounts
+ levels:
+ - intermediary
+ status: pending # semi-automated
+ notes: >-
+ Only the alias for root user is covered by the rule.
+ The other services cannot be reliably covered, as there is no simple way
+ of determining what is a service account.
+
+ - id: R76
+ title: Sealing and integrity of files
+ levels:
+ - high
+ description: >-
+ Any file that is not transient (such as temporary files, databases, etc.)
+ must be monitored by a sealing program.
+ This includes: directories containing executables, libraries,
+ configuration files, as well as any files that may contain sensitive
+ elements (cryptographic keys, passwords, confidential data).
+ status: pending
+
+ - id: R77
+ title: Protection of the seals database
+ levels:
+ - high
+ description: >-
+ The sealing database must be protected from malicious access by
+ cryptographic signature mechanisms (with the key used for the signature
+ not locally stored in clear), or possibly stored on a separate machine
+ of the one on which the sealing is done.
+ Check section "Database and config signing in AIDE manual"
+ https://aide.github.io/doc/#signing
+ status: does not meet
+
+ - id: R78
+ title: Network services partitioning
+ levels:
+ - enhanced
+ description: >-
+ Network services should as much as possible be hosted on isolated environments.
+ This avoids having other potentially affected services if one of them gets
+ compromised under the same environment.
+ notes: >-
+ Manual analysis is required to determine if services are hosted appropriately in
+ separate or isolated system while maintaining functionality.
+ status: manual
+
+ - id: R79
+ title: Hardening and monitoring of exposed services
+ levels:
+ - intermediary
+ notes: >-
+ SELinux can provide confinement and monitoring of services, and AIDE provides
+ basic integrity checking. System logs are configured as part of R43.
+ Hardening of particular services should be done on a case by case basis and is
+ not automated by this content.
+ status: pending
+
+ - id: R80
+ title: Minimization of network services
+ levels:
+ - minimal
+ description: All network services must be listening on the correct network intefaces.
+ notes: >-
+ Manual review is necessary to decide if the list of resident daemons is minimal.
+ Assisting rules could be created to list sevices listening on the network for manual review.
+ status: manual
diff --git a/controls/base_sle16.yml b/controls/base_sle16.yml
index da44120a375..df7829df7a8 100644
--- a/controls/base_sle16.yml
+++ b/controls/base_sle16.yml
@@ -21,3 +21,28 @@ controls:
rules:
- installed_OS_is_vendor_supported
status: automated
+
+ - id: SLES-16-16016020
+ title: Enable NX/XD Support
+ levels:
+ - medium
+ automated: partially
+ rules:
+ - bios_enable_execution_restrictions
+ - install_PAE_kernel_on_x86-32
+
+ - id: SLES-16-16016025
+ title: Ensure All Files Are Owned by a Group
+ levels:
+ - medium
+ rules:
+ - file_permissions_ungroupowned
+ status: automated
+
+ - id: SLES-16-16016030
+ title: Ensure All Files Are Owned by a Use
+ levels:
+ - medium
+ rules:
+ - no_files_unowned_by_user
+ status: automated
diff --git a/controls/pcidss_4_sle16.yml b/controls/pcidss_4_sle16.yml
new file mode 100644
index 00000000000..de1e0a939ab
--- /dev/null
+++ b/controls/pcidss_4_sle16.yml
@@ -0,0 +1,3540 @@
+---
+policy: PCI-DSS
+title: Payment Card Industry - Data Security Standard (PCI-DSS)
+id: pcidss_4_sle16
+version: '4.0.1'
+source: https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0_1.pdf
+product: sle16
+
+levels:
+ - id: base
+
+reference_type: pcidss4_sle16
+
+controls:
+ - id: '1.1'
+ title: 'Processes and mechanisms for installing and maintaining network security controls are defined
+ and understood.'
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 1.1.1
+ title: 'All security policies and operational procedures that are identified in Requirement
+ 1 are Documented, Kept up to date, In use and Known to all affected parties.'
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 1 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 1.1.2
+ title: 'Roles and responsibilities for performing activities in Requirement 1 are documented,
+ assigned, and understood.'
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 1 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '1.2'
+ title: 'Network Security Controls (NSCs) are configured and maintained.'
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 1.2.1
+ title: 'Configuration standards for NSC rulesets are Defined, Implemented and Maintained.'
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Examples of NSCs covered by these configuration standards include, but are not limited to,
+ firewalls, routers configured with access control lists, and cloud virtual networks. The
+ objective of this requirement is to ensure the way that NSCs are configured and operate
+ are defined and consistently applied. While the tooling and standards can be automated,
+ the review of allowed accesses should be manual as different sites may have different
+ policies.
+
+ - id: 1.2.2
+ title: 'All changes to network connections and to configurations of NSCs are approved and
+ managed in accordance with the change control process defined at Requirement 6.5.1.'
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Changes to network connections and NSCs cannot result in misconfiguration, implementation
+ of insecure services, or unauthorized network connections. Changes to network connections
+ include the addition, removal, or modification of a connection. Changes to NSC
+ configurations include those related to the component itself as well as those affecting
+ how it performs its security function. A formal change control process should be in place.
+
+ - id: 1.2.3
+ title: 'An accurate network diagram(s) is maintained that shows all connections between the
+ CDE and other networks, including any wireless networks.'
+ levels:
+ - base
+ status: manual
+ notes: |-
+ A representation of the boundaries between the CDE, all trusted networks, and all
+ untrusted networks, is maintained and available. A current network diagram(s) or other
+ technical or topological solution that identifies network connections and devices can be
+ used to meet this requirement.
+
+ - id: 1.2.4
+ title: 'An accurate data-flow diagram(s) is maintained'
+ description: |-
+ An accurate data-flow diagram(s) is maintained that meets the following:
+ - Shows all account data flows across systems and networks
+ - Updated as needed upon changes to the environment
+ levels:
+ - base
+ status: manual
+
+ - id: 1.2.5
+ title: 'All services, protocols, and ports allowed are identified, approved, and have a defined
+ business need.'
+ levels:
+ - base
+ status: manual
+
+ - id: 1.2.6
+ title: Security features are defined and implemented for all services, protocols, and ports
+ that are in use and considered to be insecure, such that the risk is mitigated.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ The specific risks associated with the use of insecure services, protocols, and ports are
+ understood, assessed, and appropriately mitigated. The selected rules here basically
+ remove services without encryption and restricted some common services.
+
+ - id: 1.2.7
+ title: Configurations of NSCs are reviewed at least once every six months to confirm they
+ are relevant and effective.
+ description: |-
+ NSC configurations that allow or restrict access to trusted networks are verified
+ periodically to ensure that only authorized connections with a current business
+ justification are permitted.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Some configuration automation solution, such as Ansible could be helpful here.
+
+ - id: 1.2.8
+ title: Configuration files for NSCs are secured from unauthorized access and kept consistent
+ with active network configurations.
+ levels:
+ - base
+ status: pending
+
+ - id: '1.3'
+ title: Network access to and from the cardholder data environment is restricted.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 1.3.1
+ title: Inbound traffic to the CDE is restricted to only traffic that is necessary
+ description: |-
+ Inbound traffic to the CDE is restricted as follows:
+ - To only traffic that is necessary.
+ - All other traffic is specifically denied.
+ levels:
+ - base
+ status: pending
+
+ - id: 1.3.2
+ title: Outbound traffic from the CDE is restricted to only traffic that is necessary
+ description: |-
+ Outbound traffic from the CDE is restricted as follows:
+ - To only traffic that is necessary.
+ - All other traffic is specifically denied.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ It appears there is no rule in the project to restrict outbound traffic on the firewall.
+ Perhaps a rule to automates this would do more harm than good. Probably a manual
+ assessment is more reasonable here.
+
+ - id: 1.3.3
+ title: NSCs are installed between all wireless networks and the CDE, regardless of whether
+ the wireless network is a CDE.
+ description: |-
+ NSCs are installed between all wireless networks and the CDE, regardless of whether the
+ wireless network is a CDE, such that:
+ - All wireless traffic from wireless networks into the CDE is denied by default.
+ - Only wireless traffic with an authorized business purpose is allowed into the CDE.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Wireless interfaces are not expected in servers so they are disabled by default in this
+ policy.
+
+ - id: '1.4'
+ title: Network connections between trusted and untrusted networks are controlled.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 1.4.1
+ title: NSCs are implemented between trusted and untrusted networks.
+ description: |-
+ Unauthorized traffic cannot traverse network boundaries between trusted and untrusted
+ networks.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Trusted and untrusted networks are expected to be different for each environment.
+ But loopback traffic is assumed to be trusted and even necessary for some services.
+ This requirement is complements 1.2.1 and 1.3.1 requirements.
+
+ - id: 1.4.2
+ title: Inbound traffic from untrusted networks to trusted networks is restricted.
+ description: |-
+ Inbound traffic from untrusted networks to trusted networks is restricted to:
+ - Communications with system components that are authorized to provide publicly accessible
+ services, protocols, and ports.
+ - Stateful responses to communications initiated by system components in a trusted network.
+ - All other traffic is denied.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Probably missing some relevant IPv6 related rules. Needs to be investigated.
+
+ - id: 1.4.3
+ title: Anti-spoofing measures are implemented to detect and block forged source IP addresses
+ from entering the trusted network.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Probably missing some relevant IPv6 related rules. Needs to be investigated.
+
+ - id: 1.4.4
+ title: System components that store cardholder data are not directly accessible from untrusted
+ networks.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is not intended to apply to storage of account data in volatile memory
+ but does apply where memory is being treated as persistent storage (for example, RAM
+ disk). Account data can only be stored in volatile memory during the time necessary to
+ support the associated business process (for example, until completion of the related
+ payment card transaction).
+
+ - id: 1.4.5
+ title: The disclosure of internal IP addresses and routing information is limited to only
+ authorized parties.
+ description: |-
+ Internal network information is protected from unauthorized disclosure.
+ levels:
+ - base
+ status: pending
+
+ - id: '1.5'
+ title: Risks to the CDE from computing devices that are able to connect to both untrusted networks
+ and the CDE are mitigated.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 1.5.1
+ title: Security controls are implemented on any computing devices, including company- and
+ employee-owned devices, that connect to both untrusted networks (including the Internet)
+ and the CDE
+ description: |-
+ Security controls are implemented on any computing devices, including company- and
+ employee-owned devices, that connect to both untrusted networks (including the Internet)
+ and the CDE as follows:
+ - Specific configuration settings are defined to prevent threats being introduced into the
+ entity's network.
+ - Security controls are actively running.
+ - Security controls are not alterable by users of the computing devices unless
+ specifically documented and authorized by management on a case-by-case basis for a limited
+ period.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ To ensure this requirement, a manual analysis of site policy and topology is inevitable.
+ From the technical perspective, previous requirements should already cover this
+ requirement at some level.
+
+ - id: '2.1'
+ title: Processes and mechanisms for applying secure configurations to all system components are
+ defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 2.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 2 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 2 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 2.1.2
+ title: Roles and responsibilities for performing activities in Requirement 2 are documented,
+ assigned, and understood.
+ description: |-
+ Day-to-day responsibilities for performing all the activities in Requirement 2 are
+ allocated. Personnel are accountable for successful, continuous operation of these
+ requirements.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 2 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '2.2'
+ title: 'System components are configured and managed securely.'
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 2.2.1
+ title: Configuration standards are developed, implemented, and maintained
+ description: |-
+ Configuration standards are developed, implemented, and maintained to:
+ - Cover all system components.
+ - Address all known security vulnerabilities.
+ - Be consistent with industry-accepted system hardening standards or vendor hardening
+ recommendations.
+ - Be updated as new vulnerability issues are identified, as defined in Requirement 6.3.1.
+ - Be applied when new systems are configured and verified as in place before or
+ immediately after a system component is connected to a production environment.
+ levels:
+ - base
+ status: partial
+ notes: |-
+ Interestingly this requirement recommends other standards, such as Center for Internet
+ Security (CIS), International Organization for Standardization (ISO), National Institute
+ of Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the
+ rules included here are very generic in terms of hardening.
+ controls:
+ - base_sle16:SLES-16-16016020
+
+ - id: 2.2.2
+ title: Vendor default accounts are managed.
+ description: |-
+ Vendor default accounts are managed as follows:
+ - If the vendor default account(s) will be used, the default password is changed per
+ Requirement 8.3.6.
+ - If the vendor default account(s) will not be used, the account is removed or disabled.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Also related to requirement 8.2.6 and 8.3.5.
+
+ - id: 2.2.3
+ title: 'Primary functions requiring different security levels are managed'
+ levels:
+ - base
+ status: manual
+
+ - id: 2.2.4
+ title: Only necessary services, protocols, daemons, and functions are enabled, and all unnecessary
+ functionality is removed or disabled
+ description: |-
+ System components cannot be compromised by exploiting unnecessary functionality present in
+ the system component.
+ levels:
+ - base
+ status: pending
+
+ - id: 2.2.5
+ title: If any insecure services, protocols, or daemons are present, business justification
+ is documented and the risk is reduced.
+ description: |-
+ If any insecure services, protocols, or daemons are present:
+ - Business justification is documented.
+ - Additional security features are documented and implemented that reduce the risk of
+ using insecure services, protocols, or daemons.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Known insecure services are removed or disabled by 2.2.4
+ General security measures are covered by 1.2.6
+ This requirement is more about checking exceptions and their respective documentation.
+
+ - id: 2.2.6
+ title: System security parameters are configured to prevent misuse.
+ description: |-
+ System components cannot be compromised because of incorrect security parameter
+ configuration.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is not specific but also points to 2.2.1, where other policies are
+ referenced. Therefore, the most common rules related to system configuration in order to
+ prevent misuse and selected in main profiles are also selected here.
+
+ - id: 2.2.7
+ title: All non-console administrative access is encrypted using strong cryptography.
+ description: |-
+ Cleartext administrative authorization factors cannot be read or intercepted from any
+ network transmissions. This includes administrative access via browser-based interfaces
+ and application programming interfaces (APIs).
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Related to requirement 12.3.3.
+
+ - id: '2.3'
+ title: Wireless environments are configured and managed securely.
+ levels:
+ - base
+ status: supported
+ controls:
+ - id: 2.3.1
+ title: For wireless environments connected to the CDE or transmitting account data, all wireless
+ vendor defaults are changed at installation or are confirmed to be secure.
+ description: |-
+ For wireless environments connected to the CDE or transmitting account data, all wireless
+ vendor defaults are changed at installation or are confirmed to be secure, including but
+ not limited to:
+ - Default wireless encryption keys.
+ - Passwords on wireless access points.
+ - SNMP defaults.
+ - Any other security-related wireless vendor defaults.
+ levels:
+ - base
+ status: supported
+ notes: |-
+ Wireless interfaces are disabled by 1.3.3.
+
+ - id: 2.3.2
+ title: For wireless environments connected to the CDE or transmitting account data, wireless
+ encryption keys are changed
+ description: |-
+ For wireless environments connected to the CDE or transmitting account
+ data, wireless encryption keys are changed
+ levels:
+ - base
+ status: supported
+ notes: |-
+ Wireless interfaces are disabled by 1.3.3.
+
+ - id: '3.1'
+ title: Processes and mechanisms for protecting stored account data are defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 3.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 3 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 3 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 3.1.2
+ title: Roles and responsibilities for performing activities in Requirement 3 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 3 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '3.2'
+ title: Storage of account data is kept to a minimum.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 3.2.1
+ title: Account data storage is kept to a minimum through implementation of data retention
+ and disposal policies, procedures, and processes.
+ description: |-
+ Account data storage is kept to a minimum through implementation of data retention and
+ disposal policies, procedures, and processes that include at least the following:
+ - Coverage for all locations of stored account data.
+ - Coverage for any sensitive authentication data (SAD) stored prior to completion of
+ authorization.
+ - Limiting data storage amount and retention time to that which is required for legal or
+ regulatory, and/or business requirements.
+ - Specific retention requirements for stored account data that defines length of retention
+ period and includes a documented business justification.
+ - Processes for secure deletion or rendering account data unrecoverable when no longer
+ needed per the retention policy.
+ - A process for verifying, at least once every three months, that stored account data
+ exceeding the defined retention period has been securely deleted or rendered unrecoverable.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement is very dependent on each site policies and business model.
+ Local policies should be consulted and audited. Manual checking is reasonable.
+
+ - id: '3.3'
+ title: Sensitive authentication data (SAD) is not stored after authorization.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 3.3.1
+ title: SAD is not stored after authorization, even if encrypted. All sensitive authentication
+ data received is rendered unrecoverable upon completion of the authorization process.
+ description: |-
+ This requirement is not eligible for the customized approach. This requirement does not
+ apply to issuers and companies that support issuing services (where SAD is needed for a
+ legitimate issuing business need) and have a business justification to store the sensitive
+ authentication data. Refer to Requirement 3.3.3 for additional requirements specifically
+ for issuers. Sensitive authentication data includes the data cited in Requirements 3.3.1.1
+ through 3.3.1.3.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 3.3.1.1
+ title: The full contents of any track are not stored upon completion of the authorization
+ process.
+ description: |-
+ This requirement is not eligible for the customized approach. In the normal course of
+ business, the following data elements from the track may need to be retained:
+ - Cardholder name.
+ - Primary account number (PAN).
+ - Expiration date.
+ - Service code.
+ To minimize risk, store securely only these data elements as needed for business.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement consists in auditing files, databases and memory to make sure the full
+ content of any track is not unnecessarily stored. It involves manual auditing but some
+ automated rules fit this requirement in order to reduce the chances if this data be
+ unintentionally stored in memory.
+
+ - id: 3.3.1.2
+ title: The card verification code is not stored upon completion of the authorization
+ process.
+ description: |-
+ This requirement is not eligible for the customized approach. The card verification code
+ is the three- or four-digit number printed on the front or back of a payment card used
+ to verify card-not-present transactions.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.
+
+ - id: 3.3.1.3
+ title: The personal identification number (PIN) and the PIN block are not stored upon
+ completion of the authorization process.
+ description: |-
+ This requirement is not eligible for the customized approach. PIN blocks are encrypted
+ during the natural course of transaction processes, but even if an entity encrypts the
+ PIN block again, it is still not allowed to be stored after the completion of the
+ authorization process.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.
+
+ - id: 3.3.2
+ title: SAD that is stored electronically prior to completion of authorization is encrypted
+ using strong cryptography.
+ description: |-
+ This requirement is not eligible for the customized approach. Whether SAD is permitted to
+ be stored prior to authorization is determined by the organizations that manage compliance
+ programs (for example, payment brands and acquirers). Contact the organizations of
+ interest for any additional criteria. This requirement applies to all storage of SAD, even
+ if no PAN is present in the environment. Refer to Requirement 3.2.1 for an additional
+ requirement that applies if SAD is stored prior to completion of authorization. Issuers
+ and companies that support issuing services, where there is a legitimate and documented
+ business need to store SAD, are not required to meet this requirement. A legitimate
+ business need is one that is necessary for the performance of the function being provided
+ by or for the issuer. Refer to Requirement 3.3.3 for requirements specifically for issuers.
+ This requirement does not replace how PIN blocks are required to be managed, nor does it
+ mean that a properly encrypted PIN block needs to be encrypted again.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement is a best practice until 31 March 2025, after which it will be required
+ and must be fully considered during a PCI DSS assessment.
+ This requirement consists of auditing information stored during a relatively short period
+ of time. Where and how the information is possibly stored depends in each Business and
+ local policies so the check is not actually automatable.
+
+ - id: 3.3.3
+ title: Additional requirement for issuers and companies that support issuing services and
+ store sensitive authentication data.
+ description: |-
+ Additional requirement for issuers and companies that support issuing services and store
+ sensitive authentication data: Any storage of sensitive authentication data is:
+ - Limited to that which is needed for a legitimate issuing business need and is secured.
+ - Encrypted using strong cryptography. This bullet is a best practice until until
+ 31 March 2025, after which it will be required as part of Requirement 3.3.3 and must be
+ fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: '3.4'
+ title: Access to displays of full PAN and ability to copy PAN is restricted.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 3.4.1
+ title: PAN is masked when displayed (the BIN and last four digits are the maximum number
+ of digits to be displayed), such that only personnel with a legitimate business need
+ can see more than the BIN and last four digits of the PAN.
+ description: |-
+ PAN displays are restricted to the minimum number of digits necessary to meet a defined
+ business need. This requirement does not supersede stricter requirements in place for
+ displays of cardholder data — for example, legal or payment brand requirements for
+ point-of-sale (POS) receipts. This requirement relates to protection of PAN where it is
+ displayed on screens, paper receipts, printouts, etc., and is not to be confused with
+ Requirement 3.5.1 for protection of PAN when stored, processed, or transmitted.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Consists on examining documented policies and procedures, checking system configurations
+ and observing relevant applications.
+
+ - id: 3.4.2
+ title: When using remote-access technologies, technical controls prevent copy and/or relocation
+ of PAN for all personnel, except for those with documented, explicit authorization and
+ a legitimate, defined business need.
+ description: |-
+ PAN cannot be copied or relocated by unauthorized personnel using remote-access
+ technologies. Storing or relocating PAN onto local hard drives, removable electronic
+ media, and other storage devices brings these devices into scope for PCI DSS.
+ This requirement is a best practice until 31 March 2025, after which it will be required
+ and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ There are technical rules to disable removable storage devices. However, this requirement
+ still demand some manual auditing in documentation and eventual exceptions.
+
+ - id: '3.5'
+ title: Primary account number (PAN) is secured wherever it is stored.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 3.5.1
+ title: PAN is rendered unreadable anywhere it is stored
+ description: |-
+ PAN is rendered unreadable anywhere it is stored by using any of the following approaches:
+ - One-way hashes based on strong cryptography of the entire PAN.
+ - Truncation (hashing cannot be used to replace the truncated segment of PAN).
+ - If hashed and truncated versions of the same PAN, or different truncation formats of
+ the same PAN, are present in an environment, additional controls are in place such that
+ the different versions cannot be correlated to reconstruct the original PAN.
+ - Indexes tokens.
+ - Strong cryptography with associated key-management processes and procedures.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 3.5.1.1
+ title: Hashes used to render PAN unreadable (per the first bullet of Requirement 3.5.1)
+ are keyed cryptographic hashes of the entire PAN, with associated key-management
+ processes and procedures in accordance with Requirements 3.6 and 3.7.
+ description: |-
+ All Applicability Notes for Requirement 3.5.1 also apply to this requirement.
+ Key-management processes and procedures (Requirements 3.6 and 3.7) do not apply to
+ system components used to generate individual keyed hashes of a PAN for comparison to
+ another system if:
+ - The system components only have access to one hash value at a time (hash values are
+ not stored on the system)
+ AND
+ - There is no other account data stored on the same system as the hashes.
+ This requirement is considered a best practice until 31 March 2025, after which it will
+ be required and must be fully considered during a PCI DSS assessment. This requirement
+ will replace the bullet in Requirement 3.5.1 for one-way hashes once its effective date
+ is reached.
+ levels:
+ - base
+ status: planned
+ notes: |-
+ This requirement likely demand assessment in application level for some environments and
+ this would be too specific to be automated. However, on system level we can ensure some
+ strong cryptographic algorithms. This is also generally covered by 2.2.7 but here would
+ be possible to include more specific rules, for openssl and libreswan for example.
+ However it would be first necessary to include a platform conditional in these rules
+ before selecting them so they are applicable only if the respective packages are
+ installed.
+
+ - id: 3.5.1.2
+ title: If disk-level or partition-level encryption (rather than file-, column-, or
+ field-level database encryption) is used to render PAN unreadable, it is implemented
+ only on removable electronic media or complemented by another mechanism that meets
+ Requirement 3.5.1
+ levels:
+ - base
+ status: pending
+
+ - id: 3.5.1.3
+ title: If disk-level or partition-level encryption is used (rather than file-, column-,
+ or field--level database encryption) to render PAN unreadable, it is managed.
+ description: |-
+ If disk-level or partition-level encryption is used (rather than file-, column-, or
+ field--level database encryption) to render PAN unreadable, it is managed as follows:
+ - Logical access is managed separately and independently of native operating system
+ authentication and access control mechanisms.
+ - Decryption keys are not associated with user accounts.
+ - Authentication factors (passwords, passphrases, or cryptographic keys) that allow
+ access to unencrypted data are stored securely.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ To properly check this requirement, site policies and documentation should be consulted.
+
+ - id: '3.6'
+ title: Cryptographic keys used to protect stored account data are secured.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 3.6.1
+ title: Procedures are defined and implemented to protect cryptographic keys used to protect
+ stored account data against disclosure and misuse.
+ description: |-
+ Procedures are defined and implemented to protect cryptographic keys used to protect
+ stored account data against disclosure and misuse that include:
+ - Access to keys is restricted to the fewest number of custodians necessary.
+ - Key-encrypting keys are at least as strong as the data-encrypting keys they protect.
+ - Key-encrypting keys are stored separately from data-encrypting keys.
+ - Keys are stored securely in the fewest possible locations and forms.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 3.6.1.1
+ title: 'Additional requirement for service providers only: A documented description
+ of the cryptographic architecture is maintained'
+ description: |-
+ Additional requirement for service providers only: A documented description of the
+ cryptographic architecture is maintained that includes:
+ - Details of all algorithms, protocols, and keys used for the protection of stored
+ account data, including key strength and expiry date.
+ - Preventing the use of the same cryptographic keys in production and test environments.
+ This bullet is a best practice until 31 March 2025, after which it will be required as
+ part of Requirement 3.6.1.1 and must be fully considered during a PCI DSS assessment.
+ - Description of the key usage for each key.
+ - Inventory of any hardware security modules (HSMs), key management systems (KMS), and
+ other secure cryptographic devices (SCDs) used for key management, including type and
+ location of devices, as outlined in Requirement 12.3.4.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.6.1.2
+ title: Secret and private keys used to encrypt/decrypt stored account data are stored
+ in secure forms.
+ description: |-
+ Secret and private keys used to encrypt/decrypt stored account data are stored in one
+ (or more) of the following forms at all times:
+ - Encrypted with a key-encrypting key that is at least as strong as the data-encrypting
+ key, and that is stored separately from the data-encrypting key.
+ - Within a secure cryptographic device (SCD), such as a hardware security module (HSM)
+ or PTS-approved point-of-interaction device.
+ - As at least two full-length key components or key shares, in accordance with an
+ industry-accepted method.
+ Secret and private keys are stored in a secure form that prevents unauthorized retrieval
+ or access. It is not required that public keys be stored in one of these forms.
+ Cryptographic keys stored as part of a key management system (KMS) that employs SCDs are
+ acceptable. A cryptographic key that is split into two parts does not meet this
+ requirement. Secret or private keys stored as key components or key shares must be
+ generated via one of the following
+ levels:
+ - base
+ status: manual
+
+ - id: 3.6.1.3
+ title: Access to cleartext cryptographic key components is restricted to the fewest
+ number of custodians necessary.
+ description: |-
+ Access to cleartext cryptographic key components is restricted to necessary personnel.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.6.1.4
+ title: Cryptographic keys are stored in the fewest possible locations.
+ description: |-
+ Cryptographic keys are retained only where necessary.
+ levels:
+ - base
+ status: manual
+
+ - id: '3.7'
+ title: Where cryptography is used to protect stored account data, key management processes and
+ procedures covering all aspects of the key lifecycle are defined and implemented.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 3.7.1
+ title: Key-management policies and procedures are implemented to include generation of strong
+ cryptographic keys used to protect stored account data.
+ description: |-
+ Strong cryptographic keys are generated.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.2
+ title: Key-management policies and procedures are implemented to include secure distribution
+ of cryptographic keys used to protect stored account data.
+ description: |-
+ Cryptographic keys are secured during distribution.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.3
+ title: Key-management policies and procedures are implemented to include secure storage of
+ cryptographic keys used to protect stored account data.
+ description: |-
+ Cryptographic keys are secured when stored.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ The scope of this requirement seems much wider going even to application level, which
+ might be different for each site. Regarding local system there are some technical measures
+ ensured by 2.2.6.
+
+ - id: 3.7.4
+ title: Key management policies and procedures are implemented for cryptographic key changes
+ for keys that have reached the end of their cryptoperiod, as defined by the associated
+ application vendor or key owner, and based on industry best practices and guidelines.
+ description: |-
+ Key management policies and procedures are implemented for cryptographic key changes for
+ keys that have reached the end of their cryptoperiod, as defined by the associated
+ application vendor or key owner, and based on industry best practices and guidelines,
+ including the following:
+ - A defined cryptoperiod for each key type in use.
+ - A process for key changes at the end of the defined cryptoperiod.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.5
+ title: Key management policies procedures are implemented to include the retirement, replacement,
+ or destruction of keys used to protect stored account data, as deemed necessary.
+ description: |-
+ Key management policies procedures are implemented to include the retirement, replacement,
+ or destruction of keys used to protect stored account data, as deemed necessary when:
+ - The key has reached the end of its defined cryptoperiod.
+ - The integrity of the key has been weakened, including when personnel with knowledge of a
+ cleartext key component leaves the company, or the role for which the key component was
+ known.
+ - The key is suspected of or known to be compromised.
+ - Retired or replaced keys are not used for encryption operations.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.6
+ title: Where manual cleartext cryptographic key-management operations are performed by personnel,
+ key-management policies and procedures are implemented include managing these operations
+ using split knowledge and dual control.
+ description: |-
+ Cleartext secret or private keys cannot be known by anyone. Operations involving cleartext
+ keys cannot be carried out by a single person. This control is applicable for manual
+ key-management operations or where key management is not controlled by the encryption
+ product. A cryptographic key that is simply split into two parts does not meet this
+ requirement. Secret or private keys stored as key components or key shares must be
+ generated via one of the following
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.7
+ title: Key management policies and procedures are implemented to include the prevention of
+ unauthorized substitution of cryptographic keys.
+ description: |-
+ Cryptographic keys cannot be substituted by unauthorized personnel.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.8
+ title: Key management policies and procedures are implemented to include that cryptographic
+ key custodians formally acknowledge (in writing or electronically) that they understand
+ and accept their key-custodian responsibilities.
+ description: |-
+ Key custodians are knowledgeable about their responsibilities in relation to cryptographic
+ operations and can access assistance and guidance when required.
+ levels:
+ - base
+ status: manual
+
+ - id: 3.7.9
+ title: 'Additional requirement for service providers only: Where a service provider shares
+ cryptographic keys with its customers for transmission or storage of account data, guidance
+ on secure transmission, storage and updating of such keys is documented and distributed
+ to the service provider’s customers.'
+ description: |-
+ Customers are provided with appropriate key management guidance whenever they receive
+ shared cryptographic keys. This requirement applies only when the entity being assessed is
+ a service provider.
+ levels:
+ - base
+ status: manual
+
+ - id: '4.1'
+ title: Processes and mechanisms for protecting cardholder data with strong cryptography during
+ transmission over open, public networks are defined and documented.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 4.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 4 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+
+ - id: 4.1.2
+ title: Roles and responsibilities for performing activities in Requirement 4 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 4 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '4.2'
+ title: PAN is protected with strong cryptography during transmission.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 4.2.1
+ title: Strong cryptography and security protocols are implemented as follows to safeguard
+ PAN during transmission over open, public networks.
+ description: |-
+ Strong cryptography and security protocols are implemented as follows to safeguard PAN
+ during transmission over open, public networks:
+ - Only trusted keys and certificates are accepted.
+ - Certificates used to safeguard PAN during transmission over open, public networks are
+ confirmed as valid and are not expired or revoked. This bullet is a best practice until
+ 31 March 2025, after which it will be required as part of Requirement 4.2.1 and must be
+ fully considered during a PCI DSS assessment.
+ - The protocol in use supports only secure versions or configurations and does not support
+ fallback to, or use of insecure versions, algorithms, key sizes, or implementations.
+ - The encryption strength is appropriate for the encryption methodology in use.
+ levels:
+ - base
+ status: supported
+ controls:
+ - id: 4.2.1.1
+ title: An inventory of the entity's trusted keys and certificates used to protect PAN
+ during transmission is maintained.
+ description: |-
+ All keys and certificates used to protect PAN during transmission are identified and
+ confirmed as trusted. This requirement is a best practice until 31 March 2025, after
+ which it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 4.2.1.2
+ title: Wireless networks transmitting PAN or connected to the CDE use industry best
+ practices to implement strong cryptography for authentication and transmission.
+ description: |-
+ Cleartext PAN cannot be read or intercepted from wireless network transmissions.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Wireless interfaces are disabled by 1.3.3.
+
+ - id: 4.2.2
+ title: PAN is secured with strong cryptography whenever it is sent via end-user messaging
+ technologies.
+ description: |-
+ Cleartext PAN cannot be read or intercepted from transmissions using end-user messaging
+ technologies. This requirement also applies if a customer, or other third-party, requests
+ that PAN is sent to them via end-user messaging technologies. There could be occurrences
+ where an entity receives unsolicited cardholder data via an insecure communication channel
+ that was not intended for transmissions of sensitive data. In this situation, the entity
+ can choose to either include the channel in the scope of their CDE and secure it according
+ to PCI DSS or delete the cardholder data and implement measures to prevent the channel
+ from being used for cardholder data.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Some known insecure services and protocols are disabled by 2.2.4.
+ If any specific end-user messaging technology is used, it should be manually checked in
+ alignment to site policies.
+
+ - id: '5.1'
+ title: Processes and mechanisms for protecting all systems and networks from malicious software
+ are defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 5.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 5 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 5 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 5.1.2
+ title: Roles and responsibilities for performing activities in Requirement 5 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 5 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '5.2'
+ title: Malicious software (malware) is prevented, or detected and addressed.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Related measures are covered by 1.2.6, 1.4.5 and 3.4.2.
+ controls:
+ - id: 5.2.1
+ title: An anti-malware solution(s) is deployed on all system components, except for those
+ system components identified in periodic evaluations per Requirement 5.2.3 that concludes
+ the system components are not at risk from malware.
+ description: |-
+ Automated mechanisms are implemented to prevent systems from becoming an attack vector for
+ malware.
+ levels:
+ - base
+ status: supported
+ notes: |-
+ There are many options of anti-malware and the criteria for any adopted solution or
+ approach relies on each site policy. Technologies are supported but manual assessment is
+ required.
+
+ - id: 5.2.2
+ title: The deployed anti-malware solution(s) detects all known types of malware and removes,
+ blocks, or contains all known types of malware.
+ levels:
+ - base
+ status: manual
+
+ - id: 5.2.3
+ title: Any system components that are not at risk for malware are evaluated periodically.
+ description: |-
+ Any system components that are not at risk for malware are evaluated periodically to
+ include the following:
+ - A documented list of all system components not at risk for malware.
+ - Identification and evaluation of evolving malware threats for those system components.
+ - Confirmation whether such system components continue to not require anti-malware
+ protection.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 5.2.3.1
+ title: The frequency of periodic evaluations of system components identified as not
+ at risk for malware is defined in the entity's targeted risk analysis, which is
+ performed according to all elements specified in Requirement 12.3.1.
+ description: |-
+ Systems not known to be at risk from malware are re-evaluated at a frequency that
+ addresses the entity's risk. This requirement is a best practice until 31 March 2025,
+ after which it will be required and must be fully considered during a PCI DSS
+ assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: '5.3'
+ title: Anti-malware mechanisms and processes are active, maintained, and monitored.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 5.3.1
+ title: The anti-malware solution(s) is kept current via automatic updates.
+ description: |-
+ Anti-malware mechanisms can detect and address the latest malware threats.
+ levels:
+ - base
+ status: manual
+
+ - id: 5.3.2
+ title: The anti-malware solution(s) performs periodic scans and active or real-time scans
+ or performs continuous behavioral analysis of systems or processes.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 5.3.2.1
+ title: If periodic malware scans are performed to meet Requirement 5.3.2, the frequency
+ of scans is defined in the entity's targeted risk analysis, which is performed
+ according to all elements specified in Requirement 12.3.1.
+ description: |-
+ Scans by the malware solution are performed at a frequency that addresses the entity's
+ risk. This requirement applies to entities conducting periodic malware scans to meet
+ Requirement 5.3.2. This requirement is a best practice until 31 March 2025, after which
+ it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 5.3.3
+ title: For removable electronic media, the anti-malware solution(s) performs automatic scans
+ of when the media is inserted, connected, or logically mounted, or Performs continuous
+ behavioral analysis of systems or processes when the media is inserted, connected, or
+ logically mounted.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Related measures are covered by 3.4.2.
+
+ - id: 5.3.4
+ title: Audit logs for the anti-malware solution(s) are enabled and retained in accordance
+ with Requirement 10.5.1.
+ description: |-
+ Historical records of anti-malware actions are immediately available and retained for at
+ least 12 months.
+ levels:
+ - base
+ status: manual
+
+ - id: 5.3.5
+ title: Anti-malware mechanisms cannot be disabled or altered by users, unless specifically
+ documented, and authorized by management on a case-by-case basis for a limited time period.
+ description: |-
+ Anti-malware mechanisms cannot be modified by unauthorized personnel.Anti-malware
+ solutions may be temporarily disabled only if there is a legitimate technical need, as
+ authorized by management on a case-by-case basis. If anti-malware protection needs to be
+ disabled for a specific purpose, it must be formally authorized. Additional security
+ measures may also need to be implemented for the period during which anti-malware
+ protection is not active.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Related measures are covered by 2.2.6 requirement and 8.2 section.
+
+ - id: '5.4'
+ title: Anti-phishing mechanisms protect users against phishing attacks.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 5.4.1
+ title: Processes and automated mechanisms are in place to detect and protect personnel against
+ phishing attacks.
+ description: |-
+ Mechanisms are in place to protect against and mitigate risk posed by phishing attacks.
+ The focus of this requirement is on protecting personnel with access to system components
+ in-scope for PCI DSS. Meeting this requirement for technical and automated controls to
+ detect and protect personnel against phishing is not the same as Requirement 12.6.3.1 for
+ security awareness training. Meeting this requirement does not also meet the requirement
+ for providing personnel with security awareness training, and vice versa. This requirement
+ is a best practice until 31 March 2025, after which it will be required and must be fully
+ considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: '6.1'
+ title: Processes and mechanisms for developing and maintaining secure systems and software are
+ defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 6.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 6 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 6 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 6.1.2
+ title: Roles and responsibilities for performing activities in Requirement 6 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 6 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '6.2'
+ title: Bespoke and custom software are developed securely.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 6.2.1
+ title: Bespoke and custom software are developed securely.
+ description: |-
+ Bespoke and custom software are developed securely, as follows:
+ - Based on industry standards and/or best practices for secure development.
+ - In accordance with PCI DSS (for example, secure authentication and logging).
+ - Incorporating consideration of information security issues during each stage of the
+ software development lifecycle.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.2.2
+ title: Software development personnel working on bespoke and custom software are trained
+ at least once every 12 months
+ description: |-
+ Software development personnel working on bespoke and custom software are trained at least
+ once every 12 months as follows:
+ - On software security relevant to their job function and development languages.
+ - Including secure software design and secure coding techniques.
+ - Including, if security testing tools are used, how to use the tools for detecting
+ vulnerabilities in software.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.2.3
+ title: Bespoke and custom software is reviewed prior to being released into production or
+ to customers, to identify and correct potential coding vulnerabilities.
+ description: |-
+ Bespoke and custom software is reviewed prior to being released into production or to
+ customers, to identify and correct potential coding vulnerabilities, as follows:
+ - Code reviews ensure code is developed according to secure coding guidelines.
+ - Code reviews look for both existing and emerging software vulnerabilities.
+ - Appropriate corrections are implemented prior to release.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 6.2.3.1
+ title: If manual code reviews are performed for bespoke and custom software prior to
+ release to production code changes co-reviewed and approved.
+ description: |-
+ If manual code reviews are performed for bespoke and custom software prior to release
+ to production code changes are:
+ - Reviewed by individuals other than the originating code author, and who are
+ knowledgeable about code-review techniques and secure coding practices.
+ - Reviewed and approved by management prior to release.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.2.4
+ title: Software engineering techniques or other methods are defined and in use by software
+ development personnel to prevent or mitigate common software attacks and related vulnerabilities
+ in bespoke and custom software.
+ levels:
+ - base
+ status: manual
+
+ - id: '6.3'
+ title: Security vulnerabilities are identified and addressed.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 6.3.1
+ title: Security vulnerabilities are identified and managed
+ levels:
+ - base
+ status: manual
+
+ - id: 6.3.2
+ title: An inventory of bespoke and custom software, and third-party software components incorporated
+ into bespoke and custom software is maintained to facilitate vulnerability and patch
+ management.
+ description: |-
+ Known vulnerabilities in third-party software components cannot be exploited in bespoke
+ and custom software.This requirement is a best practice until 31 March 2025, after which
+ it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement is a best practice until 31 March 2025, after which it will be required
+ and must be fully considered during a PCI DSS assessment.
+
+ - id: 6.3.3
+ title: All system components are protected from known vulnerabilities by installing applicable
+ security patches/updates.
+ description: |-
+ All system components are protected from known vulnerabilities by installing
+ applicable security patches/updates as follows:
+ - Patches/updates for critical vulnerabilities (identified according to the risk ranking
+ process at Requirement 6.3.1) are installed within one month of release.
+ - All other applicable security patches/updates are installed within an appropriate time
+ frame as determined by the entity's assessment of the criticality of the risk to the
+ environment as identified according to the risk ranking process at Requirement 6.3.1.
+ levels:
+ - base
+ status: pending
+
+ - id: '6.4'
+ title: Public-facing web applications are protected against attacks.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 6.4.1
+ title: For public-facing web applications, new threats and vulnerabilities are addressed
+ on an ongoing basis and these applications are protected against known attacks.
+ description: |-
+ For public-facing web applications, new threats and vulnerabilities are addressed on an
+ ongoing basis and these applications are protected against known attacks as follows:
+ - Reviewing public-facing web applications via manual or automated application
+ vulnerability security assessment tools or methods as follows:
+ - At least once every 12 months and after significant changes.
+ - By an entity that specializes in application security.
+ - Including, at a minimum, all common software attacks in Requirement 6.2.4.
+ - All vulnerabilities are ranked in accordance with requirement 6.3.1.
+ - All vulnerabilities are corrected.
+ - The application is re-evaluated after the corrections
+ OR
+ - Installing an automated technical solution(s) that continually detects and prevents
+ web-based attacks as follows:
+ - Installed in front of public-facing web applications to detect and prevent web-based
+ attacks.
+ - Actively running and up to date as applicable.
+ - Generating audit logs.
+ - Configured to either block web-based attacks or generate an alert that is immediately
+ investigated.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.4.2
+ title: For public-facing web applications, an automated technical solution is deployed that
+ continually detects and prevents web-based attacks.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.4.3
+ title: All payment page scripts that are loaded and executed in the consumer's browser are
+ managed
+ description: |-
+ All payment page scripts that are loaded and executed in the consumer's browser are
+ managed as follows:
+ - A method is implemented to confirm that each script is authorized.
+ - A method is implemented to assure the integrity of each script.
+ - An inventory of all scripts is maintained with written business or technical
+ justification as to why each is necessary.
+ levels:
+ - base
+ status: manual
+
+ - id: '6.5'
+ title: Changes to all system components are managed securely.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 6.5.1
+ title: Changes to all system components in the production environment are made according
+ to established procedures.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.5.2
+ title: Upon completion of a significant change, all applicable PCI DSS requirements are confirmed
+ to be in place on all new or changed systems and networks, and documentation is updated
+ as applicable.
+ description: |-
+ All system components are verified after a significant change to be compliant with the
+ applicable PCI DSS requirements.These significant changes should also be captured and
+ reflected in the entity's annual PCI DSS scope confirmation activity per Requirement
+ 12.5.2.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.5.3
+ title: Pre-production environments are separated from production environments and the separation
+ is enforced with access controls.
+ description: |-
+ Pre-production environments cannot introduce risks and vulnerabilities into production
+ environments.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.5.4
+ title: Roles and functions are separated between production and pre-production environments
+ to provide accountability such that only reviewed and approved changes are deployed.
+ description: |-
+ Job roles and accountability that differentiate between pre-production and production
+ activities are defined and managed to minimize the risk of unauthorized, unintentional,
+ or inappropriate actions. In environments with limited personnel where individuals perform
+ multiple roles or functions, this same goal can be achieved with additional procedural
+ controls that provide accountability. For example, a developer may also be an administrator
+ that uses an administrator-level account with elevated privileges in the development
+ environment and, for their developer role, they use a separate account with user-level
+ access to the production environment.
+ levels:
+ - base
+ status: manual
+
+ - id: 6.5.5
+ title: Live PANs are not used in pre-production environments, except where those environments
+ are included in the CDE and protected in accordance with all applicable PCI DSS requirements.
+ description: |-
+ Live PANs cannot be present in pre-production environments outside the CDE.s
+ levels:
+ - base
+ status: manual
+
+ - id: 6.5.6
+ title: Test data and test accounts are removed from system components before the system goes
+ into production.
+ description: |-
+ Test data and test accounts cannot exist in production environments.
+ levels:
+ - base
+ status: manual
+
+ - id: '7.1'
+ title: Processes and mechanisms for restricting access to system components and cardholder data
+ by business need to know are defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 7.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 7 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 7 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 7.1.2
+ title: Roles and responsibilities for performing activities in Requirement 7 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 7 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '7.2'
+ title: Access to system components and data is appropriately defined and assigned.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 7.2.1
+ title: An access control model is defined and includes granting access
+ description: |-
+ An access control model is defined and includes granting access as follows:
+ - Appropriate access depending on the entity's business and access needs.
+ - Access to system components and data resources that is based on users' job
+ classification and functions.
+ - The least privileges required (for example, user, administrator) to perform a job
+ function.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ General access are restricted by 2.2.6 and 8.2 section. This requirement is more about
+ checking granting access process.
+
+ - id: 7.2.2
+ title: Access is assigned to users, including privileged users, based on job classification
+ and function, and least privileges necessary to perform job responsibilities.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.2.3
+ title: Required privileges are approved by authorized personnel.
+ description: |-
+ Access privileges cannot be granted to users without appropriate, documented
+ authorization.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.2.4
+ title: All user accounts and related access privileges, including third-party/vendor accounts,
+ are reviewed
+ description: |-
+ All user accounts and related access privileges, including third-party/vendor accounts,
+ are reviewed as follows:
+ - At least once every six months.
+ - To ensure user accounts and access remain appropriate based on job function.
+ - Any inappropriate access is addressed.
+ - Management acknowledges that access remains appropriate.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.2.5
+ title: All application and system accounts and related access privileges are assigned and
+ managed.
+ description: |-
+ All application and system accounts and related access privileges are assigned and managed
+ as follows:
+ - Based on the least privileges necessary for the operability of the system or application.
+ - Access is limited to the systems, applications, or processes that specifically require
+ their use.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ General access are restricted by 2.2.6 and 8.2 section.
+ controls:
+ - id: 7.2.5.1
+ title: All access by application and system accounts and related access privileges
+ are reviewed.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.2.6
+ title: All user access to query repositories of stored cardholder data is restricted
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement is specific about cardholder data, which can be available in different
+ formats, such as clear and binary files, and databases depending on site policies.
+ General system restrictions are covered in 2.2.6.
+
+ - id: '7.3'
+ title: 'Access to system components and data is managed via an access control system(s).'
+ levels:
+ - base
+ status: planned
+ controls:
+ - id: 7.3.1
+ title: An access control system(s) is in place that restricts access based on a user's need
+ to know and covers all system components.
+ description: |-
+ Access rights and privileges are managed via mechanisms intended for that purpose.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.3.2
+ title: The access control system(s) is configured to enforce permissions assigned to individuals,
+ applications, and systems based on job classification and function.
+ description: |-
+ Individual account access rights and privileges to systems, applications, and data are
+ only inherited from group membership.
+ levels:
+ - base
+ status: manual
+
+ - id: 7.3.3
+ title: The access control system(s) is set to "deny all" by default.
+ description: |-
+ Access rights and privileges are prohibited unless expressly permitted.
+ levels:
+ - base
+ status: planned
+ notes: |-
+ It is possible we can select some rules for this requirement but more investigation is
+ needed to confirm.
+
+ - id: '8.1'
+ title: Processes and mechanisms for identifying users and authenticating access to system components
+ are defined and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 8.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 8 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 8 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 8.1.2
+ title: Roles and responsibilities for performing activities in Requirement 8 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 8 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '8.2'
+ title: User identification and related accounts for users and administrators are strictly managed
+ throughout an account's lifecycle.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 8.2.1
+ title: All users are assigned a unique ID before access to system components or cardholder
+ data is allowed.
+ description: |-
+ All actions by all users are attributable to an individual. This requirement is not
+ intended to apply to user accounts within point-of-sale terminals that have access to only
+ one card number at a time to facilitate a single transaction (such as IDs used by cashiers
+ on point-of-sale terminals).
+ levels:
+ - base
+ status: planned
+ notes: |-
+ The rules selected in this requirement are incomplete. Missing remediation and test
+ scenarios. They should include test scenarios and likely remediation or a warning
+ informing why a remediation is not present.
+
+ - id: 8.2.2
+ title: Group, shared, or generic IDs, or other shared authentication credentials are only
+ used when necessary on an exception basis, and are managed.
+ description: |-
+ - ID use is prevented unless needed for an exceptional circumstance.
+ - Use is limited to the time needed for the exceptional circumstance.
+ - Business justification for use is documented.
+ - Use is explicitly approved by management.
+ - Individual user identity is confirmed before access to an account is granted.
+ - Every action taken is attributable to an individual user.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is complemented by 8.2.1 and related to 8.3.5.
+
+ - id: 8.2.3
+ title: 'Additional requirement for service providers only: Service providers with remote
+ access to customer premises use unique authentication factors for each customer premises.'
+ levels:
+ - base
+ status: manual
+
+ - id: 8.2.4
+ title: Addition, deletion, and modification of user IDs, authentication factors, and other
+ identifier objects are managed
+ levels:
+ - base
+ status: manual
+
+ - id: 8.2.5
+ title: Access for terminated users is immediately revoked.
+ description: |-
+ The accounts of terminated users cannot be used.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement depends on site policies for user termination.
+
+ - id: 8.2.6
+ title: Inactive user accounts are removed or disabled within 90 days of inactivity.
+ description: |-
+ Inactive user accounts cannot be used.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Also related to requirements 2.2.2 and 8.3.5.
+
+ - id: 8.2.7
+ title: Accounts used by third parties to access, support, or maintain system components via
+ remote access are managed.
+ levels:
+ - base
+ status: manual
+
+ - id: 8.2.8
+ title: If a user session has been idle for more than 15 minutes, the user is required to
+ re-authenticate to re-activate the terminal or session.
+ description: |-
+ A user session cannot be used except by the authorized user. This requirement is not
+ intended to apply to user accounts on point-of-sale terminals that have access to only one
+ card number at a time to facilitate a single transaction (such as IDs used by cashiers on
+ point-of-sale terminals). This requirement is not meant to prevent legitimate activities
+ from being performed while the console/PC is unattended.
+ levels:
+ - base
+ status: pending
+
+ - id: '8.3'
+ title: Strong authentication for users and administrators is established and managed.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 8.3.1
+ title: All user access to system components for users and administrators is authenticated.
+ levels:
+ - base
+ status: pending
+
+ - id: 8.3.2
+ title: Strong cryptography is used to render all authentication factors unreadable during
+ transmission and storage on all system components.
+ description: |-
+ Cleartext authentication factors cannot be obtained, derived, or reused from the
+ interception of communications or from stored data.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ There are similar rules that might be redundant for some distros.
+
+ - id: 8.3.3
+ title: User identity is verified before modifying any authentication factor.
+ description: |-
+ Unauthorized individuals cannot gain system access by impersonating the identity of an
+ authorized user.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ This requirement is about processes, such as password resets, provisioning new hardware or
+ software tokens, and generating new keys. It is common that these activities involve help
+ desk teams and administrators and the involved people should ensure identities are properly
+ verified.
+
+ - id: 8.3.4
+ title: Invalid authentication attempts are limited.
+ description: |-
+ - Locking out the user ID after not more than 10 attempts.
+ - Setting the lockout duration to a minimum of 30 minutes or until the user's identity is
+ confirmed.
+ levels:
+ - base
+ status: pending
+
+ - id: 8.3.5
+ title: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1,
+ they are set and reset for each user.
+ description: |-
+ - Set to a unique value for first-time use and upon reset.
+ - Forced to be changed immediately after the first use.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Also related to requirement 2.2.2, 8.2.2 and 8.2.6.
+
+ - id: 8.3.6
+ title: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1,
+ they meet the minimum level of complexity.
+ description: |-
+ - A minimum length of 12 characters (or IF the system does not support 12 characters, a
+ minimum length of eight characters).
+ - Contain both numeric and alphabetic characters.
+ A guessed password/passphrase cannot be verified by either an online or offline brute
+ force attack.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is not intended to apply to:
+ - User accounts on point-of-sale terminals that have access to only one card number at a
+ time to facilitate a single transaction (such as IDs used by cashiers on point-of-sale
+ terminals).
+ - Application or system accounts, which are governed by requirements in section 8.6.
+
+ - id: 8.3.7
+ title: Individuals are not allowed to submit a new password/passphrase that is the same as
+ any of the last four passwords/passphrases used.
+ description: |-
+ A previously used password cannot be used to gain access to an account for at least 12
+ months.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is not intended to apply to user accounts on point-of-sale terminals that
+ have access to only one card number at a time to facilitate a single transaction (such as
+ IDs used by cashiers on point-of-sale terminals).
+ For RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be
+ prefered in detriment of accounts_password_pam_unix_remember. Using both should not create
+ conflict but is unnecessary and the last should be filtered out from the profile.
+
+ - id: 8.3.8
+ title: Authentication policies and procedures are documented and communicated to all users.
+ levels:
+ - base
+ status: manual
+
+ - id: 8.3.9
+ title: If passwords/passphrases are used as the only authentication factor for user access
+ (i.e., in any single-factor authentication implementation) they should have a limited
+ lifetime.
+ description: |-
+ If passwords/passphrases are used as the only authentication factor for user access (i.e.,
+ in any single-factor authentication implementation) then either:
+ - Passwords/passphrases are changed at least once every 90 days,
+ OR
+ - The security posture of accounts is dynamically analyzed, and real-time access to
+ resources is automatically determined accordingly.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ The requirement does not explicitily define the number of days before the password
+ expiration to warn the users, but the relevant rules were selected here as they do not
+ cause any problems in combination with password lifetime rules.
+
+ - id: 8.3.10
+ title: 'Additional requirement for service providers only: If passwords/passphrases are used
+ as the only authentication factor for customer user access to cardholder data (i.e.,
+ in any single-factor authentication implementation) then guidance is provided to customer
+ users.'
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 8.3.10.1
+ title: 'Additional requirement for service providers only: If passwords/passphrases
+ are used as the only authentication factor for customer user access (i.e., in any
+ single-factor authentication implementation) they should have a limited lifetime.'
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is already covered by 8.3.9.
+
+ - id: 8.3.11
+ title: Where authentication factors such as physical or logical security tokens, smart cards,
+ or certificates are used, factors are not shared among multiple users and the usage is
+ controlled.'
+ levels:
+ - base
+ status: manual
+
+ - id: '8.4'
+ title: Multi-factor authentication (MFA) is implemented to secure access into the CDE.
+ levels:
+ - base
+ status: supported
+ notes: |-
+ This parent requirement does not set one specific combination of Multi-factor authentication
+ (MFA), so we can't enforce the use of smartcards or any specific solution. The systems
+ usually support MFA but the chosen solution depends on site policies.
+ controls:
+ - id: 8.4.1
+ title: MFA is implemented for all non-console access into the CDE for personnel with administrative
+ access.
+ levels:
+ - base
+ status: supported
+
+ - id: 8.4.2
+ title: MFA is implemented for all non-console access into the CDE.
+ description: |-
+ Access into the CDE cannot be obtained by the use of a single authentication factor.
+ levels:
+ - base
+ status: manual
+
+ - id: 8.4.3
+ title: MFA is implemented for all remote access originating from outside the entity's network
+ that could access or impact the CDE.
+ levels:
+ - base
+ status: manual
+
+ - id: '8.5'
+ title: Multi-factor authentication (MFA) systems are configured to prevent misuse.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 8.5.1
+ title: MFA systems are properly implemented.
+ description: |-
+ - The MFA system is not susceptible to replay attacks.
+ - MFA systems cannot be bypassed by any users, including administrative users unless
+ specifically documented, and authorized by management on an exception basis, for a limited
+ time period.
+ - At least two different types of authentication factors are used.
+ - Success of all authentication factors is required before access is granted.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Each site might have a different MFA solution and each solution has its own capabilities.
+ This requirement demands manual assessment based on site policies.
+
+ - id: '8.6'
+ title: Use of application and system accounts and associated authentication factors is strictly
+ managed.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 8.6.1
+ title: If accounts used by systems or applications can be used for interactive login, they
+ are managed.
+ description: |-
+ - Interactive use is prevented unless needed for an exceptional circumstance.
+ - Interactive use is limited to the time needed for the exceptional circumstance.
+ - Business justification for interactive use is documented.
+ - Interactive use is explicitly approved by management.
+ - Individual user identity is confirmed before access to account is granted.
+ - Every action taken is attributable to an individual user.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system
+ accounts usage is restricted. Exceptions to system accounts should be manually checked to
+ ensure the requirements in description. This requirement although implements some extra
+ controls regarding root account.
+
+ - id: 8.6.2
+ title: Passwords/passphrases for any application and system accounts that can be used for
+ interactive login are not hard coded in scripts, configuration/property files, or bespoke
+ and custom source code.
+ description: |-
+ Passwords/passphrases used by application and system accounts cannot be used by
+ unauthorized personnel.
+ levels:
+ - base
+ status: manual
+
+ - id: 8.6.3
+ title: Passwords/passphrases for any application and system accounts are protected against
+ misuse.
+ description: |-
+ - Passwords/passphrases are changed periodically (at the frequency defined in the entity's
+ targeted risk analysis, which is performed according to all elements specified in
+ Requirement 12.3.1) and upon suspicion or confirmation of compromise.
+ - Passwords/passphrases are constructed with sufficient complexity appropriate for how
+ frequently the entity changes the passwords/passphrases.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Related to requirements 8.3.6 and 8.3.9.
+
+ - id: '9.1'
+ title: Processes and mechanisms for restricting physical access to cardholder data are defined
+ and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 9 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 9 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 9.1.2
+ title: Roles and responsibilities for performing activities in Requirement 9 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 9 are documented, assigned and understood
+ by the assigned personnel.
+
+ - id: '9.2'
+ title: Physical access controls manage entry into facilities and systems containing cardholder
+ data.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.2.1
+ title: Appropriate facility entry controls are in place to restrict physical access to systems
+ in the CDE.
+ description: |-
+ System components in the CDE cannot be physically accessed by unauthorized personnel.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.2.1.1
+ title: Individual physical access to sensitive areas within the CDE is monitored with
+ either video cameras or physical access control mechanisms (or both).
+ levels:
+ - base
+ status: manual
+
+ - id: 9.2.2
+ title: Physical and/or logical controls are implemented to restrict use of publicly accessible
+ network jacks within the facility.
+ description: |-
+ Unauthorized devices cannot connect to the entity's network from public areas within the
+ facility.
+ levels:
+ - base
+ status: not applicable
+
+ - id: 9.2.3
+ title: Physical access to wireless access points, gateways, networking/communications hardware,
+ and telecommunication lines within the facility is restricted
+ description: |-
+ Physical networking equipment cannot be accessed by unauthorized personnel.
+ levels:
+ - base
+ status: not applicable
+
+ - id: 9.2.4
+ title: Access to consoles in sensitive areas is restricted via locking when not in use.
+ description: |-
+ Physical consoles within sensitive areas cannot be used by unauthorized personnel.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Related to requirement 8.2.8.
+ This requirement asks to observe a system administrator's attempt to log into consoles in
+ sensitive areas and verify that they are "locked" to prevent unauthorized use. Therefore
+ it is a manual requirement applicable only very specific circumstances.
+
+ - id: '9.3'
+ title: Physical access for personnel and visitors is authorized and managed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.3.1
+ title: Procedures are implemented for authorizing and managing physical access of personnel
+ to the CDE.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.3.1.1
+ title: Physical access to sensitive areas within the CDE for personnel is controlled
+ levels:
+ - base
+ status: manual
+
+ - id: 9.3.2
+ title: Procedures are implemented for authorizing and managing visitor access to the CDE.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.3.3
+ title: Visitor badges or identification are surrendered or deactivated before visitors leave
+ the facility or at the date of expiration.
+ description: |-
+ Visitor identification or badges cannot be reused after expiration.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.3.4
+ title: Visitor logs are used to maintain a physical record of visitor activity both within
+ the facility and within sensitive areas.
+ levels:
+ - base
+ status: manual
+
+ - id: '9.4'
+ title: Media with cardholder data is securely stored, accessed, distributed, and destroyed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.4.1
+ title: All media with cardholder data is physically secured.
+ description: |-
+ Media with cardholder data cannot be accessed by unauthorized personnel.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.4.1.1
+ title: Offline media backups with cardholder data are stored in a secure location.
+ description: |-
+ Offline backups cannot be accessed by unauthorized personnel.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.1.2
+ title: The security of the offline media backup location(s) with cardholder data is
+ reviewed at least once every 12 months.
+ description: |-
+ The security controls protecting offline backups are verified periodically by
+ inspection.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.2
+ title: All media with cardholder data is classified in accordance with the sensitivity of
+ the data.
+ description: |-
+ Media are classified and protected appropriately.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.3
+ title: Media with cardholder data sent outside the facility is secured.
+ description: |-
+ Media is secured and tracked when transported outside the facility.
+ - Media sent outside the facility is logged.
+ - Media is sent by secured courier or other delivery method that can be accurately
+ tracked.
+ - Offsite tracking logs include details about media location.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.4
+ title: Management approves all media with cardholder data that is moved outside the facility
+ (including when media is distributed to individuals).
+ description: |-
+ Media cannot leave a facility without the approval of accountable personnel. Individuals
+ approving media movements should have the appropriate level of management authority to
+ grant this approval. However, it is not specifically required that such individuals have
+ "manager" as part of their title.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.5
+ title: Inventory logs of all electronic media with cardholder data are maintained.
+ description: |-
+ Accurate inventories of stored electronic media are maintained.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.4.5.1
+ title: Inventories of electronic media with cardholder data are conducted at least
+ once every 12 months.
+ description: |-
+ Media inventories are verified periodically.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.6
+ title: Hard-copy materials with cardholder data are destroyed when no longer needed for business
+ or legal reasons.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.4.7
+ title: Electronic media with cardholder data is destroyed when no longer needed for business
+ or legal reasons.
+ description: |-
+ - The electronic media is destroyed.
+ - The cardholder data is rendered unrecoverable so that it cannot be reconstructed.
+ levels:
+ - base
+ status: manual
+
+ - id: '9.5'
+ title: Point-of-interaction (POI) devices are protected from tampering and unauthorized substitution.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.5.1
+ title: POI devices that capture payment card data via direct physical interaction with the
+ payment card form factor are protected from tampering and unauthorized substitution.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.5.1.1
+ title: An up-to-date list of POI devices is maintained.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.5.1.2
+ title: POI device surfaces are periodically inspected to detect tampering and unauthorized
+ substitution.
+ description: |-
+ Point of Interaction Devices cannot be tampered with, substituted without authorization,
+ or have skimming attachments installed without timely detection.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 9.5.1.2.1
+ title: The frequency of periodic POI device inspections and the type of inspections
+ performed is defined in the entity's targeted risk analysis, which is performed
+ according to all elements specified in Requirement 12.3.1.
+ description: |-
+ POI devices are inspected at a frequency that addresses the entity's risk.
+ This requirement is a best practice until 31 March 2025, after which it will be
+ required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 9.5.1.3
+ title: Training is provided for personnel in POI environments to be aware of attempted
+ tampering or replacement of POI devices.
+ levels:
+ - base
+ status: manual
+
+ - id: '10.1'
+ title: Processes and mechanisms for logging and monitoring all access to system components and
+ cardholder data are defined and documented.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 10.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 10 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 10 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 10.1.2
+ title: Roles and responsibilities for performing activities in Requirement 10 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 10 are documented, assigned and
+ understood by the assigned personnel.
+
+ - id: '10.2'
+ title: Audit logs are implemented to support the detection of anomalies and suspicious activity,
+ and the forensic analysis of events.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.2.1
+ title: Audit logs are enabled and active for all system components and cardholder data.
+ description: |-
+ Records of all activities affecting system components and cardholder data are captured.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.2.1.1
+ title: Audit logs capture all individual user access to cardholder data.
+ description: |-
+ Records of all individual user access to cardholder data are captured.
+ levels:
+ - base
+ status: planned
+ notes: |-
+ Differently than 10.2.1.4, this requirement is about logginh successful access to
+ cardholder data. This kind of events can easily hit performance issues and are usually
+ not necessary if a good access policy is in place. More clarification is needed about
+ this requirement.
+
+ - id: 10.2.1.2
+ title: Audit logs capture all actions taken by any individual with administrative access,
+ including any interactive use of application or system accounts.
+ description: |-
+ Records of all actions performed by individuals with elevated privileges are captured.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Not all privileged commands have suid or sgid enabled. We probably want to include more
+ rules for this requirement.
+
+ - id: 10.2.1.3
+ title: Audit logs capture all access to audit logs.
+ description: |-
+ Records of all access to audit logs are captured.
+ levels:
+ - base
+ status: pending
+
+ - id: 10.2.1.4
+ title: Audit logs capture all invalid logical access attempts.
+ description: |-
+ Records of all invalid access attempts are captured.
+ levels:
+ - base
+ status: pending
+
+ - id: 10.2.1.5
+ title: Audit logs capture all changes to identification and authentication credentials.
+ levels:
+ - base
+ status: pending
+
+ - id: 10.2.1.6
+ title: Audit logs capture the initialization of new audit logs, and starting, stopping,
+ or pausing of the existing audit logs.
+ levels:
+ - base
+ status: planned
+ notes: |-
+ Ideally should exist rules specifically logging when audit configuration files are
+ modified and audit service state is changed.
+
+ - id: 10.2.1.7
+ title: Audit logs capture all creation and deletion of system-level objects.
+ description: |-
+ Records of alterations that indicate a system has been modified from its intended
+ functionality are captured.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ There are enough rules to capture deletion events but not for creation events.
+ This requirement needs to be better investigated to confirm which additional rules would
+ satistfy the requirement.
+
+ - id: 10.2.2
+ title: Audit logs record sufficient details for each auditable event.
+ description: |-
+ - User identification.
+ - Type of event.
+ - Date and time.
+ - Success and failure indication.
+ - Origination of event.
+ - Identity or name of affected data, system component, resource, or service (for example,
+ name and protocol).
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Standard settings for audit should be enough.
+
+ - id: '10.3'
+ title: Audit logs are protected from destruction and unauthorized modifications.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.3.1
+ title: Read access to audit logs files is limited to those with a job-related need.
+ description: |-
+ Stored activity records cannot be accessed by unauthorized personnel.
+ levels:
+ - base
+ status: pending
+
+ - id: 10.3.2
+ title: Audit log files are protected to prevent modifications by individuals.
+ description: |-
+ Stored activity records cannot be modified by personnel.
+ levels:
+ - base
+ status: pending
+
+ - id: 10.3.3
+ title: Audit log files, including those for external-facing technologies, are promptly backed
+ up to a secure, central, internal log server(s) or other media that is difficult to modify.
+ description: |-
+ Stored activity records are secured and preserved in a central location to prevent
+ unauthorized modification.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Although the technologies in general allow to send logs to a centralized server, some
+ parameters for this configuration are specific to each site policy and therefore the
+ requirement demands manual assessment.
+
+ - id: 10.3.4
+ title: File integrity monitoring or change-detection mechanisms is used on audit logs to
+ ensure that existing log data cannot be changed without generating alerts.
+ description: |-
+ Stored activity records cannot be modified without an alert being generated.
+ levels:
+ - base
+ status: pending
+
+ - id: '10.4'
+ title: Audit logs are reviewed to identify anomalies or suspicious activity.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 10.4.1
+ title: The audit logs are reviewed at least once daily.
+ description: |-
+ - All security events.
+ - Logs of all system components that store, process, or transmit CHD and/or SAD.
+ - Logs of all critical system components.
+ - Logs of all servers and system components that perform security functions (for example,
+ network security controls, intrusion-detection systems/intrusion-prevention systems
+ (IDS/IPS), authentication servers).
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 10.4.1.1
+ title: Automated mechanisms are used to perform audit log reviews.
+ description: |-
+ Potentially suspicious or anomalous activities are identified via a repeatable and
+ consistent mechanism. This requirement is a best practice until 31 March 2025, after
+ which it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Automation mechanisms, solutions and approaches vary for each organizarion.
+
+ - id: 10.4.2
+ title: Logs of all other system components (those not specified in Requirement 10.4.1) are
+ reviewed periodically.
+ description: |-
+ Potentially suspicious or anomalous activities for other system components (not included
+ in 10.4.1) are reviewed in accordance with the entity's identified risk. This requirement
+ is applicable to all other in-scope system components not included in Requirement 10.4.1.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 10.4.2.1
+ title: The frequency of periodic log reviews for all other system components (not defined
+ in Requirement 10.4.1) is defined in the entity's targeted risk analysis, which
+ is performed according to all elements specified in Requirement 12.3.1
+ description: |-
+ Log reviews for lower-risk system components are performed at a frequency that addresses
+ the entity's risk. This requirement is a best practice until 31 March 2025, after which
+ it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 10.4.3
+ title: Exceptions and anomalies identified during the review process are addressed.
+ description: |-
+ Suspicious or anomalous activities are addressed.
+ levels:
+ - base
+ status: manual
+
+ - id: '10.5'
+ title: Audit log history is retained and available for analysis.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.5.1
+ title: Retain audit log history for at least 12 months, with at least the most recent three
+ months immediately available for analysis.
+ description: |-
+ Historical records of activity are available immediately to support incident response and
+ are retained for at least 12 months.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ It is not simple to ensure 12 months history is present in each system but the rules in
+ this requirement ensures the logs are not lost without administrators awareness.
+
+ - id: '10.6'
+ title: Time-synchronization mechanisms support consistent time settings across all systems.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.6.1
+ title: System clocks and time are synchronized using time-synchronization technology.
+ description: |-
+ Common time is established across all systems. Keeping time-synchronization technology
+ current includes managing vulnerabilities and patching the technology according to PCI DSS
+ Requirements 6.3.1 and 6.3.3.
+ levels:
+ - base
+ status: pending
+ notes: |-
+ Maybe it is possible to optmize some similar rules related to ntp.
+
+ - id: 10.6.2
+ title: Systems are configured to the correct and consistent time.
+ description: |-
+ - One or more designated time servers are in use.
+ - Only the designated central time server(s) receives time from external sources.
+ - Time received from external sources is based on International Atomic Time or Coordinated
+ Universal Time (UTC).
+ - The designated time server(s) accept time updates only from specific industry-accepted
+ external sources.
+ - Where there is more than one designated time server, the time servers peer with one
+ another to keep accurate time.
+ - Internal systems receive time information only from designated central time server(s).
+ levels:
+ - base
+ status: pending
+ notes: |-
+ The selected rules might need updates in order to restrict their platform applicability
+ to avoid conflicts.
+
+ - id: 10.6.3
+ title: Time synchronization settings and data are protected.
+ description: |-
+ - Access to time data is restricted to only personnel with a business need.
+ - Any changes to time settings on critical systems are logged, monitored, and reviewed.
+ levels:
+ - base
+ status: pending
+
+ - id: '10.7'
+ title: Failures of critical security control systems are detected, reported, and responded to promptly.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 10.7.1
+ title: 'Additional requirement for service providers only: Failures of critical security
+ control systems are detected, alerted, and addressed promptly.'
+ description: |-
+ It includes but is not limited to failure of the following critical security control
+ systems:
+ - Network security controls.
+ - IDS/IPS.
+ - FIM.
+ - Anti-malware solutions.
+ - Physical access controls.
+ - Logical access controls.
+ - Audit logging mechanisms.
+ - Segmentation controls (if used).
+ levels:
+ - base
+ status: manual
+
+ - id: 10.7.2
+ title: Failures of critical security control systems are detected, alerted, and addressed
+ promptly.
+ description: |-
+ It includes but is not limited to failure of the following critical security control
+ systems:
+ - Network security controls.
+ - IDS/IPS.
+ - Change-detection mechanisms.
+ - Anti-malware solutions.
+ - Physical access controls.
+ - Logical access controls.
+ - Audit logging mechanisms.
+ - Segmentation controls (if used).
+ - Audit log review mechanisms.
+ - Automated security testing tools (if used).
+ levels:
+ - base
+ status: pending
+
+ - id: 10.7.3
+ title: Failures of any critical security controls systems are responded to restore security
+ functions, ensure documentation, address security issues and prevent other failures.
+ description: |-
+ It includes but is not limited to:
+ - Restoring security functions.
+ - Identifying and documenting the duration (date and time from start to end) of the
+ security failure.
+ - Identifying and documenting the cause(s) of failure and documenting required
+ remediation.
+ - Identifying and addressing any security issues that arose during the failure.
+ - Determining whether further actions are required as a result of the security failure.
+ - Implementing controls to prevent the cause of failure from reoccurring.
+ - Resuming monitoring of security controls.
+ levels:
+ - base
+ status: manual
+
+ - id: '11.1'
+ title: Processes and mechanisms for regularly testing security of systems and networks are defined
+ and understood.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.1.1
+ title: All security policies and operational procedures that are identified in Requirement
+ 11 are Documented, Kept up to date, In use and Known to all affected parties.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that security policies and
+ operational procedures identified in Requirement 11 are managed in accordance with all
+ elements specified in this requirement.
+
+ - id: 11.1.2
+ title: Roles and responsibilities for performing activities in Requirement 11 are documented,
+ assigned, and understood.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Examine documentation and interview personnel to verify that day-to-day responsibilities
+ for performing all the activities in Requirement 11 are documented, assigned and
+ understood by the assigned personnel.
+
+ - id: '11.2'
+ title: Wireless access points are identified and monitored, and unauthorized wireless access points
+ are addressed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.2.1
+ title: Authorized and unauthorized wireless access points are managed.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.2.2
+ title: An inventory of authorized wireless access points is maintained, including a documented
+ business justification.
+ description: |-
+ Unauthorized wireless access points are not mistaken for authorized wireless access
+ points.
+ levels:
+ - base
+ status: manual
+
+ - id: '11.3'
+ title: External and internal vulnerabilities are regularly identified, prioritized, and addressed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.3.1
+ title: Internal vulnerability scans are performed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.3.1.1
+ title: All other applicable vulnerabilities (those not ranked as high-risk vulnerabilities
+ or critical vulnerabilities according to the entity's vulnerability risk rankings
+ defined at Requirement 6.3.1) are managed.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.3.1.2
+ title: Internal vulnerability scans are performed via authenticated scanning.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.3.1.3
+ title: Internal vulnerability scans are performed after any significant change.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.3.2
+ title: External vulnerability scans are performed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.3.2.1
+ title: External vulnerability scans are performed after any significant change.
+ levels:
+ - base
+ status: manual
+
+ - id: '11.4'
+ title: External and internal penetration testing is regularly performed, and exploitable vulnerabilities
+ and security weaknesses are corrected.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.4.1
+ title: A penetration testing methodology is defined, documented, and implemented by the entity.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.2
+ title: Internal penetration testing is performed.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.3
+ title: External penetration testing is performed.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.4
+ title: Exploitable vulnerabilities and security weaknesses found during penetration testing
+ are corrected
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.5
+ title: If segmentation is used to isolate the CDE from other networks, penetration tests
+ are performed on segmentation controls.
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.6
+ title: 'Additional requirement for service providers only: If segmentation is used to isolate
+ the CDE from other networks, penetration tests are performed on segmentation controls.'
+ levels:
+ - base
+ status: manual
+
+ - id: 11.4.7
+ title: 'Additional requirement for multi-tenant service providers only: Multi-tenant service
+ providers support their customers for external penetration testing per Requirement 11.4.3
+ and 11.4.4.'
+ description: |-
+ Multi-tenant service providers support their customers' need for technical testing either
+ by providing access or evidence that comparable technical testing has been undertaken.
+ levels:
+ - base
+ status: manual
+
+ - id: '11.5'
+ title: Network intrusions and unexpected file changes are detected and responded to.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 11.5.1
+ title: Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or
+ prevent intrusions into the network.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.5.1.1
+ title: 'Additional requirement for service providers only: Intrusion-detection and/or
+ intrusion-prevention techniques detect, alert on/prevent, and address covert malware
+ communication channels.'
+ description: |-
+ Mechanisms are in place to detect and alert/prevent covert communications with
+ command-and-control systems. Alerts generated by these mechanisms are responded to by
+ personnel, or by automated means that ensure that such communications are blocked. This
+ requirement applies only when the entity being assessed is a service provider. This
+ requirement is a best practice until 31 March 2025, after which it will be required and
+ must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ The policy is not explicit about any specific solution. The solution might vary
+ depending on site policies.
+
+ - id: 11.5.2
+ title: A change-detection mechanism (for example, file integrity monitoring tools) is deployed.
+ levels:
+ - base
+ status: pending
+
+ - id: '11.6'
+ title: Unauthorized changes on payment pages are detected and responded to.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 11.6.1
+ title: A change- and tamper-detection mechanism is deployed.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ It depends on controls in application level, which varies based on site policies.
+
+ - id: '12.1'
+ title: A comprehensive information security policy that governs and provides direction for protection
+ of the entity's information assets is known and current.
+ levels:
+ - base
+ status: pending
+ controls:
+ - id: 12.1.1
+ title: An overall information security policy is established, published, maintained and disseminated
+ to all relevant personnel, as well as to relevant vendors and business partners.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.1.2
+ title: The information security policy is updated and reviewed at least once every 12 months.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.1.3
+ title: The security policy clearly defines information security roles and responsibilities
+ for all personnel, and all personnel are aware of and acknowledge their information security
+ responsibilities.
+ description: |-
+ Personnel understand their role in protecting the entity's cardholder data.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.1.4
+ title: Responsibility for information security is formally assigned to a Chief Information
+ Security Officer or other information security knowledgeable member of executive management.
+ description: |-
+ A designated member of executive management is responsible for information security.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.2'
+ title: Acceptable use policies for end-user technologies are defined and implemented.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.2.1
+ title: Acceptable use policies for end-user technologies are documented and implemented.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.3'
+ title: Risks to the cardholder data environment are formally identified, evaluated, and managed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.3.1
+ title: For each PCI DSS requirement that specifies completion of a targeted risk analysis,
+ the analysis is documented.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.3.2
+ title: A targeted risk analysis is performed for each PCI DSS requirement that the entity
+ meets with the customized approach
+ levels:
+ - base
+ status: manual
+
+ - id: 12.3.3
+ title: Cryptographic cipher suites and protocols in use are documented and reviewed at least
+ once every 12 months.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Related to requirement 2.2.7.
+
+ - id: 12.3.4
+ title: Hardware and software technologies in use are reviewed at least once every 12 months.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ The technical requirement related to this is 6.3.3.
+
+ - id: '12.4'
+ title: PCI DSS compliance is managed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.4.1
+ title: 'Additional requirement for service providers only: Responsibility is established
+ by executive management for the protection of cardholder data and a PCI DSS compliance
+ program.'
+ levels:
+ - base
+ status: manual
+
+ - id: 12.4.2
+ title: 'Additional requirement for service providers only: Reviews are performed at least
+ once every three months to confirm that personnel are performing their tasks in accordance
+ with all security policies and operational procedures.'
+ description: |-
+ Reviews are performed by personnel other than those responsible for performing the given
+ task.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.4.2.1
+ title: 'Additional requirement for service providers only: Reviews conducted in accordance
+ with Requirement 12.4.2 are documented.'
+ levels:
+ - base
+ status: manual
+
+ - id: '12.5'
+ title: PCI DSS scope is documented and validated.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.5.1
+ title: An inventory of system components that are in scope for PCI DSS, including a description
+ of function/use, is maintained and kept current.
+ description: |-
+ All system components in scope for PCI DSS are identified and known.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.5.2
+ title: PCI DSS scope is documented and confirmed by the entity at least once every 12 months
+ and upon significant change to the in-scope environment.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.5.2.1
+ title: 'Additional requirement for service providers only: PCI DSS scope is documented
+ and confirmed by the entity at least once every six months and upon significant
+ change to the in-scope environment. At a minimum, the scoping validation includes
+ all the elements specified in Requirement 12.5.2.'
+ description: |-
+ The accuracy of PCI DSS scope is verified to be continuously accurate by comprehensive
+ analysis and appropriate technical measures. This requirement applies only when the
+ entity being assessed is a service provider. This requirement is a best practice until
+ 31 March 2025, after which it will be required and must be fully considered during a
+ PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.5.3
+ title: 'Additional requirement for service providers only: Significant changes to organizational
+ structure result in a documented (internal) review of the impact to PCI DSS scope and
+ applicability of controls, with results communicated to executive management.'
+ description: |-
+ PCI DSS scope is confirmed after significant organizational change. This requirement
+ applies only when the entity being assessed is a service provider. This requirement is a
+ best practice until 31 March 2025, after which it will be required and must be fully
+ considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.6'
+ title: Security awareness education is an ongoing activity.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.6.1
+ title: A formal security awareness program is implemented to make all personnel aware of
+ the entity's information security policy and procedures, and their role in protecting
+ the cardholder data.
+ description: |-
+ Personnel are knowledgeable about the threat landscape, their responsibility for the
+ operation of relevant security controls, and are able to access assistance and guidance
+ when required.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.6.2
+ title: The security awareness program is updated and reviewed at least once every 12 months.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.6.3
+ title: Personnel receive security awareness training upon hire and at least once every 12
+ months via multiple methods of communication.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.6.3.1
+ title: Security awareness training includes awareness of threats and vulnerabilities
+ that could impact the security of the CDE.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.6.3.2
+ title: Security awareness training includes awareness about the acceptable use of end-user
+ technologies in accordance with Requirement 12.2.1.
+ description: |-
+ Personnel are knowledgeable about their responsibility for the security and operation of
+ end-user technologies and are able to access assistance and guidance when required. This
+ requirement is a best practice until 31 March 2025, after which it will be required and
+ must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.7'
+ title: Personnel are screened to reduce risks from insider threats.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.7.1
+ title: Potential personnel who will have access to the CDE are screened, within the constraints
+ of local laws, prior to hire to minimize the risk of attacks from internal sources.
+ description: |-
+ The risk related to allowing new members of staff access to the CDE is understood and
+ managed. For those potential personnel to be hired for positions such as store cashiers,
+ who only have access to one card number at a time when facilitating a transaction, this
+ requirement is a recommendation only.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.8'
+ title: Risk to information assets associated with third-party service provider (TPSP) relationships
+ is managed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.8.1
+ title: A list of all third-party service providers (TPSPs) with which account data is shared
+ or that could affect the security of account data is maintained, including a description
+ for each of the services provided.
+ description: |-
+ Records are maintained of TPSPs and the services provided. The use of a PCI DSS compliant
+ TPSP does not make an entity PCI DSS compliant, nor does it remove the entit's
+ responsibility for its own PCI DSS compliance.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.8.2
+ title: Written agreements with TPSPs are maintained
+ levels:
+ - base
+ status: manual
+
+ - id: 12.8.3
+ title: An established process is implemented for engaging TPSPs, including proper due diligence
+ prior to engagement.
+ description: |-
+ The capability, intent, and resources of a prospective TPSP to adequately protect account
+ data are assessed before the TPSP is engaged.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.8.4
+ title: A program is implemented to monitor TPSPs' PCI DSS compliance status at least once
+ every 12 months.
+ description: |-
+ The PCI DSS compliance status of TPSPs is verified periodically. Where an entity has an
+ agreement with a TPSP for meeting PCI DSS requirements on behalf of the entity (for
+ example, via a firewall service), the entity must work with the TPSP to make sure the
+ applicable PCI DSS requirements are met. If the TPSP does not meet those applicable
+ PCI DSS requirements, then those requirements are also "not in place" for the entity.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.8.5
+ title: Information is maintained about which PCI DSS requirements are managed by each TPSP,
+ which are managed by the entity, and any that are shared between the TPSP and the entity.
+ description: |-
+ Records detailing the PCI DSS requirements and related system components for which each
+ TPSP is solely or jointly responsible, are maintained and reviewed periodically.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.9'
+ title: Third-party service providers (TPSPs) support their customers' PCI DSS compliance.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.9.1
+ title: |-
+ Additional requirement for service providers only: TPSPs provide written agreements to
+ customers that include acknowledgments that TPSPs are responsible for the security of
+ account data the TPSP possesses or otherwise stores, processes, or transmits on behalf of
+ the customer, or to the extent that the TPSP could impact the security of the customer's
+ cardholder data and/or sensitive authentication data.
+ description: |-
+ TPSPs formally acknowledge their security responsibilities to their customers. This
+ requirement applies only when the entity being assessed is a service provider. The exact
+ wording of an agreement will depend on the details of the service being provided, and the
+ responsibilities assigned to each party. The agreement does not have to include the exact
+ wording provided in this requirement.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.9.2
+ title: |-
+ Additional requirement for service providers only: TPSPs support their customers' requests
+ for information to meet Requirements 12.8.4 and 12.8.5.
+ levels:
+ - base
+ status: manual
+
+ - id: '12.10'
+ title: Suspected and confirmed security incidents that could impact the CDE are responded to immediately.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.10.1
+ title: An incident response plan exists and is ready to be activated in the event of a suspected
+ or confirmed security incident.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.2
+ title: At least once every 12 months, the security incident response plan is reviewed, updated,
+ and tested.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.3
+ title: Specific personnel are designated to be available on a 24/7 basis to respond to suspected
+ or confirmed security incidents.
+ description: |-
+ Incidents are responded to immediately where appropriate.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.4
+ title: Personnel responsible for responding to suspected and confirmed security incidents
+ are appropriately and periodically trained on their incident response responsibilities.
+ description: |-
+ Personnel are knowledgeable about their role and responsibilities in incident response and
+ are able to access assistance and guidance when required.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: 12.10.4.1
+ title: The frequency of periodic training for incident response personnel is defined
+ in the entity's targeted risk analysis, which is performed according to all elements
+ specified in Requirement 12.3.1.
+ description: |-
+ Incident response personnel are trained at a frequency that addresses the entity's risk.
+ This requirement is a best practice until 31 March 2025, after which it will be required
+ and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.5
+ title: The security incident response plan includes monitoring and responding to alerts from
+ security monitoring systems.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.6
+ title: The security incident response plan is modified and evolved according to lessons learned
+ and to incorporate industry developments.
+ description: |-
+ The effectiveness and accuracy of the incident response plan is reviewed and updated after
+ each invocation.
+ levels:
+ - base
+ status: manual
+
+ - id: 12.10.7
+ title: Incident response procedures are in place, to be initiated upon the detection of stored
+ PAN anywhere it is not expected.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.1
+ title: Multi-tenant service providers protect and separate all customer environments and data.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A1.1.1
+ title: Logical separation is implemented.
+ description: |-
+ - The provider cannot access its customers' environments without authorization.
+ - Customers cannot access the provider's environment without authorization.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.1.2
+ title: Controls are implemented such that each customer only has permission to access its
+ own cardholder data and CDE.
+ description: |-
+ Customers cannot access other customers' environments.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.1.3
+ title: Controls are implemented such that each customer can only access resources allocated
+ to them.
+ description: |-
+ Customers cannot impact resources allocated to other customers.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.1.4
+ title: The effectiveness of logical separation controls used to separate customer environments
+ is confirmed at least once every six months via penetration testing.
+ description: |-
+ Segmentation of customer environments from other environments is periodically validated to
+ be effective. The testing of adequate separation between customers in a multi-tenant
+ service provider environment is in addition to the penetration tests specified in
+ Requirement 11.4.6. This requirement is a best practice until 31 March 2025, after which
+ it will be required and must be fully considered during a PCI DSS assessment.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.2
+ title: Multi-tenant service providers facilitate logging and incident response for all customers.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A1.2.1
+ title: Audit log capability is enabled for each customer's environment that is consistent
+ with PCI DSS Requirement 10.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.2.2
+ title: Processes or mechanisms are implemented to support and/or facilitate prompt forensic
+ investigations in the event of a suspected or confirmed security incident for any customer.
+ description: |-
+ Forensic investigation is readily available to all customers in the event of a suspected
+ or confirmed security incident.
+ levels:
+ - base
+ status: manual
+
+ - id: A1.2.3
+ title: Processes or mechanisms are implemented for reporting and addressing suspected or
+ confirmed security incidents and vulnerabilities.
+ levels:
+ - base
+ status: manual
+
+ - id: A2.1
+ title: POI terminals using SSL and/or early TLS are confirmed as not susceptible to known SSL/TLS
+ exploits.
+ description: |-
+ Appendix A2: Additional PCI DSS Requirements for Entities Using SSL/Early TLS for
+ Card-Present POS POI Terminal Connections.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A2.1.1
+ title: Where POS POI terminals at the merchant or payment acceptance location use SSL and/or
+ early TLS, the entity confirms the devices are not susceptible to any known exploits
+ for those protocols.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ Related to requirements 2.2.7 and 3.5.1.1.
+ Service level settings for web servers such as Apache and NGINX should also be checked.
+
+ - id: A2.1.2
+ title: 'Additional requirement for service providers only: All service providers with existing
+ connection points to POS POI terminals that use SSL and/or early TLS as defined in A2.1
+ have a formal Risk Mitigation and Migration Plan in place.'
+ levels:
+ - base
+ status: manual
+
+ - id: A2.1.3
+ title: 'Additional requirement for service providers only: All service providers provide
+ a secure service offering.'
+ description: |-
+ This requirement is not eligible for the customized approach. This requirement applies
+ only when the entity being assessed is a service provider.
+ levels:
+ - base
+ status: manual
+
+ - id: A3.1
+ title: A PCI DSS compliance program is implemented.
+ description: |-
+ Appendix A3: Designated Entities Supplemental Validation (DESV)
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A3.1.1
+ title: Responsibility is established by executive management for the protection of account
+ data and a PCI DSS compliance program.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+
+ - id: A3.1.2
+ title: A formal PCI DSS compliance program is in place.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirements 1-12
+
+ - id: A3.1.3
+ title: PCI DSS compliance roles and responsibilities are specifically defined and formally
+ assigned to one or more personnel.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+
+ - id: A3.1.4
+ title: Up-to-date PCI DSS and/or information security training is provided at least once
+ every 12 months to personnel with PCI DSS compliance responsibilities (as identified
+ in A3.1.3).
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+
+ - id: A3.2
+ title: PCI DSS scope is documented and validated.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A3.2.1
+ title: PCI DSS scope is documented and confirmed for accuracy at least once every three months
+ and upon significant changes to the in-scope environment.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements, Requirement 12.
+
+ - id: A3.2.2
+ title: PCI DSS scope impact for all changes to systems or networks is determined, including
+ additions of new systems and new network connections.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements; Requirements 1-12
+ controls:
+ - id: A3.2.2.1
+ title: Upon completion of a change, all relevant PCI DSS requirements are confirmed
+ to be implemented on all new or changed systems and networks, and documentation
+ is updated as applicable.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements; Requirements 1-12
+
+ - id: A3.2.3
+ title: Changes to organizational structure result in a formal (internal) review of the impact
+ to PCI DSS scope and applicability of controls.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+
+ - id: A3.2.4
+ title: If segmentation is used, PCI DSS scope is confirmed.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 11
+
+ - id: A3.2.5
+ title: A data-discovery methodology is implemented.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements.
+ controls:
+ - id: A3.2.5.1
+ title: Data discovery methods are confirmed.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements.
+
+ - id: A3.2.5.2
+ title: Response procedures are implemented to be initiated upon the detection of cleartext
+ PAN outside the CDE.
+ levels:
+ - base
+ status: manual
+
+ - id: A3.2.6
+ title: Mechanisms are implemented for detecting and preventing cleartext PAN from leaving
+ the CDE via an unauthorized channel, method, or process.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Scope of PCI DSS Requirements, Requirement 12
+ controls:
+ - id: A3.2.6.1
+ title: Response procedures are implemented to be initiated upon the detection of attempts
+ to remove cleartext PAN from the CDE via an unauthorized channel, method, or process.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+
+ - id: A3.3
+ title: PCI DSS is incorporated into business-as-usual (BAU) activities.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A3.3.1
+ title: Failures of critical security control systems are detected, alerted, and addressed
+ promptly.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 12
+ controls:
+ - id: A3.3.1.2
+ title: Failures of any critical security control systems are responded to promptly.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirements 1-12
+ If you noticed, this requirement should be A3.3.1.1 instead of A3.3.1.2 but it was kept
+ this way to be aligned to the policy.
+
+ - id: A3.3.2
+ title: Hardware and software technologies are reviewed at least once every 12 months to confirm
+ whether they continue to meet the organization's PCI DSS requirements.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirements 2, 6, 12.
+
+ - id: A3.3.3
+ title: Reviews are performed at least once every three months to verify BAU activities are
+ being followed.
+ description: |-
+ Reviews are performed by personnel assigned to the PCI DSS compliance program (as
+ identified in A3.1.3).
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirements 1-12.
+
+ - id: A3.4
+ title: Logical access to the cardholder data environment is controlled and managed.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A3.4.1
+ title: User accounts and access privileges to in-scope system components are reviewed at
+ least once every six months to ensure user accounts and access privileges remain appropriate
+ based on job function, and that all access is authorized.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 7.
+
+ - id: A3.5
+ title: Suspicious events are identified and responded to.
+ levels:
+ - base
+ status: manual
+ controls:
+ - id: A3.5.1
+ title: A methodology is implemented for the prompt identification of attack patterns and
+ undesirable behavior across systems.
+ levels:
+ - base
+ status: manual
+ notes: |-
+ PCI DSS Reference: Requirement 10, 12.
diff --git a/products/sle16/product.yml b/products/sle16/product.yml
index c6550fdbd65..e1bcd9d0328 100644
--- a/products/sle16/product.yml
+++ b/products/sle16/product.yml
@@ -35,6 +35,8 @@ platform_package_overrides:
reference_uris:
suse-base-sle16: 'not_publicly_available'
+ pcidss4_sle16: 'https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf'
+ anssi_sle16: 'https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf'
dconf_gdm_dir: "gdm.d"
diff --git a/products/sle16/profiles/anssi_bp28_minimal.profile b/products/sle16/profiles/anssi_bp28_minimal.profile
new file mode 100644
index 00000000000..03ed2faea65
--- /dev/null
+++ b/products/sle16/profiles/anssi_bp28_minimal.profile
@@ -0,0 +1,28 @@
+---
+documentation_complete: true
+
+metadata:
+ SMEs:
+ - svet-se
+ - rumch-se
+ - teacup-on-rockingchair
+
+title: 'ANSSI-BP-028 (minimal)'
+
+description: |-
+ This profile contains configurations that align to ANSSI-BP-028 v2.0 at the minimal hardening level.
+
+ ANSSI is the French National Information Security Agency, and stands for Agence nationale de la sécurité des systèmes d'information.
+ ANSSI-BP-028 is a configuration recommendation for GNU/Linux systems.
+
+ A copy of the ANSSI-BP-028 can be found at the ANSSI website:
+ https://www.ssi.gouv.fr/administration/guide/recommandations-de-securite-relatives-a-un-systeme-gnulinux/
+
+ Only the components strictly necessary to the service provided by the system should be installed.
+ Those whose presence can not be justified should be disabled, removed or deleted.
+ Performing a minimal install is a good starting point, but doesn't provide any assurance
+ over any package installed later.
+ Manual review is required to assess if the installed services are minimal.
+
+selections:
+ - anssi_sle16:all:minimal
diff --git a/products/sle16/profiles/pci-dss-4.profile b/products/sle16/profiles/pci-dss-4.profile
new file mode 100644
index 00000000000..3b1a418c6b2
--- /dev/null
+++ b/products/sle16/profiles/pci-dss-4.profile
@@ -0,0 +1,17 @@
+documentation_complete: true
+
+metadata:
+ SMEs:
+ - svet-se
+ - rumch-se
+ - teacup-on-rockingchair
+
+reference: https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf
+
+title: 'PCI-DSS v4 Control Baseline for SUSE Linux Enterprise 16'
+
+description: |-
+ Ensures PCI-DSS v4 security configuration settings are applied.
+
+selections:
+ - pcidss_4_sle16:all:base
From 7c0fd8f0d964311ef90d21d421d309bea05af4c9 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Tue, 7 Oct 2025 07:45:43 +0300
Subject: [PATCH 4/9] Drop middle layer when defining anssi and pcidss profiles
for sle16
---
controls/anssi_sle16.yml | 863 ----
controls/base_sle16.yml | 14 +-
controls/pcidss_4_sle16.yml | 3540 -----------------
products/sle16/product.yml | 2 -
.../sle16/profiles/anssi_bp28_minimal.profile | 2 +-
products/sle16/profiles/pci-dss-4.profile | 2 +-
6 files changed, 9 insertions(+), 4414 deletions(-)
delete mode 100644 controls/anssi_sle16.yml
delete mode 100644 controls/pcidss_4_sle16.yml
diff --git a/controls/anssi_sle16.yml b/controls/anssi_sle16.yml
deleted file mode 100644
index c0e622eefa7..00000000000
--- a/controls/anssi_sle16.yml
+++ /dev/null
@@ -1,863 +0,0 @@
----
-policy: 'ANSSI-BP-028'
-title: 'Configuration Recommendations of a GNU/Linux System'
-id: anssi_sle16
-version: '2.0'
-source: https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf
-product: sle16
-
-levels:
- - id: minimal
- - id: intermediary
- inherits_from:
- - minimal
- - id: enhanced
- inherits_from:
- - intermediary
- - id: high
- inherits_from:
- - enhanced
-
-reference_type: anssi_sle16
-
-controls:
- - id: R1
- title: Hardware Support
- levels:
- - enhanced
- description: >-
- It is recommended to apply the configuration recommendations for Hardware support
- mentioned in ANSSI DAT-24.
- notes: >-
- This requirement can be checked, but remediation requires manual reinstall of the OS.
- The content automation cannot really configure the BIOS, but can in some cases,
- check settings that are visible to the OS. Like for example the NX/DX setting.
- status: partial
-
- # R8 It is recommended to use hardware with support for hardware random number generator
- # R9 Disable VT-x AMD-V technologies
- # TODO: can we reliably check cpuinfo flags?
- # R10 IOMMU must enabled if the hardware supports it
- - id: R2
- title: Hardware configuration
- levels:
- - intermediary
- description: >-
- It is recommended to apply the configuration recommendations for BIOS/UEFI mentioned in
- ANSSI DAT-24.
- notes: >-
- Configurations recommended for this requirement are to be performed at the BIOS level.
- status: manual
-
- # From ANSSI DAT-24
- # R11 Password protect the BIOS
- # R12 Deactivate peripherals not needed
- # R13 The boot order list should give highest preference to component on which final OS is installed
- # R14 Enable NX/XD bit
- # - bios_enable_execution_restrictions # Doesn't have check
- # R15 Disable VT-x/AMD-V functionality
- # R16 Enable IOMMU
- - id: R3
- title: UEFI Secure boot activation
- levels:
- - intermediary
- description: >-
- It is recommended to apply UEFI Secure Boot configuration of the distribution.
- notes: >-
- Secure Boot needs to be enabled in the UEFI Setup program.
- Enabling Secure Boot can't be accomplished from the operating system.
- Also, OVAL doesn't provide any reliable ways to detect the Secure Boot status.
- Therefore, we will not provide any rules to automate this requirement.
- We recommend checking the Secure Boot status using the `mokutil --sb-state` or `bootctl status`
- commands.
- status: manual
-
- - id: R4
- title: Replacing of preloaded keys
- levels:
- - high
- description: >-
- It is recommended to replace the UEFI preloaded keys with new keys used to sign;
- the bootloader and Linux kernel, or; the image of the Linux kernel in EFI format.
- notes: >-
- This requirement is not generally automatable. The Machine Owner Key (MOK) could
- be used to add keys to the Secure Boot db key database but manual interaction is
- required to navigate the UEFI console and input the key password.
- On systems where MOK utility is not supported, one will need to access the UEFI
- firmware interface to add new keys.
- We have no automation support for UEFI interfaces and the steps for each hardware
- manufacturer can vary.
- status: manual
-
- - id: R5
- title: Boot loader password
- levels:
- - intermediary
- description: >-
- A password protecting the boot loader must exist.
- This password must prevent any user from changing their configuration options.
- status: pending
-
- - id: R6
- title: Protecting kernel command line parameters
- levels:
- - high
- description: >-
- It is recommended that UEFI Secure Boot is used to protect the Linux Kernel
- command line parameters during boot.
- notes: >-
- To protect the Linux Kernel command line one needs to create an Unified Kernel Image and use
- it with the UEFI Secure Boot mechanism.
- To check if the Kernel image contains the kernel command one needs to inspect the binary, on
- the command line one can use the objdump command. But unfortunately OVAL is not able to
- inspect kernel images.
- Also, it is not trivial to automate creation of such image or configuration of the
- Secure Boot mechanism.
- status: manual
-
- - id: R7
- title: IOMMU Configuration Guidelines
- levels:
- - enhanced
- description: >-
- The iommu = force directive must be added to the list of kernel parameters
- during startup in addition to those already present in the configuration
- files of the bootloader (/boot/grub/menu.lst or /etc/default/grub).
- status: pending
-
- - id: R8
- title: Memory configuration options
- levels:
- - intermediary
- status: pending
-
- - id: R9
- title: Kernel configuration options
- levels:
- - intermediary
- status: pending
-
- - id: R10
- title: Disabling the loading of kernel modules
- levels:
- - enhanced
- description: >-
- The loading of the kernel modules can be blocked by the activation of the
- sysctl kernel.modules_disabled:
- Prohibition of loading modules (except those already loaded to this point)
- kernel.modules_disabled = 1
- status: pending
-
- - id: R11
- title: Yama module sysctl configuration
- levels:
- - intermediary
- description: >-
- It is recommended to load the Yama security module at startup (by example
- passing the security = yama argument to the kernel) and configure the
- sysctl kernel.yama.ptrace_scope to a value of at least 1.
- status: pending
-
- - id: R12
- title: IPv4 configuration options
- levels:
- - intermediary
- status: pending
-
- - id: R13
- title: Disabling IPv6
- levels:
- - intermediary
- notes: >-
- When IPv6 is not in use, disable it, otherwise secure the IPv6 stack.
- This control hardens the IPv6 stack, to disable it use the related rules instead.
- status: pending
-
- - id: R14
- title: File system configuration options
- levels:
- - intermediary
- notes: >-
- The rule for the /proc file system is not implemented
- status: pending
-
- - id: R15
- title: Compile options for memory management
- levels:
- - high
- status: pending
- notes: >-
- The special case of direct access to physical memory is not handled.
-
- - id: R16
- title: Compile options for kernel data structures
- levels:
- - high
- status: pending
-
- - id: R17
- title: Compile options for the memory allocator
- levels:
- - high
- status: pending
-
- - id: R18
- title: Compile options for the management of kernel module
- levels:
- - high
- status: pending
-
- - id: R19
- title: Compile options for abnormal situations
- levels:
- - high
- status: pending
-
- - id: R20
- title: Compile options for kernel security functions
- levels:
- - high
- status: pending
-
- - id: R21
- title: Compile options for the compiler plugins
- levels:
- - high
- status: pending
-
- - id: R22
- title: Compile options for the IP stack
- levels:
- - high
- notes: >-
- This control doesn't disable the IPv6 stack, to disable it select the related rule.
- status: pending
-
- - id: R23
- title: Compile options for various kernel behaviors
- levels:
- - high
- notes: >-
- If the system can function without support for kernel modules, module support should be disabled
- by setting CONFIG_MODULES=n.
- status: pending
-
- - id: R24
- title: Compile options for 32-bit architectures
- levels:
- - high
- notes: >-
- Unless a X86 32bit kernel is explicitly supported by one of products in the project, this
- requirement is set to not applicable.
- status: not applicable
-
- - id: R25
- title: Compile options for x86_64 architectures
- levels:
- - high
- status: pending
-
- - id: R26
- title: Compile options for ARM architectures
- levels:
- - high
- notes: >-
- Unless a ARM 32bit kernel is explicitly supported by one of products in the project, this
- requirement is set to not applicable.
- status: not applicable
-
- - id: R27
- title: Compile options for ARM 64 architectures
- levels:
- - high
- status: pending
-
- - id: R28
- title: Partitioning type
- levels:
- - intermediary
- status: pending
-
- - id: R29
- title: Access Restrictions on /boot
- levels:
- - enhanced
- description: >-
- When possible, it is recommended not to automatically mount the /boot partition.
- In any case, access to the /boot folder should only be allowed for the root user.
- notes: >-
- The /boot partition mounted is essential to perform certain administrative actions, for
- example updating the kernel. Therefore, for better stability, in this requirement only rules
- to restrict the access to /boot are selected. It is not changed how the /boot is mounted.
- status: pending
-
- - id: R30
- title: Removal of unused user accounts
- levels:
- - minimal
- description: >-
- Unused user accounts must be deleted from the system.
- notes: >-
- The definition of unused user accounts is broad. It can include accounts
- whose owners don't use the system anymore, or users created by services
- or applications that should not be used.
- Automation by itself cannot discern which accounts are used or not.
- status: manual
-
- - id: R31
- title: User password strength
- levels:
- - minimal
- notes: >-
- The rules selected below establish a general password strength baseline
- of 100 bits, based on the recommendations of the technical note
- "Recommandations relatives à l'authentification multifacteur et aux mots de passe"
- (https://cyber.gouv.fr/publications/recommandations-relatives-lauthentification-multifacteur-et-aux-mots-de-passe)
-
- The baseline should be reviewed and tailored to the system's use case and needs.
- status: pending
-
- - id: R32
- title: Configuring a timeout on local user sessions
- levels:
- - intermediary
- description: >-
- Local user sessions (console TTY, graphical session) must be locked after a certain period
- of inactivity.
- notes: >-
- ANSSI doesn't specify the length of the inactivity period, we are choosing 10 minutes as reasonable
- number.
- status: pending
-
- - id: R33
- title: Use of dedicated administration accounts
- levels:
- - intermediary
- notes: >-
- By disabling direct root logins proper accountability is ensured.
- Users will login first, then escalate to privileged (root) access.
- Change of privilege operations must be based on executables to monitor the activities
- performed (for example sudo).
- Nonetheless, the content automation cannot ensure that each administrator was given a
- nominative administration account separate from his normal user account.
- status: pending
-
- - id: R34
- title: Deactivation of service accounts
- levels:
- - intermediary
- notes: >-
- It is difficult to generally identify the system's service accounts.
- UIDs of such accounts are generally between SYS_UID_MIN and SYS_UID_MAX, but their values
- are not enforced by the OS and can be changed over time.
- Assisting rules could list users which are not disabled for manual review.
- status: manual
-
- - id: R35
- title: Uniqueness and exclusivity of system service accounts
- levels:
- - intermediary
- description: >-
- Each service must have its own system account and be dedicated to it exclusively.
- notes: >-
- It is not trivial to identify whether a user account is a service account.
- UIDs of such accounts are generally between SYS_UID_MIN and SYS_UID_MAX, but their values
- are not enforced by the OS and can be changed over time.
- status: manual
-
- - id: R36
- title: Changing the default value of UMASK
- levels:
- - enhanced
- description: >-
- The default value of UMASK for the shells must be set to 0077 in order to allow read and
- write access to its owner only. This value can be defined in the configuration file
- /etc/profile that most shells (bash, dash, ksh…) will use.
- The default value of UMASK for services must be determined for each service, but in most
- cases, it should be set to 0027 (or more restrictive). This allows read access to its owner
- and its group, and a full access to its owner. For services such as systemd, this value can
- be defined directly in the configuration file of the service with the directive UMask=0027.
- notes: >-
- There are cases of Systemd services which would stop working in case umask
- would be configured to 0027 for all services. One such example is the
- Cups service which needs to create sockets which need to be available for
- all users. Therefore, this part of the requirement can't be automated.
- status: pending
-
- - id: R37
- title: Using access control features
- levels:
- - enhanced
- description: >-
- It is recommended to use the mandatory access control (MAC) features in
- addition to the traditional Unix user model (DAC), or possibly combine
- them with partitioning mechanisms.
- notes: >-
- Other partitioning mechanisms can include chroot and containers and are not contemplated
- in this requirement.
- status: pending
-
- - id: R38
- title: Group dedicated to the use of sudo
- levels:
- - enhanced
- description: >-
- A group dedicated to the use of sudo must be created, and only members of this
- group are allowed to execute sudo.
- status: pending
-
- - id: R39
- title: Sudo configuration guidelines
- levels:
- - intermediary
- status: pending
-
- - id: R40
- title: Privileges of target sudo users
- description: The targeted users of a rule should be, as much as possible, non privileged users.
- levels:
- - intermediary
- status: pending
-
- - id: R41
- title: Limiting the number of commands requiring the use of the EXEC option
- levels:
- - enhanced
- description: >-
- The commands requiring the execution of sub-processes (EXEC tag) must be
- explicitly listed and their use should be reduced to a strict minimum.
- notes: >-
- Human review is required to assess if the set of commands requiring EXEC is minimal.
- An auxiliary rule could list rules containing EXEC tag, for analysis.
- status: manual
-
- - id: R42
- title: Good use of negation in a sudoers file
- levels:
- - intermediary
- description: The sudoers configuration rules should not involve negation.
- status: pending
-
- - id: R43
- title: Explicit arguments in sudo specifications
- levels:
- - intermediary
- status: pending
-
- - id: R44
- title: Editing files with sudo
- levels:
- - intermediary
- description: A file requiring sudo to be edited, must be edited through the sudoedit command.
- notes: >-
- In R62 we established that the sudoers files should not use negations, thus the approach
- for this requirement is to ensure that sudoedit is the only text editor allowed.
- But it is difficult to ensure that allowed binaries aren't text editors without human
- review.
- status: manual
-
- - id: R45
- title: Enable AppArmor security profiles
- levels:
- - enhanced
- description: >-
- All AppArmor security profiles on the system must be enabled by default.
- status: pending
-
- - id: R46
- title: Activate SELinux with the Targeted Policy
- levels:
- - high
- description: >-
- It is recommended to enable the targeted policy when the distribution
- supports it and that it does not operate another security module than SELinux.
- status: pending
-
- - id: R47
- title: Containment of unprivileged interactive users
- levels:
- - high
- description: >-
- Interactive non-privileged users of a system must be confined by associating them with a SELinux
- confined user.
- notes: Interactive users who still need to perform administrative tasks should not be confined
- with user_u.
- status: manual
-
- - id: R48
- title: Setting SELinux booleans
- levels:
- - high
- description: >-
- It is recommended to set the following Booleans:
- allow_execheap to off, forbids processes to make their heap executable;
- allow_execmem to off, forbids processes to have both write and execute rights on memory pages;
- allow_execstack to off, forbids processes to make their stack executable;
- secure_mode_insmod to on, prohibits dynamic loading of modules by any process;
- ssh_sysadm_login to off, forbids SSH logins to connect directly in sysadmin role.
- notes: In RHEL, the SELinux boolean allow_execheap is renamed to selinuxuser_execheap, and the
- boolean allow_execstack is renamed to selinuxuser_execstack. And allow_execmem is not available,
- deny_execmem provides the same functionality.
- status: pending
-
- - id: R49
- title: Uninstalling SELinux Policy Debugging Tools
- levels:
- - high
- description: >-
- SELinux policy manipulation and debugging tools should not be installed
- on a machine in production.
- status: pending
-
- - id: R50
- title: Rights to access sensitive files and directories
- levels:
- - intermediary
- status: pending
-
- - id: R51
- title: Sensitive and trusted files
- levels:
- - enhanced
- description: >-
- All sensitive files and those contributing to the authentication mechanisms
- must be set up as soon as the system is installed. If default secrets are
- preconfigured, they must be replaced during, or immediately after, the
- installation phase of the system.
- notes: >-
- This concerns two aspects, the first is administrative, and involves prompt
- installation of secrets or trusted elements by the sysadmin.
- The second involves removal of any default secret or trusted element
- configured by the operating system during install process, e.g. default
- known passwords.
- status: documentation
-
- - id: R52
- title: Securing access for named sockets and pipes
- levels:
- - intermediary
- notes: |-
- The requirement states that all sockets and named pipes within all mounted
- file systems should be checked. The check should look at the permissions
- of the socket / pipe and compare them with permissions of the directory
- which contains the particular socket. In case permissions of the directory
- are less stricter than permissions of the socket, this should be
- considered a finding. Since different use cases can require different
- permissions for named pipes / sockets, it is not possible to perform this
- check automatically.
- status: manual
-
- - id: R53
- title: Files or directories without a known user or group
- levels:
- - minimal
- status: automated
- controls:
- - base_sle16:SLES-16-16016025
- - base_sle16:SLES-16-16016030
-
- - id: R54
- title: Sticky bit and write access rights
- levels:
- - minimal
- status: pending
-
- - id: R55
- title: Temporary directories dedicated to accounts
- levels:
- - intermediary
- description: >-
- Each user or service account must have its own temporary directory
- and dispose of it exclusively.
- notes: The approach of the selected rules is to use and configure pam_namespace module.
- status: pending
-
- - id: R56
- title: Executables with setuid and setgid bits
- levels:
- - minimal
- notes: >-
- Only programs specifically designed to be used with setuid or setgid bits can have these privilege
- bits set.
- This requirement considers apropriate for setuid and setgid bits the binaries that are installed
- from
- recognized and authorized repositories (covered in R15).
- The remediation resets the sticky bit to intended value by vendor/developer, any finding after
- remediation
- should be reviewed.
- status: pending
-
- - id: R57
- title: Executable with special rights setuid root and setgid root
- levels:
- - enhanced
- description: >-
- The executables with setuid executables root and setgid root special rights should be as few
- as possible.
- When only administrators are expected to execute them, these special rights should
- be removed and prefer them commands like su or sudo, which can be monitored
- notes: There could be rules to list all executables with setuid root or setgid root rights.
- status: manual
-
- - id: R58
- title: Installation of packages reduced to the bare necessities
- levels:
- - minimal
- description: >-
- The selection of packages installed should be as small as possible,
- limiting itself to select only what is required.
- notes: >-
- It is not possible to automatically decide in general way if a package is required or not for
- given system.
- As a future improvement, there could be rules assisting assessment by listing the installed
- packages.
- status: manual
-
- - id: R59
- title: Official package repositories
- levels:
- - minimal
- description: Only up-to-date official repositories of the distribution must be used.
- notes: >-
- It is not trivial to distinguish an official repository from an unofficial one.
- We cannot draw conclusions from the repo name or URL of the repo (as they can be arbitrary
- or behind a proxy).
- One approach to check the origin of installed packages is to check the signature of the packages.
- If the public key of a repository is not installed, the repo is not trusted.
- status: pending
-
- - id: R60
- title: Hardened package repositories
- levels:
- - enhanced
- description: >-
- When the distribution provides several types of repositories, preference
- should be given to those containing packages subject to additional
- hardening measures.
- Between two packages providing the same service, those subject to hardening
- (at compilation, installation, or default configuration) must be preferred.
- status: not applicable
-
- - id: R61
- title: Regular updates
- levels:
- - minimal
- notes: Check the vendor CVE feed and configure automatic install of security related updates.
- status: pending
-
- - id: R62
- title: Minimization of installed services
- levels:
- - minimal
- description: >-
- Only the components strictly necessary to the service provided by the system should
- be installed.
- Those whose presence can not be justified should be disabled, removed or deleted.
- status: manual # The list of essential services is not objective.
- notes: >-
- Performing a minimal install is a good starting point, but doesn't provide any assurance
- over any package installed later.
- Manual review is required to assess if the installed services are minimal.
- In general, use of obsolete or insecure services is not recommended and we remove some
- of these in this recommendation.
-
- - id: R63
- title: Minimization of services configuration
- levels:
- - intermediary
- description: >-
- Services are often installed with default configurations that enable features potentially
- problematic from a security point of view.
- The features configured at the level of launched services should be limited to the strict
- minimum.
- notes: >-
- Define a list of most problematic components or features to be hardened or restricted.
- status: manual
-
- - id: R64
- title: Least privilege for the services
- levels:
- - enhanced
- description: >-
- The deployed services must have their access restricted to the system
- strict minimum, especially when it comes to files, processes or network.
- notes: >-
- SELinux policies limit the privileges of services and daemons just to those which are required.
- The policies should be enough to restrict the services' privileges to its essentials, but the
- automated content cannot assess whether they are the minimum required for the deployment.
- status: pending
-
- - id: R65
- title: Services partitioning
- levels:
- - enhanced
- notes: >-
- Using automation to restrict access and chroot services is not generally reliable.
- status: manual
-
- - id: R66
- title: Virtualization components hardening
- levels:
- - high
- description: >-
- Each component supporting the virtualization must be hardened, especially
- by applying technical measures to counter the exploit attempts.
- notes: >-
- We cannot easily automate securing of virtualization technologies in a general way.
- It may be interesting to point out virtualization components that are installed and
- should be hardened.
- status: manual
-
- - id: R67
- title: Secure remote authentication with PAM
- levels:
- - intermediary
- description: |-
- When authentication takes place through a remote application (network),
- the authentication protocol used by PAM must be secure (flow encryption,
- remote server authentication, anti-replay mechanisms, ...).
- notes: |-
- In systems where remote authentication is handled through sssd service, PAM delegates
- requests for remote authentication to sssd service through a local Unix socket. The sssd
- service can use IPA, AD or LDAP as a remote database containing information required for authentication.
- In case LDAP is configured manually, there are several configuration options which should be chedked.
- status: pending
-
- - id: R68
- title: Protecting stored passwords
- levels:
- - minimal
- description: Any password must be protected by cryptographic mechanisms.
- notes: >-
- The selection of rules doesn't cover the use of hardware devices to protect the passwords.
- status: supported
-
- - id: R69
- title: Securing access to remote user databases
- levels:
- - intermediary
- description: |-
- When the user databases are stored on a remote network service, NSS must
- be configured to establish a secure link that allows, at minimum, to
- authenticate the server and protect the communication channel.
- notes: |-
- A nsswitch service connecting to remote database is provided by sssd. This is checked in requirement R67.
- Another such service is winbind which is by default configured to connect securely to Samba domains.
- Other relevant services are NIS and Hesiod. These should not be used.
- status: pending
-
- - id: R70
- title: Separation of System Accounts and Directory Administrator
- levels:
- - intermediary
- status: manual
-
- - id: R71
- title: Implement a logging system
- levels:
- - enhanced
- description: >-
- The configuration of the service must be performed according to the
- 'Security Recommendations for the architecture of a logging system'
- (DAT-PA-012 v2.0) accessible on the ANSSI website
- (https://www.ssi.gouv.fr/journalisation).
- notes: >-
- A lot of recommendations and requirements from the DAT-PA-012 document are administrative and
- hard to automate.
- The rules selected below address a few of the aspects that can be covered, keep in mind that
- these configurations should
- be customized for the systems deployment requirements.
- status: pending
-
- - id: R72
- title: Service Activity Logs
- levels:
- - enhanced
- description: >-
- Each service must have a dedicated event logging journal on the system.
- This log must only be accessible by the syslog server, and must not be readable,
- editable or deletable by the service directly.
- status: documentation # How to enable syslog for each service installed in the system
-
- - id: R73
- title: Logging activity by auditd
- levels:
- - enhanced
- description: >-
- The logging of the system activity must be done through the auditd service.
- status: pending
-
- - id: R74
- title: Configuring the local messaging service
- levels:
- - intermediary
- status: pending
-
- - id: R75
- title: Messaging Aliases for Service Accounts
- levels:
- - intermediary
- status: pending # semi-automated
- notes: >-
- Only the alias for root user is covered by the rule.
- The other services cannot be reliably covered, as there is no simple way
- of determining what is a service account.
-
- - id: R76
- title: Sealing and integrity of files
- levels:
- - high
- description: >-
- Any file that is not transient (such as temporary files, databases, etc.)
- must be monitored by a sealing program.
- This includes: directories containing executables, libraries,
- configuration files, as well as any files that may contain sensitive
- elements (cryptographic keys, passwords, confidential data).
- status: pending
-
- - id: R77
- title: Protection of the seals database
- levels:
- - high
- description: >-
- The sealing database must be protected from malicious access by
- cryptographic signature mechanisms (with the key used for the signature
- not locally stored in clear), or possibly stored on a separate machine
- of the one on which the sealing is done.
- Check section "Database and config signing in AIDE manual"
- https://aide.github.io/doc/#signing
- status: does not meet
-
- - id: R78
- title: Network services partitioning
- levels:
- - enhanced
- description: >-
- Network services should as much as possible be hosted on isolated environments.
- This avoids having other potentially affected services if one of them gets
- compromised under the same environment.
- notes: >-
- Manual analysis is required to determine if services are hosted appropriately in
- separate or isolated system while maintaining functionality.
- status: manual
-
- - id: R79
- title: Hardening and monitoring of exposed services
- levels:
- - intermediary
- notes: >-
- SELinux can provide confinement and monitoring of services, and AIDE provides
- basic integrity checking. System logs are configured as part of R43.
- Hardening of particular services should be done on a case by case basis and is
- not automated by this content.
- status: pending
-
- - id: R80
- title: Minimization of network services
- levels:
- - minimal
- description: All network services must be listening on the correct network intefaces.
- notes: >-
- Manual review is necessary to decide if the list of resident daemons is minimal.
- Assisting rules could be created to list sevices listening on the network for manual review.
- status: manual
diff --git a/controls/base_sle16.yml b/controls/base_sle16.yml
index df7829df7a8..32ee529b81d 100644
--- a/controls/base_sle16.yml
+++ b/controls/base_sle16.yml
@@ -7,16 +7,16 @@ source: not_publicly_available
reference_type: suse-base-sle16
levels:
- - id: high
- - id: medium
- - id: low
+ - id: pcidss4
+ - id: anssi_minimal
product: sle16
controls:
- id: SLES-16-16016015
levels:
- - high
+ - pcidss4
+ - anssi_minimal
title: SLES 16 must be a vendor-supported release.
rules:
- installed_OS_is_vendor_supported
@@ -25,7 +25,7 @@ controls:
- id: SLES-16-16016020
title: Enable NX/XD Support
levels:
- - medium
+ - pcidss4
automated: partially
rules:
- bios_enable_execution_restrictions
@@ -34,7 +34,7 @@ controls:
- id: SLES-16-16016025
title: Ensure All Files Are Owned by a Group
levels:
- - medium
+ - anssi_minimal
rules:
- file_permissions_ungroupowned
status: automated
@@ -42,7 +42,7 @@ controls:
- id: SLES-16-16016030
title: Ensure All Files Are Owned by a Use
levels:
- - medium
+ - anssi_minimal
rules:
- no_files_unowned_by_user
status: automated
diff --git a/controls/pcidss_4_sle16.yml b/controls/pcidss_4_sle16.yml
deleted file mode 100644
index de1e0a939ab..00000000000
--- a/controls/pcidss_4_sle16.yml
+++ /dev/null
@@ -1,3540 +0,0 @@
----
-policy: PCI-DSS
-title: Payment Card Industry - Data Security Standard (PCI-DSS)
-id: pcidss_4_sle16
-version: '4.0.1'
-source: https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0_1.pdf
-product: sle16
-
-levels:
- - id: base
-
-reference_type: pcidss4_sle16
-
-controls:
- - id: '1.1'
- title: 'Processes and mechanisms for installing and maintaining network security controls are defined
- and understood.'
- levels:
- - base
- status: manual
- controls:
- - id: 1.1.1
- title: 'All security policies and operational procedures that are identified in Requirement
- 1 are Documented, Kept up to date, In use and Known to all affected parties.'
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 1 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 1.1.2
- title: 'Roles and responsibilities for performing activities in Requirement 1 are documented,
- assigned, and understood.'
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 1 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '1.2'
- title: 'Network Security Controls (NSCs) are configured and maintained.'
- levels:
- - base
- status: pending
- controls:
- - id: 1.2.1
- title: 'Configuration standards for NSC rulesets are Defined, Implemented and Maintained.'
- levels:
- - base
- status: pending
- notes: |-
- Examples of NSCs covered by these configuration standards include, but are not limited to,
- firewalls, routers configured with access control lists, and cloud virtual networks. The
- objective of this requirement is to ensure the way that NSCs are configured and operate
- are defined and consistently applied. While the tooling and standards can be automated,
- the review of allowed accesses should be manual as different sites may have different
- policies.
-
- - id: 1.2.2
- title: 'All changes to network connections and to configurations of NSCs are approved and
- managed in accordance with the change control process defined at Requirement 6.5.1.'
- levels:
- - base
- status: manual
- notes: |-
- Changes to network connections and NSCs cannot result in misconfiguration, implementation
- of insecure services, or unauthorized network connections. Changes to network connections
- include the addition, removal, or modification of a connection. Changes to NSC
- configurations include those related to the component itself as well as those affecting
- how it performs its security function. A formal change control process should be in place.
-
- - id: 1.2.3
- title: 'An accurate network diagram(s) is maintained that shows all connections between the
- CDE and other networks, including any wireless networks.'
- levels:
- - base
- status: manual
- notes: |-
- A representation of the boundaries between the CDE, all trusted networks, and all
- untrusted networks, is maintained and available. A current network diagram(s) or other
- technical or topological solution that identifies network connections and devices can be
- used to meet this requirement.
-
- - id: 1.2.4
- title: 'An accurate data-flow diagram(s) is maintained'
- description: |-
- An accurate data-flow diagram(s) is maintained that meets the following:
- - Shows all account data flows across systems and networks
- - Updated as needed upon changes to the environment
- levels:
- - base
- status: manual
-
- - id: 1.2.5
- title: 'All services, protocols, and ports allowed are identified, approved, and have a defined
- business need.'
- levels:
- - base
- status: manual
-
- - id: 1.2.6
- title: Security features are defined and implemented for all services, protocols, and ports
- that are in use and considered to be insecure, such that the risk is mitigated.
- levels:
- - base
- status: pending
- notes: |-
- The specific risks associated with the use of insecure services, protocols, and ports are
- understood, assessed, and appropriately mitigated. The selected rules here basically
- remove services without encryption and restricted some common services.
-
- - id: 1.2.7
- title: Configurations of NSCs are reviewed at least once every six months to confirm they
- are relevant and effective.
- description: |-
- NSC configurations that allow or restrict access to trusted networks are verified
- periodically to ensure that only authorized connections with a current business
- justification are permitted.
- levels:
- - base
- status: manual
- notes: |-
- Some configuration automation solution, such as Ansible could be helpful here.
-
- - id: 1.2.8
- title: Configuration files for NSCs are secured from unauthorized access and kept consistent
- with active network configurations.
- levels:
- - base
- status: pending
-
- - id: '1.3'
- title: Network access to and from the cardholder data environment is restricted.
- levels:
- - base
- status: pending
- controls:
- - id: 1.3.1
- title: Inbound traffic to the CDE is restricted to only traffic that is necessary
- description: |-
- Inbound traffic to the CDE is restricted as follows:
- - To only traffic that is necessary.
- - All other traffic is specifically denied.
- levels:
- - base
- status: pending
-
- - id: 1.3.2
- title: Outbound traffic from the CDE is restricted to only traffic that is necessary
- description: |-
- Outbound traffic from the CDE is restricted as follows:
- - To only traffic that is necessary.
- - All other traffic is specifically denied.
- levels:
- - base
- status: pending
- notes: |-
- It appears there is no rule in the project to restrict outbound traffic on the firewall.
- Perhaps a rule to automates this would do more harm than good. Probably a manual
- assessment is more reasonable here.
-
- - id: 1.3.3
- title: NSCs are installed between all wireless networks and the CDE, regardless of whether
- the wireless network is a CDE.
- description: |-
- NSCs are installed between all wireless networks and the CDE, regardless of whether the
- wireless network is a CDE, such that:
- - All wireless traffic from wireless networks into the CDE is denied by default.
- - Only wireless traffic with an authorized business purpose is allowed into the CDE.
- levels:
- - base
- status: pending
- notes: |-
- Wireless interfaces are not expected in servers so they are disabled by default in this
- policy.
-
- - id: '1.4'
- title: Network connections between trusted and untrusted networks are controlled.
- levels:
- - base
- status: pending
- controls:
- - id: 1.4.1
- title: NSCs are implemented between trusted and untrusted networks.
- description: |-
- Unauthorized traffic cannot traverse network boundaries between trusted and untrusted
- networks.
- levels:
- - base
- status: pending
- notes: |-
- Trusted and untrusted networks are expected to be different for each environment.
- But loopback traffic is assumed to be trusted and even necessary for some services.
- This requirement is complements 1.2.1 and 1.3.1 requirements.
-
- - id: 1.4.2
- title: Inbound traffic from untrusted networks to trusted networks is restricted.
- description: |-
- Inbound traffic from untrusted networks to trusted networks is restricted to:
- - Communications with system components that are authorized to provide publicly accessible
- services, protocols, and ports.
- - Stateful responses to communications initiated by system components in a trusted network.
- - All other traffic is denied.
- levels:
- - base
- status: pending
- notes: |-
- Probably missing some relevant IPv6 related rules. Needs to be investigated.
-
- - id: 1.4.3
- title: Anti-spoofing measures are implemented to detect and block forged source IP addresses
- from entering the trusted network.
- levels:
- - base
- status: pending
- notes: |-
- Probably missing some relevant IPv6 related rules. Needs to be investigated.
-
- - id: 1.4.4
- title: System components that store cardholder data are not directly accessible from untrusted
- networks.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is not intended to apply to storage of account data in volatile memory
- but does apply where memory is being treated as persistent storage (for example, RAM
- disk). Account data can only be stored in volatile memory during the time necessary to
- support the associated business process (for example, until completion of the related
- payment card transaction).
-
- - id: 1.4.5
- title: The disclosure of internal IP addresses and routing information is limited to only
- authorized parties.
- description: |-
- Internal network information is protected from unauthorized disclosure.
- levels:
- - base
- status: pending
-
- - id: '1.5'
- title: Risks to the CDE from computing devices that are able to connect to both untrusted networks
- and the CDE are mitigated.
- levels:
- - base
- status: pending
- controls:
- - id: 1.5.1
- title: Security controls are implemented on any computing devices, including company- and
- employee-owned devices, that connect to both untrusted networks (including the Internet)
- and the CDE
- description: |-
- Security controls are implemented on any computing devices, including company- and
- employee-owned devices, that connect to both untrusted networks (including the Internet)
- and the CDE as follows:
- - Specific configuration settings are defined to prevent threats being introduced into the
- entity's network.
- - Security controls are actively running.
- - Security controls are not alterable by users of the computing devices unless
- specifically documented and authorized by management on a case-by-case basis for a limited
- period.
- levels:
- - base
- status: pending
- notes: |-
- To ensure this requirement, a manual analysis of site policy and topology is inevitable.
- From the technical perspective, previous requirements should already cover this
- requirement at some level.
-
- - id: '2.1'
- title: Processes and mechanisms for applying secure configurations to all system components are
- defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 2.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 2 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 2 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 2.1.2
- title: Roles and responsibilities for performing activities in Requirement 2 are documented,
- assigned, and understood.
- description: |-
- Day-to-day responsibilities for performing all the activities in Requirement 2 are
- allocated. Personnel are accountable for successful, continuous operation of these
- requirements.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 2 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '2.2'
- title: 'System components are configured and managed securely.'
- levels:
- - base
- status: pending
- controls:
- - id: 2.2.1
- title: Configuration standards are developed, implemented, and maintained
- description: |-
- Configuration standards are developed, implemented, and maintained to:
- - Cover all system components.
- - Address all known security vulnerabilities.
- - Be consistent with industry-accepted system hardening standards or vendor hardening
- recommendations.
- - Be updated as new vulnerability issues are identified, as defined in Requirement 6.3.1.
- - Be applied when new systems are configured and verified as in place before or
- immediately after a system component is connected to a production environment.
- levels:
- - base
- status: partial
- notes: |-
- Interestingly this requirement recommends other standards, such as Center for Internet
- Security (CIS), International Organization for Standardization (ISO), National Institute
- of Standards and Technology (NIST), Cloud Security Alliance, and product vendors. So, the
- rules included here are very generic in terms of hardening.
- controls:
- - base_sle16:SLES-16-16016020
-
- - id: 2.2.2
- title: Vendor default accounts are managed.
- description: |-
- Vendor default accounts are managed as follows:
- - If the vendor default account(s) will be used, the default password is changed per
- Requirement 8.3.6.
- - If the vendor default account(s) will not be used, the account is removed or disabled.
- levels:
- - base
- status: pending
- notes: |-
- Also related to requirement 8.2.6 and 8.3.5.
-
- - id: 2.2.3
- title: 'Primary functions requiring different security levels are managed'
- levels:
- - base
- status: manual
-
- - id: 2.2.4
- title: Only necessary services, protocols, daemons, and functions are enabled, and all unnecessary
- functionality is removed or disabled
- description: |-
- System components cannot be compromised by exploiting unnecessary functionality present in
- the system component.
- levels:
- - base
- status: pending
-
- - id: 2.2.5
- title: If any insecure services, protocols, or daemons are present, business justification
- is documented and the risk is reduced.
- description: |-
- If any insecure services, protocols, or daemons are present:
- - Business justification is documented.
- - Additional security features are documented and implemented that reduce the risk of
- using insecure services, protocols, or daemons.
- levels:
- - base
- status: manual
- notes: |-
- Known insecure services are removed or disabled by 2.2.4
- General security measures are covered by 1.2.6
- This requirement is more about checking exceptions and their respective documentation.
-
- - id: 2.2.6
- title: System security parameters are configured to prevent misuse.
- description: |-
- System components cannot be compromised because of incorrect security parameter
- configuration.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is not specific but also points to 2.2.1, where other policies are
- referenced. Therefore, the most common rules related to system configuration in order to
- prevent misuse and selected in main profiles are also selected here.
-
- - id: 2.2.7
- title: All non-console administrative access is encrypted using strong cryptography.
- description: |-
- Cleartext administrative authorization factors cannot be read or intercepted from any
- network transmissions. This includes administrative access via browser-based interfaces
- and application programming interfaces (APIs).
- levels:
- - base
- status: pending
- notes: |-
- Related to requirement 12.3.3.
-
- - id: '2.3'
- title: Wireless environments are configured and managed securely.
- levels:
- - base
- status: supported
- controls:
- - id: 2.3.1
- title: For wireless environments connected to the CDE or transmitting account data, all wireless
- vendor defaults are changed at installation or are confirmed to be secure.
- description: |-
- For wireless environments connected to the CDE or transmitting account data, all wireless
- vendor defaults are changed at installation or are confirmed to be secure, including but
- not limited to:
- - Default wireless encryption keys.
- - Passwords on wireless access points.
- - SNMP defaults.
- - Any other security-related wireless vendor defaults.
- levels:
- - base
- status: supported
- notes: |-
- Wireless interfaces are disabled by 1.3.3.
-
- - id: 2.3.2
- title: For wireless environments connected to the CDE or transmitting account data, wireless
- encryption keys are changed
- description: |-
- For wireless environments connected to the CDE or transmitting account
- data, wireless encryption keys are changed
- levels:
- - base
- status: supported
- notes: |-
- Wireless interfaces are disabled by 1.3.3.
-
- - id: '3.1'
- title: Processes and mechanisms for protecting stored account data are defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 3.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 3 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 3 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 3.1.2
- title: Roles and responsibilities for performing activities in Requirement 3 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 3 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '3.2'
- title: Storage of account data is kept to a minimum.
- levels:
- - base
- status: manual
- controls:
- - id: 3.2.1
- title: Account data storage is kept to a minimum through implementation of data retention
- and disposal policies, procedures, and processes.
- description: |-
- Account data storage is kept to a minimum through implementation of data retention and
- disposal policies, procedures, and processes that include at least the following:
- - Coverage for all locations of stored account data.
- - Coverage for any sensitive authentication data (SAD) stored prior to completion of
- authorization.
- - Limiting data storage amount and retention time to that which is required for legal or
- regulatory, and/or business requirements.
- - Specific retention requirements for stored account data that defines length of retention
- period and includes a documented business justification.
- - Processes for secure deletion or rendering account data unrecoverable when no longer
- needed per the retention policy.
- - A process for verifying, at least once every three months, that stored account data
- exceeding the defined retention period has been securely deleted or rendered unrecoverable.
- levels:
- - base
- status: manual
- notes: |-
- This requirement is very dependent on each site policies and business model.
- Local policies should be consulted and audited. Manual checking is reasonable.
-
- - id: '3.3'
- title: Sensitive authentication data (SAD) is not stored after authorization.
- levels:
- - base
- status: pending
- controls:
- - id: 3.3.1
- title: SAD is not stored after authorization, even if encrypted. All sensitive authentication
- data received is rendered unrecoverable upon completion of the authorization process.
- description: |-
- This requirement is not eligible for the customized approach. This requirement does not
- apply to issuers and companies that support issuing services (where SAD is needed for a
- legitimate issuing business need) and have a business justification to store the sensitive
- authentication data. Refer to Requirement 3.3.3 for additional requirements specifically
- for issuers. Sensitive authentication data includes the data cited in Requirements 3.3.1.1
- through 3.3.1.3.
- levels:
- - base
- status: pending
- controls:
- - id: 3.3.1.1
- title: The full contents of any track are not stored upon completion of the authorization
- process.
- description: |-
- This requirement is not eligible for the customized approach. In the normal course of
- business, the following data elements from the track may need to be retained:
- - Cardholder name.
- - Primary account number (PAN).
- - Expiration date.
- - Service code.
- To minimize risk, store securely only these data elements as needed for business.
- levels:
- - base
- status: pending
- notes: |-
- This requirement consists in auditing files, databases and memory to make sure the full
- content of any track is not unnecessarily stored. It involves manual auditing but some
- automated rules fit this requirement in order to reduce the chances if this data be
- unintentionally stored in memory.
-
- - id: 3.3.1.2
- title: The card verification code is not stored upon completion of the authorization
- process.
- description: |-
- This requirement is not eligible for the customized approach. The card verification code
- is the three- or four-digit number printed on the front or back of a payment card used
- to verify card-not-present transactions.
- levels:
- - base
- status: pending
- notes: |-
- Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.
-
- - id: 3.3.1.3
- title: The personal identification number (PIN) and the PIN block are not stored upon
- completion of the authorization process.
- description: |-
- This requirement is not eligible for the customized approach. PIN blocks are encrypted
- during the natural course of transaction processes, but even if an entity encrypts the
- PIN block again, it is still not allowed to be stored after the completion of the
- authorization process.
- levels:
- - base
- status: pending
- notes: |-
- Same rules already selected in 3.3.1.1 are valid here, but they are not repeated.
-
- - id: 3.3.2
- title: SAD that is stored electronically prior to completion of authorization is encrypted
- using strong cryptography.
- description: |-
- This requirement is not eligible for the customized approach. Whether SAD is permitted to
- be stored prior to authorization is determined by the organizations that manage compliance
- programs (for example, payment brands and acquirers). Contact the organizations of
- interest for any additional criteria. This requirement applies to all storage of SAD, even
- if no PAN is present in the environment. Refer to Requirement 3.2.1 for an additional
- requirement that applies if SAD is stored prior to completion of authorization. Issuers
- and companies that support issuing services, where there is a legitimate and documented
- business need to store SAD, are not required to meet this requirement. A legitimate
- business need is one that is necessary for the performance of the function being provided
- by or for the issuer. Refer to Requirement 3.3.3 for requirements specifically for issuers.
- This requirement does not replace how PIN blocks are required to be managed, nor does it
- mean that a properly encrypted PIN block needs to be encrypted again.
- levels:
- - base
- status: manual
- notes: |-
- This requirement is a best practice until 31 March 2025, after which it will be required
- and must be fully considered during a PCI DSS assessment.
- This requirement consists of auditing information stored during a relatively short period
- of time. Where and how the information is possibly stored depends in each Business and
- local policies so the check is not actually automatable.
-
- - id: 3.3.3
- title: Additional requirement for issuers and companies that support issuing services and
- store sensitive authentication data.
- description: |-
- Additional requirement for issuers and companies that support issuing services and store
- sensitive authentication data: Any storage of sensitive authentication data is:
- - Limited to that which is needed for a legitimate issuing business need and is secured.
- - Encrypted using strong cryptography. This bullet is a best practice until until
- 31 March 2025, after which it will be required as part of Requirement 3.3.3 and must be
- fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: '3.4'
- title: Access to displays of full PAN and ability to copy PAN is restricted.
- levels:
- - base
- status: pending
- controls:
- - id: 3.4.1
- title: PAN is masked when displayed (the BIN and last four digits are the maximum number
- of digits to be displayed), such that only personnel with a legitimate business need
- can see more than the BIN and last four digits of the PAN.
- description: |-
- PAN displays are restricted to the minimum number of digits necessary to meet a defined
- business need. This requirement does not supersede stricter requirements in place for
- displays of cardholder data — for example, legal or payment brand requirements for
- point-of-sale (POS) receipts. This requirement relates to protection of PAN where it is
- displayed on screens, paper receipts, printouts, etc., and is not to be confused with
- Requirement 3.5.1 for protection of PAN when stored, processed, or transmitted.
- levels:
- - base
- status: manual
- notes: |-
- Consists on examining documented policies and procedures, checking system configurations
- and observing relevant applications.
-
- - id: 3.4.2
- title: When using remote-access technologies, technical controls prevent copy and/or relocation
- of PAN for all personnel, except for those with documented, explicit authorization and
- a legitimate, defined business need.
- description: |-
- PAN cannot be copied or relocated by unauthorized personnel using remote-access
- technologies. Storing or relocating PAN onto local hard drives, removable electronic
- media, and other storage devices brings these devices into scope for PCI DSS.
- This requirement is a best practice until 31 March 2025, after which it will be required
- and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: pending
- notes: |-
- There are technical rules to disable removable storage devices. However, this requirement
- still demand some manual auditing in documentation and eventual exceptions.
-
- - id: '3.5'
- title: Primary account number (PAN) is secured wherever it is stored.
- levels:
- - base
- status: pending
- controls:
- - id: 3.5.1
- title: PAN is rendered unreadable anywhere it is stored
- description: |-
- PAN is rendered unreadable anywhere it is stored by using any of the following approaches:
- - One-way hashes based on strong cryptography of the entire PAN.
- - Truncation (hashing cannot be used to replace the truncated segment of PAN).
- - If hashed and truncated versions of the same PAN, or different truncation formats of
- the same PAN, are present in an environment, additional controls are in place such that
- the different versions cannot be correlated to reconstruct the original PAN.
- - Indexes tokens.
- - Strong cryptography with associated key-management processes and procedures.
- levels:
- - base
- status: pending
- controls:
- - id: 3.5.1.1
- title: Hashes used to render PAN unreadable (per the first bullet of Requirement 3.5.1)
- are keyed cryptographic hashes of the entire PAN, with associated key-management
- processes and procedures in accordance with Requirements 3.6 and 3.7.
- description: |-
- All Applicability Notes for Requirement 3.5.1 also apply to this requirement.
- Key-management processes and procedures (Requirements 3.6 and 3.7) do not apply to
- system components used to generate individual keyed hashes of a PAN for comparison to
- another system if:
- - The system components only have access to one hash value at a time (hash values are
- not stored on the system)
- AND
- - There is no other account data stored on the same system as the hashes.
- This requirement is considered a best practice until 31 March 2025, after which it will
- be required and must be fully considered during a PCI DSS assessment. This requirement
- will replace the bullet in Requirement 3.5.1 for one-way hashes once its effective date
- is reached.
- levels:
- - base
- status: planned
- notes: |-
- This requirement likely demand assessment in application level for some environments and
- this would be too specific to be automated. However, on system level we can ensure some
- strong cryptographic algorithms. This is also generally covered by 2.2.7 but here would
- be possible to include more specific rules, for openssl and libreswan for example.
- However it would be first necessary to include a platform conditional in these rules
- before selecting them so they are applicable only if the respective packages are
- installed.
-
- - id: 3.5.1.2
- title: If disk-level or partition-level encryption (rather than file-, column-, or
- field-level database encryption) is used to render PAN unreadable, it is implemented
- only on removable electronic media or complemented by another mechanism that meets
- Requirement 3.5.1
- levels:
- - base
- status: pending
-
- - id: 3.5.1.3
- title: If disk-level or partition-level encryption is used (rather than file-, column-,
- or field--level database encryption) to render PAN unreadable, it is managed.
- description: |-
- If disk-level or partition-level encryption is used (rather than file-, column-, or
- field--level database encryption) to render PAN unreadable, it is managed as follows:
- - Logical access is managed separately and independently of native operating system
- authentication and access control mechanisms.
- - Decryption keys are not associated with user accounts.
- - Authentication factors (passwords, passphrases, or cryptographic keys) that allow
- access to unencrypted data are stored securely.
- levels:
- - base
- status: manual
- notes: |-
- To properly check this requirement, site policies and documentation should be consulted.
-
- - id: '3.6'
- title: Cryptographic keys used to protect stored account data are secured.
- levels:
- - base
- status: manual
- controls:
- - id: 3.6.1
- title: Procedures are defined and implemented to protect cryptographic keys used to protect
- stored account data against disclosure and misuse.
- description: |-
- Procedures are defined and implemented to protect cryptographic keys used to protect
- stored account data against disclosure and misuse that include:
- - Access to keys is restricted to the fewest number of custodians necessary.
- - Key-encrypting keys are at least as strong as the data-encrypting keys they protect.
- - Key-encrypting keys are stored separately from data-encrypting keys.
- - Keys are stored securely in the fewest possible locations and forms.
- levels:
- - base
- status: manual
- controls:
- - id: 3.6.1.1
- title: 'Additional requirement for service providers only: A documented description
- of the cryptographic architecture is maintained'
- description: |-
- Additional requirement for service providers only: A documented description of the
- cryptographic architecture is maintained that includes:
- - Details of all algorithms, protocols, and keys used for the protection of stored
- account data, including key strength and expiry date.
- - Preventing the use of the same cryptographic keys in production and test environments.
- This bullet is a best practice until 31 March 2025, after which it will be required as
- part of Requirement 3.6.1.1 and must be fully considered during a PCI DSS assessment.
- - Description of the key usage for each key.
- - Inventory of any hardware security modules (HSMs), key management systems (KMS), and
- other secure cryptographic devices (SCDs) used for key management, including type and
- location of devices, as outlined in Requirement 12.3.4.
- levels:
- - base
- status: manual
-
- - id: 3.6.1.2
- title: Secret and private keys used to encrypt/decrypt stored account data are stored
- in secure forms.
- description: |-
- Secret and private keys used to encrypt/decrypt stored account data are stored in one
- (or more) of the following forms at all times:
- - Encrypted with a key-encrypting key that is at least as strong as the data-encrypting
- key, and that is stored separately from the data-encrypting key.
- - Within a secure cryptographic device (SCD), such as a hardware security module (HSM)
- or PTS-approved point-of-interaction device.
- - As at least two full-length key components or key shares, in accordance with an
- industry-accepted method.
- Secret and private keys are stored in a secure form that prevents unauthorized retrieval
- or access. It is not required that public keys be stored in one of these forms.
- Cryptographic keys stored as part of a key management system (KMS) that employs SCDs are
- acceptable. A cryptographic key that is split into two parts does not meet this
- requirement. Secret or private keys stored as key components or key shares must be
- generated via one of the following
- levels:
- - base
- status: manual
-
- - id: 3.6.1.3
- title: Access to cleartext cryptographic key components is restricted to the fewest
- number of custodians necessary.
- description: |-
- Access to cleartext cryptographic key components is restricted to necessary personnel.
- levels:
- - base
- status: manual
-
- - id: 3.6.1.4
- title: Cryptographic keys are stored in the fewest possible locations.
- description: |-
- Cryptographic keys are retained only where necessary.
- levels:
- - base
- status: manual
-
- - id: '3.7'
- title: Where cryptography is used to protect stored account data, key management processes and
- procedures covering all aspects of the key lifecycle are defined and implemented.
- levels:
- - base
- status: manual
- controls:
- - id: 3.7.1
- title: Key-management policies and procedures are implemented to include generation of strong
- cryptographic keys used to protect stored account data.
- description: |-
- Strong cryptographic keys are generated.
- levels:
- - base
- status: manual
-
- - id: 3.7.2
- title: Key-management policies and procedures are implemented to include secure distribution
- of cryptographic keys used to protect stored account data.
- description: |-
- Cryptographic keys are secured during distribution.
- levels:
- - base
- status: manual
-
- - id: 3.7.3
- title: Key-management policies and procedures are implemented to include secure storage of
- cryptographic keys used to protect stored account data.
- description: |-
- Cryptographic keys are secured when stored.
- levels:
- - base
- status: manual
- notes: |-
- The scope of this requirement seems much wider going even to application level, which
- might be different for each site. Regarding local system there are some technical measures
- ensured by 2.2.6.
-
- - id: 3.7.4
- title: Key management policies and procedures are implemented for cryptographic key changes
- for keys that have reached the end of their cryptoperiod, as defined by the associated
- application vendor or key owner, and based on industry best practices and guidelines.
- description: |-
- Key management policies and procedures are implemented for cryptographic key changes for
- keys that have reached the end of their cryptoperiod, as defined by the associated
- application vendor or key owner, and based on industry best practices and guidelines,
- including the following:
- - A defined cryptoperiod for each key type in use.
- - A process for key changes at the end of the defined cryptoperiod.
- levels:
- - base
- status: manual
-
- - id: 3.7.5
- title: Key management policies procedures are implemented to include the retirement, replacement,
- or destruction of keys used to protect stored account data, as deemed necessary.
- description: |-
- Key management policies procedures are implemented to include the retirement, replacement,
- or destruction of keys used to protect stored account data, as deemed necessary when:
- - The key has reached the end of its defined cryptoperiod.
- - The integrity of the key has been weakened, including when personnel with knowledge of a
- cleartext key component leaves the company, or the role for which the key component was
- known.
- - The key is suspected of or known to be compromised.
- - Retired or replaced keys are not used for encryption operations.
- levels:
- - base
- status: manual
-
- - id: 3.7.6
- title: Where manual cleartext cryptographic key-management operations are performed by personnel,
- key-management policies and procedures are implemented include managing these operations
- using split knowledge and dual control.
- description: |-
- Cleartext secret or private keys cannot be known by anyone. Operations involving cleartext
- keys cannot be carried out by a single person. This control is applicable for manual
- key-management operations or where key management is not controlled by the encryption
- product. A cryptographic key that is simply split into two parts does not meet this
- requirement. Secret or private keys stored as key components or key shares must be
- generated via one of the following
- levels:
- - base
- status: manual
-
- - id: 3.7.7
- title: Key management policies and procedures are implemented to include the prevention of
- unauthorized substitution of cryptographic keys.
- description: |-
- Cryptographic keys cannot be substituted by unauthorized personnel.
- levels:
- - base
- status: manual
-
- - id: 3.7.8
- title: Key management policies and procedures are implemented to include that cryptographic
- key custodians formally acknowledge (in writing or electronically) that they understand
- and accept their key-custodian responsibilities.
- description: |-
- Key custodians are knowledgeable about their responsibilities in relation to cryptographic
- operations and can access assistance and guidance when required.
- levels:
- - base
- status: manual
-
- - id: 3.7.9
- title: 'Additional requirement for service providers only: Where a service provider shares
- cryptographic keys with its customers for transmission or storage of account data, guidance
- on secure transmission, storage and updating of such keys is documented and distributed
- to the service provider’s customers.'
- description: |-
- Customers are provided with appropriate key management guidance whenever they receive
- shared cryptographic keys. This requirement applies only when the entity being assessed is
- a service provider.
- levels:
- - base
- status: manual
-
- - id: '4.1'
- title: Processes and mechanisms for protecting cardholder data with strong cryptography during
- transmission over open, public networks are defined and documented.
- levels:
- - base
- status: manual
- controls:
- - id: 4.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 4 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
-
- - id: 4.1.2
- title: Roles and responsibilities for performing activities in Requirement 4 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 4 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '4.2'
- title: PAN is protected with strong cryptography during transmission.
- levels:
- - base
- status: manual
- controls:
- - id: 4.2.1
- title: Strong cryptography and security protocols are implemented as follows to safeguard
- PAN during transmission over open, public networks.
- description: |-
- Strong cryptography and security protocols are implemented as follows to safeguard PAN
- during transmission over open, public networks:
- - Only trusted keys and certificates are accepted.
- - Certificates used to safeguard PAN during transmission over open, public networks are
- confirmed as valid and are not expired or revoked. This bullet is a best practice until
- 31 March 2025, after which it will be required as part of Requirement 4.2.1 and must be
- fully considered during a PCI DSS assessment.
- - The protocol in use supports only secure versions or configurations and does not support
- fallback to, or use of insecure versions, algorithms, key sizes, or implementations.
- - The encryption strength is appropriate for the encryption methodology in use.
- levels:
- - base
- status: supported
- controls:
- - id: 4.2.1.1
- title: An inventory of the entity's trusted keys and certificates used to protect PAN
- during transmission is maintained.
- description: |-
- All keys and certificates used to protect PAN during transmission are identified and
- confirmed as trusted. This requirement is a best practice until 31 March 2025, after
- which it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 4.2.1.2
- title: Wireless networks transmitting PAN or connected to the CDE use industry best
- practices to implement strong cryptography for authentication and transmission.
- description: |-
- Cleartext PAN cannot be read or intercepted from wireless network transmissions.
- levels:
- - base
- status: manual
- notes: |-
- Wireless interfaces are disabled by 1.3.3.
-
- - id: 4.2.2
- title: PAN is secured with strong cryptography whenever it is sent via end-user messaging
- technologies.
- description: |-
- Cleartext PAN cannot be read or intercepted from transmissions using end-user messaging
- technologies. This requirement also applies if a customer, or other third-party, requests
- that PAN is sent to them via end-user messaging technologies. There could be occurrences
- where an entity receives unsolicited cardholder data via an insecure communication channel
- that was not intended for transmissions of sensitive data. In this situation, the entity
- can choose to either include the channel in the scope of their CDE and secure it according
- to PCI DSS or delete the cardholder data and implement measures to prevent the channel
- from being used for cardholder data.
- levels:
- - base
- status: manual
- notes: |-
- Some known insecure services and protocols are disabled by 2.2.4.
- If any specific end-user messaging technology is used, it should be manually checked in
- alignment to site policies.
-
- - id: '5.1'
- title: Processes and mechanisms for protecting all systems and networks from malicious software
- are defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 5.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 5 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 5 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 5.1.2
- title: Roles and responsibilities for performing activities in Requirement 5 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 5 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '5.2'
- title: Malicious software (malware) is prevented, or detected and addressed.
- levels:
- - base
- status: pending
- notes: |-
- Related measures are covered by 1.2.6, 1.4.5 and 3.4.2.
- controls:
- - id: 5.2.1
- title: An anti-malware solution(s) is deployed on all system components, except for those
- system components identified in periodic evaluations per Requirement 5.2.3 that concludes
- the system components are not at risk from malware.
- description: |-
- Automated mechanisms are implemented to prevent systems from becoming an attack vector for
- malware.
- levels:
- - base
- status: supported
- notes: |-
- There are many options of anti-malware and the criteria for any adopted solution or
- approach relies on each site policy. Technologies are supported but manual assessment is
- required.
-
- - id: 5.2.2
- title: The deployed anti-malware solution(s) detects all known types of malware and removes,
- blocks, or contains all known types of malware.
- levels:
- - base
- status: manual
-
- - id: 5.2.3
- title: Any system components that are not at risk for malware are evaluated periodically.
- description: |-
- Any system components that are not at risk for malware are evaluated periodically to
- include the following:
- - A documented list of all system components not at risk for malware.
- - Identification and evaluation of evolving malware threats for those system components.
- - Confirmation whether such system components continue to not require anti-malware
- protection.
- levels:
- - base
- status: manual
- controls:
- - id: 5.2.3.1
- title: The frequency of periodic evaluations of system components identified as not
- at risk for malware is defined in the entity's targeted risk analysis, which is
- performed according to all elements specified in Requirement 12.3.1.
- description: |-
- Systems not known to be at risk from malware are re-evaluated at a frequency that
- addresses the entity's risk. This requirement is a best practice until 31 March 2025,
- after which it will be required and must be fully considered during a PCI DSS
- assessment.
- levels:
- - base
- status: manual
-
- - id: '5.3'
- title: Anti-malware mechanisms and processes are active, maintained, and monitored.
- levels:
- - base
- status: manual
- controls:
- - id: 5.3.1
- title: The anti-malware solution(s) is kept current via automatic updates.
- description: |-
- Anti-malware mechanisms can detect and address the latest malware threats.
- levels:
- - base
- status: manual
-
- - id: 5.3.2
- title: The anti-malware solution(s) performs periodic scans and active or real-time scans
- or performs continuous behavioral analysis of systems or processes.
- levels:
- - base
- status: manual
- controls:
- - id: 5.3.2.1
- title: If periodic malware scans are performed to meet Requirement 5.3.2, the frequency
- of scans is defined in the entity's targeted risk analysis, which is performed
- according to all elements specified in Requirement 12.3.1.
- description: |-
- Scans by the malware solution are performed at a frequency that addresses the entity's
- risk. This requirement applies to entities conducting periodic malware scans to meet
- Requirement 5.3.2. This requirement is a best practice until 31 March 2025, after which
- it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 5.3.3
- title: For removable electronic media, the anti-malware solution(s) performs automatic scans
- of when the media is inserted, connected, or logically mounted, or Performs continuous
- behavioral analysis of systems or processes when the media is inserted, connected, or
- logically mounted.
- levels:
- - base
- status: manual
- notes: |-
- Related measures are covered by 3.4.2.
-
- - id: 5.3.4
- title: Audit logs for the anti-malware solution(s) are enabled and retained in accordance
- with Requirement 10.5.1.
- description: |-
- Historical records of anti-malware actions are immediately available and retained for at
- least 12 months.
- levels:
- - base
- status: manual
-
- - id: 5.3.5
- title: Anti-malware mechanisms cannot be disabled or altered by users, unless specifically
- documented, and authorized by management on a case-by-case basis for a limited time period.
- description: |-
- Anti-malware mechanisms cannot be modified by unauthorized personnel.Anti-malware
- solutions may be temporarily disabled only if there is a legitimate technical need, as
- authorized by management on a case-by-case basis. If anti-malware protection needs to be
- disabled for a specific purpose, it must be formally authorized. Additional security
- measures may also need to be implemented for the period during which anti-malware
- protection is not active.
- levels:
- - base
- status: manual
- notes: |-
- Related measures are covered by 2.2.6 requirement and 8.2 section.
-
- - id: '5.4'
- title: Anti-phishing mechanisms protect users against phishing attacks.
- levels:
- - base
- status: manual
- controls:
- - id: 5.4.1
- title: Processes and automated mechanisms are in place to detect and protect personnel against
- phishing attacks.
- description: |-
- Mechanisms are in place to protect against and mitigate risk posed by phishing attacks.
- The focus of this requirement is on protecting personnel with access to system components
- in-scope for PCI DSS. Meeting this requirement for technical and automated controls to
- detect and protect personnel against phishing is not the same as Requirement 12.6.3.1 for
- security awareness training. Meeting this requirement does not also meet the requirement
- for providing personnel with security awareness training, and vice versa. This requirement
- is a best practice until 31 March 2025, after which it will be required and must be fully
- considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: '6.1'
- title: Processes and mechanisms for developing and maintaining secure systems and software are
- defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 6.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 6 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 6 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 6.1.2
- title: Roles and responsibilities for performing activities in Requirement 6 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 6 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '6.2'
- title: Bespoke and custom software are developed securely.
- levels:
- - base
- status: manual
- controls:
- - id: 6.2.1
- title: Bespoke and custom software are developed securely.
- description: |-
- Bespoke and custom software are developed securely, as follows:
- - Based on industry standards and/or best practices for secure development.
- - In accordance with PCI DSS (for example, secure authentication and logging).
- - Incorporating consideration of information security issues during each stage of the
- software development lifecycle.
- levels:
- - base
- status: manual
-
- - id: 6.2.2
- title: Software development personnel working on bespoke and custom software are trained
- at least once every 12 months
- description: |-
- Software development personnel working on bespoke and custom software are trained at least
- once every 12 months as follows:
- - On software security relevant to their job function and development languages.
- - Including secure software design and secure coding techniques.
- - Including, if security testing tools are used, how to use the tools for detecting
- vulnerabilities in software.
- levels:
- - base
- status: manual
-
- - id: 6.2.3
- title: Bespoke and custom software is reviewed prior to being released into production or
- to customers, to identify and correct potential coding vulnerabilities.
- description: |-
- Bespoke and custom software is reviewed prior to being released into production or to
- customers, to identify and correct potential coding vulnerabilities, as follows:
- - Code reviews ensure code is developed according to secure coding guidelines.
- - Code reviews look for both existing and emerging software vulnerabilities.
- - Appropriate corrections are implemented prior to release.
- levels:
- - base
- status: manual
- controls:
- - id: 6.2.3.1
- title: If manual code reviews are performed for bespoke and custom software prior to
- release to production code changes co-reviewed and approved.
- description: |-
- If manual code reviews are performed for bespoke and custom software prior to release
- to production code changes are:
- - Reviewed by individuals other than the originating code author, and who are
- knowledgeable about code-review techniques and secure coding practices.
- - Reviewed and approved by management prior to release.
- levels:
- - base
- status: manual
-
- - id: 6.2.4
- title: Software engineering techniques or other methods are defined and in use by software
- development personnel to prevent or mitigate common software attacks and related vulnerabilities
- in bespoke and custom software.
- levels:
- - base
- status: manual
-
- - id: '6.3'
- title: Security vulnerabilities are identified and addressed.
- levels:
- - base
- status: pending
- controls:
- - id: 6.3.1
- title: Security vulnerabilities are identified and managed
- levels:
- - base
- status: manual
-
- - id: 6.3.2
- title: An inventory of bespoke and custom software, and third-party software components incorporated
- into bespoke and custom software is maintained to facilitate vulnerability and patch
- management.
- description: |-
- Known vulnerabilities in third-party software components cannot be exploited in bespoke
- and custom software.This requirement is a best practice until 31 March 2025, after which
- it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
- notes: |-
- This requirement is a best practice until 31 March 2025, after which it will be required
- and must be fully considered during a PCI DSS assessment.
-
- - id: 6.3.3
- title: All system components are protected from known vulnerabilities by installing applicable
- security patches/updates.
- description: |-
- All system components are protected from known vulnerabilities by installing
- applicable security patches/updates as follows:
- - Patches/updates for critical vulnerabilities (identified according to the risk ranking
- process at Requirement 6.3.1) are installed within one month of release.
- - All other applicable security patches/updates are installed within an appropriate time
- frame as determined by the entity's assessment of the criticality of the risk to the
- environment as identified according to the risk ranking process at Requirement 6.3.1.
- levels:
- - base
- status: pending
-
- - id: '6.4'
- title: Public-facing web applications are protected against attacks.
- levels:
- - base
- status: manual
- controls:
- - id: 6.4.1
- title: For public-facing web applications, new threats and vulnerabilities are addressed
- on an ongoing basis and these applications are protected against known attacks.
- description: |-
- For public-facing web applications, new threats and vulnerabilities are addressed on an
- ongoing basis and these applications are protected against known attacks as follows:
- - Reviewing public-facing web applications via manual or automated application
- vulnerability security assessment tools or methods as follows:
- - At least once every 12 months and after significant changes.
- - By an entity that specializes in application security.
- - Including, at a minimum, all common software attacks in Requirement 6.2.4.
- - All vulnerabilities are ranked in accordance with requirement 6.3.1.
- - All vulnerabilities are corrected.
- - The application is re-evaluated after the corrections
- OR
- - Installing an automated technical solution(s) that continually detects and prevents
- web-based attacks as follows:
- - Installed in front of public-facing web applications to detect and prevent web-based
- attacks.
- - Actively running and up to date as applicable.
- - Generating audit logs.
- - Configured to either block web-based attacks or generate an alert that is immediately
- investigated.
- levels:
- - base
- status: manual
-
- - id: 6.4.2
- title: For public-facing web applications, an automated technical solution is deployed that
- continually detects and prevents web-based attacks.
- levels:
- - base
- status: manual
-
- - id: 6.4.3
- title: All payment page scripts that are loaded and executed in the consumer's browser are
- managed
- description: |-
- All payment page scripts that are loaded and executed in the consumer's browser are
- managed as follows:
- - A method is implemented to confirm that each script is authorized.
- - A method is implemented to assure the integrity of each script.
- - An inventory of all scripts is maintained with written business or technical
- justification as to why each is necessary.
- levels:
- - base
- status: manual
-
- - id: '6.5'
- title: Changes to all system components are managed securely.
- levels:
- - base
- status: manual
- controls:
- - id: 6.5.1
- title: Changes to all system components in the production environment are made according
- to established procedures.
- levels:
- - base
- status: manual
-
- - id: 6.5.2
- title: Upon completion of a significant change, all applicable PCI DSS requirements are confirmed
- to be in place on all new or changed systems and networks, and documentation is updated
- as applicable.
- description: |-
- All system components are verified after a significant change to be compliant with the
- applicable PCI DSS requirements.These significant changes should also be captured and
- reflected in the entity's annual PCI DSS scope confirmation activity per Requirement
- 12.5.2.
- levels:
- - base
- status: manual
-
- - id: 6.5.3
- title: Pre-production environments are separated from production environments and the separation
- is enforced with access controls.
- description: |-
- Pre-production environments cannot introduce risks and vulnerabilities into production
- environments.
- levels:
- - base
- status: manual
-
- - id: 6.5.4
- title: Roles and functions are separated between production and pre-production environments
- to provide accountability such that only reviewed and approved changes are deployed.
- description: |-
- Job roles and accountability that differentiate between pre-production and production
- activities are defined and managed to minimize the risk of unauthorized, unintentional,
- or inappropriate actions. In environments with limited personnel where individuals perform
- multiple roles or functions, this same goal can be achieved with additional procedural
- controls that provide accountability. For example, a developer may also be an administrator
- that uses an administrator-level account with elevated privileges in the development
- environment and, for their developer role, they use a separate account with user-level
- access to the production environment.
- levels:
- - base
- status: manual
-
- - id: 6.5.5
- title: Live PANs are not used in pre-production environments, except where those environments
- are included in the CDE and protected in accordance with all applicable PCI DSS requirements.
- description: |-
- Live PANs cannot be present in pre-production environments outside the CDE.s
- levels:
- - base
- status: manual
-
- - id: 6.5.6
- title: Test data and test accounts are removed from system components before the system goes
- into production.
- description: |-
- Test data and test accounts cannot exist in production environments.
- levels:
- - base
- status: manual
-
- - id: '7.1'
- title: Processes and mechanisms for restricting access to system components and cardholder data
- by business need to know are defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 7.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 7 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 7 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 7.1.2
- title: Roles and responsibilities for performing activities in Requirement 7 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 7 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '7.2'
- title: Access to system components and data is appropriately defined and assigned.
- levels:
- - base
- status: manual
- controls:
- - id: 7.2.1
- title: An access control model is defined and includes granting access
- description: |-
- An access control model is defined and includes granting access as follows:
- - Appropriate access depending on the entity's business and access needs.
- - Access to system components and data resources that is based on users' job
- classification and functions.
- - The least privileges required (for example, user, administrator) to perform a job
- function.
- levels:
- - base
- status: manual
- notes: |-
- General access are restricted by 2.2.6 and 8.2 section. This requirement is more about
- checking granting access process.
-
- - id: 7.2.2
- title: Access is assigned to users, including privileged users, based on job classification
- and function, and least privileges necessary to perform job responsibilities.
- levels:
- - base
- status: manual
-
- - id: 7.2.3
- title: Required privileges are approved by authorized personnel.
- description: |-
- Access privileges cannot be granted to users without appropriate, documented
- authorization.
- levels:
- - base
- status: manual
-
- - id: 7.2.4
- title: All user accounts and related access privileges, including third-party/vendor accounts,
- are reviewed
- description: |-
- All user accounts and related access privileges, including third-party/vendor accounts,
- are reviewed as follows:
- - At least once every six months.
- - To ensure user accounts and access remain appropriate based on job function.
- - Any inappropriate access is addressed.
- - Management acknowledges that access remains appropriate.
- levels:
- - base
- status: manual
-
- - id: 7.2.5
- title: All application and system accounts and related access privileges are assigned and
- managed.
- description: |-
- All application and system accounts and related access privileges are assigned and managed
- as follows:
- - Based on the least privileges necessary for the operability of the system or application.
- - Access is limited to the systems, applications, or processes that specifically require
- their use.
- levels:
- - base
- status: manual
- notes: |-
- General access are restricted by 2.2.6 and 8.2 section.
- controls:
- - id: 7.2.5.1
- title: All access by application and system accounts and related access privileges
- are reviewed.
- levels:
- - base
- status: manual
-
- - id: 7.2.6
- title: All user access to query repositories of stored cardholder data is restricted
- levels:
- - base
- status: manual
- notes: |-
- This requirement is specific about cardholder data, which can be available in different
- formats, such as clear and binary files, and databases depending on site policies.
- General system restrictions are covered in 2.2.6.
-
- - id: '7.3'
- title: 'Access to system components and data is managed via an access control system(s).'
- levels:
- - base
- status: planned
- controls:
- - id: 7.3.1
- title: An access control system(s) is in place that restricts access based on a user's need
- to know and covers all system components.
- description: |-
- Access rights and privileges are managed via mechanisms intended for that purpose.
- levels:
- - base
- status: manual
-
- - id: 7.3.2
- title: The access control system(s) is configured to enforce permissions assigned to individuals,
- applications, and systems based on job classification and function.
- description: |-
- Individual account access rights and privileges to systems, applications, and data are
- only inherited from group membership.
- levels:
- - base
- status: manual
-
- - id: 7.3.3
- title: The access control system(s) is set to "deny all" by default.
- description: |-
- Access rights and privileges are prohibited unless expressly permitted.
- levels:
- - base
- status: planned
- notes: |-
- It is possible we can select some rules for this requirement but more investigation is
- needed to confirm.
-
- - id: '8.1'
- title: Processes and mechanisms for identifying users and authenticating access to system components
- are defined and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 8.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 8 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 8 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 8.1.2
- title: Roles and responsibilities for performing activities in Requirement 8 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 8 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '8.2'
- title: User identification and related accounts for users and administrators are strictly managed
- throughout an account's lifecycle.
- levels:
- - base
- status: pending
- controls:
- - id: 8.2.1
- title: All users are assigned a unique ID before access to system components or cardholder
- data is allowed.
- description: |-
- All actions by all users are attributable to an individual. This requirement is not
- intended to apply to user accounts within point-of-sale terminals that have access to only
- one card number at a time to facilitate a single transaction (such as IDs used by cashiers
- on point-of-sale terminals).
- levels:
- - base
- status: planned
- notes: |-
- The rules selected in this requirement are incomplete. Missing remediation and test
- scenarios. They should include test scenarios and likely remediation or a warning
- informing why a remediation is not present.
-
- - id: 8.2.2
- title: Group, shared, or generic IDs, or other shared authentication credentials are only
- used when necessary on an exception basis, and are managed.
- description: |-
- - ID use is prevented unless needed for an exceptional circumstance.
- - Use is limited to the time needed for the exceptional circumstance.
- - Business justification for use is documented.
- - Use is explicitly approved by management.
- - Individual user identity is confirmed before access to an account is granted.
- - Every action taken is attributable to an individual user.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is complemented by 8.2.1 and related to 8.3.5.
-
- - id: 8.2.3
- title: 'Additional requirement for service providers only: Service providers with remote
- access to customer premises use unique authentication factors for each customer premises.'
- levels:
- - base
- status: manual
-
- - id: 8.2.4
- title: Addition, deletion, and modification of user IDs, authentication factors, and other
- identifier objects are managed
- levels:
- - base
- status: manual
-
- - id: 8.2.5
- title: Access for terminated users is immediately revoked.
- description: |-
- The accounts of terminated users cannot be used.
- levels:
- - base
- status: manual
- notes: |-
- This requirement depends on site policies for user termination.
-
- - id: 8.2.6
- title: Inactive user accounts are removed or disabled within 90 days of inactivity.
- description: |-
- Inactive user accounts cannot be used.
- levels:
- - base
- status: pending
- notes: |-
- Also related to requirements 2.2.2 and 8.3.5.
-
- - id: 8.2.7
- title: Accounts used by third parties to access, support, or maintain system components via
- remote access are managed.
- levels:
- - base
- status: manual
-
- - id: 8.2.8
- title: If a user session has been idle for more than 15 minutes, the user is required to
- re-authenticate to re-activate the terminal or session.
- description: |-
- A user session cannot be used except by the authorized user. This requirement is not
- intended to apply to user accounts on point-of-sale terminals that have access to only one
- card number at a time to facilitate a single transaction (such as IDs used by cashiers on
- point-of-sale terminals). This requirement is not meant to prevent legitimate activities
- from being performed while the console/PC is unattended.
- levels:
- - base
- status: pending
-
- - id: '8.3'
- title: Strong authentication for users and administrators is established and managed.
- levels:
- - base
- status: pending
- controls:
- - id: 8.3.1
- title: All user access to system components for users and administrators is authenticated.
- levels:
- - base
- status: pending
-
- - id: 8.3.2
- title: Strong cryptography is used to render all authentication factors unreadable during
- transmission and storage on all system components.
- description: |-
- Cleartext authentication factors cannot be obtained, derived, or reused from the
- interception of communications or from stored data.
- levels:
- - base
- status: pending
- notes: |-
- There are similar rules that might be redundant for some distros.
-
- - id: 8.3.3
- title: User identity is verified before modifying any authentication factor.
- description: |-
- Unauthorized individuals cannot gain system access by impersonating the identity of an
- authorized user.
- levels:
- - base
- status: manual
- notes: |-
- This requirement is about processes, such as password resets, provisioning new hardware or
- software tokens, and generating new keys. It is common that these activities involve help
- desk teams and administrators and the involved people should ensure identities are properly
- verified.
-
- - id: 8.3.4
- title: Invalid authentication attempts are limited.
- description: |-
- - Locking out the user ID after not more than 10 attempts.
- - Setting the lockout duration to a minimum of 30 minutes or until the user's identity is
- confirmed.
- levels:
- - base
- status: pending
-
- - id: 8.3.5
- title: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1,
- they are set and reset for each user.
- description: |-
- - Set to a unique value for first-time use and upon reset.
- - Forced to be changed immediately after the first use.
- levels:
- - base
- status: pending
- notes: |-
- Also related to requirement 2.2.2, 8.2.2 and 8.2.6.
-
- - id: 8.3.6
- title: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1,
- they meet the minimum level of complexity.
- description: |-
- - A minimum length of 12 characters (or IF the system does not support 12 characters, a
- minimum length of eight characters).
- - Contain both numeric and alphabetic characters.
- A guessed password/passphrase cannot be verified by either an online or offline brute
- force attack.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is not intended to apply to:
- - User accounts on point-of-sale terminals that have access to only one card number at a
- time to facilitate a single transaction (such as IDs used by cashiers on point-of-sale
- terminals).
- - Application or system accounts, which are governed by requirements in section 8.6.
-
- - id: 8.3.7
- title: Individuals are not allowed to submit a new password/passphrase that is the same as
- any of the last four passwords/passphrases used.
- description: |-
- A previously used password cannot be used to gain access to an account for at least 12
- months.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is not intended to apply to user accounts on point-of-sale terminals that
- have access to only one card number at a time to facilitate a single transaction (such as
- IDs used by cashiers on point-of-sale terminals).
- For RHEL 8 and RHEL 9 systems, the accounts_password_pam_pwhistory_... rules should be
- prefered in detriment of accounts_password_pam_unix_remember. Using both should not create
- conflict but is unnecessary and the last should be filtered out from the profile.
-
- - id: 8.3.8
- title: Authentication policies and procedures are documented and communicated to all users.
- levels:
- - base
- status: manual
-
- - id: 8.3.9
- title: If passwords/passphrases are used as the only authentication factor for user access
- (i.e., in any single-factor authentication implementation) they should have a limited
- lifetime.
- description: |-
- If passwords/passphrases are used as the only authentication factor for user access (i.e.,
- in any single-factor authentication implementation) then either:
- - Passwords/passphrases are changed at least once every 90 days,
- OR
- - The security posture of accounts is dynamically analyzed, and real-time access to
- resources is automatically determined accordingly.
- levels:
- - base
- status: pending
- notes: |-
- The requirement does not explicitily define the number of days before the password
- expiration to warn the users, but the relevant rules were selected here as they do not
- cause any problems in combination with password lifetime rules.
-
- - id: 8.3.10
- title: 'Additional requirement for service providers only: If passwords/passphrases are used
- as the only authentication factor for customer user access to cardholder data (i.e.,
- in any single-factor authentication implementation) then guidance is provided to customer
- users.'
- levels:
- - base
- status: manual
- controls:
- - id: 8.3.10.1
- title: 'Additional requirement for service providers only: If passwords/passphrases
- are used as the only authentication factor for customer user access (i.e., in any
- single-factor authentication implementation) they should have a limited lifetime.'
- levels:
- - base
- status: pending
- notes: |-
- This requirement is already covered by 8.3.9.
-
- - id: 8.3.11
- title: Where authentication factors such as physical or logical security tokens, smart cards,
- or certificates are used, factors are not shared among multiple users and the usage is
- controlled.'
- levels:
- - base
- status: manual
-
- - id: '8.4'
- title: Multi-factor authentication (MFA) is implemented to secure access into the CDE.
- levels:
- - base
- status: supported
- notes: |-
- This parent requirement does not set one specific combination of Multi-factor authentication
- (MFA), so we can't enforce the use of smartcards or any specific solution. The systems
- usually support MFA but the chosen solution depends on site policies.
- controls:
- - id: 8.4.1
- title: MFA is implemented for all non-console access into the CDE for personnel with administrative
- access.
- levels:
- - base
- status: supported
-
- - id: 8.4.2
- title: MFA is implemented for all non-console access into the CDE.
- description: |-
- Access into the CDE cannot be obtained by the use of a single authentication factor.
- levels:
- - base
- status: manual
-
- - id: 8.4.3
- title: MFA is implemented for all remote access originating from outside the entity's network
- that could access or impact the CDE.
- levels:
- - base
- status: manual
-
- - id: '8.5'
- title: Multi-factor authentication (MFA) systems are configured to prevent misuse.
- levels:
- - base
- status: manual
- controls:
- - id: 8.5.1
- title: MFA systems are properly implemented.
- description: |-
- - The MFA system is not susceptible to replay attacks.
- - MFA systems cannot be bypassed by any users, including administrative users unless
- specifically documented, and authorized by management on an exception basis, for a limited
- time period.
- - At least two different types of authentication factors are used.
- - Success of all authentication factors is required before access is granted.
- levels:
- - base
- status: manual
- notes: |-
- Each site might have a different MFA solution and each solution has its own capabilities.
- This requirement demands manual assessment based on site policies.
-
- - id: '8.6'
- title: Use of application and system accounts and associated authentication factors is strictly
- managed.
- levels:
- - base
- status: pending
- controls:
- - id: 8.6.1
- title: If accounts used by systems or applications can be used for interactive login, they
- are managed.
- description: |-
- - Interactive use is prevented unless needed for an exceptional circumstance.
- - Interactive use is limited to the time needed for the exceptional circumstance.
- - Business justification for interactive use is documented.
- - Interactive use is explicitly approved by management.
- - Individual user identity is confirmed before access to account is granted.
- - Every action taken is attributable to an individual user.
- levels:
- - base
- status: pending
- notes: |-
- This requirement is related to 2.2.2, 2.2.6, 8.2.1 and 8.2.2. Specifically on 8.2.2 system
- accounts usage is restricted. Exceptions to system accounts should be manually checked to
- ensure the requirements in description. This requirement although implements some extra
- controls regarding root account.
-
- - id: 8.6.2
- title: Passwords/passphrases for any application and system accounts that can be used for
- interactive login are not hard coded in scripts, configuration/property files, or bespoke
- and custom source code.
- description: |-
- Passwords/passphrases used by application and system accounts cannot be used by
- unauthorized personnel.
- levels:
- - base
- status: manual
-
- - id: 8.6.3
- title: Passwords/passphrases for any application and system accounts are protected against
- misuse.
- description: |-
- - Passwords/passphrases are changed periodically (at the frequency defined in the entity's
- targeted risk analysis, which is performed according to all elements specified in
- Requirement 12.3.1) and upon suspicion or confirmation of compromise.
- - Passwords/passphrases are constructed with sufficient complexity appropriate for how
- frequently the entity changes the passwords/passphrases.
- levels:
- - base
- status: pending
- notes: |-
- Related to requirements 8.3.6 and 8.3.9.
-
- - id: '9.1'
- title: Processes and mechanisms for restricting physical access to cardholder data are defined
- and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 9.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 9 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 9 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 9.1.2
- title: Roles and responsibilities for performing activities in Requirement 9 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 9 are documented, assigned and understood
- by the assigned personnel.
-
- - id: '9.2'
- title: Physical access controls manage entry into facilities and systems containing cardholder
- data.
- levels:
- - base
- status: manual
- controls:
- - id: 9.2.1
- title: Appropriate facility entry controls are in place to restrict physical access to systems
- in the CDE.
- description: |-
- System components in the CDE cannot be physically accessed by unauthorized personnel.
- levels:
- - base
- status: manual
- controls:
- - id: 9.2.1.1
- title: Individual physical access to sensitive areas within the CDE is monitored with
- either video cameras or physical access control mechanisms (or both).
- levels:
- - base
- status: manual
-
- - id: 9.2.2
- title: Physical and/or logical controls are implemented to restrict use of publicly accessible
- network jacks within the facility.
- description: |-
- Unauthorized devices cannot connect to the entity's network from public areas within the
- facility.
- levels:
- - base
- status: not applicable
-
- - id: 9.2.3
- title: Physical access to wireless access points, gateways, networking/communications hardware,
- and telecommunication lines within the facility is restricted
- description: |-
- Physical networking equipment cannot be accessed by unauthorized personnel.
- levels:
- - base
- status: not applicable
-
- - id: 9.2.4
- title: Access to consoles in sensitive areas is restricted via locking when not in use.
- description: |-
- Physical consoles within sensitive areas cannot be used by unauthorized personnel.
- levels:
- - base
- status: manual
- notes: |-
- Related to requirement 8.2.8.
- This requirement asks to observe a system administrator's attempt to log into consoles in
- sensitive areas and verify that they are "locked" to prevent unauthorized use. Therefore
- it is a manual requirement applicable only very specific circumstances.
-
- - id: '9.3'
- title: Physical access for personnel and visitors is authorized and managed.
- levels:
- - base
- status: manual
- controls:
- - id: 9.3.1
- title: Procedures are implemented for authorizing and managing physical access of personnel
- to the CDE.
- levels:
- - base
- status: manual
- controls:
- - id: 9.3.1.1
- title: Physical access to sensitive areas within the CDE for personnel is controlled
- levels:
- - base
- status: manual
-
- - id: 9.3.2
- title: Procedures are implemented for authorizing and managing visitor access to the CDE.
- levels:
- - base
- status: manual
-
- - id: 9.3.3
- title: Visitor badges or identification are surrendered or deactivated before visitors leave
- the facility or at the date of expiration.
- description: |-
- Visitor identification or badges cannot be reused after expiration.
- levels:
- - base
- status: manual
-
- - id: 9.3.4
- title: Visitor logs are used to maintain a physical record of visitor activity both within
- the facility and within sensitive areas.
- levels:
- - base
- status: manual
-
- - id: '9.4'
- title: Media with cardholder data is securely stored, accessed, distributed, and destroyed.
- levels:
- - base
- status: manual
- controls:
- - id: 9.4.1
- title: All media with cardholder data is physically secured.
- description: |-
- Media with cardholder data cannot be accessed by unauthorized personnel.
- levels:
- - base
- status: manual
- controls:
- - id: 9.4.1.1
- title: Offline media backups with cardholder data are stored in a secure location.
- description: |-
- Offline backups cannot be accessed by unauthorized personnel.
- levels:
- - base
- status: manual
-
- - id: 9.4.1.2
- title: The security of the offline media backup location(s) with cardholder data is
- reviewed at least once every 12 months.
- description: |-
- The security controls protecting offline backups are verified periodically by
- inspection.
- levels:
- - base
- status: manual
-
- - id: 9.4.2
- title: All media with cardholder data is classified in accordance with the sensitivity of
- the data.
- description: |-
- Media are classified and protected appropriately.
- levels:
- - base
- status: manual
-
- - id: 9.4.3
- title: Media with cardholder data sent outside the facility is secured.
- description: |-
- Media is secured and tracked when transported outside the facility.
- - Media sent outside the facility is logged.
- - Media is sent by secured courier or other delivery method that can be accurately
- tracked.
- - Offsite tracking logs include details about media location.
- levels:
- - base
- status: manual
-
- - id: 9.4.4
- title: Management approves all media with cardholder data that is moved outside the facility
- (including when media is distributed to individuals).
- description: |-
- Media cannot leave a facility without the approval of accountable personnel. Individuals
- approving media movements should have the appropriate level of management authority to
- grant this approval. However, it is not specifically required that such individuals have
- "manager" as part of their title.
- levels:
- - base
- status: manual
-
- - id: 9.4.5
- title: Inventory logs of all electronic media with cardholder data are maintained.
- description: |-
- Accurate inventories of stored electronic media are maintained.
- levels:
- - base
- status: manual
- controls:
- - id: 9.4.5.1
- title: Inventories of electronic media with cardholder data are conducted at least
- once every 12 months.
- description: |-
- Media inventories are verified periodically.
- levels:
- - base
- status: manual
-
- - id: 9.4.6
- title: Hard-copy materials with cardholder data are destroyed when no longer needed for business
- or legal reasons.
- levels:
- - base
- status: manual
-
- - id: 9.4.7
- title: Electronic media with cardholder data is destroyed when no longer needed for business
- or legal reasons.
- description: |-
- - The electronic media is destroyed.
- - The cardholder data is rendered unrecoverable so that it cannot be reconstructed.
- levels:
- - base
- status: manual
-
- - id: '9.5'
- title: Point-of-interaction (POI) devices are protected from tampering and unauthorized substitution.
- levels:
- - base
- status: manual
- controls:
- - id: 9.5.1
- title: POI devices that capture payment card data via direct physical interaction with the
- payment card form factor are protected from tampering and unauthorized substitution.
- levels:
- - base
- status: manual
- controls:
- - id: 9.5.1.1
- title: An up-to-date list of POI devices is maintained.
- levels:
- - base
- status: manual
-
- - id: 9.5.1.2
- title: POI device surfaces are periodically inspected to detect tampering and unauthorized
- substitution.
- description: |-
- Point of Interaction Devices cannot be tampered with, substituted without authorization,
- or have skimming attachments installed without timely detection.
- levels:
- - base
- status: manual
- controls:
- - id: 9.5.1.2.1
- title: The frequency of periodic POI device inspections and the type of inspections
- performed is defined in the entity's targeted risk analysis, which is performed
- according to all elements specified in Requirement 12.3.1.
- description: |-
- POI devices are inspected at a frequency that addresses the entity's risk.
- This requirement is a best practice until 31 March 2025, after which it will be
- required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 9.5.1.3
- title: Training is provided for personnel in POI environments to be aware of attempted
- tampering or replacement of POI devices.
- levels:
- - base
- status: manual
-
- - id: '10.1'
- title: Processes and mechanisms for logging and monitoring all access to system components and
- cardholder data are defined and documented.
- levels:
- - base
- status: manual
- controls:
- - id: 10.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 10 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 10 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 10.1.2
- title: Roles and responsibilities for performing activities in Requirement 10 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 10 are documented, assigned and
- understood by the assigned personnel.
-
- - id: '10.2'
- title: Audit logs are implemented to support the detection of anomalies and suspicious activity,
- and the forensic analysis of events.
- levels:
- - base
- status: pending
- controls:
- - id: 10.2.1
- title: Audit logs are enabled and active for all system components and cardholder data.
- description: |-
- Records of all activities affecting system components and cardholder data are captured.
- levels:
- - base
- status: pending
- controls:
- - id: 10.2.1.1
- title: Audit logs capture all individual user access to cardholder data.
- description: |-
- Records of all individual user access to cardholder data are captured.
- levels:
- - base
- status: planned
- notes: |-
- Differently than 10.2.1.4, this requirement is about logginh successful access to
- cardholder data. This kind of events can easily hit performance issues and are usually
- not necessary if a good access policy is in place. More clarification is needed about
- this requirement.
-
- - id: 10.2.1.2
- title: Audit logs capture all actions taken by any individual with administrative access,
- including any interactive use of application or system accounts.
- description: |-
- Records of all actions performed by individuals with elevated privileges are captured.
- levels:
- - base
- status: pending
- notes: |-
- Not all privileged commands have suid or sgid enabled. We probably want to include more
- rules for this requirement.
-
- - id: 10.2.1.3
- title: Audit logs capture all access to audit logs.
- description: |-
- Records of all access to audit logs are captured.
- levels:
- - base
- status: pending
-
- - id: 10.2.1.4
- title: Audit logs capture all invalid logical access attempts.
- description: |-
- Records of all invalid access attempts are captured.
- levels:
- - base
- status: pending
-
- - id: 10.2.1.5
- title: Audit logs capture all changes to identification and authentication credentials.
- levels:
- - base
- status: pending
-
- - id: 10.2.1.6
- title: Audit logs capture the initialization of new audit logs, and starting, stopping,
- or pausing of the existing audit logs.
- levels:
- - base
- status: planned
- notes: |-
- Ideally should exist rules specifically logging when audit configuration files are
- modified and audit service state is changed.
-
- - id: 10.2.1.7
- title: Audit logs capture all creation and deletion of system-level objects.
- description: |-
- Records of alterations that indicate a system has been modified from its intended
- functionality are captured.
- levels:
- - base
- status: pending
- notes: |-
- There are enough rules to capture deletion events but not for creation events.
- This requirement needs to be better investigated to confirm which additional rules would
- satistfy the requirement.
-
- - id: 10.2.2
- title: Audit logs record sufficient details for each auditable event.
- description: |-
- - User identification.
- - Type of event.
- - Date and time.
- - Success and failure indication.
- - Origination of event.
- - Identity or name of affected data, system component, resource, or service (for example,
- name and protocol).
- levels:
- - base
- status: pending
- notes: |-
- Standard settings for audit should be enough.
-
- - id: '10.3'
- title: Audit logs are protected from destruction and unauthorized modifications.
- levels:
- - base
- status: pending
- controls:
- - id: 10.3.1
- title: Read access to audit logs files is limited to those with a job-related need.
- description: |-
- Stored activity records cannot be accessed by unauthorized personnel.
- levels:
- - base
- status: pending
-
- - id: 10.3.2
- title: Audit log files are protected to prevent modifications by individuals.
- description: |-
- Stored activity records cannot be modified by personnel.
- levels:
- - base
- status: pending
-
- - id: 10.3.3
- title: Audit log files, including those for external-facing technologies, are promptly backed
- up to a secure, central, internal log server(s) or other media that is difficult to modify.
- description: |-
- Stored activity records are secured and preserved in a central location to prevent
- unauthorized modification.
- levels:
- - base
- status: pending
- notes: |-
- Although the technologies in general allow to send logs to a centralized server, some
- parameters for this configuration are specific to each site policy and therefore the
- requirement demands manual assessment.
-
- - id: 10.3.4
- title: File integrity monitoring or change-detection mechanisms is used on audit logs to
- ensure that existing log data cannot be changed without generating alerts.
- description: |-
- Stored activity records cannot be modified without an alert being generated.
- levels:
- - base
- status: pending
-
- - id: '10.4'
- title: Audit logs are reviewed to identify anomalies or suspicious activity.
- levels:
- - base
- status: manual
- controls:
- - id: 10.4.1
- title: The audit logs are reviewed at least once daily.
- description: |-
- - All security events.
- - Logs of all system components that store, process, or transmit CHD and/or SAD.
- - Logs of all critical system components.
- - Logs of all servers and system components that perform security functions (for example,
- network security controls, intrusion-detection systems/intrusion-prevention systems
- (IDS/IPS), authentication servers).
- levels:
- - base
- status: manual
- controls:
- - id: 10.4.1.1
- title: Automated mechanisms are used to perform audit log reviews.
- description: |-
- Potentially suspicious or anomalous activities are identified via a repeatable and
- consistent mechanism. This requirement is a best practice until 31 March 2025, after
- which it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
- notes: |-
- Automation mechanisms, solutions and approaches vary for each organizarion.
-
- - id: 10.4.2
- title: Logs of all other system components (those not specified in Requirement 10.4.1) are
- reviewed periodically.
- description: |-
- Potentially suspicious or anomalous activities for other system components (not included
- in 10.4.1) are reviewed in accordance with the entity's identified risk. This requirement
- is applicable to all other in-scope system components not included in Requirement 10.4.1.
- levels:
- - base
- status: manual
- controls:
- - id: 10.4.2.1
- title: The frequency of periodic log reviews for all other system components (not defined
- in Requirement 10.4.1) is defined in the entity's targeted risk analysis, which
- is performed according to all elements specified in Requirement 12.3.1
- description: |-
- Log reviews for lower-risk system components are performed at a frequency that addresses
- the entity's risk. This requirement is a best practice until 31 March 2025, after which
- it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 10.4.3
- title: Exceptions and anomalies identified during the review process are addressed.
- description: |-
- Suspicious or anomalous activities are addressed.
- levels:
- - base
- status: manual
-
- - id: '10.5'
- title: Audit log history is retained and available for analysis.
- levels:
- - base
- status: pending
- controls:
- - id: 10.5.1
- title: Retain audit log history for at least 12 months, with at least the most recent three
- months immediately available for analysis.
- description: |-
- Historical records of activity are available immediately to support incident response and
- are retained for at least 12 months.
- levels:
- - base
- status: pending
- notes: |-
- It is not simple to ensure 12 months history is present in each system but the rules in
- this requirement ensures the logs are not lost without administrators awareness.
-
- - id: '10.6'
- title: Time-synchronization mechanisms support consistent time settings across all systems.
- levels:
- - base
- status: pending
- controls:
- - id: 10.6.1
- title: System clocks and time are synchronized using time-synchronization technology.
- description: |-
- Common time is established across all systems. Keeping time-synchronization technology
- current includes managing vulnerabilities and patching the technology according to PCI DSS
- Requirements 6.3.1 and 6.3.3.
- levels:
- - base
- status: pending
- notes: |-
- Maybe it is possible to optmize some similar rules related to ntp.
-
- - id: 10.6.2
- title: Systems are configured to the correct and consistent time.
- description: |-
- - One or more designated time servers are in use.
- - Only the designated central time server(s) receives time from external sources.
- - Time received from external sources is based on International Atomic Time or Coordinated
- Universal Time (UTC).
- - The designated time server(s) accept time updates only from specific industry-accepted
- external sources.
- - Where there is more than one designated time server, the time servers peer with one
- another to keep accurate time.
- - Internal systems receive time information only from designated central time server(s).
- levels:
- - base
- status: pending
- notes: |-
- The selected rules might need updates in order to restrict their platform applicability
- to avoid conflicts.
-
- - id: 10.6.3
- title: Time synchronization settings and data are protected.
- description: |-
- - Access to time data is restricted to only personnel with a business need.
- - Any changes to time settings on critical systems are logged, monitored, and reviewed.
- levels:
- - base
- status: pending
-
- - id: '10.7'
- title: Failures of critical security control systems are detected, reported, and responded to promptly.
- levels:
- - base
- status: pending
- controls:
- - id: 10.7.1
- title: 'Additional requirement for service providers only: Failures of critical security
- control systems are detected, alerted, and addressed promptly.'
- description: |-
- It includes but is not limited to failure of the following critical security control
- systems:
- - Network security controls.
- - IDS/IPS.
- - FIM.
- - Anti-malware solutions.
- - Physical access controls.
- - Logical access controls.
- - Audit logging mechanisms.
- - Segmentation controls (if used).
- levels:
- - base
- status: manual
-
- - id: 10.7.2
- title: Failures of critical security control systems are detected, alerted, and addressed
- promptly.
- description: |-
- It includes but is not limited to failure of the following critical security control
- systems:
- - Network security controls.
- - IDS/IPS.
- - Change-detection mechanisms.
- - Anti-malware solutions.
- - Physical access controls.
- - Logical access controls.
- - Audit logging mechanisms.
- - Segmentation controls (if used).
- - Audit log review mechanisms.
- - Automated security testing tools (if used).
- levels:
- - base
- status: pending
-
- - id: 10.7.3
- title: Failures of any critical security controls systems are responded to restore security
- functions, ensure documentation, address security issues and prevent other failures.
- description: |-
- It includes but is not limited to:
- - Restoring security functions.
- - Identifying and documenting the duration (date and time from start to end) of the
- security failure.
- - Identifying and documenting the cause(s) of failure and documenting required
- remediation.
- - Identifying and addressing any security issues that arose during the failure.
- - Determining whether further actions are required as a result of the security failure.
- - Implementing controls to prevent the cause of failure from reoccurring.
- - Resuming monitoring of security controls.
- levels:
- - base
- status: manual
-
- - id: '11.1'
- title: Processes and mechanisms for regularly testing security of systems and networks are defined
- and understood.
- levels:
- - base
- status: manual
- controls:
- - id: 11.1.1
- title: All security policies and operational procedures that are identified in Requirement
- 11 are Documented, Kept up to date, In use and Known to all affected parties.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that security policies and
- operational procedures identified in Requirement 11 are managed in accordance with all
- elements specified in this requirement.
-
- - id: 11.1.2
- title: Roles and responsibilities for performing activities in Requirement 11 are documented,
- assigned, and understood.
- levels:
- - base
- status: manual
- notes: |-
- Examine documentation and interview personnel to verify that day-to-day responsibilities
- for performing all the activities in Requirement 11 are documented, assigned and
- understood by the assigned personnel.
-
- - id: '11.2'
- title: Wireless access points are identified and monitored, and unauthorized wireless access points
- are addressed.
- levels:
- - base
- status: manual
- controls:
- - id: 11.2.1
- title: Authorized and unauthorized wireless access points are managed.
- levels:
- - base
- status: manual
-
- - id: 11.2.2
- title: An inventory of authorized wireless access points is maintained, including a documented
- business justification.
- description: |-
- Unauthorized wireless access points are not mistaken for authorized wireless access
- points.
- levels:
- - base
- status: manual
-
- - id: '11.3'
- title: External and internal vulnerabilities are regularly identified, prioritized, and addressed.
- levels:
- - base
- status: manual
- controls:
- - id: 11.3.1
- title: Internal vulnerability scans are performed.
- levels:
- - base
- status: manual
- controls:
- - id: 11.3.1.1
- title: All other applicable vulnerabilities (those not ranked as high-risk vulnerabilities
- or critical vulnerabilities according to the entity's vulnerability risk rankings
- defined at Requirement 6.3.1) are managed.
- levels:
- - base
- status: manual
-
- - id: 11.3.1.2
- title: Internal vulnerability scans are performed via authenticated scanning.
- levels:
- - base
- status: manual
-
- - id: 11.3.1.3
- title: Internal vulnerability scans are performed after any significant change.
- levels:
- - base
- status: manual
-
- - id: 11.3.2
- title: External vulnerability scans are performed.
- levels:
- - base
- status: manual
- controls:
- - id: 11.3.2.1
- title: External vulnerability scans are performed after any significant change.
- levels:
- - base
- status: manual
-
- - id: '11.4'
- title: External and internal penetration testing is regularly performed, and exploitable vulnerabilities
- and security weaknesses are corrected.
- levels:
- - base
- status: manual
- controls:
- - id: 11.4.1
- title: A penetration testing methodology is defined, documented, and implemented by the entity.
- levels:
- - base
- status: manual
-
- - id: 11.4.2
- title: Internal penetration testing is performed.
- levels:
- - base
- status: manual
-
- - id: 11.4.3
- title: External penetration testing is performed.
- levels:
- - base
- status: manual
-
- - id: 11.4.4
- title: Exploitable vulnerabilities and security weaknesses found during penetration testing
- are corrected
- levels:
- - base
- status: manual
-
- - id: 11.4.5
- title: If segmentation is used to isolate the CDE from other networks, penetration tests
- are performed on segmentation controls.
- levels:
- - base
- status: manual
-
- - id: 11.4.6
- title: 'Additional requirement for service providers only: If segmentation is used to isolate
- the CDE from other networks, penetration tests are performed on segmentation controls.'
- levels:
- - base
- status: manual
-
- - id: 11.4.7
- title: 'Additional requirement for multi-tenant service providers only: Multi-tenant service
- providers support their customers for external penetration testing per Requirement 11.4.3
- and 11.4.4.'
- description: |-
- Multi-tenant service providers support their customers' need for technical testing either
- by providing access or evidence that comparable technical testing has been undertaken.
- levels:
- - base
- status: manual
-
- - id: '11.5'
- title: Network intrusions and unexpected file changes are detected and responded to.
- levels:
- - base
- status: pending
- controls:
- - id: 11.5.1
- title: Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or
- prevent intrusions into the network.
- levels:
- - base
- status: manual
- controls:
- - id: 11.5.1.1
- title: 'Additional requirement for service providers only: Intrusion-detection and/or
- intrusion-prevention techniques detect, alert on/prevent, and address covert malware
- communication channels.'
- description: |-
- Mechanisms are in place to detect and alert/prevent covert communications with
- command-and-control systems. Alerts generated by these mechanisms are responded to by
- personnel, or by automated means that ensure that such communications are blocked. This
- requirement applies only when the entity being assessed is a service provider. This
- requirement is a best practice until 31 March 2025, after which it will be required and
- must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
- notes: |-
- The policy is not explicit about any specific solution. The solution might vary
- depending on site policies.
-
- - id: 11.5.2
- title: A change-detection mechanism (for example, file integrity monitoring tools) is deployed.
- levels:
- - base
- status: pending
-
- - id: '11.6'
- title: Unauthorized changes on payment pages are detected and responded to.
- levels:
- - base
- status: manual
- controls:
- - id: 11.6.1
- title: A change- and tamper-detection mechanism is deployed.
- levels:
- - base
- status: manual
- notes: |-
- It depends on controls in application level, which varies based on site policies.
-
- - id: '12.1'
- title: A comprehensive information security policy that governs and provides direction for protection
- of the entity's information assets is known and current.
- levels:
- - base
- status: pending
- controls:
- - id: 12.1.1
- title: An overall information security policy is established, published, maintained and disseminated
- to all relevant personnel, as well as to relevant vendors and business partners.
- levels:
- - base
- status: manual
-
- - id: 12.1.2
- title: The information security policy is updated and reviewed at least once every 12 months.
- levels:
- - base
- status: manual
-
- - id: 12.1.3
- title: The security policy clearly defines information security roles and responsibilities
- for all personnel, and all personnel are aware of and acknowledge their information security
- responsibilities.
- description: |-
- Personnel understand their role in protecting the entity's cardholder data.
- levels:
- - base
- status: manual
-
- - id: 12.1.4
- title: Responsibility for information security is formally assigned to a Chief Information
- Security Officer or other information security knowledgeable member of executive management.
- description: |-
- A designated member of executive management is responsible for information security.
- levels:
- - base
- status: manual
-
- - id: '12.2'
- title: Acceptable use policies for end-user technologies are defined and implemented.
- levels:
- - base
- status: manual
- controls:
- - id: 12.2.1
- title: Acceptable use policies for end-user technologies are documented and implemented.
- levels:
- - base
- status: manual
-
- - id: '12.3'
- title: Risks to the cardholder data environment are formally identified, evaluated, and managed.
- levels:
- - base
- status: manual
- controls:
- - id: 12.3.1
- title: For each PCI DSS requirement that specifies completion of a targeted risk analysis,
- the analysis is documented.
- levels:
- - base
- status: manual
-
- - id: 12.3.2
- title: A targeted risk analysis is performed for each PCI DSS requirement that the entity
- meets with the customized approach
- levels:
- - base
- status: manual
-
- - id: 12.3.3
- title: Cryptographic cipher suites and protocols in use are documented and reviewed at least
- once every 12 months.
- levels:
- - base
- status: manual
- notes: |-
- Related to requirement 2.2.7.
-
- - id: 12.3.4
- title: Hardware and software technologies in use are reviewed at least once every 12 months.
- levels:
- - base
- status: manual
- notes: |-
- The technical requirement related to this is 6.3.3.
-
- - id: '12.4'
- title: PCI DSS compliance is managed.
- levels:
- - base
- status: manual
- controls:
- - id: 12.4.1
- title: 'Additional requirement for service providers only: Responsibility is established
- by executive management for the protection of cardholder data and a PCI DSS compliance
- program.'
- levels:
- - base
- status: manual
-
- - id: 12.4.2
- title: 'Additional requirement for service providers only: Reviews are performed at least
- once every three months to confirm that personnel are performing their tasks in accordance
- with all security policies and operational procedures.'
- description: |-
- Reviews are performed by personnel other than those responsible for performing the given
- task.
- levels:
- - base
- status: manual
- controls:
- - id: 12.4.2.1
- title: 'Additional requirement for service providers only: Reviews conducted in accordance
- with Requirement 12.4.2 are documented.'
- levels:
- - base
- status: manual
-
- - id: '12.5'
- title: PCI DSS scope is documented and validated.
- levels:
- - base
- status: manual
- controls:
- - id: 12.5.1
- title: An inventory of system components that are in scope for PCI DSS, including a description
- of function/use, is maintained and kept current.
- description: |-
- All system components in scope for PCI DSS are identified and known.
- levels:
- - base
- status: manual
-
- - id: 12.5.2
- title: PCI DSS scope is documented and confirmed by the entity at least once every 12 months
- and upon significant change to the in-scope environment.
- levels:
- - base
- status: manual
- controls:
- - id: 12.5.2.1
- title: 'Additional requirement for service providers only: PCI DSS scope is documented
- and confirmed by the entity at least once every six months and upon significant
- change to the in-scope environment. At a minimum, the scoping validation includes
- all the elements specified in Requirement 12.5.2.'
- description: |-
- The accuracy of PCI DSS scope is verified to be continuously accurate by comprehensive
- analysis and appropriate technical measures. This requirement applies only when the
- entity being assessed is a service provider. This requirement is a best practice until
- 31 March 2025, after which it will be required and must be fully considered during a
- PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 12.5.3
- title: 'Additional requirement for service providers only: Significant changes to organizational
- structure result in a documented (internal) review of the impact to PCI DSS scope and
- applicability of controls, with results communicated to executive management.'
- description: |-
- PCI DSS scope is confirmed after significant organizational change. This requirement
- applies only when the entity being assessed is a service provider. This requirement is a
- best practice until 31 March 2025, after which it will be required and must be fully
- considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: '12.6'
- title: Security awareness education is an ongoing activity.
- levels:
- - base
- status: manual
- controls:
- - id: 12.6.1
- title: A formal security awareness program is implemented to make all personnel aware of
- the entity's information security policy and procedures, and their role in protecting
- the cardholder data.
- description: |-
- Personnel are knowledgeable about the threat landscape, their responsibility for the
- operation of relevant security controls, and are able to access assistance and guidance
- when required.
- levels:
- - base
- status: manual
-
- - id: 12.6.2
- title: The security awareness program is updated and reviewed at least once every 12 months.
- levels:
- - base
- status: manual
-
- - id: 12.6.3
- title: Personnel receive security awareness training upon hire and at least once every 12
- months via multiple methods of communication.
- levels:
- - base
- status: manual
- controls:
- - id: 12.6.3.1
- title: Security awareness training includes awareness of threats and vulnerabilities
- that could impact the security of the CDE.
- levels:
- - base
- status: manual
-
- - id: 12.6.3.2
- title: Security awareness training includes awareness about the acceptable use of end-user
- technologies in accordance with Requirement 12.2.1.
- description: |-
- Personnel are knowledgeable about their responsibility for the security and operation of
- end-user technologies and are able to access assistance and guidance when required. This
- requirement is a best practice until 31 March 2025, after which it will be required and
- must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: '12.7'
- title: Personnel are screened to reduce risks from insider threats.
- levels:
- - base
- status: manual
- controls:
- - id: 12.7.1
- title: Potential personnel who will have access to the CDE are screened, within the constraints
- of local laws, prior to hire to minimize the risk of attacks from internal sources.
- description: |-
- The risk related to allowing new members of staff access to the CDE is understood and
- managed. For those potential personnel to be hired for positions such as store cashiers,
- who only have access to one card number at a time when facilitating a transaction, this
- requirement is a recommendation only.
- levels:
- - base
- status: manual
-
- - id: '12.8'
- title: Risk to information assets associated with third-party service provider (TPSP) relationships
- is managed.
- levels:
- - base
- status: manual
- controls:
- - id: 12.8.1
- title: A list of all third-party service providers (TPSPs) with which account data is shared
- or that could affect the security of account data is maintained, including a description
- for each of the services provided.
- description: |-
- Records are maintained of TPSPs and the services provided. The use of a PCI DSS compliant
- TPSP does not make an entity PCI DSS compliant, nor does it remove the entit's
- responsibility for its own PCI DSS compliance.
- levels:
- - base
- status: manual
-
- - id: 12.8.2
- title: Written agreements with TPSPs are maintained
- levels:
- - base
- status: manual
-
- - id: 12.8.3
- title: An established process is implemented for engaging TPSPs, including proper due diligence
- prior to engagement.
- description: |-
- The capability, intent, and resources of a prospective TPSP to adequately protect account
- data are assessed before the TPSP is engaged.
- levels:
- - base
- status: manual
-
- - id: 12.8.4
- title: A program is implemented to monitor TPSPs' PCI DSS compliance status at least once
- every 12 months.
- description: |-
- The PCI DSS compliance status of TPSPs is verified periodically. Where an entity has an
- agreement with a TPSP for meeting PCI DSS requirements on behalf of the entity (for
- example, via a firewall service), the entity must work with the TPSP to make sure the
- applicable PCI DSS requirements are met. If the TPSP does not meet those applicable
- PCI DSS requirements, then those requirements are also "not in place" for the entity.
- levels:
- - base
- status: manual
-
- - id: 12.8.5
- title: Information is maintained about which PCI DSS requirements are managed by each TPSP,
- which are managed by the entity, and any that are shared between the TPSP and the entity.
- description: |-
- Records detailing the PCI DSS requirements and related system components for which each
- TPSP is solely or jointly responsible, are maintained and reviewed periodically.
- levels:
- - base
- status: manual
-
- - id: '12.9'
- title: Third-party service providers (TPSPs) support their customers' PCI DSS compliance.
- levels:
- - base
- status: manual
- controls:
- - id: 12.9.1
- title: |-
- Additional requirement for service providers only: TPSPs provide written agreements to
- customers that include acknowledgments that TPSPs are responsible for the security of
- account data the TPSP possesses or otherwise stores, processes, or transmits on behalf of
- the customer, or to the extent that the TPSP could impact the security of the customer's
- cardholder data and/or sensitive authentication data.
- description: |-
- TPSPs formally acknowledge their security responsibilities to their customers. This
- requirement applies only when the entity being assessed is a service provider. The exact
- wording of an agreement will depend on the details of the service being provided, and the
- responsibilities assigned to each party. The agreement does not have to include the exact
- wording provided in this requirement.
- levels:
- - base
- status: manual
-
- - id: 12.9.2
- title: |-
- Additional requirement for service providers only: TPSPs support their customers' requests
- for information to meet Requirements 12.8.4 and 12.8.5.
- levels:
- - base
- status: manual
-
- - id: '12.10'
- title: Suspected and confirmed security incidents that could impact the CDE are responded to immediately.
- levels:
- - base
- status: manual
- controls:
- - id: 12.10.1
- title: An incident response plan exists and is ready to be activated in the event of a suspected
- or confirmed security incident.
- levels:
- - base
- status: manual
-
- - id: 12.10.2
- title: At least once every 12 months, the security incident response plan is reviewed, updated,
- and tested.
- levels:
- - base
- status: manual
-
- - id: 12.10.3
- title: Specific personnel are designated to be available on a 24/7 basis to respond to suspected
- or confirmed security incidents.
- description: |-
- Incidents are responded to immediately where appropriate.
- levels:
- - base
- status: manual
-
- - id: 12.10.4
- title: Personnel responsible for responding to suspected and confirmed security incidents
- are appropriately and periodically trained on their incident response responsibilities.
- description: |-
- Personnel are knowledgeable about their role and responsibilities in incident response and
- are able to access assistance and guidance when required.
- levels:
- - base
- status: manual
- controls:
- - id: 12.10.4.1
- title: The frequency of periodic training for incident response personnel is defined
- in the entity's targeted risk analysis, which is performed according to all elements
- specified in Requirement 12.3.1.
- description: |-
- Incident response personnel are trained at a frequency that addresses the entity's risk.
- This requirement is a best practice until 31 March 2025, after which it will be required
- and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: 12.10.5
- title: The security incident response plan includes monitoring and responding to alerts from
- security monitoring systems.
- levels:
- - base
- status: manual
-
- - id: 12.10.6
- title: The security incident response plan is modified and evolved according to lessons learned
- and to incorporate industry developments.
- description: |-
- The effectiveness and accuracy of the incident response plan is reviewed and updated after
- each invocation.
- levels:
- - base
- status: manual
-
- - id: 12.10.7
- title: Incident response procedures are in place, to be initiated upon the detection of stored
- PAN anywhere it is not expected.
- levels:
- - base
- status: manual
-
- - id: A1.1
- title: Multi-tenant service providers protect and separate all customer environments and data.
- levels:
- - base
- status: manual
- controls:
- - id: A1.1.1
- title: Logical separation is implemented.
- description: |-
- - The provider cannot access its customers' environments without authorization.
- - Customers cannot access the provider's environment without authorization.
- levels:
- - base
- status: manual
-
- - id: A1.1.2
- title: Controls are implemented such that each customer only has permission to access its
- own cardholder data and CDE.
- description: |-
- Customers cannot access other customers' environments.
- levels:
- - base
- status: manual
-
- - id: A1.1.3
- title: Controls are implemented such that each customer can only access resources allocated
- to them.
- description: |-
- Customers cannot impact resources allocated to other customers.
- levels:
- - base
- status: manual
-
- - id: A1.1.4
- title: The effectiveness of logical separation controls used to separate customer environments
- is confirmed at least once every six months via penetration testing.
- description: |-
- Segmentation of customer environments from other environments is periodically validated to
- be effective. The testing of adequate separation between customers in a multi-tenant
- service provider environment is in addition to the penetration tests specified in
- Requirement 11.4.6. This requirement is a best practice until 31 March 2025, after which
- it will be required and must be fully considered during a PCI DSS assessment.
- levels:
- - base
- status: manual
-
- - id: A1.2
- title: Multi-tenant service providers facilitate logging and incident response for all customers.
- levels:
- - base
- status: manual
- controls:
- - id: A1.2.1
- title: Audit log capability is enabled for each customer's environment that is consistent
- with PCI DSS Requirement 10.
- levels:
- - base
- status: manual
-
- - id: A1.2.2
- title: Processes or mechanisms are implemented to support and/or facilitate prompt forensic
- investigations in the event of a suspected or confirmed security incident for any customer.
- description: |-
- Forensic investigation is readily available to all customers in the event of a suspected
- or confirmed security incident.
- levels:
- - base
- status: manual
-
- - id: A1.2.3
- title: Processes or mechanisms are implemented for reporting and addressing suspected or
- confirmed security incidents and vulnerabilities.
- levels:
- - base
- status: manual
-
- - id: A2.1
- title: POI terminals using SSL and/or early TLS are confirmed as not susceptible to known SSL/TLS
- exploits.
- description: |-
- Appendix A2: Additional PCI DSS Requirements for Entities Using SSL/Early TLS for
- Card-Present POS POI Terminal Connections.
- levels:
- - base
- status: manual
- controls:
- - id: A2.1.1
- title: Where POS POI terminals at the merchant or payment acceptance location use SSL and/or
- early TLS, the entity confirms the devices are not susceptible to any known exploits
- for those protocols.
- levels:
- - base
- status: manual
- notes: |-
- Related to requirements 2.2.7 and 3.5.1.1.
- Service level settings for web servers such as Apache and NGINX should also be checked.
-
- - id: A2.1.2
- title: 'Additional requirement for service providers only: All service providers with existing
- connection points to POS POI terminals that use SSL and/or early TLS as defined in A2.1
- have a formal Risk Mitigation and Migration Plan in place.'
- levels:
- - base
- status: manual
-
- - id: A2.1.3
- title: 'Additional requirement for service providers only: All service providers provide
- a secure service offering.'
- description: |-
- This requirement is not eligible for the customized approach. This requirement applies
- only when the entity being assessed is a service provider.
- levels:
- - base
- status: manual
-
- - id: A3.1
- title: A PCI DSS compliance program is implemented.
- description: |-
- Appendix A3: Designated Entities Supplemental Validation (DESV)
- levels:
- - base
- status: manual
- controls:
- - id: A3.1.1
- title: Responsibility is established by executive management for the protection of account
- data and a PCI DSS compliance program.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
-
- - id: A3.1.2
- title: A formal PCI DSS compliance program is in place.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirements 1-12
-
- - id: A3.1.3
- title: PCI DSS compliance roles and responsibilities are specifically defined and formally
- assigned to one or more personnel.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
-
- - id: A3.1.4
- title: Up-to-date PCI DSS and/or information security training is provided at least once
- every 12 months to personnel with PCI DSS compliance responsibilities (as identified
- in A3.1.3).
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
-
- - id: A3.2
- title: PCI DSS scope is documented and validated.
- levels:
- - base
- status: manual
- controls:
- - id: A3.2.1
- title: PCI DSS scope is documented and confirmed for accuracy at least once every three months
- and upon significant changes to the in-scope environment.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements, Requirement 12.
-
- - id: A3.2.2
- title: PCI DSS scope impact for all changes to systems or networks is determined, including
- additions of new systems and new network connections.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements; Requirements 1-12
- controls:
- - id: A3.2.2.1
- title: Upon completion of a change, all relevant PCI DSS requirements are confirmed
- to be implemented on all new or changed systems and networks, and documentation
- is updated as applicable.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements; Requirements 1-12
-
- - id: A3.2.3
- title: Changes to organizational structure result in a formal (internal) review of the impact
- to PCI DSS scope and applicability of controls.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
-
- - id: A3.2.4
- title: If segmentation is used, PCI DSS scope is confirmed.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 11
-
- - id: A3.2.5
- title: A data-discovery methodology is implemented.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements.
- controls:
- - id: A3.2.5.1
- title: Data discovery methods are confirmed.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements.
-
- - id: A3.2.5.2
- title: Response procedures are implemented to be initiated upon the detection of cleartext
- PAN outside the CDE.
- levels:
- - base
- status: manual
-
- - id: A3.2.6
- title: Mechanisms are implemented for detecting and preventing cleartext PAN from leaving
- the CDE via an unauthorized channel, method, or process.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Scope of PCI DSS Requirements, Requirement 12
- controls:
- - id: A3.2.6.1
- title: Response procedures are implemented to be initiated upon the detection of attempts
- to remove cleartext PAN from the CDE via an unauthorized channel, method, or process.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
-
- - id: A3.3
- title: PCI DSS is incorporated into business-as-usual (BAU) activities.
- levels:
- - base
- status: manual
- controls:
- - id: A3.3.1
- title: Failures of critical security control systems are detected, alerted, and addressed
- promptly.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 12
- controls:
- - id: A3.3.1.2
- title: Failures of any critical security control systems are responded to promptly.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirements 1-12
- If you noticed, this requirement should be A3.3.1.1 instead of A3.3.1.2 but it was kept
- this way to be aligned to the policy.
-
- - id: A3.3.2
- title: Hardware and software technologies are reviewed at least once every 12 months to confirm
- whether they continue to meet the organization's PCI DSS requirements.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirements 2, 6, 12.
-
- - id: A3.3.3
- title: Reviews are performed at least once every three months to verify BAU activities are
- being followed.
- description: |-
- Reviews are performed by personnel assigned to the PCI DSS compliance program (as
- identified in A3.1.3).
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirements 1-12.
-
- - id: A3.4
- title: Logical access to the cardholder data environment is controlled and managed.
- levels:
- - base
- status: manual
- controls:
- - id: A3.4.1
- title: User accounts and access privileges to in-scope system components are reviewed at
- least once every six months to ensure user accounts and access privileges remain appropriate
- based on job function, and that all access is authorized.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 7.
-
- - id: A3.5
- title: Suspicious events are identified and responded to.
- levels:
- - base
- status: manual
- controls:
- - id: A3.5.1
- title: A methodology is implemented for the prompt identification of attack patterns and
- undesirable behavior across systems.
- levels:
- - base
- status: manual
- notes: |-
- PCI DSS Reference: Requirement 10, 12.
diff --git a/products/sle16/product.yml b/products/sle16/product.yml
index e1bcd9d0328..c6550fdbd65 100644
--- a/products/sle16/product.yml
+++ b/products/sle16/product.yml
@@ -35,8 +35,6 @@ platform_package_overrides:
reference_uris:
suse-base-sle16: 'not_publicly_available'
- pcidss4_sle16: 'https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf'
- anssi_sle16: 'https://cyber.gouv.fr/sites/default/files/document/linux_configuration-en-v2.pdf'
dconf_gdm_dir: "gdm.d"
diff --git a/products/sle16/profiles/anssi_bp28_minimal.profile b/products/sle16/profiles/anssi_bp28_minimal.profile
index 03ed2faea65..6c5f7e9882d 100644
--- a/products/sle16/profiles/anssi_bp28_minimal.profile
+++ b/products/sle16/profiles/anssi_bp28_minimal.profile
@@ -25,4 +25,4 @@ description: |-
Manual review is required to assess if the installed services are minimal.
selections:
- - anssi_sle16:all:minimal
+ - base_sle16:all:anssi_minimal
diff --git a/products/sle16/profiles/pci-dss-4.profile b/products/sle16/profiles/pci-dss-4.profile
index 3b1a418c6b2..68401528a42 100644
--- a/products/sle16/profiles/pci-dss-4.profile
+++ b/products/sle16/profiles/pci-dss-4.profile
@@ -14,4 +14,4 @@ description: |-
Ensures PCI-DSS v4 security configuration settings are applied.
selections:
- - pcidss_4_sle16:all:base
+ - base_sle16:all:pcidss4
From c3699e90b15150d08b1f14e3e0fbec9b2750231a Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 8 Oct 2025 15:48:12 +0300
Subject: [PATCH 5/9] Fix typo
---
controls/base_sle16.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/controls/base_sle16.yml b/controls/base_sle16.yml
index 32ee529b81d..b9ce21648aa 100644
--- a/controls/base_sle16.yml
+++ b/controls/base_sle16.yml
@@ -40,7 +40,7 @@ controls:
status: automated
- id: SLES-16-16016030
- title: Ensure All Files Are Owned by a Use
+ title: Ensure All Files Are Owned by a User
levels:
- anssi_minimal
rules:
From cba17cba30a2a850f678525e11763f4932dd2dc3 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 8 Oct 2025 15:49:27 +0300
Subject: [PATCH 6/9] Extend definition of installed_OS_is_vendor_supported
with sle16
---
.../installed_OS_is_vendor_supported/oval/shared.xml | 1 +
.../installed_OS_is_vendor_supported/rule.yml | 6 +++---
2 files changed, 4 insertions(+), 3 deletions(-)
diff --git a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/oval/shared.xml b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/oval/shared.xml
index 98cd1fdfbb0..a028877c12a 100644
--- a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/oval/shared.xml
+++ b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/oval/shared.xml
@@ -13,6 +13,7 @@
+
diff --git a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
index 4858543fdf9..1cd04cfd2f6 100644
--- a/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
+++ b/linux_os/guide/system/software/integrity/certified-vendor/installed_OS_is_vendor_supported/rule.yml
@@ -8,7 +8,7 @@ description: |-
{{% if 'ol' in product %}}
Oracle Linux is supported by Oracle Corporation. As the Oracle
Linux vendor, Oracle Corporation is responsible for providing security patches.
-{{% elif product in ["sle12", "sle15", "slmicro5", "slmicro6"] %}}
+{{% elif product in ["sle12", "sle15", "sle16", "slmicro5", "slmicro6"] %}}
SUSE Linux Enterprise is supported by SUSE. As the SUSE Linux Enterprise
vendor, SUSE is responsible for providing security patches.
{{% elif 'almalinux' in product %}}
@@ -39,7 +39,7 @@ identifiers:
cce@sle12: CCE-83001-8
cce@sle15: CCE-83260-0
cce@slmicro5: CCE-93601-3
- cce@slmicro6: CCE-95035-2
+ cce@slmicro6: CCE-95035-2
references:
cis-csc: 18,20,4
@@ -63,7 +63,7 @@ ocil: |-
$ grep -i "red hat" /etc/redhat-release
{{% elif 'ol' in product %}}
$ grep -i "oracle" /etc/oracle-release
-{{% elif product in ["sle12", "sle15", "slmicro5", "slmicro6"] %}}
+{{% elif product in ["sle12", "sle15", "sle16", "slmicro5", "slmicro6"] %}}
$ grep -i "suse" /etc/os-release
{{% elif 'ubuntu' in product %}}
$ grep DISTRIB_DESCRIPTION /etc/lsb-release
From 4ba06ceb69b3c80bca146d45438f787cc7f8af62 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 8 Oct 2025 16:13:55 +0300
Subject: [PATCH 7/9] Fix check for installed OS SLE16
---
shared/checks/oval/installed_OS_is_sle16.xml | 37 +++++++++-----------
1 file changed, 16 insertions(+), 21 deletions(-)
diff --git a/shared/checks/oval/installed_OS_is_sle16.xml b/shared/checks/oval/installed_OS_is_sle16.xml
index 282e64eb0c8..c8a80169785 100644
--- a/shared/checks/oval/installed_OS_is_sle16.xml
+++ b/shared/checks/oval/installed_OS_is_sle16.xml
@@ -6,20 +6,16 @@
multi_platform_all
-
-
- The operating system installed on the system is
- SUSE Linux Enterprise 15.
+
+ The operating system installed on the system is SUSE Linux Enterprise Server 16.
+ test_ref="test_sle16_unix_family" />
-
+
@@ -33,18 +29,7 @@
-
-
-
-
-
- ^16.*$
-
-
- sled-release
-
-
-
+
@@ -52,7 +37,7 @@
^16.*$
- sles-release
+ SLES-release
@@ -66,4 +51,14 @@
SLES_SAP-release
+
+
+
+
+
+ ^16.*$
+
+
+ sle-ha-release
+
From bafded047c36e149a57b81260f85b033db2cdd83 Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 8 Oct 2025 16:15:20 +0300
Subject: [PATCH 8/9] Make product work with installed_OS_is_sle16 check
---
products/sle16/product.yml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/products/sle16/product.yml b/products/sle16/product.yml
index c6550fdbd65..326e1138e52 100644
--- a/products/sle16/product.yml
+++ b/products/sle16/product.yml
@@ -22,8 +22,8 @@ aide_bin_path: "/usr/bin/aide"
cpes_root: "../../shared/applicability"
cpes:
- sle16:
- name: "cpe:/o:suse:sles:16.0"
- title: "SUSE Linux Enterprise Server 16.0"
+ name: "cpe:/o:suse:linux_enterprise_server:16"
+ title: "SUSE Linux Enterprise Server 16"
check_id: installed_OS_is_sle16
platform_package_overrides:
From 852ddb9b7ad9dd53a95236236c2aac7b8f03d95b Mon Sep 17 00:00:00 2001
From: teacup-on-rockingchair
<315160+teacup-on-rockingchair@users.noreply.github.com>
Date: Wed, 8 Oct 2025 16:18:26 +0300
Subject: [PATCH 9/9] Mark controls and profiles as DRAFT for product sle16
---
controls/base_sle16.yml | 2 +-
products/sle16/profiles/anssi_bp28_minimal.profile | 2 +-
products/sle16/profiles/base.profile | 2 +-
products/sle16/profiles/pci-dss-4.profile | 2 +-
4 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/controls/base_sle16.yml b/controls/base_sle16.yml
index b9ce21648aa..88b54bcff2a 100644
--- a/controls/base_sle16.yml
+++ b/controls/base_sle16.yml
@@ -1,6 +1,6 @@
---
policy: Basis System Security Profile for SUSE Linux Enterprise 16
-title: asis System Security Profile SUSE Linux Enterprise 16
+title: DRAFT Basis System Security Profile SUSE Linux Enterprise 16
id: base_sle16
version: '1.0'
source: not_publicly_available
diff --git a/products/sle16/profiles/anssi_bp28_minimal.profile b/products/sle16/profiles/anssi_bp28_minimal.profile
index 6c5f7e9882d..c6a90af08e0 100644
--- a/products/sle16/profiles/anssi_bp28_minimal.profile
+++ b/products/sle16/profiles/anssi_bp28_minimal.profile
@@ -7,7 +7,7 @@ metadata:
- rumch-se
- teacup-on-rockingchair
-title: 'ANSSI-BP-028 (minimal)'
+title: 'DRAFT ANSSI-BP-028 (minimal)'
description: |-
This profile contains configurations that align to ANSSI-BP-028 v2.0 at the minimal hardening level.
diff --git a/products/sle16/profiles/base.profile b/products/sle16/profiles/base.profile
index b1b0d2f46d3..1d6c2bcfd35 100644
--- a/products/sle16/profiles/base.profile
+++ b/products/sle16/profiles/base.profile
@@ -9,7 +9,7 @@ metadata:
reference: not_publicly_available
-title: 'General System Security Profile for SUSE Linux Enterprise (SLES) 16'
+title: 'DRAFT General System Security Profile for SUSE Linux Enterprise (SLES) 16'
description: |-
This profile contains configuration checks that align to the
diff --git a/products/sle16/profiles/pci-dss-4.profile b/products/sle16/profiles/pci-dss-4.profile
index 68401528a42..60342f5fab3 100644
--- a/products/sle16/profiles/pci-dss-4.profile
+++ b/products/sle16/profiles/pci-dss-4.profile
@@ -8,7 +8,7 @@ metadata:
reference: https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf
-title: 'PCI-DSS v4 Control Baseline for SUSE Linux Enterprise 16'
+title: 'DRAFT PCI-DSS v4 Control Baseline for SUSE Linux Enterprise 16'
description: |-
Ensures PCI-DSS v4 security configuration settings are applied.