pci_compliance
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pci_compliance [2013/12/05 11:57 (11 years ago)] – cromo | pci_compliance [2022/04/12 10:52 (2 years ago)] (current) – anemenzo | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== PCI Support Training | + | See: https:// |
- | //Windward Software Inc// | + | |
+ | ====== PCI ====== | ||
===== What is the difference between PCI Compliance and PA-DSS Validation? ===== | ===== What is the difference between PCI Compliance and PA-DSS Validation? ===== | ||
Line 17: | Line 18: | ||
===== The 12 Requirements of the PCI DSS ===== | ===== The 12 Requirements of the PCI DSS ===== | ||
- | Outlined below are the 12 requirements for the PCI DSS. For more info, click this [[https:// | + | Outlined below are the 12 requirements for the PCI DSS. For more details, refer to this [[https:// |
^ Build and Maintain a Secure Network ^ | ^ Build and Maintain a Secure Network ^ | ||
Line 65: | Line 66: | ||
* Also user passwords must be encrypted. | * Also user passwords must be encrypted. | ||
- | {{wiki: | + | {{ : |
+ | //Note: The chip contains track equivalent data as well as other sensitive data, including the Integrated Circuit (IC) Chip Card Verification Value (also referred to Chip CVC, iCVV, CAV3 or iCSC).// \\ | ||
+ | source: [[https:// | ||
| | ||
Line 163: | Line 166: | ||
* Debug logging must never log cardholder data or sensitive information. | * Debug logging must never log cardholder data or sensitive information. | ||
* Debug logging should not be employed in a production environment. | * Debug logging should not be employed in a production environment. | ||
+ | |||
+ | ===== Links: ===== | ||
+ | |||
+ | * [[https:// |
pci_compliance.1386273424.txt.gz · Last modified: 2013/12/05 11:57 (11 years ago) by cromo