Preview

PCI DSS and the seven domains

Satisfactory Essays
Open Document
Open Document
565 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PCI DSS and the seven domains
IS3110
Unit 2 Assignment PCI DSS and the Seven Domians
Jose J Delgado

PCI DSS and the Seven Domains
YieldMore
YieldMore has a network needing to configure its current configuration and policy to meet PCI DSS standards which can be found at: https://www.pcisecuritystandards.org/security_standards/documents.php?agreements=pcidss&association=pcidss
In order to be in compliance a basic compliance plan has been created to ensure YieldMore and customer data in the reconfiguration will be met. Software and hardware used will be checked to PCI DSS database to ensure compliance. The network plan will be required to meet these minimum requirements before compliance assessment test will be made.
*Note: If third party is to host the payment process and procedure. They will be responsible to uphold the PCI DSS standards, they will be held liable if failure to maintain compliance.

Build and Maintain a Secure Network
Requirement 1: Install and maintain a firewall
-In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.
Requirement 2: Do not use defaults, such as default password
-In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)
Protect Cardholder Data
Requirement 3: Protect stored data
-Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)
Requirement 4: Encrypt transmissions
- SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)
Maintain a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Cisco Unified WAN Services: Services, Security, Resiliency, and Intelligence - Cisco. (n.d.). Retrieved from http://www.cisco.com/en/US/prod/collateral/routers/ps9343/solution_overview_c22-450358_ps9343_Products_White_Paper.html…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Heartland Case Summary

    • 376 Words
    • 2 Pages

    Summary: Heartland is requiring that all merchants comply with PCI-DSS standards, and as part of this effort, have partnered with ControlScan to serve as both the ASV and QSA. Failure to comply with these standards, will lead to a penalty for those business owners not in compliance.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Personal Device Policy

    • 822 Words
    • 4 Pages

    This policy is intended to protect the security and integrity of XYZ Credit Union/Bank’s data and technology infrastructure.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The system must be safe and secure allowing customers to transfer or access information through a security encrypted connection. Allowing data to be safely transferred from one place to another without getting information…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Capstone Test Plan

    • 1638 Words
    • 7 Pages

    This test plan document will describe the testing activities to be conducted as part of the Capstone Healthcare Modernization project at Capstone Healthcare.…

    • 1638 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    systems that underpin them, form the basis of the Cisco Supplier Code of Conduct, which conforms…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This book is designed to provide information about exam topics for the Cisco Certified Network Associate (CCNA) Exam…

    • 116315 Words
    • 466 Pages
    Powerful Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Reseta

    • 1504 Words
    • 7 Pages

    1. Purpose. This Interim Policy Document (IPD) establishes XX Agency (XXA) procedures for managing network security.…

    • 1504 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Access Control List

    • 330 Words
    • 2 Pages

    All network users will be required to be authorized. This will be established by use of password and access restriction levels.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    E-Retailing

    • 354 Words
    • 2 Pages

    When ready to complete the sale, the customer proceeds to the checkout. At this time, the customer enters personal and financial data through a secure Internet connection. The transaction and financial data automatically are verified at a banking Web site. If the bank approves the transaction, the customer receives an online confirmation notice of the purchase.…

    • 354 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    11231

    • 551 Words
    • 3 Pages

    6. Refer to the exhibit. Beginning with HR servers and workstations, a network engineer is designing a new security structure for the network. Which set of policies adheres to the hierarchical network model design principles?…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    I-Factor Testimony Bureau

    • 2920 Words
    • 12 Pages

    This project helps to maintain the details of the clients, banks and transaction details in full fledged security. Unauthorized persons cannot access the data. The transactions are kept online, so that there is fast completion of the transaction process available…

    • 2920 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays