Vulnerability Management
The intent of this activity set is to help organizations develop requirements regarding the application and network security scanning and penetration tests offered by external security vendors. While there are a number of ways to participate in vulnerability scanning, some businesses are forced into it simply due to PCI DSS requirements. PCI DSS requires payment processors to verify their customer locations and help ensure the security of credit card transactions. Other forms of vulnerability management include monitoring hardware and software for vulnerability disclosures and patching accordingly.
Category | Sub-Category | Name | Activity |
---|---|---|---|
Vulnerability Management | Production Scanning | Vulnerability Scans | [The organization] conducts vulnerability scans against the production environment; scan tools are updated prior to running scans. |
Vulnerability Management | Production | Vulnerability | Vulnerability scans are conducted against cardholder environments [in accordance with the organization-defined frequency] or after significant change; critical vulnerability resolution is confirmed via a rescan. |
Vulnerability Management | Production Scanning | Approved Scanning Vendor | [In accordance with the organization-defined frequency], [the organization] engages an Approved Scanning Vendor to conduct external vulnerability scans. |
Vulnerability Management | Penetration Testing | Application Penetration Testing | [The organization] conducts penetration tests according to the service risk rating assignment. |
Vulnerability Management | Penetration Testing | Penetration | [The organization] conducts penetration tests against cardholder data environments |
Vulnerability Management | Patch | Infrastructure | [The organization] installs security-relevant patches, including software or firmware updates; identified end-of-life software must have a documented decommission plan in place before the software is removed from the environment. |
Vulnerability Management | Malware Protection | Enterprise Antivirus | If applicable, [the organization] has managed enterprise antivirus deployments and ensures the following: |
Vulnerability Management | Malware Protection | Enterprise Antivirus Tampering | Antivirus mechanisms cannot be disabled or altered by users unless specifically authorized by management. |
Vulnerability Management | Code Security | Code Security Check | [In accordance with the organization-defined frequency], [the organization] conducts source code checks for vulnerabilities according to the service risk rating assignment. |
Vulnerability Management | Code Security | Code Security Check: | Where applicable, security testing performed prior to releasing code into production includes the following: |
Vulnerability Management | External Advisories and Inquiries | External Information Security Inquiries | [The organization] reviews information-security-related inquiries, complaints, and disputes. |
Vulnerability Management | External Advisories and Inquiries | External Alerts and Advisories | [The organization] reviews alerts and advisories from management approved security forums and communicates verified threats to authorized personnel. |
Vulnerability Management | Program Management | Vulnerability Remediation | [The organization] assigns a |