ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

"Fundamentals of PCI-DSS" Course Preview: Requirement #3 (Protect Stored Data)

Автор: Vasco Patricio | Negotiation & Communication Coach

Загружено: 2021-11-14

Просмотров: 1271

Описание: 🎓 FULL "3-in-1 Fraud Prevention, Dispute Resolution, PCI-DSS Masterclass" Course 🎓
https://bit.ly/fraud-dispute-course
Including:
✅ 11.5 hours of video
✅ 112 lessons (with PDF slides + quizzes)
✅ Instructor support with Vasco via message

🎥 ALL Preview Lessons on YouTube (Single Playlist) 🎥
https://bit.ly/pcidss-yt

------
Video transcript (possibly truncated due to char. limit):

Let's talk about Requirement #3, "Protect
Stored Data".

It's not just about data security in your
database - although it also is about data

security! - with strong encryption, key management,
key lifecycle, and so on -

but it includes other topics, such as, for
example, not storing data that you don't need

to store in the first place, or purging data
that you don't need anymore or, for example,

never, ever storing Sensitive Authentication
Data (SAD).

But there are other topics that we must comply
with.

Let's take a look.

Requirement #3, with the official name of,
"Protect stored Cardholder Data", is very

straightforward, and it's all about making
sure that your stored Cardholder Data is properly

protected.

It's about both making sure that the encryption
used is strong by nature, but that it's also

properly managed itself.

For example, with proper key management and
key lifecycle.

It's also about protecting the Personal Account
Number (PAN) stored.

Remember, stored data are not just digital
data.

They're also receipts on paper, logs on paper,
or any other medium that contains Cardholder

Data (CHD).

Sub-requirements of Requirement #3 include:
First, limiting the storage and retention

of card data to the essential.

The most secure way to store data is to never
have to store it in the first place!

Then, not storing Sensitive Authentication
Data (SAD) - such as the CVV number, or the

PIN.

Period.

Then, 3.3, is about masking stored Personal
Account Numbers (PANs).

Usually, you can show the first 6 digits - also
known as the BIN number, or Bank Identification

Number, because these are related to the bank
that issued that card - as well as the last

4.

Everything else in the middle, that's hidden,
is the unique part.

If you've ever obtained a receipt, for example,
at a restaurant, and the credit card number

is shown, but you just see a lot of asterisks
in the middle, and you see the first 6 digits

and the last 4, this is PCI-DSS at play.

Then, 3.4 is rendering the Personal Account
Numbers (PANs) unreadable on all communication

channels.

Encrypting it, masking it, etc.

Just making sure that, if an attacker intercepts
your communication, they can't read the numbers.

3.5 is about procedures for key protection.

The keys used to encrypt the card data.

And 3.6 is about procedures to manage those
keys.

The cryptoperiod, having a key custodian,
maybe split knowledge, and so on.

And finally, 3.7 is the customary "document
and enforce" all of these policies and procedures.

So, all of these points must not be done informally,
but instead with written-down policies, that

are put into practice.

So, first comes requirement 3.1.

Cardholder Data (CHD) must be limited in terms
of what is stored and what is retained.

And note that this process covers both logical
and physical Cardholder Data (CHD).

So both databases, but also paper receipts
or copies that contain card numbers.

And it also covers for how long it may be
kept, and how it's disposed of.

So, first, you need a data retention policy.

What data are kept, and for how long.

And this must be what happens in reality.

It's not worth it to have a policy that says
you store numbers for 30 days, if in practice,

they are in the database for years, which
is why you also need to clarify how the deletion

is done.

So printed data can be shredded or burned,
and digital data, such as hard drives, can

be securely deleted by zeroing out the deleted
data - or in the case of physical destruction,

they can be demagnetized, shredded or others.

But the key here is: Use common sense.

Have a procedure

And this policy must be frequently reviewed,
at least quarterly.

As with many other things, this is because
technology changes, your infrastructure changes,

and your data retention policy needs to keep
up with those.

3.2 is very simple: No storing Sensitive Authentication
Data (SAD).

Period.

Remember.

What's usually on the back of the card, such
as the CVV code, or the magnetic track, or

the PIN number, should never be stored.

It's not needed.

It can be transmitted, naturally, but it is
immediately deleted afterwards.

You will notice that with a retailer, like
Amazon, when you add your credit card number,

it asks you for the number and expiration
date.

But it doesn't ask you for the CVV.

And then, when you go to pay, it asks you
for the CVV, in real time.

Unlike the rest of the data, Sensitive Authentication
Data (SAD) are never stored.

Just used in the moment.

But now here's the key: You can't just say
that you don't store it.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
"Fundamentals of PCI-DSS" Course Preview: Requirement #3 (Protect Stored Data)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

"Fundamentals of PCI-DSS" Course Preview: Requirement #5 (No Malware)

"Fundamentals of PCI-DSS" Course Preview: Overview of the 12 Requirements

[Intro] Open for Business: Why Metadata Holds the Keys

[Intro] Open for Business: Why Metadata Holds the Keys

"Fundamentals of PCI-DSS" Course Preview: Requirement #6 (Develop Securely)

Удаляем свои фото, выходим из чатов, скрываем фамилию? Как избежать штрафов

Удаляем свои фото, выходим из чатов, скрываем фамилию? Как избежать штрафов

Popular Programming Courses

Popular Programming Courses

Emerging PCI DSS 4.0 Requirements: Solutions to 6.4.3 and 11.6.1 | SecurityMetrics Podcast 81

Emerging PCI DSS 4.0 Requirements: Solutions to 6.4.3 and 11.6.1 | SecurityMetrics Podcast 81

What is SQL? [in 4 minutes for beginners]

What is SQL? [in 4 minutes for beginners]

3-In-1 Fraud Prevention, Dispute Resolution, PCI-DSS Masterclass Preview: Promotional Video

3-In-1 Fraud Prevention, Dispute Resolution, PCI-DSS Masterclass Preview: Promotional Video

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Сложность пароля — это ложь. Вот что на самом деле защищает вас

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

How Much Does PCI DSS Analyst Make?

How Much Does PCI DSS Analyst Make?

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Екатерина Шульман: что ожидает режимы в Венесуэле и Иране?

Екатерина Шульман: что ожидает режимы в Венесуэле и Иране?

Превратите ЛЮБОЙ файл в знания LLM за СЕКУНДЫ

Превратите ЛЮБОЙ файл в знания LLM за СЕКУНДЫ

Что такое аппаратные модули безопасности (HSM), зачем они нужны и как они работают.

Что такое аппаратные модули безопасности (HSM), зачем они нужны и как они работают.

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

Откуда в ядерном реакторе появляется плутоний

Откуда в ядерном реакторе появляется плутоний

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]