Skip to content
SectonaSectona
Menu
  • Platform
    • 1
    • Sectona Security Platform

      Explore Platform

    • 28679
    • CORE

      Continuous Discovery

      Password Management

      Secure Remote Access

      Session Recording and Threat Analytics

      Multi-Factor Authentication

      Just-in-time Access

      Privileged Task Management

      Account Lifecycle Management

    • ADVANCED

      Windows Privilege Management

      Privileged Access Governance

      DevOps Secrets Management

      Releasing Soon
  • Solutions
    • 2
    • Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28680
    • BY USE-CASES

      Secure remote privileged access

      Remove administrator rights

      Secure cloud environments

      Automate entitlement reviews

      Simplify privileged account lifecyle

      BY INITIATIVE

      PCI-DSS Compliance

      ISO 27002

      SWIFT Security Framework

      Documentation Downloads Try Free Edition
  • Resources
    • 3
    • Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28633
    • RESOURCES

      Datasheets

      Solution Briefs

      Whitepapers

      Case Studies

      Toolkits

      View all resources

    • LEARN

      Key Concepts

      Technology Blog

      Product Updates

      Documentation

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Services
    • 4
    • FROM THE BLOG

      Sectona Recognized By KuppingerCole As A Maturing Challenger
      Read More
    • 28634
    • TRAINING & SERVICE Professional Services Get the help you need to succeed with your privileged access management project.Explore
      Training & Certification Access learning and trainings options to improve the success of Sectona platform.Explore
    • GET SUPPORT

      Email us

      Create a case

      Customer Success

      Download Resources

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Company
    • 5
    • COMPANY

      About us

      Leadership team

      Contact us

      Branding

    • 28635
    • PARTNER

      Find a partner

      Become a partner

      Register a Deal

    • CAREERS

      Join the team

      Explore career opportunities

    • Become a Partner

      The Sectona Technology Partner Program empowers you to deliver strategic value to your customers.

      Become a Partner
CLOSE
Contact Sales Request Demo
Sectona

Find out PCI-DSS requirements specific to privileged access

Explore how Sectona platform can help you address PCI-DSS requirements​

Request Demo

The Payment Card Industry Data Security Standard (PCI-DSS) is a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. The standard specifically mandates protecting the cardholder data environment by taking preventive measures to secure privileged account access and passwords.

Sectona helps you achieve compliance with this standard by delivering and ensuring administrative access to your cardholder data environment is controlled, secured, and monitored. It further helps add value by providing rich analytics to improve visibility around user access to your cardholder data environment. Enterprises must be compliant with the PCI-DSS v3.2.1 around clauses of privileged access as highlighted below:

Requirement 2

Do not use vendor-supplied defaults for system passwords and other security parameters

2.1, 2.3, 2.6

Requirement 7

Restrict access to cardholder data by business need to know


7.1, 7.2, 7.3

Requirement 8

Identify and authenticate access to system components


8.1, 8.2, 8.3, 8.5, 8.8

Requirement 10

Track and monitor all access to network resources and cardholder data

10.1, 10.2, 10.3, 10.5, 10.7, 10.9

Explore how Sectona helps you achieve compliance with PCI-DSS​

Sectona privileged access management solution addresses the PCI-DSS standard requirements in and around clauses related to privileged or administrative account access. It also provides pre-defined and customizable reports out of the box that can help you provide evidence to prove compliance with PCI requirements.
  • Addressing Requirement 2 Automate Password Management

    Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

  • Addressing Requirement 7 Defining Need-Based Access

    Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

  • Addressing Requirement 8 Authorized Access Provision with Built-in Multi Factor Authentication

    Leverage deep integration with Active Directory for faster provisioning and de-provisioning of access. Control third-party vendor access by defining hybrid access mechanisms. Configure customizable MFA options to enforce second level of authentication for users.

  • Addressing Requirement 10 Risk-Based Session Monitoring

    Capture comprehensive logs of all critical sessions in both command and video format. Logs are stored in an encrypted format and provide auditable insights accessible only to authorized personnel.

PCI-DSS
PCI DSS Requirement 7
PCI DSS Requirement 8
PCI DSS Requirement 10
Addressing Requirement 2 Automate Password Management

Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts.

PCI DSS Requirement 2
Addressing Requirement 7 Defining Need-Based Access

Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.

PCI DSS Requirement 7
Addressing Requirement 8 Authorized Access Provision with Built-in Multi Factor Authentication

Leverage deep integration with Active Directory for faster provisioning and de-provisioning of access. Control third-party vendor access by defining hybrid access mechanisms. Configure customizable MFA options to enforce second level of authentication for users.

PCI DSS Requirement 8
Addressing Requirement 10 Risk-Based Session Monitoring

Capture comprehensive logs of all critical sessions in both command and video format. Logs are stored in an encrypted format and provide auditable insights accessible only to authorized personnel.

PCI DSS Requirement 10

Explore Platform right arrow blue

GartnerPeerInsightsLogo onlight

"Well rounded & integrated PAM suite with easy adaptability to support critical user access across AWS resources"

Read Review
"The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates"

Trusted by

06 Pidilite
05 Sidbi
03 Ajman

Next Steps

Explore use-cases aligned with your privileged access requirements

See It In Action

Explore


  • About
  • Join the team
  • Careers We're Hiring
  • Contact Us
  • Platform
  • Partners
  • Documentation

Resources


  • Sectona Blog
  • Key ConceptsNew
  • Datasheets
  • Solution Briefs
  • Whitepapers
  • Case Studies

Capabilities


  • Continuous Discovery
  • Password Management
  • Secure Remote Access
  • Session Recording and Threat Analytics
  • Mutli-Factor Authentication
  • Just-in-time Access
  • Privileged Task Management
  • Account Lifecycle Management

Solutions


  • Secure remote privileged access
  • Remove administrator rights
  • Secure cloud environments
  • Automate entitlement reviews
  • Simplify privileged account lifecyle
Facebook Twitter Linkedin

© 2021 Sectona Technologies Pvt Ltd. All Rights Reserved. All Trademarks held by their respective owners.

PRIVACY POLICY | TERMS | EULA | RESPONSIBLE DISCLOSURE

Scroll to top
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI-DSS Compliance
    • ISO 27002
    • SWIFT Security Framework
  • Resources
    • Blog
    • Key Concept
    • Resources
    • Knowledge Base
  • Services
    • Professional Services
    • Training & Certifications
  • Company
    • About Us
    • Contact Us
    • Branding
  • Partner
    • Find a Partner
    • Become a Partner
    • Register a Deal
  • Careers
    • Join the team
    • Explore Career Opportunities
  • Explore
    • Documentation
    • Downloads
    • Try Free Edition
    • Security Platform