{"id":25197,"date":"2020-06-27T07:54:20","date_gmt":"2020-06-27T07:54:20","guid":{"rendered":"http:\/\/35.232.100.111\/?page_id=25197"},"modified":"2022-12-28T09:37:25","modified_gmt":"2022-12-28T09:37:25","slug":"pci-dss-compliance","status":"publish","type":"page","link":"https:\/\/sectona.com\/pci-dss-compliance\/","title":{"rendered":"PCI DSS Compliance Pertaining to Privileged Access"},"content":{"rendered":"\t\t
Explore how Sectona platform can help you address PCI DSS requirements\u200b<\/p>\r\n
Request Demo<\/a><\/p><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Sectona helps you achieve compliance with this standard by delivering and ensuring administrative access to your cardholder data environment is controlled, secured, and monitored. It further helps add value by providing rich analytics to improve visibility around user access to your cardholder data environment. Enterprises must be compliant with the PCI-DSS v3.2.1 around clauses of privileged access as highlighted below:<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Do not use vendor-supplied defaults for system passwords and other security parameters Restrict access to cardholder data by business need to know Identify and authenticate access to system components Track and monitor all access to network resources and cardholder data Manage and Inventorize privileged accounts across infrastructure. Leverage strong password change capabilities from discovery, onboarding to rotation for all vendor supplied default accounts. <\/p><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t Configure access policy definitions based on user roles & functions. Define access to critical data and enforce restrictions on a need-to-know, need-to-access basis with strong workflow based access.<\/p><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t Leverage deep integration with Active Directory for faster provisioning and de-provisioning of access. Control third-party vendor access by defining hybrid access mechanisms. Configure customizable MFA options to enforce second level of authentication for users. <\/p><\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t Capture comprehensive logs of all critical sessions in both command and video format. Logs are stored in an encrypted format and provide auditable insights accessible only to authorized personnel.<\/p> <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\tRequirement 2<\/h2>\n\t\t\t\t\t\t\t
\n2.1, 2.3, 2.6 <\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tRequirement 7<\/h2>\n\t\t\t\t\t\t\t
\n7.1, 7.2, 7.3<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tRequirement 8<\/h2>\n\t\t\t\t\t\t\t
\n8.1, 8.2, 8.3, 8.5, 8.8\n<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tRequirement 10<\/h2>\n\t\t\t\t\t\t\t
\n10.1, 10.2, 10.3, 10.5, 10.7, 10.9\n<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tExplore How Sectona Helps You achieve Compliance with PCI DSS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t