{"version":"1.0","provider_name":"Shawn&#039;s Blog","provider_url":"https:\/\/terrabytefoundry.com\/blog_s","author_name":"TBF_Shawn","author_url":"https:\/\/terrabytefoundry.com\/blog_s\/author\/tbf_shawn\/","title":"Intro to PCI version 4 Requirement 6 - Shawn&#039;s Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"IoXmJruFHS\"><a href=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/10\/16\/intro-to-version-4-requirement-6\/\">Intro to PCI version 4 Requirement 6<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/10\/16\/intro-to-version-4-requirement-6\/embed\/#?secret=IoXmJruFHS\" width=\"600\" height=\"338\" title=\"&#8220;Intro to PCI version 4 Requirement 6&#8221; &#8212; Shawn&#039;s Blog\" data-secret=\"IoXmJruFHS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/terrabytefoundry.com\/blog_s\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Requirement 6 focuses on application security management.&nbsp; &nbsp;Some of the terminology (i.e. word choice) has changed in this section, but a lot of the focus is in areas that fall in line with the overall v4 changes towards visibility and accountability. Overall Thoughts It feels like the overall vibe of R6 is making sure the &hellip; Continue reading \"\""}