{"id":47,"date":"2022-09-11T21:40:47","date_gmt":"2022-09-12T02:40:47","guid":{"rendered":"https:\/\/terrabytefoundry.com\/blog_s\/?p=47"},"modified":"2022-09-11T21:43:03","modified_gmt":"2022-09-12T02:43:03","slug":"intro-to-pci-version-4-requirement-1","status":"publish","type":"post","link":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/","title":{"rendered":"Intro to PCI version 4: Requirement 1"},"content":{"rendered":"\n<p>Our previous discussion touched on the (very) high level aspects of what makes version 4 of the PCI DSS different than its predecessors, so now we are in a better position to dive into some of the details.&nbsp; To this we are going to look at each requirement individually.&nbsp; This week we are going to start at the beginning \u2013 Requirement 1. As we work through the differences, let me apologize in advance for how dry the content is going to be as you work through it.&nbsp; I really wanted to make it lighthearted and fun.&nbsp; I decided that the information regarding the changes was too important, and I didn\u2019t want anyone to miss something.&nbsp; I will write something clever (someday) to make up for this (and the next 11 or so blogs in this series)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Overall Thoughts<\/h2>\n\n\n\n<p>Keeping with the general direction of the maturation of PCI with version 4, Requirement 1 is all about expanding the language to be more encompassing of changing technologies and assuring management takes ownership of the program.&nbsp; One of the common shortcomings within security programs is figuring out who will own each aspect of the program.&nbsp; The more complicated the environment, the more complicated the organization structure, and the number of security standards effecting the company all play into a (sometimes) overwhelming jumble of chaos that requires numerous specializations among the staff (PCI, HIPAA, SOX, FedRamp, GDPR, etc.)&nbsp; Not wanting to get lost in the shuffle, PCI is making a point (that you will see mentioned in every post in this series) regarding not losing site of the importance of protecting consumers and their cardholder data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s New for Req 1 in v4<\/h2>\n\n\n\n<p>The only net new item in version 4 for requirement 1 is the new 1.1.2, which states \u201cRoles and responsibilities for performing activities in Requirement 1 are documented, assigned, and understood.\u201d&nbsp; This goes back to what I was mentioning in the previous paragraph.&nbsp; A formal document stating who is \u201cresponsible\u201d.&nbsp; An interesting note though about how this is worded.&nbsp; It doesn\u2019t say to document who is responsible for requirement 1, but rather \u201cfor performing activities\u201d are \u201cdocumented, assigned, and understood\u201d.&nbsp; In short, for each requirement in section 1 of the PCI DSS you have to list who is responsible for actually doing the work, confirm it has been assigned to someone, and they have to demonstrate understanding of the processes, as the apply to PCI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Changes to the existing controls&nbsp;<\/h2>\n\n\n\n<p>A decent number of items have been changed between v3.2.1 and v4.&nbsp; To keep track of them all, I am going to bullet them out for you and give a (very) brief note on them.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1 (in general) \u2013 Evolving Requirement \u2013 Changing the terms \u201crouters\u201d and \u201cfirewalls\u201d for a more open \u201cnetwork security controls\u201d.&nbsp; This is done to allow for an expansion of acceptable technologies that do the work normally associated with firewalls and traditional networking equipment.&nbsp; It also opens the door for some outside the box solutions, for those wanting to use the customized approach for any areas.<\/li><li>1.1.5 \u2013 Evolving Requirement \u2013 Now will be covered under 1.1.2<\/li><li>1.1 \u2013 Clarification\/guidance \u2013 Now will be 1.2.1 and focus on defining and maintaining configuration standards.<\/li><li>1.1.1 \u2013 Clarification\/guidance \u2013 Now 1.2.2 and has additional clarification that change control documentation in Req 1 must match those of Req 6 (6.5.1 specifically)<\/li><li>1.1.4 \u2013 Clarification\/ guidance \u2013 Removed, as the SSC deemed it redundant.<\/li><li>1.1.6 \u2013 Clarification\/ guidance \u2013 Split into two separate requirements (1.2.5 and 1.2.6) to allow for specific intent of each to be clearer.<\/li><li>1.1.7 \u2013 Clarification\/ guidance \u2013 Is now 1.2.7 and adds more specific language around requirement to review configuration files every 6 months.&nbsp; (NOTE \u2013 Do NOT read this to be twice a year, but actually every 6 months.)<\/li><li>1.2 \u2013 Structure \/ Format \u2013 Removed.&nbsp; The SSC felt this was covered in other areas and no longer needed.<\/li><li>1.2.2 \u2013 Clarification \/ guidance \u2013 Renumbered to 1.2.8.&nbsp; Additional clarification on intent of securing configuration files.<\/li><li>1.2.1 \u2013 Clarification \/ guidance \u2013 Split into 1.3.1 and 1.3.2 to provide clarity around the intent.<\/li><li>1.2.3 \u2013 Clarification \/ guidance \u2013 Changed to 1.3.3 and provides additional details on the intent behind security controls between the CDE and wireless networks.<\/li><li>1.3 \u2013 Clarification \/ guidance \u2013 Renumbered to 1.4.1 to add specifics on the need for security between \u201ctrusted\u201d and \u201cUntrusted\u201d networks.<\/li><li>1.3.1\/1.3.2\/1.3.5 \u2013 Clarification \/ guidance \u2013 Combined these three previous requirements to provide a focused intent on restricting \u2018inbound\u2019 traffic from untrusted networks.<\/li><li>1.3.4 \u2013 Clarification \/ guidance \u2013 Removed.&nbsp; SSC also felt this one was redundant.<\/li><li>1.3.6 \u2013 Clarification \/ guidance \u2013 Is now 1.4.4 to provide clarity around security that prevents direct access to cardholder data stores from untrusted networks.<\/li><li>1.4 \u2013 Clarification \/ guidance \u2013 Now listed in the DSS as 1.5.1 and provides clarity for securing devices that connect to both the CDE and any untrusted networks.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Whew!&nbsp; If you are still with me, then congratulations.&nbsp; You have shown a dedication to IT security, specifically PCI security that makes you a true leader in your environment.&nbsp; I don\u2019t currently have a fancy plaque to present to you but know that I am proud of you.&nbsp; Now, as I stated at the start of our road through requirement 1, it was going to be dry and full of bullets.&nbsp; I feel like I delivered as promised (sorry).&nbsp; As PCI continues to mature and adapt to the ever-changing threat landscape, we will continue to discuss it and make sure you have a base understanding of the changes.<\/p>\n\n\n\n<p>As always, if you have additional questions or feel the need to discuss payment card security (or data privacy or any other IT security\/risk\/privacy topic) feel free to reach out to us to continue the conversation.&nbsp; If you already have a trusted consultant, good for you on finding someone that you can rely on for counsel.&nbsp; Either way, make sure you are having conversations to build a better understanding of the changes happening that will have an impact on your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">~ Shawn<\/h2>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our previous discussion touched on the (very) high level aspects of what makes version 4 of the PCI DSS different than its predecessors, so now we are in a better position to dive into some of the details.&nbsp; To this we are going to look at each requirement individually.&nbsp; This week we are going to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Intro to PCI version 4: Requirement 1&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,5,7,6],"tags":[16,18],"class_list":["post-47","post","type-post","status-publish","format-standard","hentry","category-assurance","category-pci","category-shawn","category-version-4","tag-pci","tag-shawn"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Our previous discussion touched on the (very) high level aspects of what makes version 4 of the PCI DSS different than its predecessors, so now we are in a better position to dive into some of the details.&nbsp; To this we are going to look at each requirement individually.&nbsp; This week we are going to &hellip; Continue reading &quot;Intro to PCI version 4: Requirement 1&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Shawn&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-12T02:40:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T02:43:03+00:00\" \/>\n<meta name=\"author\" content=\"TBF_Shawn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TBF_Shawn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/\"},\"author\":{\"name\":\"TBF_Shawn\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\"},\"headline\":\"Intro to PCI version 4: Requirement 1\",\"datePublished\":\"2022-09-12T02:40:47+00:00\",\"dateModified\":\"2022-09-12T02:43:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/\"},\"wordCount\":970,\"keywords\":[\"PCI\",\"Shawn\"],\"articleSection\":[\"Assurance\",\"PCI\",\"Shawn\",\"version 4\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/\",\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/\",\"name\":\"Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#website\"},\"datePublished\":\"2022-09-12T02:40:47+00:00\",\"dateModified\":\"2022-09-12T02:43:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/11\\\/intro-to-pci-version-4-requirement-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intro to PCI version 4: Requirement 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#website\",\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/\",\"name\":\"Shawn&#039;s Blog\",\"description\":\"Shawn&#039;s Thoughts and Ramblings\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\",\"name\":\"TBF_Shawn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"caption\":\"TBF_Shawn\"},\"sameAs\":[\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\"],\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/author\\\/tbf_shawn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/","og_locale":"en_US","og_type":"article","og_title":"Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog","og_description":"Our previous discussion touched on the (very) high level aspects of what makes version 4 of the PCI DSS different than its predecessors, so now we are in a better position to dive into some of the details.&nbsp; To this we are going to look at each requirement individually.&nbsp; This week we are going to &hellip; Continue reading \"Intro to PCI version 4: Requirement 1\"","og_url":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/","og_site_name":"Shawn&#039;s Blog","article_published_time":"2022-09-12T02:40:47+00:00","article_modified_time":"2022-09-12T02:43:03+00:00","author":"TBF_Shawn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TBF_Shawn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/#article","isPartOf":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/"},"author":{"name":"TBF_Shawn","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4"},"headline":"Intro to PCI version 4: Requirement 1","datePublished":"2022-09-12T02:40:47+00:00","dateModified":"2022-09-12T02:43:03+00:00","mainEntityOfPage":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/"},"wordCount":970,"keywords":["PCI","Shawn"],"articleSection":["Assurance","PCI","Shawn","version 4"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/","url":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/","name":"Intro to PCI version 4: Requirement 1 - Shawn&#039;s Blog","isPartOf":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/#website"},"datePublished":"2022-09-12T02:40:47+00:00","dateModified":"2022-09-12T02:43:03+00:00","author":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4"},"breadcrumb":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/11\/intro-to-pci-version-4-requirement-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/terrabytefoundry.com\/blog_s\/"},{"@type":"ListItem","position":2,"name":"Intro to PCI version 4: Requirement 1"}]},{"@type":"WebSite","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#website","url":"https:\/\/terrabytefoundry.com\/blog_s\/","name":"Shawn&#039;s Blog","description":"Shawn&#039;s Thoughts and Ramblings","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/terrabytefoundry.com\/blog_s\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4","name":"TBF_Shawn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","caption":"TBF_Shawn"},"sameAs":["https:\/\/terrabytefoundry.com\/blog_s"],"url":"https:\/\/terrabytefoundry.com\/blog_s\/author\/tbf_shawn\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/47","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":3,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/47\/revisions"}],"predecessor-version":[{"id":50,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/47\/revisions\/50"}],"wp:attachment":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/media?parent=47"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/categories?post=47"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/tags?post=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}