{"id":55,"date":"2022-09-18T23:59:00","date_gmt":"2022-09-19T04:59:00","guid":{"rendered":"https:\/\/terrabytefoundry.com\/blog_s\/?p=55"},"modified":"2022-09-17T15:05:19","modified_gmt":"2022-09-17T20:05:19","slug":"intro-to-pci-version-4-requirement-2","status":"publish","type":"post","link":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/","title":{"rendered":"Intro to PCI version 4: Requirement 2"},"content":{"rendered":"\n<p>As you noticed during our discussion around the updates to requirement 1 (and if you didn\u2019t go read that blog post), the content is pretty dry, but I try to present it in a way that is at least easy to consume and use.&nbsp; That won\u2019t change throughout the rest of the requirements, not even requirement 2 \u2013 the \u201ccommon sense\u201d requirement (as I like to call it.)&nbsp; The reason I refer to it in that way is simple \u2013 If you just do things based on what just makes sense, you have achieved most of the needs for compliance in this one.&nbsp; If you want to hear my thoughts on that, feel free to reach out directly for a conversation on the topic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Overall Thoughts<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">As we discussed in our PCI discussion there is a major shift on ownership of the PCI program.&nbsp; If you don\u2019t dig too deeply it feels like the only motivation is to just shine a light on PCI and prevent it from being forgotten in the overall security stance of the company, and I admit I do think that is part of it.&nbsp; I also think that the council is motivated by making sure the process owners are acknowledged within the organization, so they have the internal credibility and awareness of their position to act in a way that helps them be almost as agile as the threat landscape they are facing.&nbsp; In IT security the defenders are mostly in a reactive mode, giving an edge to the attackers, so the shorter the reaction window is the less the impact.&nbsp; Requirement 2 is designed around the idea that we reduce risk and increase the window allowed for reaction from the start, or introduction of items to the environment to begin with.&nbsp; With that focus in the overhaul of Requirement 2, the updates will provide clarification on how the environmental elements are expanded and managed during the introduction period.<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s New for Req 2 in v4<\/h2>\n\n\n\n<p>The only net new item in version 4 for requirement 2 is the new 2.1.2, which states \u201cRoles and responsibilities for performing activities in Requirement 2 are documented, assigned, and understood.\u201d If the previous sentence feels like I just took the same sentence from the post on requirement 1 and changed the 1 to a 2, good job remembering what we discussed in the previous blog post.&nbsp; You truly might be my biggest fan!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Changes to the existing controls&nbsp;<\/h2>\n\n\n\n<p>As in our previous post dedicated to a specific section of the DSS,  I am going to bullet them out for you and give a (very) brief note on them.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>2 (in general) \u2013 Clarification\/Guidance \u2013 Updated principal requirement title to reflect that the focus is on secure configurations in general, and not just on vendor-supplied defaults.<\/li><li>2.1 &#8211; Clarification\/Guidance \u2013 Now will be 2.2.2 where the SSC wants to clarify the intent is to understand whether vendor default accounts are in use and to manage them accordingly.<\/li><li>2.2.1 &#8211; Clarification\/Guidance \u2013 Updated as 2.2.3, adds details to the intent of the requirement for managing primary functions that require different security levels.<\/li><li>2.2.2 \u2013 Structure\/format \u2013 Combined with 2.2.5, to now be 2.2.4 as a combination of what the council feels to be \u201csimilar topics\u201d<\/li><li>2.2.3 &#8211; Clarification\/Guidance \u2013 Renumbered to 2.2.5 and added details on the intent of the requirement is if any insecure services, protocols, or daemons are present.<\/li><li>2.1.1 \u2013 Clarification\/Guidance \u2013 Split into two separate controls (2.3.1 \/ 2.3.2) to provide focus on different aspects of assessment on wireless vendor default settings.<\/li><li>2.4 \u2013 Structure\/Format \u2013 Removed from requirement 2 and now part of requirement 12 (12.5.1)<\/li><li>2.6 \u2013 Structure\/Format \u2013 Removed from RoC\/SAQ assessments.&nbsp; The council felt it was covered under other areas and no longer needed to be a standalone part of the assessment process.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Well, this week we had less to talk about, due to the nature and length of requirement 2 in general.&nbsp; Don\u2019t let the limited number of requirements in this section of the DSS lull you into a sense of complacency.&nbsp; Reduction of risk through removing it prior to its introduction of your environment is an important step for all.&nbsp; The reason I refer to requirement 2 as the \u201ccommon sense\u201d requirement, yes even when talking to my clients, is because you must be pretty na\u00efve and brand new to the IT world to think that putting devices on the network without going through some hardening process.&nbsp; As with most, if not all, items in the PCI Digital Security Standards, if it is included \u2013 someone wasn\u2019t doing it.<\/p>\n\n\n\n<p>When reading through the bulleted list you may have noticed that I didn\u2019t go too deep into the changes and kept it as a high-level description on the type of change more than the actual change.&nbsp; In order to not publish a book weekly I am choosing to provide some general information, so you know how to frame the conversation with your internal subject matter experts and\/or your third-party experts.&nbsp; I don\u2019t want to provide detailed specifics without knowing your environment.&nbsp; Even leaning in that direction would be irresponsible of me, in my opinion.<\/p>\n\n\n\n<p>As always, if you have additional questions or feel the need to discuss payment card security (or data privacy or any other IT security\/risk\/privacy topic) feel free to reach out to us to continue the conversation.&nbsp; If you already have a trusted consultant, good for you on finding someone that you can rely on for counsel.&nbsp; Either way, make sure you are having conversations to build a better understanding of the changes happening that will have an impact on your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">~ Shawn<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>As you noticed during our discussion around the updates to requirement 1 (and if you didn\u2019t go read that blog post), the content is pretty dry, but I try to present it in a way that is at least easy to consume and use.&nbsp; That won\u2019t change throughout the rest of the requirements, not even &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Intro to PCI version 4: Requirement 2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,5,7,6],"tags":[],"class_list":["post-55","post","type-post","status-publish","format-standard","hentry","category-assurance","category-pci","category-shawn","category-version-4"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"As you noticed during our discussion around the updates to requirement 1 (and if you didn\u2019t go read that blog post), the content is pretty dry, but I try to present it in a way that is at least easy to consume and use.&nbsp; That won\u2019t change throughout the rest of the requirements, not even &hellip; Continue reading &quot;Intro to PCI version 4: Requirement 2&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Shawn&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-19T04:59:00+00:00\" \/>\n<meta name=\"author\" content=\"TBF_Shawn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TBF_Shawn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/\"},\"author\":{\"name\":\"TBF_Shawn\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\"},\"headline\":\"Intro to PCI version 4: Requirement 2\",\"datePublished\":\"2022-09-19T04:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/\"},\"wordCount\":944,\"articleSection\":[\"Assurance\",\"PCI\",\"Shawn\",\"version 4\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/\",\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/\",\"name\":\"Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#website\"},\"datePublished\":\"2022-09-19T04:59:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/2022\\\/09\\\/18\\\/intro-to-pci-version-4-requirement-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intro to PCI version 4: Requirement 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#website\",\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/\",\"name\":\"Shawn&#039;s Blog\",\"description\":\"Shawn&#039;s Thoughts and Ramblings\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/#\\\/schema\\\/person\\\/588d52e259ebeabac260cbb21bb1aeb4\",\"name\":\"TBF_Shawn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g\",\"caption\":\"TBF_Shawn\"},\"sameAs\":[\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\"],\"url\":\"https:\\\/\\\/terrabytefoundry.com\\\/blog_s\\\/author\\\/tbf_shawn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/","og_locale":"en_US","og_type":"article","og_title":"Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog","og_description":"As you noticed during our discussion around the updates to requirement 1 (and if you didn\u2019t go read that blog post), the content is pretty dry, but I try to present it in a way that is at least easy to consume and use.&nbsp; That won\u2019t change throughout the rest of the requirements, not even &hellip; Continue reading \"Intro to PCI version 4: Requirement 2\"","og_url":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/","og_site_name":"Shawn&#039;s Blog","article_published_time":"2022-09-19T04:59:00+00:00","author":"TBF_Shawn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TBF_Shawn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/#article","isPartOf":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/"},"author":{"name":"TBF_Shawn","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4"},"headline":"Intro to PCI version 4: Requirement 2","datePublished":"2022-09-19T04:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/"},"wordCount":944,"articleSection":["Assurance","PCI","Shawn","version 4"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/","url":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/","name":"Intro to PCI version 4: Requirement 2 - Shawn&#039;s Blog","isPartOf":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/#website"},"datePublished":"2022-09-19T04:59:00+00:00","author":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4"},"breadcrumb":{"@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/terrabytefoundry.com\/blog_s\/2022\/09\/18\/intro-to-pci-version-4-requirement-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/terrabytefoundry.com\/blog_s\/"},{"@type":"ListItem","position":2,"name":"Intro to PCI version 4: Requirement 2"}]},{"@type":"WebSite","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#website","url":"https:\/\/terrabytefoundry.com\/blog_s\/","name":"Shawn&#039;s Blog","description":"Shawn&#039;s Thoughts and Ramblings","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/terrabytefoundry.com\/blog_s\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/terrabytefoundry.com\/blog_s\/#\/schema\/person\/588d52e259ebeabac260cbb21bb1aeb4","name":"TBF_Shawn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5acf07715e5622368f9bc851369ef517917f409c14615da93434e0dcf7bbed28?s=96&d=mm&r=g","caption":"TBF_Shawn"},"sameAs":["https:\/\/terrabytefoundry.com\/blog_s"],"url":"https:\/\/terrabytefoundry.com\/blog_s\/author\/tbf_shawn\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":1,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/55\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/posts\/55\/revisions\/56"}],"wp:attachment":[{"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/media?parent=55"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/categories?post=55"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/terrabytefoundry.com\/blog_s\/wp-json\/wp\/v2\/tags?post=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}