O'Reilly logo

PCI Compliance, 3rd Edition by Anton Chuvakin, Branden R. Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Vulnerability Management

Information in this chapter:

• PCI DSS Requirements Covered

• Vulnerability Management in PCI

• Requirement 5 Walk-Through

• Requirement 6 Walk-Through

• Requirement 11 Walk-Through

• Internal Vulnerability Scanning

• Common PCI Vulnerability Management Mistakes

• Case Study

Before we discuss Payment Card Industry (PCI) requirements related to vulnerability management in depth and find out what technical and nontechnical safeguards are prescribed there and how to address them, we need to address one underlying and confusing issue of defining some of the terms that the PCI Data Security Standard (DSS) documentation relies upon.

These are as follows:

• Vulnerability assessment;

• Penetration testing;

• Testing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required