This chapter explains performing vulnerability assessments to identify weaknesses in systems and applications, and how to mitigate or remediate the vulnerabilities to protect and secure your data.
Information in this chapter
• PCI DSS requirements covered
• Vulnerability management in PCI
• Requirement 5 walk-through
• Requirement 6 walk-through
• Requirement 11 walk-through
• Internal vulnerability scanning
• Common PCI vulnerability management mistakes
• Case study
Before we discuss Payment Card Industry (PCI) requirements related to vulnerability management in-depth and find out what technical ...