O'Reilly logo

PCI Compliance, 4th Edition by Anton Chuvakin, Branden R. Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Vulnerability management

Abstract

This chapter explains performing vulnerability assessments to identify weaknesses in systems and applications, and how to mitigate or remediate the vulnerabilities to protect and secure your data.

Keywords

Vulnerability Management
Penetration Testing
Scanning
ASV
Quarterly Scans
Information in this chapter
• PCI DSS requirements covered
• Vulnerability management in PCI
• Requirement 5 walk-through
• Requirement 6 walk-through
• Requirement 11 walk-through
• Internal vulnerability scanning
• Common PCI vulnerability management mistakes
• Case study
Before we discuss Payment Card Industry (PCI) requirements related to vulnerability management in-depth and find out what technical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required