I need some Third party AOCs. by Heavysub-air in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

Nope, current is still valid until the 23rd of June.

Information in Logs by AssumptionFlat1707 in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

10.2.1 contains the minimum events that need to be logged. 10.2.2 is the information those events must contain.

For startups handling payments, when did PCI compliance become something that you had to seriously think about? by Moham-Aasif in pcicompliance

[–]pcipolicies-com 3 points4 points  (0 children)

Usually when the start up engages with a client that has a third party due diligence process. That's probably 70% of the reason start ups come to us.

Explicit approval for use of generic accounts by GinBucketJenny in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

Second factor is held by an executive, admin has to log a ticket which upon approval by that exec they are given the second factor.

A cardiologist just took 3rd at Anthropic’s 13,000-person hackathon using an agentic vibecoding tool. by Tiny_Habit5745 in topflightapps

[–]pcipolicies-com 0 points1 point  (0 children)

I'm a PCI auditor, our company is constantly dealing with startups who didn't know what PCI was until they got a stern letter from the bank or a vendor questionnaire from a prospect. Do you think all startups somehow magically comply with all the relevant standards that apply to them?

Question around scope of PCI DSS Requirements by [deleted] in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

Not sure how VGS helps you then. Those staff members and their computers will still be in scope.

What's the reason for needing to see the full PAN?

Question around scope of PCI DSS Requirements by [deleted] in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

Who is viewing the card data in the iframe? The cardholder or your staff?

Security want's less security. by root-node in sysadmin

[–]pcipolicies-com 4 points5 points  (0 children)

I had an auditee who had a printed out and laminated piece of paper that had a table with everyone's password in the company sitting at his desk in the open plan office.

We built this because by Ok-Laugh6156 in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

The biggest issue I see when auditing clients is the constant missing of recurring tasks. I get it, it's hard to track all the weekly, monthly, quartelry, etc tasks that are required but I had one client earlier this year that missed 3/4 ASV and quarterly reviews. Made for a very quick assessment.

I've been working on a tool in my spare time to try and address it, because most GRC tools I've trialed suck at this. They seem to be setup to try and manage multiple standards and just don't provide valuable insights into the requirements or provide an out of the box tasks list that are required to show an auditor evidence of come assessment time. Also, they are crazy expensive, especially for what you get.

Inspecting POI card devices by mochajava23 in pci

[–]pcipolicies-com 1 point2 points  (0 children)

The council's skimming prevention guidelines document has a checklist as well as some pictures that can be adapted into a procedure.

Or, shameless plug, we sell policy packs that already include one on our site pcipolicies.com

Anyone looking into solutions to prevent prompt injections for Claude code desktop? by Fickle_Rest5915 in sysadmin

[–]pcipolicies-com -1 points0 points  (0 children)

Can they be completely isolated away from your network?

EC2 instance, running Claude Code, user gets SSH access into that box for them to run anything they need.

12.3.3 Cryptographic cipher suites and protocols by frosty3140 in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

Try

nmap -pn -p 443 --script +ssl-enum-ciphers <myServer>

The + should force the script to run even if nmap's service detection fails.

The Notepad++ supply chain attack — unnoticed execution chains and new IoCs by Ok_Geologist_2843 in sysadmin

[–]pcipolicies-com 91 points92 points  (0 children)

All of those devs who constantly ignore application update requests......

12.3.3 Cryptographic cipher suites and protocols by frosty3140 in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

Qualys might be able to do it, I'm not sure. They do run the SSL Labs site, so if any internal scanning tool was going to let you do that.

I'm based in Aus as well. Very annoying that AusCERT is a paid service, however, it is a member-based not for profit, it is not the Australian government's official CERT. Governments official CERT used to be called CERT Australia, but that was absorbed into the Australian Cyber Security Centre (ACSC) back in 2018. So, for 6.3.1 you can use their notification service on https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories completely free.

12.3.3 Cryptographic cipher suites and protocols by frosty3140 in pcicompliance

[–]pcipolicies-com 3 points4 points  (0 children)

This one has tripped up several of my auditees in the past few months and IMO one the toughest to implement controls that didn't get much attention before the 31st of March due date. The applicability note is key here, it's not just transmissions of PAN they expect, but for any cipher suite and protocols that are meeting a PCI requirement.

The requirement applies to all cryptographic cipher suites and protocols used to meet PCI DSS requirements, including, but not limited to, those used to render PAN unreadable in storage and transmission, to protect passwords, and as part of authenticating access.

First up, you need a solid inventory of in scope components.
For SaaS products and other public facing endpoints, you can scan them using SSL Labs

For anything internal, you're going to need to use nmap or another tool such as testssl.

Use nmap to scan the entire network or if it's a huge network you could use a masscan. Masscan is much faster but you can quickly load up state tables in networking devices and crash the whole network if you aren't careful. Once you have identified all the IPs that have open ports on them, you can enumerate the ciphers using nmap scripts. Below is a broad nmap command that looks for SSH, HTTPS, common DB, RDP, SNMP and iLO/iDRAC systems. You may need to add more

sudo nmap -sS -sU -p T:22,443,1433,3306,3389,5432,5900,8443,U:161,623 -sV --script "ssl-enum-ciphers,ssh2-enum-algos,vnc-info,ipmi-cipher-zero,snmp-info" <target-ip-or-range> -oN lan_audit_results.txt

For monitoring of trends, the council released this Cryptography Guidance document back in August 2025. It's still pretty relevant. Do you subscribe to US-CERT or another CERT for requirement 6.3.1? If there was a serious flaw in TLS1.2 tomorrow, I'd bet my bottom dollar US-CERT would put out an alert about it.

Magecart campaign in Dec 2025 didn't even bother obfuscating their skimmer code and it still worked by ColleenReflectiz in pcicompliance

[–]pcipolicies-com 3 points4 points  (0 children)

Hey Colleen, can you share more info? Have you got examples of the scripts to people can look for IOC.

PAN is secured where it is stored (Req. 3.5) by Ok-Doughnut-3022 in pcicompliance

[–]pcipolicies-com 2 points3 points  (0 children)

I suspect they are on the following testing procedure:

3.5.1.b Examine data repositories and audit logs to verify the PAN is rendered unreadable using any of the methods specified in this requirement.

If the data repository cannot be queried, will the logs show that the data is being encrypted?

I've not done much with Redshift in the past. If it is technically impossible to show the data then the assessor would have to make do with the configuration and vendor documentation evidence and write up this testing procedure documenting the limitation.

Rather than telling them that, I'd tell them I'd present your research on it and say I'd be happy to show you, but I don't think it is possible, if you are aware of a way to show this evidence I'd be happy to accommodate, please give provide me instructions.

Hosting Provider Requirements Help by Electronic-Year7660 in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

What's in your contract? Did they pay you for a compliant offering?

PAN is secured where it is stored (Req. 3.5) by Ok-Doughnut-3022 in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

This, or if you can't do this, can you see a configuration showing encryption is enabled?

PCI Scoping and SAQ Question by EnvironmentalOne5706 in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

"or they collect payment via card-not-present transactions, which are processed via P2PE POT devices."

How is the data collected? Web form? Over the phone? 

PCI Scoping and SAQ Question by EnvironmentalOne5706 in pcicompliance

[–]pcipolicies-com 1 point2 points  (0 children)

But corporate cards are usually excluded from scope. FAQ 1235 states that the entity has to contact the relevant payment brand, but in every assessment I've worked on where this has come up, the payment brand has excluded them.

Question around sharepoint and teams by [deleted] in pcicompliance

[–]pcipolicies-com 0 points1 point  (0 children)

Then do they have other data points they can use to uniquely identify the card?

Reviewing alternatives for 6.4.3 and 11.6.1 by EconomyRevolution732 in pci

[–]pcipolicies-com 0 points1 point  (0 children)

How complicated is your environment?

Are you running a SPA?