{"id":253,"date":"2020-04-07T16:39:06","date_gmt":"2020-04-07T16:39:06","guid":{"rendered":"http:\/\/www.pcidssguide.com\/?p=253"},"modified":"2023-10-09T07:46:45","modified_gmt":"2023-10-09T07:46:45","slug":"pci-dss-requirement-6","status":"publish","type":"post","link":"https:\/\/pcidssguide.com\/pci-dss-requirement-6\/","title":{"rendered":"PCI DSS Requirement 6 Explained"},"content":{"rendered":"\n\n\n\n\n

PCI DSS Requirement 6: Develop and maintain secure systems and applications<\/strong><\/h2>\n\n\n\n

Malicious people are exploiting vulnerabilities to gain privileged access to systems. Most of these vulnerabilities may be addressed by people who manage the systems or by security patches provided by the manufacturers.<\/p>\n\n\n\n

See Also: PCI Web Application Security Requirements<\/a><\/strong><\/p>\n\n\n\n

All systems must have all appropriate software patches to protect against misuse and compromise of cardholder data by malicious individuals and malicious software.<\/p>\n\n\n\n

Appropriate software patches are patches that have been properly evaluated and tested to determine that patches do not conflict with current security configurations. A large number of vulnerabilities can be avoided by using standard system development processes and secure coding techniques for in-house applications.<\/p>\n\n\n\n

PCI DSS Requirement 6 deals with the development of secure applications and systems. It aims to properly manage security patches and secure system and application configurations to ensure continued protection against misuse or compromise of cardholder data.<\/p>\n\n\n\n

Let\u2019s take a look at all the sub-requirements found in PCI DSS requirement 6.<\/p>\n\n\n\n

PCI DSS Requirement 6.1: Establish a process to identify vulnerabilities using reputable outside sources and assign a risk ranking to newly discovered vulnerabilities.<\/strong><\/h2>\n\n\n\n

The purpose of this requirement is to make organizations aware of new vulnerabilities that could affect their environment. Vulnerability information sources must be reliable and can often be obtained from sources such as manufacturer\u2019s websites, industry newsgroups, mailing lists, or RSS feeds.<\/p>\n\n\n\n

See Also: Patching for Complying with PCI DSS Requirement 6<\/a><\/strong><\/p>\n\n\n\n

When an organization identifies a vulnerability that could affect its environment, the vulnerability risk must be assessed and rated. For this reason, the organization must have a method for continuously assessing and assigning risk rankings to vulnerabilities.<\/p>\n\n\n\n

However, this method cannot be achieved with an ASV scan or internal network vulnerability scan. Instead, it is necessary to monitor industry resources for vulnerability information actively.<\/p>\n\n\n\n

Classifying risks as \u201chigh\u201d, \u201cmedium\u201d or \u201clow\u201d allows organizations to identify, prioritize and address the highest risk vulnerabilities faster. In this way, attackers are less likely to exploit security vulnerabilities that pose the greatest risk.<\/p>\n\n\n\n

The risk rankings should be based on industry best practices and consideration of the potential impact. For example, criteria for rating vulnerabilities may include taking into account the type of CVSS baseline or manufacturer classification and systems affected.<\/p>\n\n\n\n

Methods for assessing vulnerabilities and assigning risk ratings can vary depending on an organization\u2019s environment and risk assessment strategy. The risk ranking should at least describe all vulnerabilities that are considered \u201chigh risk\u201d to the environment.<\/p>\n\n\n\n

In addition to the risk rating, vulnerabilities can be considered \u201ccritical\u201d if they pose a high threat to the environment, affect critical systems, or cause a potential compromise if not addressed.<\/p>\n\n\n\n

Examples of critical systems may include security systems, public devices and systems, databases, and other systems that store, process or transmit cardholder data.<\/p>\n\n\n\n

The process to identify vulnerabilities and assign risk rankings to vulnerabilities should include the following items:<\/p>\n\n\n\n