{"id":614,"date":"2020-04-23T13:38:11","date_gmt":"2020-04-23T13:38:11","guid":{"rendered":"http:\/\/www.pcidssguide.com\/?p=614"},"modified":"2023-10-09T13:50:47","modified_gmt":"2023-10-09T13:50:47","slug":"pci-dss-requirement-9-through-physical-security","status":"publish","type":"post","link":"https:\/\/pcidssguide.com\/pci-dss-requirement-9-through-physical-security\/","title":{"rendered":"Ensuring Physical Security: PCI DSS Requirement 9"},"content":{"rendered":"\n\n\n\n\n

When you hear the word data protection, what’s the first thing that comes to mind? You can talk about checking firewalls, encryption, and even vulnerabilities. But have you ever thought of locked doors, security badges, or login sheets?<\/p>\n\n\n\n

Are you aware that most devices containing sensitive data are stolen in the middle of the day? This is because it’s easier to steal data when employees are too busy to notice someone leaving the office with a phone, laptop, or server.<\/p>\n\n\n\n

Many companies still don’t know how physical protection will help protect card details. However, there are also a few ways data thieves can gain access by circumventing physical access controls, and most such technical devices do not require them.<\/p>\n\n\n\n

Strengthening your physical protection prevents hackers and social engineers from obtaining the information needed to access and steal card data.<\/p>\n\n\n\n

What are the PCI DSS Physical Security Requirements?<\/strong><\/h2>\n\n\n\n

When you think of a data breach, the idea of \u200b\u200ba hacker somehow getting into a computer or network infrastructure comes to mind. However, not all data security incidents are caused by remote cyberattacks; most of them are caused by physical breaches.<\/p>\n\n\n\n

See Also: PCI Compliant Data Center Requirements<\/a><\/strong><\/p>\n\n\n\n

Therefore, it is not surprising that the Payment Card Industry Data Security Standard (PCI DSS) outlines specific guidelines to physically secure cardholder data environments (CDE).<\/p>\n\n\n\n

With unauthorized access, criminals, fraudsters, and fraudulent employees can quickly access, remove, edit, or tamper with a device that touches or stores cardholder data (CHD) and payment information.<\/p>\n\n\n\n

For example, fraudsters are increasingly applying “skimming” devices to compromise credit and debit cards at ATMs and gas station pump terminals. While the transition to EMV chip cards is designed to alleviate this growing problem, the risks remain.<\/p>\n\n\n\n

See Also: Data Center Audit Checklist<\/a><\/strong> <\/p>\n\n\n\n

Complicating the situation is that not all card data is stored electronically. Often, businesses keep hard copies of customer payment card data and receipts. If they fall into the wrong hands with these materials due to PCI non-compliance, businesses will face heavy penalties, lose consumer trust, and damage their credibility.<\/p>\n\n\n\n

PCI DSS Requirement 9<\/a> is purely physically dedicated to stopping cardholder data theft. Criminals often try to access cardholder data by physically stealing hardware or paper receipts that contain SAD data. Likewise, tampering or modifying legitimate card reading devices is a common attack technique used by attackers.<\/p>\n\n\n\n

PCI DSS Requirement 9 was created with ten sub-requirements to help protect cardholder data from a physical perspective. Each of the sub-requirements is dedicated to a different aspect of physical security and includes detailed descriptions of how to complete the tasks that make up the fundamental requirement:<\/p>\n\n\n\n