Skip to content

Appendix I. PCI DSS Controls Mapping

PCI DSS 3 Requirements Mapped to APS Policies and Controls

Last Reviewed: 2025-02-17:19:44:43-UTC

Below is a list of PCI DSS 3.x Requirements and the mappings to APS policies and controls in place.

ID PCI DSS 3 Requirement APS Policies and Controls
1 Configure and use firewalls to protect cardholder data HR and Personnel; Access; Data Protection; SDLC; Configuration & Change Management; Threat Detection and Prevention; Mobile Device Security and Media Management; Model
2 Do not use the vendor’s default settings for system passwords and other security parameters Model; Roles & Responsibilities; Risk Management; Asset Inventory Management; Data Management; Data Protection; Configuration and Change Management; Mobile Device Security and Media Management
3 Protect stored cardholder data Data Management; Data Protection; Mobile Device Security and Management
4 Encrypt cardholder data when transmitting over open, public networks HR and Personnel Security; Data Protection; Secure Software Development and Product Security
5 Protect all systems against malware and update anti-virus software regularly System Audits, Monitoring and Assessments; HR and Personnel Security; Access; Configuration and Change Management; Threat Detection and Prevention; Mobile Device Security and Management
6 Develop secure systems and applications Model; Roles, Responsibilities and Training; Risk Management and Risk Assessment Process; System Audits, Monitoring and Assessments; Secure Software Development and Product Security; Configuration and Change Management; Threat Detection and Prevention; Vulnerability Management; Mobile Device Security and Media Management
7 Restrict access to cardholder data based on business requirements Access; Data Management
8 Identify and authenticate access to system components Roles, Responsibilities and Training; System Audits, Monitoring and Assessment; Access
9 Restrict physical access to cardholder data “Facility Access and Physical Security”; Asset Inventory Management; Mobile Device Security and Media Management
10 Track and monitor all access to network resources and cardholder data Roles, Responsibilities and Training; System Audits, Monitoring and Assessments; Configuration and Change Management
11 Test security systems and processes regularly Roles, Responsibilities and Training; System Audits, Monitoring and Assessments; Access; Secure Software Development and Product Security; Threat Detection and Prevention; Vulnerability Management
12 Create a policy that addresses information security for all staff Roles, Responsibilities and Training; Policy Management; Risk Management and Risk Assessment Process; HR and Personnel Security; Secure Software Development and Product Security; Incident Response; Breach Investigation and Notification; Third Party Security and Vendor Risk Management