Global

PCI DSS: Vulnerability Management

Vulnerability Management [Req 5-6]

Rule: Protect all systems from malicious software and develop/maintain secure systems through patching and secure development practices.

Requirement 5: Malware Protection

5.2 — Malware Prevention and Detection

ControlRequirement
Anti-malware deployedOn all systems commonly affected
Detect known malwareSignature-based detection
Detect unknown malwareBehavioral analysis
Systems coveredAll system components in CDE

5.3 — Active and Maintained

ControlRequirement
Automatic updatesSignatures and engine
Periodic scansReal-time or scheduled scans
Audit logsGenerate logs of activity
Cannot be disabledBy users (or requires approval)

5.4 — Anti-Phishing

ControlRequirement
Technical controlsEmail filtering, URL filtering
User trainingAwareness on phishing
Detection mechanismsIdentify phishing attempts

Systems Commonly Affected by Malware

  • Windows systems
  • macOS systems
  • Linux systems (increasingly targeted)
  • Point-of-sale devices

If not commonly affected: Document risk assessment justifying exclusion.

Requirement 6: Secure Systems and Software

6.2 — Secure Development

ControlRequirement
TrainingDevelopers trained in secure coding
Secure coding guidelinesBased on industry standards
Code reviewBefore production deployment
SDLCSecurity integrated into lifecycle

6.3 — Vulnerability Management

ControlRequirement
Identify vulnerabilitiesFrom public sources (CVEs, etc.)
Risk rankAssign risk ranking
Critical/high patchesWithin 30 days
Other patchesAppropriate timeframe

Patching Timeline

SeverityDeadline
CriticalWithin 30 days
HighWithin 30 days
MediumWithin 90 days (recommended)
LowDefined timeframe

6.4 — Web Application Security

ControlRequirement
Attack detectionWAF or equivalent for public web apps
OWASP Top 10Address common vulnerabilities
Review annuallyUpdate protections

6.5 — Change Management

ControlRequirement
Documented proceduresFor all changes
Impact analysisSecurity impact assessment
ApprovalAuthorized parties
TestingBefore production
RollbackProcedures defined

OWASP Top 10 Coverage

PCI DSS requires protection against common vulnerabilities:

  • Injection attacks
  • Broken authentication
  • Sensitive data exposure
  • XML external entities
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting (XSS)
  • Insecure deserialization
  • Known vulnerabilities
  • Insufficient logging

Citation

PCI DSS v4.0.1 Requirements 5-6

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt