Compliance

  1. Firewalls and User Identification

  2. Encrypted VPN (Virtual Private Network)

  3. Offsite, Tier-4 Back-up

  4. Multi-Factor Authentication

  5. Private Hosting Environment and Physical Safeguarding  

  6. SSL Certificates

  7. Proper Data Disposal

Requirements:

  1. Install and maintain a firewall configuration to protect cardholder data.

  2. Do not use vendor-supplied defaults for system passwords and other security parameters.

  3. Protect stored cardholder data.

  4. Encrypt transmission of cardholder data across open, public networks.

  5. Use and regularly update anti-virus software.

  6. Develop and maintain secure systems and applications.

  7. Restrict access to cardholder data by business need-to-know. 

  8. Assign a unique ID to each person with computer access.

  9. Restrict physical access to cardholder data. 

  10. Track and monitor all access to network resources and cardholder data. 

  11. Regularly test security systems and processes. 

  12. Maintain a security policy and ensure that all personnel are aware of it. 

Requirements:

Since 2010, PCG has held over 60 Information Technology Staff Augmentation contracts; providing services to government and private entities alike. 

Terms & Conditions:

Contract Holder

Quick Links

Community