SAMMY works best on screens 1024px wide or larger.
9.1: All security policies and operational procedures that are identified in Requirement 9 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures identified in Requirement 9 are managed in accordance with all elements specified in this requirement.
Description

Requirement 9.1.1

Purpose

Requirement 9.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 9. While it is important to define the specific policies or procedures called out in Requirement 9, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 9.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

9.1: Roles and responsibilities for performing activities in Requirement 9 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 9 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 9 to verify that roles and responsibilities are assigned as documented and are understood.
Description

Requirement 9.1.1

Purpose

Requirement 9.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 9. While it is important to define the specific policies or procedures called out in Requirement 9, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 9.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

9.2: Appropriate facility entry controls are in place to restrict physical access to systems in the CDE.
  • Observe entry controls and interview responsible personnel to verify that physical security controls are in place to restrict access to systems in the CDE.
Description

Requirement 9.2.1

Purpose

Physical access controls at facility entry points help prevent unauthorized individuals from gaining access to areas where cardholder data is stored, processed, or transmitted. Without proper controls, unauthorized persons could physically access systems and data.

Good Practice

Entry controls should include measures such as badge readers, biometric scanners, or security personnel. Visitor management procedures should be in place to control access by non-employees.

Requirement 9.2.1.1

Purpose

Individual physical access to sensitive areas should be monitored to detect unauthorized access attempts. Monitoring physical access points helps identify security incidents and provides evidence for investigations.

Good Practice

Video cameras, access control mechanisms, or other measures should be used to monitor access to sensitive areas. Monitoring data should be retained for a sufficient period to support investigations.

Requirement 9.2.2

Purpose

Physical security controls in sensitive areas help protect systems and data from unauthorized access, tampering, or theft. Network jacks, wireless access points, and other network infrastructure in public areas could be exploited by attackers.

Good Practice

Restrict physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices. Unused network jacks should be disabled. Wireless access points should be physically secured to prevent tampering.

Requirement 9.2.3

Purpose

Restricting physical access to wireless access points, gateways, and networking devices prevents unauthorized individuals from tampering with or connecting unauthorized devices to the network.

Good Practice

Network devices and access points should be placed in locked areas or enclosures. Access to these areas should be controlled and monitored.

Requirement 9.2.4

Purpose

Consoles and physical access to systems in sensitive areas must be restricted to prevent unauthorized use. If an unauthorized individual gains physical access to a system console, they may be able to bypass logical access controls.

Good Practice

System consoles should be physically secured in locked areas. Screen lock should be enabled to prevent unauthorized use when personnel step away from the console.

9.2: Individual physical access to sensitive areas within the CDE is monitored with either video cameras or physical access control mechanisms (or both) as follows: (a) Entry and exit points to/from sensitive areas within the CDE are monitored, (b) Monitoring devices or mechanisms are protected from tampering or disabling, (c) Collected data is reviewed and correlated with other entries, (d) Collected data is stored for at least three months, unless otherwise restricted by law.
  • Observe locations where individual physical access to sensitive areas within the CDE occurs to verify that either video cameras or physical access control mechanisms (or both) are in place to monitor the entry and exit points.
  • Observe locations where individual physical access to sensitive areas within the CDE occurs to verify that either video cameras or physical access control mechanisms (or both) are protected from tampering or disabling.
  • Observe the physical access control mechanisms and/or examine video cameras and interview responsible personnel to verify that: • Collected data from video cameras and/or physical access control mechanisms is reviewed and correlated with other entries. • Collected data is stored for at least three months.
Description

Requirement 9.2.1

Purpose

Physical access controls at facility entry points help prevent unauthorized individuals from gaining access to areas where cardholder data is stored, processed, or transmitted. Without proper controls, unauthorized persons could physically access systems and data.

Good Practice

Entry controls should include measures such as badge readers, biometric scanners, or security personnel. Visitor management procedures should be in place to control access by non-employees.

Requirement 9.2.1.1

Purpose

Individual physical access to sensitive areas should be monitored to detect unauthorized access attempts. Monitoring physical access points helps identify security incidents and provides evidence for investigations.

Good Practice

Video cameras, access control mechanisms, or other measures should be used to monitor access to sensitive areas. Monitoring data should be retained for a sufficient period to support investigations.

Requirement 9.2.2

Purpose

Physical security controls in sensitive areas help protect systems and data from unauthorized access, tampering, or theft. Network jacks, wireless access points, and other network infrastructure in public areas could be exploited by attackers.

Good Practice

Restrict physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices. Unused network jacks should be disabled. Wireless access points should be physically secured to prevent tampering.

Requirement 9.2.3

Purpose

Restricting physical access to wireless access points, gateways, and networking devices prevents unauthorized individuals from tampering with or connecting unauthorized devices to the network.

Good Practice

Network devices and access points should be placed in locked areas or enclosures. Access to these areas should be controlled and monitored.

Requirement 9.2.4

Purpose

Consoles and physical access to systems in sensitive areas must be restricted to prevent unauthorized use. If an unauthorized individual gains physical access to a system console, they may be able to bypass logical access controls.

Good Practice

System consoles should be physically secured in locked areas. Screen lock should be enabled to prevent unauthorized use when personnel step away from the console.

9.2: Physical and/or logical controls are implemented to restrict use of publicly accessible network jacks within the facility.
  • Interview responsible personnel and observe locations of publicly accessible network jacks to verify that physical and/or logical controls are in place to restrict access to publicly accessible network jacks within the facility.
Description

Requirement 9.2.1

Purpose

Physical access controls at facility entry points help prevent unauthorized individuals from gaining access to areas where cardholder data is stored, processed, or transmitted. Without proper controls, unauthorized persons could physically access systems and data.

Good Practice

Entry controls should include measures such as badge readers, biometric scanners, or security personnel. Visitor management procedures should be in place to control access by non-employees.

Requirement 9.2.1.1

Purpose

Individual physical access to sensitive areas should be monitored to detect unauthorized access attempts. Monitoring physical access points helps identify security incidents and provides evidence for investigations.

Good Practice

Video cameras, access control mechanisms, or other measures should be used to monitor access to sensitive areas. Monitoring data should be retained for a sufficient period to support investigations.

Requirement 9.2.2

Purpose

Physical security controls in sensitive areas help protect systems and data from unauthorized access, tampering, or theft. Network jacks, wireless access points, and other network infrastructure in public areas could be exploited by attackers.

Good Practice

Restrict physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices. Unused network jacks should be disabled. Wireless access points should be physically secured to prevent tampering.

Requirement 9.2.3

Purpose

Restricting physical access to wireless access points, gateways, and networking devices prevents unauthorized individuals from tampering with or connecting unauthorized devices to the network.

Good Practice

Network devices and access points should be placed in locked areas or enclosures. Access to these areas should be controlled and monitored.

Requirement 9.2.4

Purpose

Consoles and physical access to systems in sensitive areas must be restricted to prevent unauthorized use. If an unauthorized individual gains physical access to a system console, they may be able to bypass logical access controls.

Good Practice

System consoles should be physically secured in locked areas. Screen lock should be enabled to prevent unauthorized use when personnel step away from the console.

9.2: Physical access to wireless access points, gateways, networking/communications hardware, and telecommunication lines within the facility is restricted.
  • Interview responsible personnel and observe locations of hardware and lines to verify that physical access to wireless access points, gateways, networking/communications hardware, and telecommunication lines within the facility is restricted.
Description

Requirement 9.2.1

Purpose

Physical access controls at facility entry points help prevent unauthorized individuals from gaining access to areas where cardholder data is stored, processed, or transmitted. Without proper controls, unauthorized persons could physically access systems and data.

Good Practice

Entry controls should include measures such as badge readers, biometric scanners, or security personnel. Visitor management procedures should be in place to control access by non-employees.

Requirement 9.2.1.1

Purpose

Individual physical access to sensitive areas should be monitored to detect unauthorized access attempts. Monitoring physical access points helps identify security incidents and provides evidence for investigations.

Good Practice

Video cameras, access control mechanisms, or other measures should be used to monitor access to sensitive areas. Monitoring data should be retained for a sufficient period to support investigations.

Requirement 9.2.2

Purpose

Physical security controls in sensitive areas help protect systems and data from unauthorized access, tampering, or theft. Network jacks, wireless access points, and other network infrastructure in public areas could be exploited by attackers.

Good Practice

Restrict physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices. Unused network jacks should be disabled. Wireless access points should be physically secured to prevent tampering.

Requirement 9.2.3

Purpose

Restricting physical access to wireless access points, gateways, and networking devices prevents unauthorized individuals from tampering with or connecting unauthorized devices to the network.

Good Practice

Network devices and access points should be placed in locked areas or enclosures. Access to these areas should be controlled and monitored.

Requirement 9.2.4

Purpose

Consoles and physical access to systems in sensitive areas must be restricted to prevent unauthorized use. If an unauthorized individual gains physical access to a system console, they may be able to bypass logical access controls.

Good Practice

System consoles should be physically secured in locked areas. Screen lock should be enabled to prevent unauthorized use when personnel step away from the console.

9.2: Access to consoles in sensitive areas is restricted via locking when not in use.
  • Observe a system administrator’s attempt to log into consoles in sensitive areas and verify that they are “locked” to prevent unauthorized use.
Description

Requirement 9.2.1

Purpose

Physical access controls at facility entry points help prevent unauthorized individuals from gaining access to areas where cardholder data is stored, processed, or transmitted. Without proper controls, unauthorized persons could physically access systems and data.

Good Practice

Entry controls should include measures such as badge readers, biometric scanners, or security personnel. Visitor management procedures should be in place to control access by non-employees.

Requirement 9.2.1.1

Purpose

Individual physical access to sensitive areas should be monitored to detect unauthorized access attempts. Monitoring physical access points helps identify security incidents and provides evidence for investigations.

Good Practice

Video cameras, access control mechanisms, or other measures should be used to monitor access to sensitive areas. Monitoring data should be retained for a sufficient period to support investigations.

Requirement 9.2.2

Purpose

Physical security controls in sensitive areas help protect systems and data from unauthorized access, tampering, or theft. Network jacks, wireless access points, and other network infrastructure in public areas could be exploited by attackers.

Good Practice

Restrict physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices. Unused network jacks should be disabled. Wireless access points should be physically secured to prevent tampering.

Requirement 9.2.3

Purpose

Restricting physical access to wireless access points, gateways, and networking devices prevents unauthorized individuals from tampering with or connecting unauthorized devices to the network.

Good Practice

Network devices and access points should be placed in locked areas or enclosures. Access to these areas should be controlled and monitored.

Requirement 9.2.4

Purpose

Consoles and physical access to systems in sensitive areas must be restricted to prevent unauthorized use. If an unauthorized individual gains physical access to a system console, they may be able to bypass logical access controls.

Good Practice

System consoles should be physically secured in locked areas. Screen lock should be enabled to prevent unauthorized use when personnel step away from the console.

9.3: Procedures are implemented for authorizing and managing physical access of personnel to the CDE, including: (a) Identifying personnel, (b) Managing changes to an individual’s physical access requirements, (c) Revoking or terminating personnel identification, (d) Limiting access to the identification process or system to authorized personnel.
  • Examine documented procedures to verify that procedures to authorize and manage physical access of personnel to the CDE are defined in accordance with all elements specified in this requirement.
  • Observe identification methods, such as ID badges, and processes to verify that personnel in the CDE are clearly identified.
  • Observe processes to verify that access to the identification process, such as a badge system, is limited to authorized personnel.
Description

Requirement 9.3.1

Purpose

Controlling physical access for personnel to sensitive areas based on their job function helps ensure that only authorized individuals can access areas where cardholder data is stored, processed, or transmitted. This reduces the risk of unauthorized access.

Good Practice

Physical access should be granted based on the individual's job function and need to access the area. Access rights should be reviewed periodically and revoked when no longer needed.

Requirement 9.3.1.1

Purpose

Physical access to sensitive areas should be reviewed periodically to identify and revoke access that is no longer needed. Without periodic reviews, individuals may retain physical access after they no longer require it.

Good Practice

Physical access rights should be reviewed at least every six months. Reviews should verify that all individuals with access still have a business need for that access. Access should be revoked for individuals who no longer need it.

Requirement 9.3.2

Purpose

Visitor access to facilities and sensitive areas must be controlled to prevent unauthorized individuals from gaining access to cardholder data environments. Without visitor controls, unauthorized persons could gain physical access to systems and data.

Good Practice

Visitors should be authorized before entering, escorted at all times in sensitive areas, identified with a badge or other identifier, and have their visit logged. Visitor badges should be visually distinguishable from employee badges.

Requirement 9.3.3

Purpose

Visitor badges or identification help distinguish visitors from authorized personnel and help ensure that visitors are identified and monitored while on the premises. Proper badge management prevents unauthorized individuals from retaining access after their visit.

Good Practice

Visitor badges should be surrendered or deactivated before the visitor leaves the facility. Badges should clearly indicate visitor status and should expire after the visit period.

Requirement 9.3.4

Purpose

A visitor log provides a physical audit trail of visitor activity. This log can be used to investigate security incidents and to verify that visitor access controls are being followed.

Good Practice

The visitor log should record the visitor's name, the organization represented, the onsite personnel authorizing physical access, and the date and time of the visit. Visitor logs should be retained for at least three months.

9.3: Physical access to sensitive areas within the CDE for personnel is controlled as follows: (a) Access is authorized and based on individual job function, (b) Access is revoked immediately upon termination, (c) All physical access mechanisms, such as keys, access cards, etc., are returned or disabled upon termination.
  • Observe personnel in sensitive areas within the CDE, interview responsible personnel, and examine physical access control lists to verify that: • Access to the sensitive area is authorized. • Access is required for the individual’s job function.
  • Observe processes and interview personnel to verify that access of all personnel is revoked immediately upon termination.
  • For terminated personnel, examine physical access controls lists and interview responsible personnel to verify that all physical access mechanisms (such as keys, access cards, etc.) were returned or disabled.
Description

Requirement 9.3.1

Purpose

Controlling physical access for personnel to sensitive areas based on their job function helps ensure that only authorized individuals can access areas where cardholder data is stored, processed, or transmitted. This reduces the risk of unauthorized access.

Good Practice

Physical access should be granted based on the individual's job function and need to access the area. Access rights should be reviewed periodically and revoked when no longer needed.

Requirement 9.3.1.1

Purpose

Physical access to sensitive areas should be reviewed periodically to identify and revoke access that is no longer needed. Without periodic reviews, individuals may retain physical access after they no longer require it.

Good Practice

Physical access rights should be reviewed at least every six months. Reviews should verify that all individuals with access still have a business need for that access. Access should be revoked for individuals who no longer need it.

Requirement 9.3.2

Purpose

Visitor access to facilities and sensitive areas must be controlled to prevent unauthorized individuals from gaining access to cardholder data environments. Without visitor controls, unauthorized persons could gain physical access to systems and data.

Good Practice

Visitors should be authorized before entering, escorted at all times in sensitive areas, identified with a badge or other identifier, and have their visit logged. Visitor badges should be visually distinguishable from employee badges.

Requirement 9.3.3

Purpose

Visitor badges or identification help distinguish visitors from authorized personnel and help ensure that visitors are identified and monitored while on the premises. Proper badge management prevents unauthorized individuals from retaining access after their visit.

Good Practice

Visitor badges should be surrendered or deactivated before the visitor leaves the facility. Badges should clearly indicate visitor status and should expire after the visit period.

Requirement 9.3.4

Purpose

A visitor log provides a physical audit trail of visitor activity. This log can be used to investigate security incidents and to verify that visitor access controls are being followed.

Good Practice

The visitor log should record the visitor's name, the organization represented, the onsite personnel authorizing physical access, and the date and time of the visit. Visitor logs should be retained for at least three months.

9.3: Procedures are implemented for authorizing and managing visitor access to the CDE, including: (a) Visitors are authorized before entering, (b) Visitors are escorted at all times, (c) Visitors are clearly identified and given a badge or other identification that expires, (d) Visitor badges or other identification visibly distinguishes visitors from personnel.
  • Examine documented procedures and interview personnel to verify procedures are defined for authorizing and managing visitor access to the CDE in accordance with all elements specified in this requirement.
  • Observe processes when visitors are present in the CDE and interview personnel to verify that visitors are: • Authorized before entering the CDE. • Escorted at all times within the CDE.
  • Observe the use of visitor badges or other identification to verify that the badge or other identification does not permit unescorted access to the CDE.
  • Observe visitors in the CDE to verify that: • Visitor badges or other identification are being used for all visitors. • Visitor badges or identification easily distinguish visitors from personnel.
  • Examine visitor badges or other identification and observe evidence in the badging system to verify visitor badges or other identification expires.
Description

Requirement 9.3.1

Purpose

Controlling physical access for personnel to sensitive areas based on their job function helps ensure that only authorized individuals can access areas where cardholder data is stored, processed, or transmitted. This reduces the risk of unauthorized access.

Good Practice

Physical access should be granted based on the individual's job function and need to access the area. Access rights should be reviewed periodically and revoked when no longer needed.

Requirement 9.3.1.1

Purpose

Physical access to sensitive areas should be reviewed periodically to identify and revoke access that is no longer needed. Without periodic reviews, individuals may retain physical access after they no longer require it.

Good Practice

Physical access rights should be reviewed at least every six months. Reviews should verify that all individuals with access still have a business need for that access. Access should be revoked for individuals who no longer need it.

Requirement 9.3.2

Purpose

Visitor access to facilities and sensitive areas must be controlled to prevent unauthorized individuals from gaining access to cardholder data environments. Without visitor controls, unauthorized persons could gain physical access to systems and data.

Good Practice

Visitors should be authorized before entering, escorted at all times in sensitive areas, identified with a badge or other identifier, and have their visit logged. Visitor badges should be visually distinguishable from employee badges.

Requirement 9.3.3

Purpose

Visitor badges or identification help distinguish visitors from authorized personnel and help ensure that visitors are identified and monitored while on the premises. Proper badge management prevents unauthorized individuals from retaining access after their visit.

Good Practice

Visitor badges should be surrendered or deactivated before the visitor leaves the facility. Badges should clearly indicate visitor status and should expire after the visit period.

Requirement 9.3.4

Purpose

A visitor log provides a physical audit trail of visitor activity. This log can be used to investigate security incidents and to verify that visitor access controls are being followed.

Good Practice

The visitor log should record the visitor's name, the organization represented, the onsite personnel authorizing physical access, and the date and time of the visit. Visitor logs should be retained for at least three months.

9.3: Visitor badges or identification are surrendered or deactivated before visitors leave the facility or at the date of expiration.
  • Observe visitors leaving the facility and interview personnel to verify visitor badges or other identification are surrendered or deactivated before visitors leave the facility or at the date of expiration. upon departure or expiration.
Description

Requirement 9.3.1

Purpose

Controlling physical access for personnel to sensitive areas based on their job function helps ensure that only authorized individuals can access areas where cardholder data is stored, processed, or transmitted. This reduces the risk of unauthorized access.

Good Practice

Physical access should be granted based on the individual's job function and need to access the area. Access rights should be reviewed periodically and revoked when no longer needed.

Requirement 9.3.1.1

Purpose

Physical access to sensitive areas should be reviewed periodically to identify and revoke access that is no longer needed. Without periodic reviews, individuals may retain physical access after they no longer require it.

Good Practice

Physical access rights should be reviewed at least every six months. Reviews should verify that all individuals with access still have a business need for that access. Access should be revoked for individuals who no longer need it.

Requirement 9.3.2

Purpose

Visitor access to facilities and sensitive areas must be controlled to prevent unauthorized individuals from gaining access to cardholder data environments. Without visitor controls, unauthorized persons could gain physical access to systems and data.

Good Practice

Visitors should be authorized before entering, escorted at all times in sensitive areas, identified with a badge or other identifier, and have their visit logged. Visitor badges should be visually distinguishable from employee badges.

Requirement 9.3.3

Purpose

Visitor badges or identification help distinguish visitors from authorized personnel and help ensure that visitors are identified and monitored while on the premises. Proper badge management prevents unauthorized individuals from retaining access after their visit.

Good Practice

Visitor badges should be surrendered or deactivated before the visitor leaves the facility. Badges should clearly indicate visitor status and should expire after the visit period.

Requirement 9.3.4

Purpose

A visitor log provides a physical audit trail of visitor activity. This log can be used to investigate security incidents and to verify that visitor access controls are being followed.

Good Practice

The visitor log should record the visitor's name, the organization represented, the onsite personnel authorizing physical access, and the date and time of the visit. Visitor logs should be retained for at least three months.

9.3: Visitor logs are used to maintain a physical record of visitor activity both within the facility and within sensitive areas, including: (a) The visitor’s name and the organization represented, (b) The date and time of the visit, (c) The name of the personnel authorizing physical access, (d) Retaining the log for at least three months, unless otherwise restricted by law.
  • Examine the visitor logs and interview responsible personnel to verify that visitor logs are used to record physical access to both the facility and sensitive areas.
  • Examine the visitor logs and verify that the logs contain: • The visitor’s name and the organization represented. • The personnel authorizing physical access. • Date and time of visit.
  • Examine visitor log storage locations and interview responsible personnel to verify that the log is retained for at least three months, unless otherwise restricted by law.
Description

Requirement 9.3.1

Purpose

Controlling physical access for personnel to sensitive areas based on their job function helps ensure that only authorized individuals can access areas where cardholder data is stored, processed, or transmitted. This reduces the risk of unauthorized access.

Good Practice

Physical access should be granted based on the individual's job function and need to access the area. Access rights should be reviewed periodically and revoked when no longer needed.

Requirement 9.3.1.1

Purpose

Physical access to sensitive areas should be reviewed periodically to identify and revoke access that is no longer needed. Without periodic reviews, individuals may retain physical access after they no longer require it.

Good Practice

Physical access rights should be reviewed at least every six months. Reviews should verify that all individuals with access still have a business need for that access. Access should be revoked for individuals who no longer need it.

Requirement 9.3.2

Purpose

Visitor access to facilities and sensitive areas must be controlled to prevent unauthorized individuals from gaining access to cardholder data environments. Without visitor controls, unauthorized persons could gain physical access to systems and data.

Good Practice

Visitors should be authorized before entering, escorted at all times in sensitive areas, identified with a badge or other identifier, and have their visit logged. Visitor badges should be visually distinguishable from employee badges.

Requirement 9.3.3

Purpose

Visitor badges or identification help distinguish visitors from authorized personnel and help ensure that visitors are identified and monitored while on the premises. Proper badge management prevents unauthorized individuals from retaining access after their visit.

Good Practice

Visitor badges should be surrendered or deactivated before the visitor leaves the facility. Badges should clearly indicate visitor status and should expire after the visit period.

Requirement 9.3.4

Purpose

A visitor log provides a physical audit trail of visitor activity. This log can be used to investigate security incidents and to verify that visitor access controls are being followed.

Good Practice

The visitor log should record the visitor's name, the organization represented, the onsite personnel authorizing physical access, and the date and time of the visit. Visitor logs should be retained for at least three months.

9.4: All media with cardholder data is physically secured.
  • Examine documentation to verify that the procedures defined for protecting cardholder data include controls for physically securing all media.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Offline media backups with cardholder data are stored in a secure location.
  • Examine documentation to verify that procedures are defined for physically securing offline media backups with cardholder data in a secure location.
  • Examine logs or other documentation and interview responsible personnel at the storage location to verify that offline media backups are stored in a secure location.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: The security of the offline media backup location(s) with cardholder data is reviewed at least once every 12 months.
  • Examine documentation to verify that procedures are defined for reviewing the security of the offline media backup location(s) with cardholder data at least once every 12 months.
  • Examine documented procedures, logs, or other documentation, and interview responsible personnel at the storage location(s) to verify that the storage location’s security is reviewed at least once every 12 months.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: All media with cardholder data is classified in accordance with the sensitivity of the data.
  • Examine documentation to verify that procedures are defined for classifying media with cardholder data in accordance with the sensitivity of the data.
  • Examine media logs or other documentation to verify that all media is classified in accordance with the sensitivity of the data.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Media with cardholder data sent outside the facility is secured as follows: (a) Media sent outside the facility is logged, (b) Media is sent by secured courier or other delivery method that can be accurately tracked, (c) Offsite tracking logs include details about media location.
  • Examine documentation to verify that procedures are defined for securing media sent outside the facility in accordance with all elements specified in this requirement.
  • Interview personnel and examine records to verify that all media sent outside the facility is logged and sent via secured courier or other delivery method that can be tracked.
  • Examine offsite tracking logs for all media to verify tracking details are documented.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Management approves all media with cardholder data that is moved outside the facility (including when media is distributed to individuals).
  • Examine documentation to verify that procedures are defined to ensure that media moved outside the facility is approved by management.
  • Examine offsite media tracking logs and interview responsible personnel to verify that proper management authorization is obtained for all media moved outside the facility (including media distributed to individuals).
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Inventory logs of all electronic media with cardholder data are maintained.
  • Examine documentation to verify that procedures are defined to maintain electronic media inventory logs.
  • Examine electronic media inventory logs and interview responsible personnel to verify that logs are maintained.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Inventories of electronic media with cardholder data are conducted at least once every 12 months.
  • Examine documentation to verify that procedures are defined to conduct inventories of electronic media with cardholder data at least once every 12 months.
  • Examine electronic media inventory logs and interview personnel to verify that electronic media inventories are performed at least once every 12 months.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Hard-copy materials with cardholder data are destroyed when no longer needed for business or legal reasons, as follows: (a) Materials are cross-cut shredded, incinerated, or pulped so that cardholder data cannot be reconstructed, (b) Materials are stored in secure storage containers prior to destruction.
  • Examine the media destruction policy to verify that procedures are defined to destroy hard- copy media with cardholder data when no longer needed for business or legal reasons in accordance with all elements specified in this requirement.
  • Observe processes and interview personnel to verify that hard-copy materials are cross-cut shredded, incinerated, or pulped such that cardholder data cannot be reconstructed.
  • Observe storage containers used for materials that contain information to be destroyed to verify that the containers are secure.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.4: Electronic media with cardholder data is destroyed when no longer needed for business or legal reasons via one of the following: (a) The electronic media is destroyed, (b) The cardholder data is rendered unrecoverable so that it cannot be reconstructed.
  • Examine the media destruction policy to verify that procedures are defined to destroy electronic media when no longer needed for business or legal reasons in accordance with all elements specified in this requirement.
  • Observe the media destruction process and interview responsible personnel to verify that electronic media with cardholder data is destroyed via one of the methods specified in this requirement.
Description

Requirement 9.4.1

Purpose

Media containing cardholder data must be physically secured to prevent unauthorized access, theft, or loss. Without proper physical security, media can be removed from the facility and the data compromised.

Good Practice

Media should be stored in a secure location with limited access. Backup media should be stored in a secure, off-site location. Media storage areas should be inventoried periodically.

Requirement 9.4.1.1

Purpose

Offline media backups containing cardholder data must be stored securely to prevent unauthorized access. If backup media is not properly secured, it could be stolen or accessed by unauthorized individuals.

Good Practice

Backup media should be stored in a secure, off-site location. The storage location should have physical access controls comparable to those at the primary site. Media should be inventoried periodically.

Requirement 9.4.2

Purpose

Classifying media by sensitivity helps organizations apply appropriate security controls based on the level of sensitivity of the data on the media. Without classification, sensitive media may not receive adequate protection.

Good Practice

Media should be classified according to the sensitivity of the data it contains. Labels or markings should be used to indicate the classification level. Personnel should be trained on how to handle media of different classification levels.

Requirement 9.4.3

Purpose

Media sent outside the facility is at increased risk of interception, theft, or loss during transit. Using secured courier or other delivery methods that can be accurately tracked helps maintain the security of the media during transport.

Good Practice

Media should be sent via secured courier or other delivery method that provides tracking capability. Management should approve all media that is sent outside the facility. The delivery tracking information should be retained.

Requirement 9.4.4

Purpose

Without proper records of media movement, the location of media may become unknown, making it impossible to account for all media containing cardholder data. Maintaining logs helps ensure that media is tracked and can be located at all times.

Good Practice

A log should be maintained for all media sent outside the facility, including the date, the sender, the recipient, and the business reason for the transport. The log should be reviewed periodically to ensure completeness.

Requirement 9.4.5

Purpose

Maintaining an inventory of electronic media containing cardholder data helps ensure that all such media is accounted for and protected. Without an inventory, media may be lost or stolen without detection.

Good Practice

An inventory of all electronic media containing cardholder data should be maintained and updated regularly. The inventory should include the location, classification, and custodian of each piece of media. Periodic inventory checks should be performed.

Requirement 9.4.5.1

Purpose

Periodic inventories of electronic media help detect missing or misplaced media that could indicate theft or loss. Regular inventory verification supports timely detection and response to media-related security incidents.

Good Practice

Inventories should be conducted at a frequency defined by the entity's targeted risk analysis. Discrepancies should be investigated and resolved promptly.

Requirement 9.4.6

Purpose

Media that is no longer needed must be securely destroyed to prevent the data from being recovered. If media is not properly destroyed, cardholder data could be retrieved from discarded media.

Good Practice

Media should be destroyed using methods that ensure the data cannot be reconstructed, such as cross-cut shredding, incineration, or degaussing. The destruction method should be appropriate for the type of media. Destruction should be documented.

Examples

Methods for destroying media include cross-cut shredding for paper media, degaussing for magnetic media, and physical destruction or secure erasure for electronic media.

Requirement 9.4.6.1

Purpose

Hard-copy materials containing cardholder data that are not properly destroyed could be retrieved from trash or recycling. Cross-cut shredding, incineration, or other approved methods help ensure the data cannot be recovered.

Good Practice

Hard-copy materials should be cross-cut shredded, incinerated, or pulped so they cannot be reconstructed. Destruction should take place in a secure area. Third-party destruction services should be monitored and verified.

Requirement 9.4.7

Purpose

Electronic media containing cardholder data must be destroyed so that the data is unrecoverable. Standard deletion or formatting is not sufficient because data can often be recovered from media that has been formatted or had files deleted.

Good Practice

Electronic media should be rendered unrecoverable through secure erasure software, degaussing, or physical destruction. The method used should be appropriate for the type of media and should follow industry-accepted standards.

9.5: POI devices that capture payment card data via direct physical interaction with the payment card form factor are protected from tampering and unauthorized substitution, including the following: (a) Maintaining a list of POI devices, (b) Periodically inspecting POI devices to look for tampering or unauthorized substitution, (c) Training personnel to be aware of suspicious behavior and to report tampering or unauthorized substitution of devices.
  • Examine documented policies and procedures to verify that processes are defined that include all elements specified in this requirement.
Description

Requirement 9.5.1

Purpose

Point-of-interaction (POI) devices that capture payment card data are targets for attackers who may attempt to tamper with or substitute devices to capture cardholder data. Protecting POI devices helps prevent skimming and other attacks.

Good Practice

A list of all POI devices should be maintained, including the make, model, location, and serial number. The list should be kept up to date and verified periodically.

Definitions

POI devices include point-of-sale (POS) terminals, mobile payment devices, and other devices used to capture payment card data at the point of interaction with the cardholder.

Requirement 9.5.1.1

Purpose

Maintaining an up-to-date list of POI devices helps ensure that all devices are accounted for and can be verified. Without a device list, it would be difficult to detect a substituted or additional unauthorized device.

Good Practice

The device list should include the make and model, location, and serial number of each device. The list should be updated whenever devices are added, removed, or relocated.

Requirement 9.5.1.2

Purpose

Periodic inspection of POI device surfaces helps detect tampering or unauthorized substitution. Skimming devices or other tampering may be difficult to detect without careful inspection.

Good Practice

POI devices should be periodically inspected to detect signs of tampering, such as unexpected attachments, changes in appearance, or broken seals. Personnel should be trained on how to identify signs of device tampering.

Examples

Signs of tampering include unexpected attachments or overlays on the device, changes to the serial number or appearance, broken security seals or labels, differences in color or material, and additional wiring or components.

Requirement 9.5.1.2.1

Purpose

The frequency of POI device inspections should be based on a risk analysis that considers the device's exposure to tampering, its location, and the volume of transactions processed. Higher-risk devices should be inspected more frequently.

Good Practice

A targeted risk analysis should be performed to determine the appropriate inspection frequency for each device or group of devices. Factors to consider include the device's physical accessibility, the level of supervision, and any history of tampering in the area.

Requirement 9.5.1.3

Purpose

Training personnel who interact with POI devices helps them recognize signs of tampering or substitution. Without awareness training, tampered or substituted devices may go undetected for extended periods.

Good Practice

Training should include how to verify device identity, how to recognize signs of tampering, and how to report suspicious behavior. Personnel should be aware of the risks of device tampering and the importance of prompt reporting.

9.5: An up-to-date list of POI devices is maintained, including: (a) Make and model of the device, (b) Location of device, (c) Device serial number or other methods of unique identification.
  • Examine the list of POI devices to verify it includes all elements specified in this requirement.
  • Observe POI devices and device locations and compare to devices in the list to verify that the list is accurate and up to date.
  • Interview personnel to verify the list of POI devices is updated when devices are added, relocated, decommissioned, etc.
Description

Requirement 9.5.1

Purpose

Point-of-interaction (POI) devices that capture payment card data are targets for attackers who may attempt to tamper with or substitute devices to capture cardholder data. Protecting POI devices helps prevent skimming and other attacks.

Good Practice

A list of all POI devices should be maintained, including the make, model, location, and serial number. The list should be kept up to date and verified periodically.

Definitions

POI devices include point-of-sale (POS) terminals, mobile payment devices, and other devices used to capture payment card data at the point of interaction with the cardholder.

Requirement 9.5.1.1

Purpose

Maintaining an up-to-date list of POI devices helps ensure that all devices are accounted for and can be verified. Without a device list, it would be difficult to detect a substituted or additional unauthorized device.

Good Practice

The device list should include the make and model, location, and serial number of each device. The list should be updated whenever devices are added, removed, or relocated.

Requirement 9.5.1.2

Purpose

Periodic inspection of POI device surfaces helps detect tampering or unauthorized substitution. Skimming devices or other tampering may be difficult to detect without careful inspection.

Good Practice

POI devices should be periodically inspected to detect signs of tampering, such as unexpected attachments, changes in appearance, or broken seals. Personnel should be trained on how to identify signs of device tampering.

Examples

Signs of tampering include unexpected attachments or overlays on the device, changes to the serial number or appearance, broken security seals or labels, differences in color or material, and additional wiring or components.

Requirement 9.5.1.2.1

Purpose

The frequency of POI device inspections should be based on a risk analysis that considers the device's exposure to tampering, its location, and the volume of transactions processed. Higher-risk devices should be inspected more frequently.

Good Practice

A targeted risk analysis should be performed to determine the appropriate inspection frequency for each device or group of devices. Factors to consider include the device's physical accessibility, the level of supervision, and any history of tampering in the area.

Requirement 9.5.1.3

Purpose

Training personnel who interact with POI devices helps them recognize signs of tampering or substitution. Without awareness training, tampered or substituted devices may go undetected for extended periods.

Good Practice

Training should include how to verify device identity, how to recognize signs of tampering, and how to report suspicious behavior. Personnel should be aware of the risks of device tampering and the importance of prompt reporting.

9.5: POI device surfaces are periodically inspected to detect tampering and unauthorized substitution.
  • Examine documented procedures to verify processes are defined for periodic inspections of POI device surfaces to detect tampering and unauthorized substitution.
  • Interview responsible personnel and observe inspection processes to verify: • Personnel are aware of procedures for inspecting devices. • All devices are periodically inspected for evidence of tampering and unauthorized substitution.
Description

Requirement 9.5.1

Purpose

Point-of-interaction (POI) devices that capture payment card data are targets for attackers who may attempt to tamper with or substitute devices to capture cardholder data. Protecting POI devices helps prevent skimming and other attacks.

Good Practice

A list of all POI devices should be maintained, including the make, model, location, and serial number. The list should be kept up to date and verified periodically.

Definitions

POI devices include point-of-sale (POS) terminals, mobile payment devices, and other devices used to capture payment card data at the point of interaction with the cardholder.

Requirement 9.5.1.1

Purpose

Maintaining an up-to-date list of POI devices helps ensure that all devices are accounted for and can be verified. Without a device list, it would be difficult to detect a substituted or additional unauthorized device.

Good Practice

The device list should include the make and model, location, and serial number of each device. The list should be updated whenever devices are added, removed, or relocated.

Requirement 9.5.1.2

Purpose

Periodic inspection of POI device surfaces helps detect tampering or unauthorized substitution. Skimming devices or other tampering may be difficult to detect without careful inspection.

Good Practice

POI devices should be periodically inspected to detect signs of tampering, such as unexpected attachments, changes in appearance, or broken seals. Personnel should be trained on how to identify signs of device tampering.

Examples

Signs of tampering include unexpected attachments or overlays on the device, changes to the serial number or appearance, broken security seals or labels, differences in color or material, and additional wiring or components.

Requirement 9.5.1.2.1

Purpose

The frequency of POI device inspections should be based on a risk analysis that considers the device's exposure to tampering, its location, and the volume of transactions processed. Higher-risk devices should be inspected more frequently.

Good Practice

A targeted risk analysis should be performed to determine the appropriate inspection frequency for each device or group of devices. Factors to consider include the device's physical accessibility, the level of supervision, and any history of tampering in the area.

Requirement 9.5.1.3

Purpose

Training personnel who interact with POI devices helps them recognize signs of tampering or substitution. Without awareness training, tampered or substituted devices may go undetected for extended periods.

Good Practice

Training should include how to verify device identity, how to recognize signs of tampering, and how to report suspicious behavior. Personnel should be aware of the risks of device tampering and the importance of prompt reporting.

9.5: Training is provided for personnel in POI environments to be aware of attempted tampering or replacement of POI devices, and includes: (a) Verifying the identity of any third-party persons claiming to be repair or maintenance personnel, before granting them access to modify or troubleshoot devices, (b) Procedures to ensure devices are not installed, replaced, or returned without verification, (c) Being aware of suspicious behavior around devices, (d) Reporting suspicious behavior and indications of device tampering or substitution to appropriate personnel.
  • Review training materials for personnel in POI environments to verify they include all elements specified in this requirement.
  • Interview personnel in POI environments to verify they have received training and know the procedures for all elements specified in this requirement.
Description

Requirement 9.5.1

Purpose

Point-of-interaction (POI) devices that capture payment card data are targets for attackers who may attempt to tamper with or substitute devices to capture cardholder data. Protecting POI devices helps prevent skimming and other attacks.

Good Practice

A list of all POI devices should be maintained, including the make, model, location, and serial number. The list should be kept up to date and verified periodically.

Definitions

POI devices include point-of-sale (POS) terminals, mobile payment devices, and other devices used to capture payment card data at the point of interaction with the cardholder.

Requirement 9.5.1.1

Purpose

Maintaining an up-to-date list of POI devices helps ensure that all devices are accounted for and can be verified. Without a device list, it would be difficult to detect a substituted or additional unauthorized device.

Good Practice

The device list should include the make and model, location, and serial number of each device. The list should be updated whenever devices are added, removed, or relocated.

Requirement 9.5.1.2

Purpose

Periodic inspection of POI device surfaces helps detect tampering or unauthorized substitution. Skimming devices or other tampering may be difficult to detect without careful inspection.

Good Practice

POI devices should be periodically inspected to detect signs of tampering, such as unexpected attachments, changes in appearance, or broken seals. Personnel should be trained on how to identify signs of device tampering.

Examples

Signs of tampering include unexpected attachments or overlays on the device, changes to the serial number or appearance, broken security seals or labels, differences in color or material, and additional wiring or components.

Requirement 9.5.1.2.1

Purpose

The frequency of POI device inspections should be based on a risk analysis that considers the device's exposure to tampering, its location, and the volume of transactions processed. Higher-risk devices should be inspected more frequently.

Good Practice

A targeted risk analysis should be performed to determine the appropriate inspection frequency for each device or group of devices. Factors to consider include the device's physical accessibility, the level of supervision, and any history of tampering in the area.

Requirement 9.5.1.3

Purpose

Training personnel who interact with POI devices helps them recognize signs of tampering or substitution. Without awareness training, tampered or substituted devices may go undetected for extended periods.

Good Practice

Training should include how to verify device identity, how to recognize signs of tampering, and how to report suspicious behavior. Personnel should be aware of the risks of device tampering and the importance of prompt reporting.