Ingenico Direct Support Site

Results for

icon-search-large No search results yet
Enter your search query above

The Prioritized Approach includes six milestones. The matrix below summarizes the high-level goals and intentions of each milestone. The PCI-SSC Prioritized Approach  document maps the milestones to each of all twelve PCI DSS requirements and their sub-requirements. In doing so you handle those requirements important for the first and following milestones.

1 Remove sensitive authentication data and limit data retention.
This milestone targets the storage of cardholder data. Remember if sensitive authentication data and other cardholder data are not stored, the effects of a compromise will be greatly reduced. If you don’t need it, don’t store it.
2 Protect systems and networks, and be prepared to respond to a system breach.
This milestone targets controls for points of access to most compromises, and the processes for responding on a suspected breach.
3 Secure payment card applications.
This milestone targets controls for applications, application processes, and application servers. Weaknesses in these areas offer easy prey for compromising systems and obtaining access to cardholder data.
4 Monitor and control access to your systems.
Controls for this milestone allow you to detect the who, what, when, and how concerning who is accessing your network and cardholder data environment.
5 Protect stored cardholder data.
For those who have analyzed their business processes and determined that they must store Primary Account Numbers, Milestone Five targets key protection mechanisms for that stored data.
6 Finalize remaining compliance efforts, and ensure all controls are in place.
The intent of Milestone Six is to complete PCI DSS requirements, and to finalize all remaining related policies, procedures, and processes needed to protect the cardholder data environment.

Prioritized Approach Tool

The Prioritized Approach Tool is an excel that links the requirements from SAQ D to the  Milestones for Prioritizing PCI DSS Compliance Efforts. So starting with milestone 1 you are able to select the appropriate controls from the Prioritized Approach Tool to complete milestone 1. After completing milestone 1 you can continue with the remaining milestones in the same way. The Prioritized Approach Tool can be downloaded here: