{"id":210,"date":"2021-08-19T15:15:28","date_gmt":"2021-08-19T13:15:28","guid":{"rendered":"https:\/\/www.edilog.de\/network\/?p=210"},"modified":"2025-09-29T13:49:53","modified_gmt":"2025-09-29T11:49:53","slug":"data-security-standard-der-kredikartenindustrie-pci-dss","status":"publish","type":"post","link":"https:\/\/www.edilog.de\/network\/2021\/08\/19\/data-security-standard-der-kredikartenindustrie-pci-dss\/","title":{"rendered":"Data Security Standard der Kredikartenindustrie (PCI DSS)"},"content":{"rendered":"<p>Die wesentlichen Regelungen\u00a0des Data Security Standard der Kredikartenindustrie (PCI DSS) f\u00fcr den Bereich Data Security\u00a0sind:<\/p>\n<p><strong>1. Build and Maintain a Secure Network<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 1: Install and maintain a firewall configuration to protect cardholder data<\/li>\n<li>Requirement 2: Do not use vendor-supplied defaults for system passwords and other<br \/>\nsecurity parameters<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>2. Protect Cardholder Data<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 3: Protect stored cardholder data<\/li>\n<li>Requirement 4: Encrypt transmission of cardholder data across open, public networks<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>3. Maintain a Vulnerability Management Program<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 5: Use and regularly update anti-virus software<\/li>\n<li>Requirement 6: Develop and maintain secure systems and applications<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>4. Implement Strong Access Control Measures<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 7: Restrict access to cardholder data by business need-to-know<\/li>\n<li>Requirement 8: Assign a unique ID to each person with computer access<\/li>\n<li>Requirement 9: Restrict physical access to cardholder data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>5. Regularly Monitor and Test Networks<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 10: Track and monitor all access to network resources and cardholder data<\/li>\n<li>Requirement 11: Regularly test security systems and processes<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6. Maintain an Information Security Policy<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Requirement 12: Maintain a policy that addresses information security<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Weitere Informationen zum Data Security Standard der Kredikartenindustrie (PCI DSS) finden Sie\u00a0<a href=\"https:\/\/www.pcisecuritystandards.org\/security_standards\/pci_dss.shtml\" target=\"_blank\" rel=\"noopener\">hier<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die wesentlichen Regelungen\u00a0des Data Security Standard der Kredikartenindustrie (PCI DSS) f\u00fcr den Bereich Data Security\u00a0sind: 1. Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2. Protect Cardholder Data Requirement 3: Protect &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.edilog.de\/network\/2021\/08\/19\/data-security-standard-der-kredikartenindustrie-pci-dss\/\" class=\"more-link\"><span class=\"screen-reader-text\">\u201eData Security Standard der Kredikartenindustrie (PCI DSS)\u201c<\/span> weiterlesen<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9,21,26],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/posts\/210"}],"collection":[{"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":0,"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edilog.de\/network\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}