Skip to main content

๐Ÿ’ผ 6 Develop and maintain secure systems and applications

  • Contextual name: ๐Ÿ’ผ 6 Develop and maintain secure systems and applications
  • ID: /frameworks/pci-dss-v3.2.1/06
  • Located in: ๐Ÿ’ผ PCI DSS v3.2.1

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-c05faa07

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 6.1 Establish a process to identify security vulnerabilities, using reputable outside sources for security vulnerability information, and assign a risk ranking to newly discovered security vulnerabilities.
๐Ÿ’ผ 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.1
๐Ÿ’ผ 6.3 Develop internal and external software applications securely.2
ย ย ย ย ๐Ÿ’ผ 6.3.1 Remove development, test and/or custom application accounts, user IDs, and passwords before applications become active or are released to customers.
ย ย ย ย ๐Ÿ’ผ 6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability.
๐Ÿ’ผ 6.4 Follow change control processes and procedures for all changes to system components.6
ย ย ย ย ๐Ÿ’ผ 6.4.1 Separate development/test environments from production environments, and enforce the separation with access controls.
ย ย ย ย ๐Ÿ’ผ 6.4.2 Separation of duties between development/test and production environments.
ย ย ย ย ๐Ÿ’ผ 6.4.3 Production data (live PANs) are not used for testing or development.
ย ย ย ย ๐Ÿ’ผ 6.4.4 Removal of test data and accounts from system components before the system becomes active / goes into production.
ย ย ย ย ๐Ÿ’ผ 6.4.5 Change control procedures.4
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 6.4.5.1 Documentation of impact.
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 6.4.5.2 Documented change approval by authorized parties.
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system.
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 6.4.5.4 Back-out procedures
ย ย ย ย ๐Ÿ’ผ 6.4.6 Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or changed systems and networks, and documentation updated as applicable.
๐Ÿ’ผ 6.5 Address common coding vulnerabilities in software-development processes.10
ย ย ย ย ๐Ÿ’ผ 6.5.1 Injection flaws, particularly SQL injection. Also consider OS Command Injection, LDAP and XPath injection flaws as well as other injection flaws.
ย ย ย ย ๐Ÿ’ผ 6.5.2 Buffer overflows.
ย ย ย ย ๐Ÿ’ผ 6.5.3 Insecure cryptographic storage.
ย ย ย ย ๐Ÿ’ผ 6.5.4 Insecure communications.
ย ย ย ย ๐Ÿ’ผ 6.5.5 Improper error handling.
ย ย ย ย ๐Ÿ’ผ 6.5.6 All โ€œhigh riskโ€ vulnerabilities identified in the vulnerability identification process.
ย ย ย ย ๐Ÿ’ผ 6.5.7 Cross-site scripting (XSS).
ย ย ย ย ๐Ÿ’ผ 6.5.8 Improper access control.
ย ย ย ย ๐Ÿ’ผ 6.5.9 Cross-site request forgery (CSRF).
ย ย ย ย ๐Ÿ’ผ 6.5.10 Broken authentication and session management.
๐Ÿ’ผ 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks.
๐Ÿ’ผ 6.7 Ensure that security policies and operational procedures for developing and maintaining secure systems and applications are documented, in use, and known to all affected parties.