Skip to main content

๐Ÿ’ผ 9 Restrict physical access to cardholder data

  • Contextual name: ๐Ÿ’ผ 9 Restrict physical access to cardholder data
  • ID: /frameworks/pci-dss-v3.2.1/09
  • Located in: ๐Ÿ’ผ PCI DSS v3.2.1

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-2453b035

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.3
ย ย ย ย ๐Ÿ’ผ 9.1.1 Use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas.
ย ย ย ย ๐Ÿ’ผ 9.1.2 Implement physical and/or logical controls to restrict access to publicly accessible network jacks.
ย ย ย ย ๐Ÿ’ผ 9.1.3 Restrict physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines.
๐Ÿ’ผ 9.2 Develop procedures to easily distinguish between onsite personnel and visitors.
๐Ÿ’ผ 9.3 Control physical access for onsite personnel to sensitive areas.
๐Ÿ’ผ 9.4 Implement procedures to identify and authorize visitors.4
ย ย ย ย ๐Ÿ’ผ 9.4.1 Visitors are authorized before entering, and escorted at all times within, areas where cardholder data is processed or maintained.
ย ย ย ย ๐Ÿ’ผ 9.4.2 Visitors are identified and given a badge or other identification that expires and that visibly distinguishes the visitors from onsite personnel.
ย ย ย ย ๐Ÿ’ผ 9.4.3 Visitors are asked to surrender the badge or identification before leaving the facility or at the date of expiration.
ย ย ย ย ๐Ÿ’ผ 9.4.4 A visitor log is used to maintain a physical audit trail of visitor activity to the facility as well as computer rooms and data centers where cardholder data is stored or transmitted.
๐Ÿ’ผ 9.5 Physically secure all media.1
ย ย ย ย ๐Ÿ’ผ 9.5.1 Store media backups in a secure location, preferably an off-site facility.
๐Ÿ’ผ 9.6 Maintain strict control over the internal or external distribution of any kind of media.3
ย ย ย ย ๐Ÿ’ผ 9.6.1 Classify media so the sensitivity of the data can be determined.
ย ย ย ย ๐Ÿ’ผ 9.6.2 Send the media by secured courier or other delivery method that can be accurately tracked.
ย ย ย ย ๐Ÿ’ผ 9.6.3 Ensure management approves any and all media that is moved from a secured area.
๐Ÿ’ผ 9.7 Maintain strict control over the storage and accessibility of media.1
ย ย ย ย ๐Ÿ’ผ 9.7.1 Properly maintain inventory logs of all media and conduct media inventories at least annually
๐Ÿ’ผ 9.8 Destroy media when it is no longer needed for business or legal reasons.2
ย ย ย ย ๐Ÿ’ผ 9.8.1 Shred, incinerate, or pulp hard-copy materials so that cardholder data cannot be reconstructed.
ย ย ย ย ๐Ÿ’ผ 9.8.2 Render cardholder data on electronic media unrecoverable so that cardholder data cannot be reconstructed.
๐Ÿ’ผ 9.9 Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution.3
ย ย ย ย ๐Ÿ’ผ 9.9.1 Maintain an up-to-date list of devices.
ย ย ย ย ๐Ÿ’ผ 9.9.2 Periodically inspect device surfaces to detect tampering, or substitution.
ย ย ย ย ๐Ÿ’ผ 9.9.3 Provide training for personnel to be aware of attempted tampering or replacement of devices.
๐Ÿ’ผ 9.10 Ensure that security policies and operational procedures for restricting physical access to cardholder data are documented, in use, and known to all affected parties.