Sub-Requirement 8.8 (Update: v3.0 11/2013)

8.8 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are documented, in use, and known to all affected parties. (Maps to prior Requirement 12.2)

  • Examine documentation interview personnel to verify that security policies and operational procedures for encrypting transmissions of cardholder data are:
    • Documented
    • In use
    • Known to all affected parties

Illustrative Controls and the TIBCO LogLogic Solution

Personnel need to be aware of and following security policies and operational procedures for managing the secure transmission of cardholder data on a continuous basis

Reports and Alerts

Use the link/reference to see the 8.8 reports and alerts: 8.8 on page 133.