Sub-Requirement 6.7 (Update: v3.0 11/2013)

6.7 Ensure that security policies and operational procedures for managing vendor defaults and other security parameters are documented, in use, and known to all affected parties. (Maps to prior Requirement 12.2)

  • Examine documentation interview personnel to verify that security policies and operational procedures for encrypting transmissions of cardholder data are:
    • Documented
    • In use
    • Known to all affected parties

Illustrative Controls and the TIBCO LogLogic Solution

  • Personnel need to be aware of and following security policies and operational procedures for managing the secure transmission of cardholder data on a continuous basis

Reports and Alerts

Use the link/reference to see the 6.7 reports and alerts: 6.7 on page 107.