Are there alternatives to encrypting stored data?
Stored cardholder data should be rendered unreadable according to requirement 3 of the PCI Security Audit Procedures document. If encryption, truncation, or another comparable approach cannot be used, encryption options should continue to be investigated as the technology is rapidly evolving. In the interim, while encryption solutions are being investigated, stored data must be strongly protected by compensating controls.

An example of compensating controls for encryption of stored data is complex network segmentation that may include the following:

1. Internal firewalls that specifically protect the database
2. TCP wrappers or firewall on the database to specifically limit who can connect to the database
3. Separation of the corporate internal network on a different network segment from production, Fire walled away from database servers.
(1205 vote(s))
Not helpful

Comments (0)
Help Desk Software by Kayako
© 2018 Comodo Security Solutions, Inc. All rights reserved.