This article provides guidance to help organizations identify the systems that need to be included in the PCI DSS scope at a minimum. In addition, it provides guidance on how to use segmentation to help reduce the number of systems that require PCI DSS control measures.
Vulnerabilities are constantly found by malicious individuals and researchers, and new software is introduced to them. System components, processes, and custom applications should be periodically reviewed to ensure an evolving environment continues to represent security controls.
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!