Skip to content

Jackie Chen's IT Workshop

We are all apprentices in a craft where no one ever becomes a master.

  • BLOG
  • CONTACT
  • DEVOPS
  • LEARNING
  • PROJECTS
  • TSM
  • VIDEO

Tag: PCI

PCI DSS: Maintain a Vulnerability Management Program


Requirement 5: Use and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications

Jackie Chen Security Leave a comment May 18, 2011 1 Minute

PCI DSS: Protect Cardholder Data


Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks

Jackie Chen Security Leave a comment May 17, 2011 1 Minute

PCI DSS: Build and Maintain a Secure Network


Requirement 1: Install and maintain a firewall configuration to protect cardholder data   Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters  

Jackie Chen Security Leave a comment May 16, 2011 1 Minute

PCI DSS: Overview


PCI DSS stands for Paymenet Card Industry Data Security Standard. It provides a baseline of technical and operation requirements designed to protect cardholder data. And it applies to every entities involved in payment card process – including merchants, processors, accquires, issuers, and service providers, as well as all other entities that store, process or transmit … Continue reading PCI DSS: Overview →

Jackie Chen Security Leave a comment May 10, 2011 1 Minute

Translate

Search

Archives

Tags

AD Akamai Apache API Atlassian Automation AWS Backup Exec bamboo Bash Batch Script CentOS Challenge ChatOps Cisco Cloud Cluster Confluence Crowd DAG DevOps docker Elastic Beanstalk ELB ePO EVA Exchange Fedora Foreman Git Hubot Hyper-V Java Jira Kubernetes Lambda Linux Lync Nagios Nginx Nodejs OpenShift Outlook PCI PowerShell Puppet Python RDS RHEL S3 S60 V3 SAN SCOM SCVMM Security SharePoint Slack Spot SQL Server SSM StorWize Sumologic troubleshooting Trusted Advisor TSM tsung Ubuntu vCO VCOPS VMware VPN Windows Wireless XenApp Xymon

Categories

  • Atlassian (73)
  • Bookmarks (8)
  • Chanllenges (3)
  • Citrix (12)
  • Cloud (153)
  • Linux (134)
  • Microsoft (96)
  • Mobile (7)
  • Monitoring (39)
  • Network (49)
  • Others (13)
  • Scripting (134)
  • Security (61)
  • Storage (81)
  • Virtualization (135)
  • WWW (17)

Top Posts & Pages

  • Nginx Sample Config of HTTP and LDAPS Reverse Proxy
  • Fail to quiesce a virtual machine while taking snapshot
  • Hyper-V: A device attached to the system is not functioning
  • AWS ELB (CLB) vs ALB vs NLB
  • Ansible example - get dictionary value
  • When KMS key grant is created for Lambda execution role?
  • Diagram as Code Example
  • Configure Traefik Sticky Session in Kubernetes
  • Run Jira Data Center on Kubernetes Part Two
  • Run Jira Data Center on Kubernetes Part One

Recent Comments

AWS Cost Anomaly Det… on Why QuickSight increases Cloud…
Why QuickSight incre… on AWS Cost Anomaly Detectio…
Eric Kimminau on PowerShell: Using Credential F…
tsm login example -… on TSM 6.3: Create Schedule
Vladislav on User Directory Setting Trick i…
Vladislav on User Directory Setting Trick i…
Cavit on AWS DataSync vs S3 Sync
Denis on Fail to quiesce a virtual mach…
runcheng on When KMS key grant is created…
tuhinchakravorty on PowerCLI: Check ESXi Scratch L…
Website Powered by WordPress.com.
  • Follow Following
    • Jackie Chen's IT Workshop
    • Join 152 other followers
    • Already have a WordPress.com account? Log in now.
    • Jackie Chen's IT Workshop
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar