1. Assess – Identifying card holder data, taking an inventory of your assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose card holder data.
2. Remediate 0 fixing vulnerabilities and not storing card holder data unless you need it.
3. Report – Compiling and submitting required remediation validation records(if applicable), and submitting compliance reports to the acquiring bank and card brands.
Saturday, January 10, 2009
Labels: Software stuff
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment