EasyManua.ls Logo

Toast PCI User Manual

Default Icon
44 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Toast PCI Instruction Guide
Question and Answer IconNeed help?

Do you have a question about the Toast PCI and is the answer not in the manual?

Toast PCI Specifications

General IconGeneral
BrandToast
ModelPCI
CategoryTouch terminals
LanguageEnglish

Summary

What are PCI DSS & PA-DSS

About PCI DSS

Explains the Payment Card Industry Data Security Standard (PCI DSS) and its scope.

About PA-DSS

Explains the Payment Application Data Security Standard (PA-DSS).

Merchant General Responsibilities

Data Capture and Removal

Installation and Removal of Devices

PCI DSS Controls Impact & Toast Responsibilities

Keyed to PCI DSS SAQ v3.2.1

Maps PCI DSS v3.2.1 requirements to Toast's role and merchant actions.

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Requirement 3: Protect stored cardholder data

3.2 Do not store sensitive authentication data (SAD) after authorization...

Prohibits storing sensitive authentication data post-authorization.

Requirement 4: Encrypt transmission of cardholder data across open, public networks

4.1 Use strong cryptography and security protocols...

Mandates strong cryptography for data transmission over networks.

Requirement 6: Develop and maintain secure systems and applications

6.2 Ensure that all system components and software are protected from known vulnerabilities...

Installing security patches to protect against vulnerabilities.

Requirement 7: Restrict access to cardholder data by business need to know

7.2 Establish an access control system(s)...

Establishing access control systems based on need-to-know.

Requirement 8: Assign a unique ID to each person with computer access

8.1 Define and implement policies and procedures to ensure proper user identification management...

Policies for user identification management for all system components.

8.3.2 Incorporate multi-factor authentication for all remote network access...

Multi-factor authentication for remote network access.

Requirement 9: Restrict physical access to cardholder data

9.9.2 Periodically inspect device surfaces to detect tampering...

Periodic inspection of devices for tampering or substitution.

Requirement 10: Track and monitor all access to network resources and cardholder data

10.1 Implement audit trails to link all access to system components to each individual user.

Implementing audit trails for user access to system components.

Requirement 11: Regularly test security systems and processes

Requirement 12: Maintain a policy that addresses information security for all personnel

12.10 Implement an incident response plan.

Implementing an incident response plan.

Related product manuals