EasyManua.ls Logo

Toast PCI - Page 40

Default Icon
44 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
• Is performed at least annually and upon
significant changes to the environment (for
example, acquisition, merger, relocation,
etc.),
• Identifies critical assets, threats, and
vulnerabilities, and
• Results in a formal, documented analysis of
risk.
Examples of risk-assessment methodologies
include but are not limited to OCTAVE, ISO
27005 and NIST SP 800-30.
12.3 Develop usage policies for critical
technologies and define proper use of these
technologies.
Note: Examples of critical technologies
include, but are not limited to, remote access
and wireless technologies, laptops, tablets,
removable electronic media, e-mail usage
and Internet usage.
Ensure these usage policies require the
following:
12.3.1 Explicit approval by authorized parties
You are responsible for
maintaining appropriate
policies and processes.
12.3.2 Authentication for use of the
technology
You are responsible for
maintaining appropriate
policies and processes.
12.3.3 A list of all such devices and personnel
with access
You are responsible for
maintaining appropriate
policies and processes.
12.3.5 Acceptable uses of the technology
You are responsible for
maintaining appropriate
policies and processes.
12.3.6 Acceptable network locations for the
technologies
You are responsible for
maintaining appropriate
policies and processes.
12.3.8 Automatic disconnect of sessions for
remote-access technologies after a specific
period of inactivity
In the event our support personnel
require remote access for
troubleshooting, you will be provided with
instruction on secure connection and
disconnection.
You are responsible for
maintaining appropriate
policies and processes.
12.3.9 Activation of remote-access
technologies for vendors and business
partners only when needed by vendors and
In the event our support personnel
require remote access for
troubleshooting, you will be provided with
You are responsible for
maintaining appropriate
policies and processes.
PCI Instruction Guide
© Toast 2018
Page 40 of 44

Related product manuals