EasyManuals Logo

VeriFone Vx520 Implementation Guide

VeriFone Vx520
34 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
Author
Jevgenijs Smirnovs
Document name
Verifone Payment Core
Point VxPC F02.01.xxx
Implementation Guide
E-mail
jevgenijs.smirnovs@verifone.com
Date
12-Jun-2015
Phone
+371 67844726
Page number
5
Version
1.0
© 2015 VeriFone. All rights reserved. VeriFone, the VeriFone logo, Vx, Mx, VeriCentre, VeriShield, Verix V, Verix and PAYware are either
trademarks or registered trademarks of VeriFone in the United States and/or other countries. All other trademarks or brand names are the
properties of their respective holders. All features and specifications are subject to change without notice.
The information contained in this document is confidential and property of VeriFone, Inc. This material may not be copied or published, or
divulged in part or in totality without written permission form VeriFone, Inc.
Table of contents
1. Introduction .................................................................................................................................... 7
2. Summary of PCI DSS requirements ................................................................................................. 9
2.1. Build and Maintain a Secure Network ...................................................................................... 9
Requirement 1: Install and maintain a firewall configuration to protect cardholder data ............ 9
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security
parameters .................................................................................................................................... 12
2.2. Protect Cardholder Data ......................................................................................................... 12
Requirement 3: Protect stored cardholder data .......................................................................... 12
Requirement 4: Encrypt transmission of cardholder data across open, public networks ............ 14
2.3. Maintain a Vulnerability Management Program .................................................................... 15
Requirement 5: Protect all systems against malware and regularly update anti-virus software or
programs ....................................................................................................................................... 15
Requirement 6: Develop and maintain secure systems and applications .................................... 16
2.4. Implement Strong Access Control Measures ......................................................................... 16
Requirement 7: Restrict access to cardholder data by business need to know ........................... 16
Requirement 8: Identify and authenticate access to system components .................................. 17
Requirement 9: Restrict physical access to cardholder data ........................................................ 18
2.5. Regularly Monitor and Test Networks ................................................................................... 19
Requirement 10: Track and monitor all access to network resources and cardholder data........ 19
Requirement 11: Regularly test security systems and processes ................................................. 20
2.6. Maintain an Information Security Policy ................................................................................ 21
Requirement 12: Maintain a policy that addresses information security for employees and
contractors .................................................................................................................................... 21
3. How to set up your Point Vx to ensure PCI DSS compliance ........................................................ 22
3.1. Do not retain full magnetic stripe or card validation code .................................................... 22
3.2. Protect stored card holder data ............................................................................................. 23
3.3. Protect wireless transmissions ............................................................................................... 23
3.4. Facilitate secure remote software updates............................................................................ 24
3.5. Encrypt sensitive traffic over public networks ....................................................................... 25

Table of Contents

Other manuals for VeriFone Vx520

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the VeriFone Vx520 and is the answer not in the manual?

VeriFone Vx520 Specifications

General IconGeneral
Peripheral PortsRS-232, USB
Power Supply100-240 VAC, 50/60 Hz
Operating Temperature0°C to 50°C (32°F to 122°F)
Processor400 MHz ARM11
Memory128 MB Flash
Display128 x 64 pixel LCD with backlight
ConnectivityDial-up, Ethernet
Card ReadersEMV chip
ContactlessOptional
PrinterIntegrated thermal printer
SecurityPCI PTS
SAM Slots3
ComplianceEMV Level 1 & 2, RoHS

Related product manuals