WithPCI Logo
WithPCI.com

12.1.1 An overall information security policy

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

12.1.1 An overall information security policy is:

  • Established.
  • Published.
  • Maintained.
  • Disseminated to all relevant personnel, as well as to relevant vendors and business partners.

Customized Approach Objective

The strategic objectives and principles of information security are defined, adopted, and known to all personnel.

Defined Approach Testing Procedures

12.1.1 Examine the information security policy and interview personnel to verify that the overall information security policy is managed in accordance with all elements specified in this requirement.

Purpose

An organization's overall information security policy ties to and governs all other policies and procedures that define protection of cardholder data.

The information security policy communicates management's intent and objectives regarding the protection of its most valuable assets, including cardholder data.

Without an information security policy, individuals will make their own value decisions on the controls that are required within the organization which may result in the organization neither meeting its legal, regulatory, and contractual obligations, nor being able to adequately protect its assets in a consistent manner.

To ensure the policy is implemented, it is important that all relevant personnel within the organization, as well as relevant third parties, vendors, and business partners are aware of the organization's information security policy and their responsibilities for protecting information assets.

Good Practice

The security policy for the organization identifies the purpose, scope, accountability, and information that clearly defines the organization's position regarding information security.

The overall information security policy differs from individual security policies that address specific technology or security disciplines. This policy sets forth the directives for the entire organization whereas individual security policies align and support the overall security policy and communicate specific objectives for technology or security disciplines.

It is important that all relevant personnel within the organization, as well as relevant third parties, vendors, and business partners are aware of the organization's information security policy and their responsibilities for protecting information assets.

Definitions

"Relevant" for this requirement means that the information security policy is disseminated to those with roles applicable to some or all the topics in the policy, either within the company or because of services/functions performed by a vendor or third party.

purpose

Document and communicate information security policies and procedures.

compliance strategies

  • Central policy repository
  • Annual review and staff training

typical policies

  • Information Security Policy
  • Acceptable Use Policy

common pitfalls

  • Outdated documentation
  • Staff unaware of policies

type

Documentation Control

difficulty

Low

key risks

  • Inconsistent security practices

recommendations

  • Use document management systems for version control

Eligible SAQ

  • SAQ-A-EP
  • SAQ-B
  • SAQ-B-IP
  • SAQ-C
  • SAQ-C-VT
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy