WithPCI Logo
WithPCI.com

12.10 Suspected and confirmed security incidents that could impact the CDE are responded to immediately.

This requirement ensures that organizations have proper incident response procedures in place to quickly and effectively respond to security incidents that could impact cardholder data, minimizing potential damage and facilitating recovery.

Sub-requirements:

12.10. An incident response plan is established and maintained.

Ensure that an incident response plan is documented, assigned, tested, and maintained to address security incidents involving cardholder data.

https://WithPCI.com
8
Sub-requirements
12
Test Points
Low-Moderate (2.3)
Implementation Difficulty

Control Types

Process
Documentation
Training
Process: 8
Documentation: 2
Training: 1

Key Risks

Uncoordinated or delayed incident response
Untrained responders
Inability to contain or recover from incidents

Frequently Asked Questions

What is required in an incident response plan?

Procedures for identifying, containing, eradicating, and recovering from security incidents, including roles and responsibilities.

How often must the incident response plan be tested?

At least annually, and after significant changes to systems or personnel.

Who should be trained on the incident response plan?

All personnel with responsibilities in the plan, including IT, security, and management.

How is evidence of testing and training maintained?

Through test reports, attendance logs, and training records.

What happens if an incident response plan is not maintained?

The organization may be unable to respond effectively to incidents, increasing risk and potential impact.

Common QSA Questions

Can you show your incident response plan and evidence of testing?

Yes, we maintain the current plan and logs of all tests and training sessions.

How are personnel trained and assigned to incident response roles?

Training is provided annually, and roles are documented in the plan and organizational charts.

How are incidents tracked and reviewed?

Through incident logs, post-incident reviews, and continuous improvement processes.

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy