WithPCI Logo
WithPCI.com

6.3 Security vulnerabilities are identified and addressed.

This requirement focuses on the processes for identifying, managing, and addressing security vulnerabilities in systems and software. It covers vulnerability monitoring, risk ranking, software inventory maintenance, and protection against known vulnerabilities.

Sub-requirements:

6.3. Custom and bespoke software are developed securely.

Ensure custom and bespoke software are developed using secure coding standards, reviewed for vulnerabilities, and remediated before release.

https://WithPCI.com
3
Sub-requirements
6
Test Points
High (5.0)
Implementation Difficulty

Control Types

Process
Technical
Process: 2
Technical: 3

Key Risks

Introduction of vulnerabilities during development
Unreviewed or insecure code released to production
Lack of remediation for identified issues

Frequently Asked Questions

What standards should be used for secure coding?

Industry best practices such as OWASP and SANS secure coding guidelines.

How should code be reviewed?

Through a combination of automated scanning tools and manual peer reviews.

What happens if vulnerabilities are found during review?

They must be remediated before the software is released to production.

How often should secure coding standards be updated?

At least annually or when new threats are identified.

Who should be trained on secure coding practices?

All developers and anyone involved in software development.

Common QSA Questions

Can you show evidence of code reviews prior to production release?

Yes, we maintain records of all code reviews and vulnerability scans.

How do you ensure secure coding standards are followed?

We provide training, use secure coding checklists, and enforce standards through code review.

What is your process for remediating vulnerabilities in custom software?

All identified issues are tracked, remediated, and verified before release.

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy