WithPCI Logo
WithPCI.com

Requirement 6.5.3: Pre-production environments are separated from production environments

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

6.5.3 Pre-production environments are separated from production environments and the separation is enforced with access controls.

Customized Approach Objective

Pre-production environments cannot introduce risks and vulnerabilities into production environments.

Defined Approach Testing Procedures

6.5.3.a Examine policies and procedures to verify that processes are defined for separating the pre-production environment from the production environment via access controls that enforce the separation.

6.5.3.b Examine network documentation and configurations of network security controls to verify that the pre-production environment is separate from the production environment(s).

6.5.3.c Examine access control settings to verify that access controls are in place to enforce separation between the pre-production and production environment(s).

Purpose

Due to the constantly changing state of pre-production environments, they are often less secure than the production environment.

Good Practice

Organizations must clearly understand which environments are test environments or development environments and how these environments interact on the level of networks and applications.

Definitions

Pre-production environments include development, testing, user acceptance testing (UAT), etc. Even where production infrastructure is used to facilitate testing or development, production environments still need to be separated (logically or physically) from pre-production functionality such that vulnerabilities introduced as a result of pre-production activities do not adversely affect production systems.

purpose

Document and approve all changes prior to implementation.

compliance strategies

  • Change request forms
  • Approval workflows

typical policies

  • Change Approval Policy

common pitfalls

  • No documentation of changes
  • No approval records

type

Process Control

difficulty

Low

key risks

  • Unauthorized or risky changes

recommendations

  • Centralize change documentation and approvals

Eligible SAQ

  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy