WithPCI Logo
WithPCI.com

9.4 Media with cardholder data is securely stored, accessed, distributed, and destroyed.

This requirement focuses on ensuring that media containing cardholder data is securely stored, accessed, distributed, and destroyed, preventing unauthorized access, copying, or destruction of sensitive information.

Controls for physically securing media are intended to prevent unauthorized persons from gaining access to cardholder data on any media. Cardholder data is susceptible to unauthorized viewing, copying, or scanning if it is unprotected while it is on removable or portable media, printed out, or left on someone's desk.

Sub-requirements:

9.4. Media containing cardholder data is securely managed, stored, and destroyed.

Ensure that all media containing cardholder data is protected from unauthorized access, tracked, and securely destroyed when no longer needed.

https://WithPCI.com
10
Sub-requirements
21
Test Points
Low-Moderate (2.2)
Implementation Difficulty

Control Types

Physical
Process
Documentation
Physical: 3
Process: 9
Documentation: 1

Key Risks

Theft or loss of sensitive media
Improper media destruction
Untracked movement of media

Frequently Asked Questions

What types of media are covered?

Any physical media containing cardholder data, including paper, backup tapes, USB drives, and hard disks.

How should media be stored?

In locked, access-controlled locations with access limited to authorized personnel.

How is media movement tracked?

Through check-in/check-out logs, chain of custody records, and inventory systems.

How should media be destroyed?

By shredding, degaussing, or other methods that render data unrecoverable.

How often should media inventories be conducted?

At least annually, or more frequently as defined by policy.

Common QSA Questions

Can you show your media inventory and destruction logs?

Yes, we maintain detailed records of all media inventories and destruction activities.

How is media containing cardholder data transported?

Only by authorized personnel or secure couriers, with tracking and management approval.

How do you ensure proper media destruction?

We use certified destruction methods and retain certificates of destruction.

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy