WithPCI Logo
WithPCI.com

A1.2.3 Processes or mechanisms are implemented for reporting and addressing suspected or confirmed security incidents and vulnerabilities.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

A1.2.3 Processes or mechanisms are implemented for reporting and addressing suspected or confirmed security incidents and vulnerabilities, including:

  • Customers can securely report security incidents and vulnerabilities to the provider.
  • The provider addresses and remediates suspected or confirmed security incidents and vulnerabilities according to Requirement 6.3.1.

Customized Approach Objective

Suspected or confirmed security incidents or vulnerabilities are discovered and addressed. Customers are informed where appropriate.

Applicability Notes

This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.

Defined Approach Testing Procedures

A1.2.3 Examine documented procedures and interview personnel to verify that the provider has a mechanism for reporting and addressing suspected or confirmed security incidents and vulnerabilities, in accordance with all elements specified in this requirement.

Purpose

Security vulnerabilities in the provided services can impact the security of all the service provider's customers and therefore must be managed in accordance with the service provider's established processes, with priority given to resolving vulnerabilities that have the highest probability of compromise.

Customers are likely to notice vulnerabilities and security misconfigurations while using the service.

Implementing secure methods for customers to report security incidents and vulnerabilities encourages customers to report potential issues and enable the provider to quickly learn about and address potential issues within their environment.

purpose

Provide tenants with access to their own logs upon request.

compliance strategies

  • Self-service log portals
  • Formal request process

typical policies

  • Tenant Log Access Policy

common pitfalls

  • Delayed log delivery
  • Logs not filtered for tenant

type

Process Control

difficulty

Moderate

key risks

  • Tenants unable to meet compliance or investigate incidents

recommendations

  • Automate log access for tenants

Eligible SAQ

  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy