A1.2.3 Processes or mechanisms are implemented for reporting and addressing suspected or confirmed security incidents and vulnerabilities.
Defined Approach Requirements
A1.2.3 Processes or mechanisms are implemented for reporting and addressing suspected or confirmed security incidents and vulnerabilities, including:
- Customers can securely report security incidents and vulnerabilities to the provider.
- The provider addresses and remediates suspected or confirmed security incidents and vulnerabilities according to Requirement 6.3.1.
Customized Approach Objective
Suspected or confirmed security incidents or vulnerabilities are discovered and addressed. Customers are informed where appropriate.
Applicability Notes
This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.
Defined Approach Testing Procedures
A1.2.3 Examine documented procedures and interview personnel to verify that the provider has a mechanism for reporting and addressing suspected or confirmed security incidents and vulnerabilities, in accordance with all elements specified in this requirement.
Purpose
Security vulnerabilities in the provided services can impact the security of all the service provider's customers and therefore must be managed in accordance with the service provider's established processes, with priority given to resolving vulnerabilities that have the highest probability of compromise.
Customers are likely to notice vulnerabilities and security misconfigurations while using the service.
Implementing secure methods for customers to report security incidents and vulnerabilities encourages customers to report potential issues and enable the provider to quickly learn about and address potential issues within their environment.
purpose
Provide tenants with access to their own logs upon request.
compliance strategies
- Self-service log portals
- Formal request process
typical policies
- Tenant Log Access Policy
common pitfalls
- Delayed log delivery
- Logs not filtered for tenant
type
Process Control
difficulty
Moderate
key risks
- Tenants unable to meet compliance or investigate incidents
recommendations
- Automate log access for tenants
Eligible SAQ
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy