WithPCI Logo
WithPCI.com

System & Configuration Management Policy Template

Company Name [Company Name]
Effective Date [Date]
Version [Version Number, e.g., 1.0]
Policy Owner [CISO/IT Director]
Document Classification Confidential / Internal Use Only
Parent Policy Information Security Policy

Purpose

This policy establishes the requirements for the secure configuration, management, and maintenance of all information technology systems and assets throughout their lifecycle at [Company Name]. The purpose is to ensure systems are hardened against threats, configured consistently according to approved baselines, inventoried accurately, patched promptly, monitored effectively, and securely decommissioned. This minimizes security risks, ensures operational stability, protects sensitive data (including but not limited to cardholder data), and supports compliance with regulatory requirements, including PCI DSS 4.0.1.


Scope

This policy applies to all company-owned or managed IT assets, including servers (physical and virtual), workstations, laptops, mobile devices (if accessing company resources), network devices (routers, switches, firewalls, VPNs, wireless APs), operating systems, databases, applications (developed in-house or commercial off-the-shelf), cloud services (IaaS, PaaS, SaaS configurations), and IoT devices. It covers all environments including production, development, testing, and disaster recovery, with specific attention to systems within or impacting the Cardholder Data Environment (CDE). All employees, contractors, consultants, and third parties involved in the design, deployment, configuration, management, or decommissioning of these assets are subject to this policy.


Roles and Responsibilities

Role/Group Key Responsibilities
Executive Management Provide oversight and resources for system and configuration management; Establish risk tolerance regarding system security and stability.
CISO/IT Director Own and approve this policy; Oversee the implementation and effectiveness of system hardening, configuration management, patching, and related controls.
Information Security Team Develop and maintain secure configuration standards (baselines); Conduct vulnerability scans and penetration tests; Monitor system compliance; Review and approve security configurations; Manage security tools (e.g., VA scanners, config monitoring).
IT Operations/System Administrators Implement and maintain systems according to approved build standards; Apply patches and configuration changes; Manage configuration backups; Maintain asset inventory; Respond to alerts; Perform decommissioning tasks.
Network Engineering Team Implement and maintain secure configurations for network devices according to standards; Manage network configuration backups.
Application Development Team Develop applications using secure coding practices; Ensure applications function correctly on hardened systems; Participate in secure configuration definition for application platforms.
System/Application Owners Define functional requirements; Participate in defining secure configurations for their systems; Approve changes affecting their systems; Ensure systems are included in inventory and monitoring.
Change Advisory Board (CAB) Review and approve significant configuration changes, system deployments, and decommissioning activities impacting critical systems or the CDE.
Compliance/Audit Team Periodically review system configurations, patch levels, inventory accuracy, and process documentation for compliance and effectiveness.
All Users Use systems according to acceptable use policies; Report suspected security issues or performance anomalies promptly.

Policy Requirements

1. Asset Management Policy

  • Inventory: Maintain a comprehensive and accurate inventory of all IT assets within the scope of this policy. The inventory must include, at a minimum: asset identifier, type, location (physical/logical), owner, classification/criticality, operating system/firmware version, and status (e.g., production, test, decommissioned). Systems within the CDE must be explicitly identified. (PCI DSS Req 2.4).
  • Ownership: Assign ownership (business and technical) for each asset in the inventory.
  • Classification: Classify assets based on criticality and the sensitivity of data they process or store, aligning with the Data Classification scheme.
  • Review: The asset inventory must be reviewed and updated at least quarterly, or more frequently upon changes (commissioning, decommissioning, significant configuration changes). Automation should be used where feasible to maintain inventory accuracy.

2. System Configuration Policy / Secure Build Standards

  • Baseline Configurations: Develop, document, and maintain secure baseline configuration standards for all operating systems, network devices, databases, applications, and cloud services. Standards must be based on industry best practices (e.g., CIS Benchmarks, DISA STIGs) and vendor hardening guidelines.
  • Hardening Requirements: Baseline standards must include, at a minimum:
    • Changing all vendor-supplied default credentials (passwords, SNMP strings) before deployment (PCI DSS Req 2.2.2, Req 2.2.3).
    • Disabling or removing unnecessary services, protocols, daemons, and functions (PCI DSS Req 2.2.4).
    • Configuring system security parameters securely (e.g., password complexity, logging, access controls) (PCI DSS Req 2.2.5).
    • Removing unnecessary default accounts or disabling them (PCI DSS Req 2.2.3).
  • Server Build Standard: A specific, documented standard must exist for building servers (Windows, Linux, etc.), incorporating the baseline hardening requirements, standard software stack, monitoring agents, and initial patching levels. Builds should be automated where possible to ensure consistency.
  • Single Functionality: Configure servers and system components to perform only necessary functions required for their specific role in the environment. For example, web servers, database servers, and DNS servers should be implemented on separate systems or securely isolated virtual instances (PCI DSS Req 2.2.1).
  • Compliance Monitoring**: Implement automated tools where feasible to monitor system configurations against approved baselines and detect unauthorized changes or configuration drift. Address deviations promptly.
  • Review: Baseline standards must be reviewed and updated at least annually, or when significant new threats or vulnerabilities emerge.

3. Patch Management

  • Implement a formal patch management process to identify, risk-assess, test, deploy, and verify security patches for all systems and software within scope.
  • Monitor reputable sources for security patch information (e.g., vendor notifications, CERT alerts).
  • Risk-rank patches based on vulnerability severity (e.g., CVSS score) and asset criticality.
  • Deploy critical/high-risk patches within defined timeframes (e.g., 30 days for critical, 90 days for high). PCI DSS requires critical vulnerabilities to be addressed promptly (Req 6.3.3 requires addressing within 30 days for internet-facing CDE components).
  • Test patches in a non-production environment representative of production systems before widespread deployment, where feasible.
  • Maintain records of patch deployment status and any exceptions (which require documented risk acceptance and compensating controls).

4. Vulnerability Management

  • Implement a vulnerability management program that includes regular internal and external vulnerability scanning, performed by qualified personnel or approved scanning vendors (ASVs for external PCI scans).
  • Conduct authenticated internal scans and external scans at least quarterly, and after any significant change.
  • Remediate identified vulnerabilities according to risk ratings and timelines defined in the Patch Management process. High/Critical vulnerabilities in the CDE require prioritized remediation.
  • Perform annual penetration testing (internal and external, including network and application layers), or more frequently based on risk. Segmentation checks must be performed every six months for CDE environments.
  • Address findings from scans and penetration tests in a timely manner, documenting remediation efforts.

5. System Commissioning Checklist & Process

  • Implement a formal process for commissioning new systems or significant upgrades into the production environment.
  • A System Commissioning Checklist must be completed before go-live, verifying:
    • System is registered in the Asset Inventory.
    • System is built according to the approved Secure Build Standard and baseline configuration.
    • All vendor defaults are changed.
    • All applicable security patches are installed.
    • System is hardened (unnecessary services/ports disabled).
    • Monitoring/logging agents are installed and functional.
    • Configuration backups are scheduled.
    • Vulnerability scan completed with no outstanding critical/high vulnerabilities.
    • System documentation (build guide, topology impact) is complete.
    • Formal approval obtained from System Owner, Information Security, and via Change Management process.
  • Documentation of checklist completion must be retained.

6. Configuration Backup Policy

  • Implement procedures to back up critical system configurations for all key infrastructure components, including network devices (firewalls, routers, switches), servers (OS configuration), security appliances (IDS/IPS, WAF), and critical applications.
  • Define backup frequency based on change frequency and criticality (e.g., daily for frequently changing firewalls, weekly for stable servers).
  • Store configuration backups securely, with access restricted to authorized personnel. Consider storing copies offsite or in a separate security domain.
  • Periodically test the restoration process for critical configuration backups (at least annually) to ensure recoverability.
  • Document backup schedules, storage locations, retention periods, and restoration procedures.

7. Legacy System Security Plan

  • Identify and inventory all systems considered "legacy" – those that cannot fully meet current security standards (e.g., cannot be patched, use unsupported OS/software, lack required security features).
  • For each legacy system, develop a Legacy System Security Plan that includes:
    • Documented business justification for continued use.
    • Formal risk assessment identifying specific vulnerabilities and potential impacts.
    • Implemented compensating controls (e.g., network isolation/segmentation, enhanced monitoring, application-layer firewalls, restricted access).
    • A defined plan and timeline for migrating away from or decommissioning the legacy system.
  • Legacy System Security Plans require formal risk acceptance by Executive Management and the CISO, reviewed at least annually. Access to legacy systems must be strictly controlled.

8. Decommissioning Process

  • Implement a formal process for securely decommissioning systems and assets when they are retired or replaced.
  • Data Removal: Ensure all sensitive data (including CHD, PII) is securely removed from systems/media prior to disposal or reuse, using methods aligned with the Data Protection & Encryption Policy (e.g., secure wipe per NIST SP 800-88, degaussing, physical destruction). Retain records of data destruction.
  • Access Removal: Remove all system access accounts and network connectivity associated with the decommissioned asset.
  • Inventory Update: Update the asset inventory to reflect the decommissioned status.
  • Configuration Removal: Remove related configurations from other systems (e.g., firewall rules, monitoring checks, backup jobs).
  • Documentation: Document the decommissioning steps taken, including data destruction verification, and retain records for audit purposes.

9. Monitoring and Logging

  • Implement system-level logging to record security-relevant events (logins, access changes, administrative actions, errors) according to the Access Management and Data Protection policies.
  • Enable logging on all system components, synchronize clocks using a central time source (NTP), and forward logs to a central SIEM system.
  • Monitor systems for security alerts, performance issues, and indications of compromise or misconfiguration. Integrate configuration monitoring alerts into the SIEM/SOC workflow.

Enforcement

  • Failure to comply with this System & Configuration Management Policy may result in disciplinary action, up to and including termination of employment or contract, in accordance with established HR policies and contractual agreements.
  • Systems found to be non-compliant with configuration standards or patching requirements may be quarantined or disconnected from the network until remediated.
  • Exceptions to this policy (e.g., delayed patching, deviations from baseline) require a documented business justification, formal risk assessment identifying potential impacts and compensating controls, and written approval from the CISO/IT Director. Approved exceptions must be time-bound and reviewed regularly (e.g., quarterly).

Revision History

Version Date Author Change Details
1.0 [Date] [Author Name] Initial policy release
[Ver #] [Date] [Author Name] [Summary of changes]

Approval

Name Title Signature Date
[Exec Name] [Executive Title, e.g., CTO] [Date]
[CISO Name] [CISO/IT Director Title] [Date]

Appendix A: System Commissioning Process Flow

graph TD
    A[Request New System or Upgrade] --> B{Define Requirements and Config}
    B --> C[Build System per Standard]
    C --> D[Apply Patches and Harden]
    D --> E[Install Monitoring and Backup Agents]
    E --> F{Perform Vulnerability Scan}
    F --|Vulnerabilities Found|--> G[Remediate Vulnerabilities]
    G --> F
    F --|Clean Scan|--> H[Complete Commissioning Checklist]
    H --> I{Security and Owner Approval?}
    I --|Yes|--> J{"Submit Change Request (CAB)"}
    I --|No|--> K[Address Issues or Reject]
    K --> B
    J --|Approved|--> L[Deploy to Production]
    L --> M[Update Inventory and Documentation]
    M --> N[System Operational]

    subgraph Preparation_Build
        A
        B
        C
        D
        E
    end

    subgraph Validation_Approval
        F
        G
        H
        I
        J
        K
    end

    subgraph Deployment_Closure
        L
        M
        N
    end

Appendix B: Server Build Standard - Key Elements Example

  1. Operating System: Approved OS version (e.g., Windows Server 2022 LTSC, RHEL 8.x). Install minimal required components/roles.
  2. Partitioning: Standard disk layout (e.g., separate OS, logs, application data partitions).
  3. Hardening:
    • Apply relevant CIS Benchmark Level 1 profile (or equivalent standard).
    • Disable unnecessary services (e.g., print spooler on non-print servers, SMBv1).
    • Configure secure protocols (e.g., disable TLS 1.0/1.1, enable strong ciphers).
    • Implement local firewall rules (allow necessary ports only).
    • Change all default passwords/accounts.
    • Configure strong password policies and lockout settings.
    • Enable detailed security logging (forwarded to SIEM).
  4. Patching: Install all current critical and high-severity OS and application patches before production deployment.
  5. Software: Install standard management agents (monitoring, backup, EDR, config management). Install only approved application software.
  6. Access Control: Configure local user groups; grant administrative access only to authorized personnel/groups via RBAC. Enable MFA for admin access.
  7. Documentation: Record build options, deviations, initial configuration details.

Appendix C: System Commissioning Checklist - Example Snippets

  • Asset Inventory: Asset registered in CMDB/Inventory with correct Owner, Location, Classification.
  • Build Standard: OS version matches standard; Build documentation referenced.
  • Hardening: CIS Benchmark score validated / Hardening script output reviewed; Default credentials confirmed changed; Unnecessary services confirmed disabled (provide list).
  • Patching: OS and critical applications patched to current approved level (Patch report attached).
  • Security Software: EDR agent installed, reporting to console; Monitoring agent installed, reporting; Backup agent installed, first backup scheduled.
  • Logging: Logs being forwarded successfully to SIEM; Critical event logging verified.
  • Network Config: Static IP assigned (if required); Firewall rules requested/approved (CR#); DNS records created.
  • Access Control: Administrative access restricted to authorized groups; MFA confirmed for admin access.
  • Vulnerability Scan: Scan completed post-build/patching (Report attached); No Critical/High vulnerabilities outstanding OR risk acceptance documented (Ref#).
  • Configuration Backup: Configuration backup job created and scheduled.
  • Documentation: System diagrams updated; Runbook/operational procedures drafted/updated.
  • Approvals: System Owner Sign-off; Information Security Sign-off; Change Request Approved (CR#).

Appendix D: Decommissioning Process Checklist - Example

  1. Authorization: Change Request approved for decommissioning.
  2. Communication: Notify relevant users/system owners of schedule.
  3. Application Removal: Uninstall/disable applications gracefully; migrate application data if needed.
  4. Data Backup (Final): Perform final backup if required for archival (confirm retention needs).
  5. Data Sanitization: Securely wipe/destroy storage media according to Data Protection policy (Method used:, Verification:, Date:, By:). Record serial numbers of destroyed media if applicable.
  6. Network Isolation: Disconnect network cables; remove system from VLANs.
  7. Configuration Removal: Remove firewall rules, DNS records, monitoring checks, backup jobs, application integrations related to the system.
  8. Access Removal: Remove system accounts from directories (AD etc.); Remove system from domain; Revoke service account credentials used by the system.
  9. Inventory Update: Mark asset as "Decommissioned" in CMDB/Inventory; Record disposal date/method.
  10. Physical Disposal: Arrange for secure physical disposal or return of leased equipment.
  11. Documentation Finalization: Update all related documentation; Close Change Request.

Appendix E: PCI DSS 4.0.1 System & Configuration Management Requirements Matrix

PCI DSS Requirement Relevant Policy Section(s) Key Controls Covered
Req 2 (Overall)** Policy Req 2 (System Config/Build), Req 5 (Commissioning), Req 7 (Legacy) Harden systems, change defaults, disable unnecessary services/functions, secure configuration standards.
2.2.1 Policy Req 2 (Single Functionality) Configure systems for a single primary function.
2.2.2, 2.2.3 Policy Req 2 (Hardening Requirements), Req 5 (Commissioning Checklist) Change vendor-supplied defaults; Remove/disable default accounts before installing systems.
2.2.4 Policy Req 2 (Hardening Requirements) Enable only necessary services, protocols, daemons.
2.2.5 Policy Req 2 (Hardening Requirements) Configure system security parameters securely.
2.4 Policy Req 1 (Asset Management) Maintain inventory of system components in scope for PCI DSS.
Req 6 (Overall)** Policy Req 3 (Patch Mgmt), Req 4 (Vuln Mgmt), Req 5 (Commissioning) Maintain inventory of bespoke/custom software, Secure software development (referenced), Patch management, Vulnerability Mgmt.
6.3 (Incl 6.3.1-6.3.3)** Policy Req 3 (Patch Management) Process to identify/install security patches; Address critical vulnerabilities promptly (within 30 days for CDE).
9.5.1.2 (New) Policy Req 8 (Decommissioning Process - Data Removal) Securely render stored CHD unrecoverable upon electronic media disposal.
Req 10 (Overall)** Policy Req 9 (Monitoring and Logging) Log access and actions; Secure logs; Time synchronization.
10.3.1, 10.3.2 Policy Req 9 (Monitoring and Logging) Implement NTP; Synchronize clocks across systems.
Req 11 (Overall)** Policy Req 4 (Vulnerability Management), Req 1 (Asset Mgmt) Test security of systems and networks regularly (VA Scans, Pen Tests).
11.3 (Incl 11.3.1-11.3.2) Policy Req 4 (Vulnerability Management) Internal/External vulnerability scans (quarterly & post-change); ASV scans; Remediation process.
12.3.3 Policy Req 1 (Asset Mgmt), Req 2 (Config Mgmt), Req 5 (Commissioning), Req 8 (Decommissioning) Usage policies define proper use; Documentation updated upon environment changes.
12.5.2 Policy Req 5 (Commissioning), Req 6 (Config Backup), Req 8 (Decommissioning) Maintain operational procedures (build, backup, decommission).

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy