Примеры использования Cardholder data на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Control and manage logical access to the cardholder data environment.
Restrict access to cardholder data by business need to know 66.
Remote-access technologies are frequent"back doors" to critical resources and cardholder data.
Possession of such information could facilitate compromise of the system and related cardholder data.
Limiting access to data resources will help prevent cardholder data from being presented to unauthorized resources.
proper encryption strength to encrypt cardholder data.
A record of all individual accesses to cardholder data can identify which accounts may have been compromised or misused.
Implement a formal security awareness program to make all personnel aware of the cardholder data security policy and procedures.
observe the processes to verify that cardholder data on removable media is encrypted wherever stored.
documents the existence of all cardholder data in their environment, to verify that no cardholder data exists outside of the currently defined CDE.
back-office rooms at retail locations that store cardholder data, and storage areas for large quantities of cardholder data. .
Keep cardholder data storage to a minimum by implementing data retention and disposal policies, procedures and processes that include at least the following for all cardholder data(CHD) storage.
router configurations to verify that outbound traffic from the cardholder data environment to the Internet is explicitly authorized.
Interview administrative personnel to confirm that all users are assigned a unique ID for access to system components or cardholder data.
Review the security awareness program to verify it provides awareness to all personnel about the cardholder data security policy and procedures.
Security vulnerabilities in custom code are commonly exploited by malicious individuals to gain access to a network and compromise cardholder data.
outbound traffic necessary for the cardholder data environment.
A process to test the effectiveness of the methods used for data discovery ensures the completeness and accuracy of cardholder data detection.
Applications that fail to adequately encrypt network traffic using strong cryptography are at increased risk of being compromised and exposing cardholder data.
or transmit cardholder data from those that do not.