
{"id":207,"date":"2007-06-22T11:40:27","date_gmt":"2007-06-22T14:40:27","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=207"},"modified":"2007-06-22T11:40:27","modified_gmt":"2007-06-22T14:40:27","slug":"payment-card-industry-data-security-standard-pci-dss","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/","title":{"rendered":"Payment Card Industry Data Security Standard (PCI DSS)"},"content":{"rendered":"<p>Entender el est\u00c3\u00a1ndar PCI DSS puede ser algo enrevesado. Quiz\u00c3\u00a1s alguien pueda necesitar echar un ojo a este paper, PCI DSS made easy, que aunque tiene un tinte comercial de la empresa GFI muy marcado, no deja de ser un documento para entender este est\u00c3\u00a1ndar de una manera accesible. En lo que al est\u00c3\u00a1ndar respecta, comentar que la versi\u00c3\u00b3n actual es la de Septiembre de 2006, numerada como versi\u00c3\u00b3n 1.1. Desafortunadamente, no existe un versi\u00c3\u00b3n en castellano. El est\u00c3\u00a1ndar tiene 6 dominios, en los que se definen 12 requisitos para construir una infraestructura confiable para el procesado de transacciones mediante tarjetas de pago. Los requisitos son elementales, y son de f\u00c3\u00a1cil adopci\u00c3\u00b3n para cualquier Entidad que se proponga cumplir con los est\u00c3\u00a1ndares: 1. Construir y mantener una infraestructura segura Requisito 1: Instalar y mantener una configuraci\u00c3\u00b3n de firewall para proteger los datos de titulares de tarjetas. Requisito 2: No emplear configuraciones por defecto en los elementos de protecci\u00c3\u00b3n. 2. Proteger los datos de los titulares Requisito 3: Proteger los datos de titulares de tarjeta almacenados. Requisito 4: Cifrar las transmisiones de datos de titulares de tarjeta en redes abiertas y p\u00c3\u00bablicas. 3. Mantener un programa de gesti\u00c3\u00b3n de las vulnerabilidades Requisito 5: Emplear y actualizar peri\u00c3\u00b3dicamente el software antivirus. Requisito 6: DEsarrollar y mantener sistemas y aplicaciones seguras. 4. Implementar medidas fuertes de control de acceso Requisito 7: Restringir el acceso a los datos de titulares al \u00c3\u00a1mbito de lo estrictamente necesario para ofrecer el servicio. Requisito 8: Asignar un identificador \u00c3\u00banico a cada persona con acceso a equipos de proceso. Requisito 9: Restringir la seguridad f\u00c3\u00adsica para acceder a los datos de titulares. 5. Monitorizar y someter a pruebas regulares las redes Requisito 10: Monitorizar y hacer seguimiento a todos los recursos de red y a los datos de titulares. Requisito 11: Probar regularmente la seguridad de los sistemas y procesos. 6. Mantener una Pol\u00c3\u00adtica de Seguridad de la Informaci\u00c3\u00b3n Requisito 12: Mantener una pol\u00c3\u00adtica que cubra la seguridad de la informaci\u00c3\u00b3n. Como pod\u00c3\u00a9is comprobar, nada nuevo bajo el sol. Una eficiente combinaci\u00c3\u00b3n de infraestructura segura, datos protegidos, gesti\u00c3\u00b3n de vulnerabilidades, control de acceso adecuado, monitorizaci\u00c3\u00b3n y aplicaci\u00c3\u00b3n en todos los niveles de las adecuadas pol\u00c3\u00adticas y procedimientos deber\u00c3\u00ada ser suficiente. Aunque, como todos sabemos, un m\u00c3\u00adnimo descuido en cualquiera de estos \u00c3\u00a1mbitos implica que todo el sistema se venga abajo.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/\">http:\/\/www.sahw.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Entender el est\u00c3\u00a1ndar PCI DSS puede ser algo enrevesado. Quiz\u00c3\u00a1s alguien pueda necesitar echar un ojo a este paper, PCI DSS made easy, que aunque tiene un tinte comercial de la empresa GFI muy marcado, no deja de ser un documento para entender este est\u00c3\u00a1ndar de una manera accesible. En lo que al est\u00c3\u00a1ndar respecta, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,1],"tags":[],"class_list":["post-207","post","type-post","status-publish","format-standard","hentry","category-articulos","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Payment Card Industry Data Security Standard (PCI DSS)<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Payment Card Industry Data Security Standard (PCI DSS)\",\"datePublished\":\"2007-06-22T14:40:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Art\u00c3\u00adculos\",\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Payment Card Industry Data Security Standard (PCI DSS)\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-06-22T14:40:27+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Payment Card Industry Data Security Standard (PCI DSS)","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Payment Card Industry Data Security Standard (PCI DSS)","datePublished":"2007-06-22T14:40:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Art\u00c3\u00adculos","Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/","url":"https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Payment Card Industry Data Security Standard (PCI DSS)","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-06-22T14:40:27+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/payment-card-industry-data-security-standard-pci-dss\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/207\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}