PCI DSS Compliance Report

Compliance with the PCI DSS Multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures. is an ongoing process, not a "set-it-and-forget-it" project. As part of maintaining compliance, you need to identify areas in which your organization is not in compliance. You can also use the PCI DSS compliance requirements to address key information security issues and risks, especially in relation to other relevant regulations (e.g., HIPAA, GLBA, state privacy/disclosure laws, CALEA). In addition to maintaining compliance, periodic self-assessment is an important tool for identifying areas that need improvement, and can help save costs if an assessor is required for validation of PCI DSS compliance.

Both trial and full versions of the HS-PCI module include the ability to audit EFT Server for compliance with the PCI DSS requirements. EFT Server's Auditing and Reporting module (ARM) scans all PCI DSS requirements addressed in EFT Server, and reports on the compliance status of each (Pass, Fail, or Warning). The report also provides a description of the requirement tested for each item. For failed requirements, the report presents a reason the non-compliant setting was used, if you provided one at the time that particular setting was disabled/changed.

The ARM is used to store the PCI DSS violations. If the ARM is disabled, the violations are still recorded; however, the justifications that you type when you accept a non-compliant setting are not recorded in the database. You can still run the compliance report, but the justifications that you provide will not appear in the report.

Reporting of failed items occurs at the highest level of failure only, except in the case of an explicit setting that violates compliance. For example:

To generate the PCI DSS compliance report

For a description of each PCI DSS requirement covered in the report, see Possible PCI DSS Compliance Report Outcomes.

For details of creating and generating reports, see Auditing and Reporting Module (ARM).

Related Topics

Warnings for PCI DSS Violations

PCI DSS Requirements

Possible PCI DSS Compliance Report Outcomes

Introduction to Event Rules

Creating Event Rules

Event Timer Rule

Generate Report Action