Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CMP-2461: Requirement 9 is not applicable #12166

Merged
merged 1 commit into from
Jul 18, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
82 changes: 37 additions & 45 deletions controls/pcidss_4_ocp4.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2387,36 +2387,28 @@ controls:
and understood.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.1.1
title: All security policies and operational procedures that are identified in Requirement 9
are Documented, Kept up to date, In use and Known to all affected parties.
levels:
- base
status: pending
notes: |-
Examine documentation and interview personnel to verify that security policies and
operational procedures identified in Requirement 9 are managed in accordance with all
elements specified in this requirement.
status: not applicable

- id: 9.1.2
title: Roles and responsibilities for performing activities in Requirement 9 are documented,
assigned, and understood.
levels:
- base
status: pending
notes: |-
Examine documentation and interview personnel to verify that day-to-day responsibilities
for performing all the activities in Requirement 9 are documented, assigned and understood
by the assigned personnel.
status: not applicable

- id: '9.2'
title: Physical access controls manage entry into facilities and systems containing cardholder
data.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.2.1
title: Appropriate facility entry controls are in place to restrict physical access to
Expand All @@ -2425,14 +2417,14 @@ controls:
System components in the CDE cannot be physically accessed by unauthorized personnel.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.2.1.1
title: Individual physical access to sensitive areas within the CDE is monitored with
either video cameras or physical access control mechanisms (or both).
levels:
- base
status: pending
status: not applicable

- id: 9.2.2
title: Physical and/or logical controls are implemented to restrict use of publicly
Expand All @@ -2442,7 +2434,7 @@ controls:
facility.
levels:
- base
status: pending
status: not applicable

- id: 9.2.3
title: Physical access to wireless access points, gateways, networking/communications
Expand All @@ -2451,45 +2443,40 @@ controls:
Physical networking equipment cannot be accessed by unauthorized personnel.
levels:
- base
status: pending
status: not applicable

- id: 9.2.4
title: Access to consoles in sensitive areas is restricted via locking when not in use.
description: |-
Physical consoles within sensitive areas cannot be used by unauthorized personnel.
levels:
- base
status: pending
notes: |-
Related to requirement 8.2.8.
This requirement asks to observe a system administrator's attempt to log into consoles in
sensitive areas and verify that they are "locked" to prevent unauthorized use. Therefore
it is a manual requirement applicable only very specific circumstances.
status: not applicable

- id: '9.3'
title: Physical access for personnel and visitors is authorized and managed.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.3.1
title: Procedures are implemented for authorizing and managing physical access of personnel
to the CDE.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.3.1.1
title: Physical access to sensitive areas within the CDE for personnel is controlled
levels:
- base
status: pending
status: not applicable

- id: 9.3.2
title: Procedures are implemented for authorizing and managing visitor access to the CDE.
levels:
- base
status: pending
status: not applicable

- id: 9.3.3
title: Visitor badges or identification are surrendered or deactivated before visitors leave
Expand All @@ -2498,36 +2485,41 @@ controls:
Visitor identification or badges cannot be reused after expiration.
levels:
- base
status: pending
status: not applicable

- id: 9.3.4
title: A visitor log is used to maintain a physical record of visitor activity within the
facility and within sensitive areas.
levels:
- base
status: pending
status: not applicable

- id: '9.4'
title: Media with cardholder data is securely stored, accessed, distributed, and destroyed.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.4.1
title: All media with cardholder data is physically secured.
description: |-
Media with cardholder data cannot be accessed by unauthorized personnel.
levels:
- base
status: pending
status: not applicable
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was wondering whether this requirement isn't actually manual, instead of not applicable

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I could see several of these controls being manual if you consider the physical perspective (e.g., you need to build fences around your cluster to meet requirement 9.2).

Marking them as manual seems to align with what RHEL did. Either way, I don't think these statuses will show up in the actual operator since they're not backed by any rules.

notes: |-
Openshift uses the Kubernetes persistent volume (PV) framework, which allows separation
between storage provisioners and consumers.
The payment entity needs to ensure that they are using persistent storages for which
they have control over its location and physical access.
controls:
- id: 9.4.1.1
title: Offline media backups with cardholder data are stored in a secure location.
description: |-
Offline backups cannot be accessed by unauthorized personnel.
levels:
- base
status: pending
status: not applicable

- id: 9.4.1.2
title: The security of the offline media backup location(s) with cardholder data is
Expand All @@ -2537,7 +2529,7 @@ controls:
inspection.
levels:
- base
status: pending
status: not applicable

- id: 9.4.2
title: All media with cardholder data is classified in accordance with the sensitivity of
Expand All @@ -2546,7 +2538,7 @@ controls:
Media are classified and protected appropriately.
levels:
- base
status: pending
status: not applicable

- id: 9.4.3
title: Media with cardholder data sent outside the facility is secured.
Expand All @@ -2558,7 +2550,7 @@ controls:
- Offsite tracking logs include details about media location.
levels:
- base
status: pending
status: not applicable

- id: 9.4.4
title: Management approves all media with cardholder data that is moved outside the facility
Expand All @@ -2570,15 +2562,15 @@ controls:
"manager" as part of their title.
levels:
- base
status: pending
status: not applicable

- id: 9.4.5
title: Inventory logs of all electronic media with cardholder data are maintained.
description: |-
Accurate inventories of stored electronic media are maintained.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.4.5.1
title: Inventories of electronic media with cardholder data are conducted at least once
Expand All @@ -2587,14 +2579,14 @@ controls:
Media inventories are verified periodically.
levels:
- base
status: pending
status: not applicable

- id: 9.4.6
title: Hard-copy materials with cardholder data are destroyed when no longer needed for
business or legal reasons.
levels:
- base
status: pending
status: not applicable

- id: 9.4.7
title: Electronic media with cardholder data is destroyed when no longer needed for business
Expand All @@ -2604,27 +2596,27 @@ controls:
- The cardholder data is rendered unrecoverable so that it cannot be reconstructed.
levels:
- base
status: pending
status: not applicable

- id: '9.5'
title: Point-of-interaction (POI) devices are protected from tampering and unauthorized
substitution.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.5.1
title: POI devices that capture payment card data via direct physical interaction with the
payment card form factor are protected from tampering and unauthorized substitution.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.5.1.1
title: An up-to-date list of POI devices is maintained.
levels:
- base
status: pending
status: not applicable

- id: 9.5.1.2
title: POI device surfaces are periodically inspected to detect tampering and unauthorized
Expand All @@ -2634,7 +2626,7 @@ controls:
or have skimming attachments installed without timely detection.
levels:
- base
status: pending
status: not applicable
controls:
- id: 9.5.1.2.1
title: The frequency of periodic POI device inspections and the type of inspections
Expand All @@ -2646,14 +2638,14 @@ controls:
required and must be fully considered during a PCI DSS assessment.
levels:
- base
status: pending
status: not applicable

- id: 9.5.1.3
title: Training is provided for personnel in POI environments to be aware of attempted
tampering or replacement of POI devices.
levels:
- base
status: pending
status: not applicable

- id: '10.1'
title: Processes and mechanisms for logging and monitoring all access to system components and
Expand Down
Loading