To conform to the data governance policies mentioned in the left pane, J.K avro superstore implements the security solution from DB2.
The following table shows the mapping between the PCI requirement and DB2 security features.
PCI Goals and Requirements | DB2 Feature |
---|---|
Build and Maintain a Secure Network | |
Requirement 1: Install and maintain a firewall configuration to protect cardholder data | |
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters. | |
Protect Cardholder Data | |
Requirement 3: Protect stored cardholder data | Roles, Authorities |
Requirement 4: Encrypt transmission of cardholder data across open, public networks. | SSL Support |
Maintain a Vulnerability Management Program | |
Requirement 5: Use and regularly update anti-virus software | |
Requirement 6: Develop and maintain secure systems and applications | |
Implement Strong Access Control Measures | |
Requirement 7: Restrict access to cardholder data by business need-to-know | Authorities, Row Level LBAC,Column Level LBAC |
Requirement 8: Assign a unique ID to each person with computer access | Trusted Context |
Requirement 9: Restrict physical access to cardholder data | |
Regularly Monitor and Test Networks | |
Requirement 10: Track and monitor all access to network resources and cardholder data | Audit, Data Encryption |
Requirement 11: Regularly test security systems and processes |