NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/2015 12:37



Similar documents
Windows Server 2008/2012 Server Hardening

Service Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service

Web. Security Options Comparison

Defense Security Service Office of the Designated Approving Authority

Services on Server 11/5/ :00:00-12/4/ :59:59

CIS Microsoft Windows 7 Benchmark. v

Security Options... 1

Belarc Advisor Security Benchmark Summary

CIS Microsoft Windows Server v Benchmark

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

About Microsoft Windows Server 2003

Windows Server 2003 default services

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 31/03/ L Wyatt Update to procedure

How To Set A Group Policy On A Computer With A Network Security Policy On Itunes.Com (For Acedo) On A Pc Or Mac Mac (For An Ubuntu) On An Ubode (For Mac) On Pc Or Ip

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014

Secure configuration document

Defense Security Service Industrial Security Field Operations NISP Authorization Office. Technical Assessment Guide for Windows 7 Operating System

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

CHARON-VAX application note

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Did you know your security solution can help with PCI compliance too?

74% 96 Action Items. Compliance

Windows Operating Systems. Basic Security

Services Summary... 1

Windows Advanced Audit Policy Configuration

Windows 7 Core Services: Application Experience. Application Information. Background Intelligent Transfer. Base Filtering Engine.

Objectives. At the end of this chapter students should be able to:

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Windows 7, Enterprise Desktop Support Technician

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

GFI White Paper PCI-DSS compliance and GFI Software products

CIS Microsoft Windows Server Benchmark. v

Computer Security: Principles and Practice

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Agency Pre Migration Tasks

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Locking down a Hitachi ID Suite server

Microsoft Solutions for Security and Compliance. Windows Server 2003 Security Guide

GlobalSCAPE DMZ Gateway, v1. User Guide

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

SonicWALL PCI 1.1 Implementation Guide

FileCloud Security FAQ

Achieving PCI-Compliance through Cyberoam

Virtual Data Centre. User Guide

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Black Viper s Windows 10 Service Configurations» Black Viper

Security Configuration Benchmark For. Microsoft Windows 7. Version July 30 th 2010

A Guide to New Features in Propalms OneGate 4.0

Catapult PCI Compliance

MCSA Security + Certification Program

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

vcloud Director User's Guide

Configuring Security Features of Session Recording

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

70-685: Enterprise Desktop Support Technician

Configuring Windows Server 2008 Network Infrastructure

Windows 7, Enterprise Desktop Support Technician

Configuration Information

This section provides a summary of using network location profiles to identify network connection types. Details include:

2: Do not use vendor-supplied defaults for system passwords and other security parameters

R4: Configuring Windows Server 2008 Network Infrastructure

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Windows security for n00bs part 1 Security architecture & Access Control

Remote Administration

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure

SQL Server Hardening

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Colligo Engage Windows App 7.0. Administrator s Guide

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.

Activity 1: Scanning with Windows Defender

F-Secure Messaging Security Gateway. Deployment Guide

Networking Best Practices Guide. Version 6.5

Citrix Access Gateway Plug-in for Windows User Guide

vsphere Security ESXi 6.0 vcenter Server 6.0 EN

Kaseya Server Instal ation User Guide June 6, 2008

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

ILTA HANDS ON Securing Windows 7

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

TESTBED Win2012 Server

Chapter 6 Using Network Monitoring Tools

Transcription:

NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/2015 12:37 Compliance Score : 89.81% 370 of 412 rules passed 0 of 412 rules partially passed 42 of 412 rules failed Detailed PCI DSS v3.1 Requirements and Security Assessment Procedures: NNT PCI DSS Microsoft Windows Server 2012 R2. To obtain the latest version of this guide, please visit http://www.nntws.com. If you have questions, comments, or have identified ways to improve this guide, please write us at support@nntws.com 1 Build and Maintain a Secure Network and Systems: Requirement 1: Install and maintain a firewall 1.1 Requirement 1: Install and maintain a firewall configuration to protect cardholder data: Corporate Firewall and In-Scope Devices Internal Firewall 1.1.1 Requirement 1: Firewall configuration standards: Track and Approve Config Changes 1.1.1.1 A formal process for approving and testing all network connections and changes to the firewall and router configurations 1.2 Requirement 1: Install and maintain a firewall configuration to protect cardholder data: Windows Server Firewall 1.2.1 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Domain 1.2.1.1 Set 'Windows Firewall: Domain: Firewall state' to 'On (recommended)' 1.2.1.2 Set 'Windows Firewall: Domain: Inbound connections' to 'Block (default)' 1.2.1.3 Set 'Windows Firewall: Domain: Outbound connections' to 'Allow (default)' 1.2.1.4 Set 'Windows Firewall: Domain: Display a notification' to 'Yes (default)' 1.2.1.5 Set 'Windows Firewall: Domain: Allow unicast response' to 'No' 1.2.1.6 Set 'Windows Firewall: Domain: Apply local firewall rules' to 'Yes (default)' 1.2.1.7 Set 'Windows Firewall: Domain: Apply local connection security rules' to 'Yes (default)' 1.2.1.8 Set 'Windows Firewall: Domain: Logging: Name' to '%SYSTEMROOT%\System32\logfiles\firewall\domainfw.log' 1.2.1.9 Set 'Windows Firewall: Domain: Logging: Size limit (KB)' to '16,384 KB or greater ' 1.2.1.10 Set 'Windows Firewall: Domain: Logging: Log dropped packets' to 'Yes' 1.2.1.11 Set 'Windows Firewall: Domain: Logging: Log successful connections' to 'Yes' 1.2.2 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Private Profile 1.2.2.1 Set 'Windows Firewall: Private: Firewall state' to 'On (recommended)' 1.2.2.2 Set 'Windows Firewall: Private: Inbound connections' to 'Block (default)' 1.2.2.3 Set 'Windows Firewall: Private: Outbound connections' to 'Allow (default)' 1.2.2.4 Set 'Windows Firewall: Private: Display a notification' to 'Yes (default)' 1.2.2.5 Set 'Windows Firewall: Private: Allow unicast response' to 'No' 1.2.2.6 Set 'Windows Firewall: Private: Apply local firewall rules' to 'Yes (default)' 1.2.2.7 Set 'Windows Firewall: Private: Apply local connection security rules' to 'Yes (default)' 1.2.2.8 Set 'Windows Firewall: Private: Logging: Name' to '%SYSTEMROOT%\System32\logfiles\firewall\privatefw.log' Page 1

1.2.2.9 Set 'Windows Firewall: Private: Logging: Size limit (KB)' to '16,384 KB or greater' 1.2.2.10 Set 'Windows Firewall: Private: Logging: Log dropped packets' to 'Yes' 1.2.2.11 Set 'Windows Firewall: Private: Logging: Log successful connections' to 'Yes' 1.2.3 Requirement 1: Firewall configuration standards: Windows Firewall With Advanced Security - Public Profile 1.2.3.1 Set 'Windows Firewall: Public: Firewall state' to 'On (recommended)' 1.2.3.2 Set 'Windows Firewall: Public: Inbound connections' to 'Block (default)' 1.2.3.3 Set 'Windows Firewall: Public: Outbound connections' to 'Allow (default)' 1.2.3.4 Set 'Windows Firewall: Public: Display a notification' to 'Yes' 1.2.3.5 Set 'Windows Firewall: Public: Allow unicast response' to 'No' 1.2.3.6 Set 'Windows Firewall: Public: Apply local firewall rules' to 'Yes (default)' 1.2.3.7 Set 'Windows Firewall: Public: Apply local connection security rules' to 'No' 1.2.3.8 Set 'Windows Firewall: Public: Logging: Name' to '%SYSTEMROOT%\System32\logfiles\firewall\publicfw.log' 1.2.3.9 Set 'Windows Firewall: Public: Logging: Size limit (KB)' to '16,384 KB or greater' 1.2.3.10 Set 'Windows Firewall: Public: Logging: Log dropped packets' to 'Yes' 1.2.3.11 Set 'Windows Firewall: Public: Logging: Log successful connections' to 'Yes' 2 Build and Maintain a Secure Network and Systems: Requirement 2: Do not use vendor-supplied defaults 2.1 Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters: Develop configuration standards for all system components 2.1.1 Requirement 2: System Hardening - Default User Accounts 2.1.1.1 Set 'Accounts: Guest account status' to 'Disabled' 2.1.1.2 Configure 'Accounts: Rename administrator account' 2.1.1.3 Configure 'Accounts: Rename guest account' 2.1.2 Requirement 2: System Hardening - Personalization Rules 2.1.2.1 Set 'Enable screen saver' to 'Enabled' 2.1.2.2 Set 'Force specific screen saver: Screen saver executable name' to 'Enabled:scrnsave.scr' 2.1.2.3 Set 'Password protect the screen saver' to 'Enabled' 2.1.3 Requirement 2: System Hardening - Attachment Manager Rules 2.1.3.1 Set 'Do not preserve zone information in file attachments' to 'Disabled' 2.2 Requirement 2: System Hardening: Non-Default Services List - Verify that system configuration standards include the following procedures for all types of system components: - Changi 2.2.1 Requirement 2: System Hardening: Check for any Non-Default Services 2.2.1.1 Check for any Non-Default Services 2.3 Requirement 2: System Hardening: Mandatory Services List - Verify that system configuration standards include the following procedures for all types of system components: - Changin Page 2

2.3.1 Requirement 2: System Hardening: Mandatory Services List 2.3.1.1 App Readiness Service 2.3.1.2 Application Experience Service 2.3.1.3 Application Host Helper Service 2.3.1.4 Application Identity Service 2.3.1.5 Application Information Service 2.3.1.6 Application Layer Gateway Service 2.3.1.7 Application Management Service 2.3.1.8 AppX Deployment Service (AppXSVC) Service 2.3.1.9 ASP.NET State Service (aspnet_state) Service 2.3.1.10 Background Intelligent Transfer Service 2.3.1.11 Background Tasks Infrastructure (BrokerInfrastructure) Service 2.3.1.12 Base Filtering Engine Service 2.3.1.13 Certificate Propagation Service 2.3.1.14 CNG Key Isolation Service 2.3.1.15 COM+ Event System Service 2.3.1.16 COM+ System Application Service 2.3.1.17 Computer Browser Service 2.3.1.18 Credential Manager Service 2.3.1.19 Cryptographic Services Service 2.3.1.20 DCOM Server Process Launcher Service 2.3.1.21 Device Association (deviceassociationservice) Service 2.3.1.22 Device Install (deviceinstall) Service 2.3.1.23 Device Setup (dsmsvc) Service 2.3.1.24 DHCP Client Service 2.3.1.25 Diagnostic Policy Service 2.3.1.26 Diagnostic Service Host Service 2.3.1.27 Diagnostic System Host Service 2.3.1.28 Distributed Link Tracking Client Service 2.3.1.29 Distributed Transaction Coordinator Service 2.3.1.30 DNS Client Service 2.3.1.31 The Enhanced Mitigation Experience Toolkit (EMET) Service 2.3.1.32 Encrypting File System (EFS) Service 2.3.1.33 Extensible Authentication Protocol Service 2.3.1.34 Function Discovery Provider Host Service 2.3.1.35 Function Discovery Resource Publication Service 2.3.1.36 Group Policy Client Service 2.3.1.37 Health Key and Certificate Management Service 2.3.1.38 Human Interface Device Access Service 2.3.1.39 Hyper-V Data Exchange Service (vmickvpexchange) Service 2.3.1.40 Hyper-V Guest Service Interface (vmicguestinterface) Service Page 3

2.3.1.41 Hyper-V Guest Shutdown Service (vmicshutdown) Service 2.3.1.42 Hyper-V Heartbeat Service (vmicheartbeat) Service 2.3.1.43 Hyper-V Remote Desktop Virtualization Service (vmicrdv) Service 2.3.1.44 Hyper-V Time Synchronization Service (vmictimesync) Service 2.3.1.45 Hyper-V Volume Shadow Copy Requestor (vmicvss) Service 2.3.1.46 IKE and AuthIP IPsec Keying Modules Service 2.3.1.47 Interactive Services Detection Service 2.3.1.48 Internet Connection Sharing (ICS) Service 2.3.1.49 Internet Explorer ETW Collector Service 2.3.1.50 IP Helper Service 2.3.1.51 IPsec Policy Agent Service 2.3.1.52 KDC Proxy Server service (kpssvc) Service 2.3.1.53 KtmRm for Distributed Transaction Coordinator Service 2.3.1.54 Link-Layer Topology Discovery Mapper Service 2.3.1.55 Microsoft iscsi Initiator Service 2.3.1.56 Microsoft Software Shadow Copy Provider Service 2.3.1.57 Microsoft Storage Spaces SMP (smphost) Service 2.3.1.58 Multimedia Class Scheduler Service 2.3.1.59 Net.Tcp Port Sharing Service 2.3.1.60 Netlogon Service 2.3.1.61 Network Access Protection Agent Service 2.3.1.62 Network Connections Service 2.3.1.63 Network Connectivity Assistant (ncasvc) Service 2.3.1.64 Network List Service 2.3.1.65 Network Location Awareness Service 2.3.1.66 Network Store Interface Service 2.3.1.67 Optimize Drives (defragsvc) Service 2.3.1.68 Performance Counter DLL Host (perfhost) Service 2.3.1.69 Performance Logs and Alerts Service 2.3.1.70 Plug and Play Service 2.3.1.71 Portable Device Enumerator Service 2.3.1.72 Power Service 2.3.1.73 Print Spooler Service 2.3.1.74 Printer Extensions and Notifications Service 2.3.1.75 Problem Reports and Solutions Control Panel Support Service 2.3.1.76 Remote Access Auto Connection Manager Service 2.3.1.77 Remote Access Connection Manager Service 2.3.1.78 Remote Desktop Configuration Service 2.3.1.79 Remote Desktop Services Service 2.3.1.80 Remote Desktop Services UserMode Port Redirector 2.3.1.81 Remote Procedure Call (RPC) Service 2.3.1.82 Remote Procedure Call (RPC) Locator Service Page 4

2.3.1.83 Remote Registry Service 2.3.1.84 Resultant Set of Policy Provider Service 2.3.1.85 Routing and Remote Access Service 2.3.1.86 RPC Endpoint Mapper Service 2.3.1.87 Secondary Logon Service 2.3.1.88 Secure Socket Tunneling Protocol Service 2.3.1.89 Security Accounts Manager Service 2.3.1.90 Server Service 2.3.1.91 Shell Hardware Detection Service 2.3.1.92 Smart Card Service 2.3.1.93 Smart Card Device Enumeration Service 2.3.1.94 Smart Card Removal Policy Service 2.3.1.95 SNMP Trap Service 2.3.1.96 Software Protection Service 2.3.1.97 Special Administration Console Helper Service 2.3.1.98 Spot Verifier Service 2.3.1.99 SSDP Discovery Service 2.3.1.100 Storage Tiers Management Service 2.3.1.101 Superfetch Service 2.3.1.102 System Event Notification Service 2.3.1.103 System Events Broker Service 2.3.1.104 Task Scheduler Service 2.3.1.105 TCP/IP NetBIOS Helper Service 2.3.1.106 Telephony Service 2.3.1.107 Themes Service 2.3.1.108 Thread Ordering Server Service 2.3.1.109 UPnP Device Host Service 2.3.1.110 User Access Logging Service 2.3.1.111 User Profile Service 2.3.1.112 Virtual Disk Service 2.3.1.113 Volume Shadow Copy Service 2.3.1.114 Windows Audio Service 2.3.1.115 Windows Audio Endpoint Builder Service 2.3.1.116 Windows Color System Service 2.3.1.117 Windows Connection Manager (wcmsvc) Service 2.3.1.118 Windows Driver Foundation - User-mode Driver Framework Service 2.3.1.119 Windows Encryption Provider Host Service 2.3.1.120 Windows Error Reporting Service 2.3.1.121 Windows Event Collector Service 2.3.1.122 Windows Event Log Service 2.3.1.123 Windows Firewall Service 2.3.1.124 Windows Font Cache (fontcache) Service Page 5

2.3.1.125 Windows Installer Service 2.3.1.126 Windows Management Instrumentation Service 2.3.1.127 Windows Modules Installer Service 2.3.1.128 Windows Presentation Foundation Font Cache (fontcache3.0.0.0) Service 2.3.1.129 Windows Process Activation Service Service 2.3.1.130 Windows Remote Management (WS-Management) Service 2.3.1.131 Windows Store Service (WSService) 2.3.1.132 Windows Time Service 2.3.1.133 Windows Update Service 2.3.1.134 WinHTTP Web Proxy Auto-Discovery Service 2.3.1.135 Wired AutoConfig Service 2.3.1.136 WMI Performance Adapter Service 2.3.1.137 Workstation Service 2.4 Requirement 2: System Hardening: Optional Services List - - Verify that system configuration standards include the following procedures for all types of system components: - Changing 2.4.1 Requirement 2: System Hardening: Optional Services List 2.4.1.1 Optional Services List: NNT Agent Service (NNTAgentService) 2.4.1.2 Optional Services List: NNT Proxy Agent Service (NNTAgentProxyService) 2.4.1.3 Optional Services List: NNT Change Tracker Gen 7 MongoDB Service 2.4.1.4 Optional Services List: NNT Change Tracker Gen 7 Redis Service 2.4.1.5 Optional Services List: ASP.NET State Service (aspnet_state) Service 2.4.1.6 Optional Services List: World Wide Web Publishing Service 2.4.1.7 Optional Services List: W3C Logging Service 2.5 Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters: Develop configuration standards for all system components 2.5.1 Requirement 2: System Hardening: Group Policy Rules 2.5.1.1 Set 'Configure registry policy processing: Do not apply during periodic background processing' to 'False' 2.5.1.2 Set 'Configure registry policy processing: Process even if the Group Policy objects have not changed' to 'True' 2.5.2 Requirement 2: System Hardening: Internet Communication settings Rules 2.5.2.1 Set 'Turn off downloading of print drivers over HTTP' to 'Enabled' 2.5.2.2 Set 'Turn off Internet download for Web publishing and online ordering wizards' to 'Enabled' 2.5.2.3 Set 'Turn off printing over HTTP' to 'Enabled' 2.5.2.4 Set 'Turn off Search Companion content file updates' to 'Enabled' 2.5.2.5 Set 'Turn off the "Publish to Web" task for files and folders' to 'Enabled' 2.5.2.6 Set 'Turn off the Windows Messenger Customer Experience Improvement Program' to 'Enabled' 2.5.3 Requirement 2: System Hardening: Personalization Rules 2.5.3.1 Set 'Prevent enabling lock screen camera' to 'Enabled' Page 6

2.5.3.2 Set 'Prevent enabling lock screen slide show' to 'Enabled' 2.5.4 Requirement 2: System Hardening: Search Rules 2.5.4.1 Set 'Allow indexing of encrypted files' to 'Disabled' 2.5.5 Requirement 2: System Hardening: Windows Installer Rules 2.5.5.1 Set 'Always install with elevated privileges' to 'Disabled' 2.5.6 Requirement 2: System Hardening - Additonal Measues: Administrative Templates (Computer) Rules 2.5.6.1 Set 'Apply UAC restrictions to local accounts on network logons' to 'Enabled' 2.5.6.2 Set 'WDigest Authentication' to 'Disabled' 2.5.7 Requirement 2: System Hardening - Additonal Measues: App runtime Rules 2.5.7.1 Set 'Allow Microsoft accounts to be optional' to 'Enabled' 2.5.8 Requirement 2: System Hardening - Additonal Measues: User Account Control Rules 2.5.8.1 Set 'User Account Control: Admin Approval Mode for the Built-in Administrator account' to 'Enabled' 2.5.8.2 Set 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' to 'Disabled' 2.5.8.3 Set 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' to 'Prompt for consent on the secure desktop' 2.5.8.4 Set 'User Account Control: Behavior of the elevation prompt for standard users' to 'Automatically deny elevation requests' 2.5.8.5 Set 'User Account Control: Detect application installations and prompt for elevation' to 'Enabled' 2.5.8.6 Set 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' to 'Enabled' 2.5.8.7 Set 'User Account Control: Run all administrators in Admin Approval Mode' to 'Enabled' 2.5.8.8 Set 'User Account Control: Switch to the secure desktop when prompting for elevation' to 'Enabled' 2.5.8.9 Set 'User Account Control: Virtualize file and registry write failures to per-user locations' to 'Enabled' 2.5.9 Requirement 2: System Hardening - Additonal Measues: AutoPlay Policies Rules 2.5.9.1 Set 'Turn off Autoplay' to 'Enabled:All drives' 2.5.10 Requirement 2: System Hardening - Additonal Measues: EMET Rules 2.5.10.1 Ensure EMET is installed 2.5.10.2 Set 'Default Protections for Internet Explorer' to 'Enabled' 2.5.10.3 Set 'Default Protections for Popular Software' to 'Enabled' 2.5.10.4 Set 'Default Protections for Recommended Software' to 'Enabled' 2.5.10.5 Set 'System ASLR' to 'Enabled:Application Opt-In' 2.5.10.6 Set 'System DEP' to 'Enabled:Application Opt-Out' Page 7

2.5.10.7 Set 'System SEHOP' to 'Enabled:Application Opt-Out' 2.5.11 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - User Rights Assignment 2.5.11.1 Set 'Access Credential Manager as a trusted caller' to 'No One' 2.5.11.2 Set 'Access this computer from the network' 2.5.11.3 Set 'Act as part of the operating system' to 'No One' 2.5.11.4 Set 'Adjust memory quotas for a process' to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' 2.5.11.5 Set 'Allow log on locally' to 'Administrators' 2.5.11.6 Configure 'Allow log on through Remote Desktop Services' 2.5.11.7 Set 'Back up files and directories' to 'Administrators' 2.5.11.8 Set 'Change the system time' to 'Administrators, LOCAL SERVICE' 2.5.11.9 Set 'Change the time zone' to 'Administrators, LOCAL SERVICE' 2.5.11.10 Set 'Create a pagefile' to 'Administrators' 2.5.11.11 Set 'Create a token object' to 'No One' 2.5.11.12 Set 'Create global objects' to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' 2.5.11.13 Set 'Create permanent shared objects' to 'No One' 2.5.11.14 Set 'Create symbolic links' to 'Administrators' 2.5.11.15 Set 'Debug programs' to 'Administrators' 2.5.11.16 Set 'Enable computer and user accounts to be trusted for delegation' 2.5.11.17 Set 'Force shutdown from a remote system' to 'Administrators' 2.5.11.18 Set 'Impersonate a client after authentication' to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' 2.5.11.19 Set 'Increase scheduling priority' to 'Administrators' 2.5.11.20 Set 'Load and unload device drivers' to 'Administrators' 2.5.11.21 Set 'Lock pages in memory' to 'No One' 2.5.11.22 Set 'Modify an object label' to 'No One' 2.5.11.23 Set 'Modify firmware environment values' to 'Administrators' 2.5.11.24 Set 'Perform volume maintenance tasks' to 'Administrators' 2.5.11.25 Set 'Profile single process' to 'Administrators' 2.5.11.26 Set 'Profile system performance' to 'Administrators, NT SERVICE\WdiServiceHost' 2.5.11.27 Set 'Replace a process level token' to 'LOCAL SERVICE, NETWORK SERVICE' 2.5.11.28 Set 'Restore files and directories' to 'Administrators' 2.5.11.29 Set 'Shut down the system' to 'Administrators' 2.5.11.30 Set 'Take ownership of files or other objects' to 'Administrators' 2.5.12 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Security Options 2.5.12.1 Set 'Accounts: Block Microsoft accounts' to 'Users can't add or log on with Microsoft accounts' 2.5.12.2 Set 'Accounts: Guest account status' to 'Disabled' 2.5.12.3 Set 'Accounts: Limit local account use of blank passwords to console logon only' to 'Enabled' 2.5.12.4 Configure 'Accounts: Rename administrator account' 2.5.12.5 Configure 'Accounts: Rename guest account' Page 8

2.5.13 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Devices Rules 2.5.13.1 Set 'Devices: Allowed to format and eject removable media' to 'Administrators' 2.5.13.2 Set 'Devices: Prevent users from installing printer drivers' to 'Enabled' 2.5.14 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Domain member Rules 2.5.14.1 Set 'Domain member: Digitally encrypt or sign secure channel data (always)' to 'Enabled' 2.5.14.2 Set 'Domain member: Digitally encrypt secure channel data (when possible)' to 'Enabled' 2.5.14.3 Set 'Domain member: Digitally sign secure channel data (when possible)' to 'Enabled' 2.5.14.4 Set 'Domain member: Disable machine account password changes' to 'Disabled' 2.5.14.5 Set 'Domain member: Maximum machine account password age' to 30 or fewer days, but not 0 2.5.14.6 Set 'Domain member: Require strong (Windows 2000 or later) session key' to 'Enabled' 2.5.15 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Interactive logon Rules 2.5.15.1 Set 'Interactive logon: Do not display last user name' to 'Enabled' 2.5.15.2 Set 'Interactive logon: Do not require CTRL+ALT+DEL' to 'Disabled' 2.5.15.3 Configure 'Interactive logon: Message text for users attempting to log on' 2.5.15.4 Configure 'Interactive logon: Message title for users attempting to log on' 2.5.15.5 Set 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' to '4 or fewer logon(s)' 2.5.15.6 Set 'Interactive logon: Prompt user to change password before expiration' to 'between 5 and 14 days' 2.5.15.7 Set 'Interactive logon: Smart card removal behavior' to 'Lock Workstation' 2.5.16 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Microsoft network client Rules 2.5.16.1 Set 'Microsoft network client: Digitally sign communications (always)' to 'Enabled' 2.5.16.2 Set 'Microsoft network client: Digitally sign communications (if server agrees)' to 'Enabled' 2.5.16.3 Set 'Microsoft network client: Send unencrypted password to third-party SMB servers' to 'Disabled' 2.5.17 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Microsoft network server Rules 2.5.17.1 Set 'Microsoft network server: Digitally sign communications (always)' to 'Enabled' 2.5.17.2 Set 'Microsoft network server: Digitally sign communications (if client agrees)' to 'Enabled' 2.5.17.3 Set 'Microsoft network server: Server SPN target name validation level' to 'Accept if provided by client' 2.5.18 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - MSS Rules 2.5.18.1 Set 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' to 'Disabled' 2.5.18.2 Set 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' to 'Highest protection, source routing 1 is completely Pass disabled' 2.5.18.3 Set 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' to 'Highest protection, source routing 1 is completely disabled' Pass 2.5.18.4 Set 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' to 'Enabled' Page 9

2.5.18.5 Set 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' to '90% or less' 2.5.19 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Recovery console Rules 2.5.19.1 Set 'Recovery console: Allow automatic administrative logon' to 'Disabled' 2.5.19.2 Set 'Recovery console: Allow floppy copy and access to all drives and all folders' to 'Disabled' 2.5.20 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - Shutdown Rules 2.5.20.1 Set 'Shutdown: Allow system to be shut down without having to log on' to 'Disabled' 2.5.21 Requirement 2: System Hardening - Security parameters to prevent misuse: Account Policies - System objects Rules 2.5.21.1 Set 'System objects: Require case insensitivity for non-windows subsystems' to 'Enabled' 2.5.21.2 Set 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' to 'Enabled' 3 Protect Cardholder Data: Requirement 3: Protect stored cardholder data 3.1 Requirement 3: Protect stored cardholder data: Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) 3.1.1 Requirement 3: Protect stored cardholder data: Render stored PANs unreadable 3.1.1.1 Verify that Cardholder Data Encryption and Tokenization measures are in place (Rule not automatically assessed) 4.1 Requirement 4: Use strong cryptography and security protocols (for example, TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public netw 4 Protect Cardholder Data: Requirement 4: Encrypt transmission of cardholder data across open networks 4.1.1 Requirement 4: Encrypt transmission of cardholder data: Use strong cryptography and security protocols 4.1.1.1 Configure 'System cryptography: Force strong key protection for user keys stored on the computer' 4.1.1.2 Set 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Enabled' 4.1.1.3 Set 'Network security: LAN Manager authentication level' to 'Send NTLMv2 response only. Refuse LM & NTLM' 4.1.1.4 Set 'Network security: LDAP client signing requirements' to 'Negotiate signing' or higher 4.1.1.5 Set 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' to 'Require NTLMv2 session security,require 1 128-bit encryption' Pass 4.1.1.6 Set 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' to 'Require NTLMv2 session security,require 1 128-bit encryption' Pass 4.1.1.7 Set 'Domain member: Require strong (Windows 2000 or later) session key' to 'Enabled' 5 Maintain a Vulnerability Management Program: Requirement 5: Protect all systems against malware 5.1 Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs 5.1.1 Requirement 5: Anti-Virus Protection Check 5.1.1.1 Verify Virus Protection is enabled and updated 5.1.2 Requirement 5: Protect all systems against malware: Early Launch Antimalware Rules 5.1.2.1 Set 'Boot-Start Driver Initialization Policy' to 'Enabled: Good, unknown and bad but critical' Page 10

5.1.3 Requirement 5: Protect all systems against malware: Attachment Rules 5.1.3.1 Set 'Notify antivirus programs when opening attachments' to 'Enabled' 6 Maintain a Vulnerability Management Program: Requirement 6: Develop and maintain secure systems and applications 6.1 Requirement 6: Develop and maintain secure systems and applications 6.1.1 Requirement 6: Develop and maintain secure systems and applications - Windows Update Rules 6.1.1.1 Set 'Configure Automatic Updates' to 'Enabled' 6.1.1.2 Set 'Configure Automatic Updates: Scheduled install day' to '0 - Every day' 6.1.1.3 Set 'Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box' to 'Disabled' 6.1.1.4 Set 'Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box' to 'Disabled' 6.1.1.5 Set 'No auto-restart with logged on users for scheduled automatic updates installations' to 'Disabled' 6.1.1.6 Set 'Reschedule Automatic Updates scheduled installations' to 'Enabled:1 minute' 7.1 Requirement 7: Requirement 7: Restrict access to cardholder data by business need to know: Restriction of access to privileged user IDs to least privileges necessary to perform job res 7 Implement Strong Access Control Measures: Requirement 7: Restrict access to cardholder data by business need to know 7.1.1 Requirement 7: Restrict access to cardholder data by business need to know - Network Access Rules 7.1.1.1 Set 'Network access: Allow anonymous SID/Name translation' to 'Disabled' 7.1.1.2 Set 'Network access: Do not allow anonymous enumeration of SAM accounts' to 'Enabled' 7.1.1.3 Set 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled' 7.1.1.4 Set 'Network access: Let Everyone permissions apply to anonymous users' to 'Disabled' 7.1.1.5 Configure 'Network Access: Named Pipes that can be accessed anonymously' 7.1.1.6 Set 'Network access: Remotely accessible registry paths' 7.1.1.7 Set 'Network access: Remotely accessible registry paths and sub-paths' 7.1.1.8 Set 'Network access: Restrict anonymous access to Named Pipes and Shares' to 'Enabled' 7.1.1.9 Set 'Network access: Shares that can be accessed anonymously' to 'None' 7.1.1.10 Set 'Network access: Sharing and security model for local accounts' to 'Classic - local users authenticate as themselves' 7.1.2 Requirement 7: Restrict access to cardholder data by business need to know - Network Security Rules 7.1.2.1 Set 'Do not display network selection UI' to 'Enabled' 7.1.2.2 Set 'Configure Offer Remote Assistance' to 'Disabled' 7.1.2.3 Set 'Configure Solicited Remote Assistance' to 'Disabled' 7.1.2.4 Set 'Network security: Allow Local System to use computer identity for NTLM' to 'Enabled' 7.1.2.5 Set 'Network security: Allow LocalSystem NULL session fallback' to 'Disabled' 7.1.2.6 Set 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' to 'Disabled' 7.1.2.7 Set 'Network Security: Configure encryption types allowed for Kerberos' to 'RC4\AES128\AES256\Future types' 7.1.2.8 Set 'Network security: Do not store LAN Manager hash value on next password change' to 'Enabled' 7.1.2.9 Set 'Deny access to this computer from the network' 7.1.2.10 Set 'Deny log on as a batch job' to include 'Guests' 7.1.2.11 Set 'Deny log on as a service' to include 'Guests' Page 11

7.1.2.12 Set 'Deny log on locally' to include 'Guests' 7.1.2.13 Set 'Deny log on through Remote Desktop Services' to include 'Guests, Local account' 8.1 Requirement 8: Identify and authenticate access to system components: Restrict access to cardholder data by business need to know: 8.1 Define and implement policies and procedure 8 Implement Strong Access Control Measures: Requirement 8: Identify and authenticate access to system components 8.1.1 Requirement 8: Identify and authenticate access to system components - Account Lockout Rules 8.1.1.1 Set 'Account lockout threshold' to 6 or fewer invalid logon attempt(s), but not 0 8.1.1.2 Set 'Account lockout duration' to '30 or more minute(s)' 8.1.1.3 Set 'Reset account lockout counter after' to '30 or more minute(s)' 8.1.1.4 Set 'Network security: Force logoff when logon hours expire' to 'Enabled' 8.1.1.5 Set 'Microsoft network server: Disconnect clients when logon hours expire' to 'Enabled' 8.1.1.6 Set 'Interactive logon: Machine inactivity limit' to 15 minutes - 900 or fewer second(s), but not 0 8.1.1.7 Set 'Microsoft network server: Amount of idle time required before suspending session' to '15 or fewer minute(s)' 8.1.1.8 Set 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires must be set to zero seconds 8.1.2 Requirement 8: Identify and authenticate access to system components - Password Policy 8.1.2.1 Set 'Enforce password history' to '24 or more password(s)' 8.1.2.2 Set 'Maximum password age' to 60 or fewer days, but not 0 8.1.2.3 Set 'Minimum password age' to '1 or more day(s)' 8.1.2.4 Set 'Minimum password length' to '14 or more character(s)' 8.1.2.5 Set 'Password must meet complexity requirements' to 'Enabled' 8.1.2.6 Set 'Store passwords using reversible encryption' to 'Disabled' 8.1.3 Requirement 8: Identify and authenticate access to system components - Windows Logon Options Rules 8.1.3.1 Set 'Sign-in last interactive user automatically after a system-initiated restart' to 'Disabled' 8.1.4 Requirement 8: Identify and authenticate access to system components - Windows Remote Management (WinRM)-WinRM Client Rules 8.1.4.1 Set 'Allow Basic authentication' to 'Disabled' 8.1.4.2 Set 'Allow unencrypted traffic' to 'Disabled' 8.1.4.3 Set 'Disallow Digest authentication' to 'Enabled' 8.1.5 Requirement 8: Identify and authenticate access to system components - Remote Desktop Rules 8.1.5.1 Set 'Do not allow passwords to be saved' to 'Enabled' 8.1.5.2 Set 'Do not allow drive redirection' to 'Enabled' 8.1.5.3 Set 'Always prompt for password upon connection' to 'Enabled' 8.1.5.4 Set 'Set client connection encryption level: Encryption Level' to 'Enabled: High Level' 9 Maintain a Vulnerability Management Program: Requirement 9: Restrict physical access to cardholder data Page 12

9.1 Requirement 9: Restrict physical access to cardholder data: Physical Protection procedures and measures 9.1.1 Requirement 9: Restrict physical access to cardholder data: Physical Protection procedures and measures 9.1.1.1 Verify PCI DSS Requirement 9 requirements are being operated (Rule not automatically assessed) 10 Regularly Monitor and Test Networks: Requirement 10: Track and monitor all access to network resources and cardholder data 10.1 Requirement 10: Track access to network/cardholder data: Retain and Review System Audit Trails 10.1.1 Requirement 10: Track access to network/cardholder data: Account Policies - Audit Rules 10.1.1.1 Set 'Manage auditing and security log' to 'Administrators' 10.1.1.2 Set 'Generate security audits' to 'LOCAL SERVICE, NETWORK SERVICE' 10.1.1.3 Set 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' to 'Enabled' 10.1.1.4 Set 'Audit: Shut down system immediately if unable to log security audits' to 'Disabled' 10.1.2 Requirement 10: Track access to network/cardholder data: Windows Components - Event Log Rules 10.1.2.1 Set 'Maximum Log Size (KB)' to 'Enabled:32768' 10.1.2.2 Set 'Retain old events' to 'Disabled' 10.1.2.3 Set 'Retain old events' to 'Disabled' 10.1.2.4 Set 'Maximum Log Size (KB)' to 'Enabled:81920' 10.1.2.5 Set 'Maximum Log Size (KB)' to 'Enabled:32768' 10.1.2.6 Set 'Retain old events' to 'Disabled' 10.1.3 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - System Rules 10.1.3.1 Set 'Audit Policy: System: System Integrity' to 'Success and Failure' 10.1.3.2 Set 'Audit Policy: System: Security System Extension' to 'Success and Failure' 10.1.3.3 Set 'Audit Policy: System: Security State Change' to 'Success and Failure' 10.1.3.4 Set 'Audit Policy: System: IPsec Driver' to 'Success and Failure' 10.1.3.5 Set 'Audit Policy: System: Other System Events' to 'No Auditing' 10.1.4 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Object Access Rules 10.1.4.1 Set 'Audit Policy: Object Access: Handle Manipulation' to 'No Auditing' 10.1.4.2 Set 'Audit Policy: Object Access: Other Object Access Events' to 'No Auditing' 10.1.4.3 Set 'Audit Policy: Object Access: File Share' to 'No Auditing' 10.1.4.4 Set 'Audit Policy: Object Access: File System' to 'No Auditing' 10.1.4.5 Set 'Audit Policy: Object Access: SAM' to 'No Auditing' 10.1.4.6 Set 'Audit Policy: Object Access: Kernel Object' to 'No Auditing' 10.1.4.7 Set 'Audit Policy: Object Access: Filtering Platform Packet Drop' to 'No Auditing' 10.1.4.8 Set 'Audit Policy: Object Access: Registry' to 'No Auditing' 10.1.4.9 Set 'Audit Policy: Object Access: Certification Services' to 'No Auditing' 10.1.4.10 Set 'Audit Policy: Object Access: Application Generated' to 'No Auditing' Page 13

10.1.4.11 Set 'Audit Policy: Object Access: Detailed File Share' to 'No Auditing' 10.1.4.12 Set 'Audit Policy: Object Access: Filtering Platform Connection' to 'No Auditing' 10.1.5 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Logon-Logoff Rules 10.1.5.1 Set 'Audit Policy: Logon-Logoff: Other Logon/Logoff Events' to 'No Auditing' 10.1.5.2 Set 'Audit Policy: Logon-Logoff: Special Logon' to 'Success' 10.1.5.3 Set 'Audit Policy: Logon-Logoff: IPsec Main Mode' to 'No Auditing' 10.1.5.4 Set 'Audit Policy: Logon-Logoff: Account Lockout' to 'No Auditing' 10.1.5.5 Set 'Audit Policy: Logon-Logoff: IPsec Extended Mode' to 'No Auditing' 10.1.5.6 Set 'Audit Policy: Logon-Logoff: IPsec Quick Mode' to 'No Auditing' 10.1.5.7 Set 'Audit Policy: Logon-Logoff: Logoff' to 'Success' 10.1.5.8 Set 'Audit Policy: Logon-Logoff: Network Policy Server' to 'No Auditing' 10.1.5.9 Set 'Audit Policy: Logon-Logoff: Logon' to 'Success and Failure' 10.1.6 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - DS Access Rules 10.1.6.1 Set 'Audit Policy: DS Access: Directory Service Replication' to 'No Auditing' 10.1.6.2 Set 'Audit Policy: DS Access: Detailed Directory Service Replication' to 'No Auditing' 10.1.6.3 Set 'Audit Policy: DS Access: Directory Service Changes' to 'No Auditing' 10.1.6.4 Set 'Audit Policy: DS Access: Directory Service Access' to 'No Auditing' 10.1.7 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Detailed Tracking Rules 10.1.7.1 Set 'Audit Policy: Detailed Tracking: DPAPI Activity' to 'No Auditing' 10.1.7.2 Set 'Audit Policy: Detailed Tracking: Process Termination' to 'No Auditing' 10.1.7.3 Set 'Audit Policy: Detailed Tracking: Process Creation' to 'Success' 10.1.7.4 Set 'Audit Policy: Detailed Tracking: RPC Events' to 'No Auditing' 10.1.8 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Policy Change Rules 10.1.8.1 Set 'Audit Policy: Policy Change: MPSSVC Rule-Level Policy Change' to 'No Auditing' 10.1.8.2 Set 'Audit Policy: Policy Change: Filtering Platform Policy Change' to 'No Auditing' 10.1.8.3 Set 'Audit Policy: Policy Change: Authorization Policy Change' to 'No Auditing' 10.1.8.4 Set 'Audit Policy: Policy Change: Audit Policy Change' to 'Success and Failure' 10.1.8.5 Set 'Audit Policy: Policy Change: Other Policy Change Events' to 'No Auditing' 10.1.8.6 Set 'Audit Policy: Policy Change: Authentication Policy Change' to 'Success' 10.1.9 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Account Management Rules 10.1.9.1 Set 'Audit Policy: Account Management: Distribution Group Management' to 'No Auditing' 10.1.9.2 Set 'Audit Policy: Account Management: Computer Account Management' to 'Success' 10.1.9.3 Set 'Audit Policy: Account Management: User Account Management' to 'Success and Failure' Page 14

10.1.9.4 Set 'Audit Policy: Account Management: Security Group Management' to 'Success and Failure' 10.1.9.5 Set 'Audit Policy: Account Management: Other Account Management Events' to 'Success and Failure' 10.1.9.6 Set 'Audit Policy: Account Management: Application Group Management' to 'No Auditing' 10.1.10 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Account Logon Rules 10.1.10.1 Set 'Audit Policy: Account Logon: Kerberos Authentication Service' to 'No Auditing' 10.1.10.2 Set 'Audit Policy: Account Logon: Other Account Logon Events' to 'No Auditing' 10.1.10.3 Set 'Audit Policy: Account Logon: Kerberos Service Ticket Operations' to 'No Auditing' 10.1.10.4 Set 'Audit Policy: Account Logon: Credential Validation' to 'Success and Failure' 10.1.11 Requirement 10: Track access to network/cardholder data: Advanced Audit Policy Configuration - Privilege Use Rules 10.1.11.1 Set 'Audit Policy: Privilege Use: Other Privilege Use Events' to 'No Auditing' 10.1.11.2 Set 'Audit Policy: Privilege Use: Non Sensitive Privilege Use' to 'No Auditing' 10.1.11.3 Set 'Audit Policy: Privilege Use: Sensitive Privilege Use' to 'Success and Failure' 11.1.1 Requirement 11: Regularly test security systems and processes: 11.5 Deploy a change-detection mechanism (for example, file-integrity monitoring tools) to alert personnel to unauth 11 Regularly Monitor and Test Networks: Requirement 11: Regularly test security systems and processes 11.1 Requirement 11: Regularly test security systems and processes 11.1.1.1 Implement File Integrity Monitoring: Verify the use of a change-detection mechanism within the cardholder data environment by observing system 1 settings and monitored Pass files, as w 12 Maintain an Information Security Policy: Requirement 12: Maintain a policy that addresses information security for all personnel 12.1 Requirement 12: Maintain a policy that addresses information security for all personnel 12.1.1 Requirement 12: Maintain a policy that addresses information security for all personnel: Policy and Procedure Documentation 12.1.1.1 Verify PCI DSS Requirement 12 requirements are being operated Page 15