Supported rules for Payment Card Industry Data Security Standard v4.0.1
BMC AMI Security Policy Manager supports automatic audits of multiple settings on z/OS to ensure compliance with PCI-DSS v4.0.1, to save hundreds of employee-hours and help businesses adhere to the highest security standards. SPM provides a consolidated PCI-DSS report that displays the controls in place to adhere to the common payment regulation that businesses must comply and align with.
In SPM, the PCI DSS reports are identified by the PR4nnn naming convention. For example, for compliance rule PR4222:
- P = PCI DSS
- R = RACF
- 4 = version 4.0.1
- 222 = report 2.2.2
SPM supports compliance testing for the following PCI DSS rules:
PCI DSS Requirement | Rule description | Reference in SPM | Additional information with regards to SPM |
---|---|---|---|
10.5 | Audit log history is retained and available for analysis. | PR4105 | You cannot modify the audit log history. The SMF Dump file is restricted for UPDATE or greater access to a user associated with the IFASMFDP dump job only. |
10.3 | Audit logs are protected from destruction and unauthorized modifications. | PR4103 | SMF data sets MAN1 MAN2 must be protected. These are load balancing SMF logging data sets. A user must never be granted UPDATE or higher access to these data sets. |
10.2 | Audit logs are implemented to support the detection of anomalies and suspicious activity, and the forensic analysis of events. | PR4102 | SMF type 80, 81, and 83 records are enabled. This ensures that granting of elevated privileges and access controls to general resources are logged. Make sure that SMF logging is active. |
8.6.3 | Passwords/passphrases for any application and system accounts are protected against misuse as follows:
| PR4863 | Ensure the following SETROPTS settings:
|
8.3.6 | If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the following minimum level of complexity:
| PR4836 | The password must be alphanumeric and a minimum of 8 characters in length. If ENCRYPTION is set to KDFAES, then the passphrase must have a minimum of 9 characters. |
8.3.4 | Invalid authentication attempts are limited by locking out the user ID after not more than 10 attempts. | PR4834 | The REVOKE parameter must be set to a maximum of 10 unsuccessful password attempts before account lock out. |
8.2.6 | Inactive user accounts are removed or disabled within 90 days of inactivity. | PR4826 | The SETROPTS INACTIVE parameter must be set to less than 90 days. Users who are active but with last access date greater than 90 days must be reported, and revoked or disabled. |
2.2.2 | Vendor default accounts are managed as follows:
| PR4222 | The default password of the vendor ID must be changed and revoked. |