If you’re used to working with a specific PCI framework control, you can use this guide to identify its corresponding Unified Control.
For more information, and to view other framework control maps, visit Unified Controls FAQ.
PCI Control | Unified Control |
1.1.1 Maintaining Effective Security Policies | CTRL-431 Information Security Policy and Procedures |
1.1.2 Assigning Requirement 1 Responsibilities | CTRL-545 Position Descriptions |
1.2.1 NSC Rulesets Configuration Standards | CTRL-208 Configuration Management |
1.2.2 Managing Network Connection Changes | CTRL-190 Change Management and Software Development Life Cycle |
1.2.3 Maintaining Accurate Network Diagrams | CTRL-198 Network Segmentation |
1.2.4 Maintaining Accurate Data-Flow Diagrams | CTRL-198 Network Segmentation |
1.2.5 Regulating Business-related Tech Services | CTRL-118 Network Protocols |
1.2.6 Implementing Security for Insecure Services | CTRL-118 Network Protocols |
1.2.7 Biannual NSC Configuration Review | CTRL-950 Boundary Protection |
1.2.8 Securing NSCs Configuration Files | CTRL-208 Configuration Management |
1.3.1 CDE Inbound Traffic Restrictions | CTRL-950 Boundary Protection |
1.3.2 CDE Outbound Traffic Restrictions | CTRL-950 Boundary Protection |
1.3.3 NSCs Regulating Wireless Network Traffic | CTRL-950 Boundary Protection |
1.4.1 Implementing NSCs in Networks | CTRL-950 Boundary Protection |
1.4.2 Restrictions on Inbound Traffic | CTRL-950 Boundary Protection |
1.4.3 Implementing Anti-Spoofing Measures | CTRL-1010 Anti-Spoofing Mechanisms |
1.4.4 Cardholder Data Protection Measures | CTRL-950 Boundary Protection |
1.4.5 Restricted IP Address Disclosure | CTRL-178 Interconnected Systems |
1.5.1 Implementing Security Controls | CTRL-79 Mobile Device Management |
2.1.1 Maintaining Security Policies Procedures | CTRL-353 Change Authenticators Prior To Delivery |
2.1.2 Assigning Requirement 2 Responsibilities | CTRL-545 Position Descriptions |
2.2.1 Maintaining Configuration Standards | CTRL-208 Configuration Management |
2.2.2 Managing Vendor Default Accounts | CTRL-353 Change Authenticators Prior To Delivery |
2.2.3 Managing Primary Functions Security Levels | CTRL-208 Configuration Management |
2.2.4 Optimizing System Functionality | CTRL-118 Network Protocols |
2.2.5 Insecure Services Risk Reduction | CTRL-118 Network Protocols |
2.2.6 Preventing Misuse with Security Configuration | CTRL-208 Configuration Management |
2.2.7 Encrypting Non-Console Administrative Access | CTRL-112 Encryption of Data at Rest and in Transit |
2.3.1 Securing Wireless Network Installations | CTRL-121 Wireless Network |
2.3.2 Changing Wireless Encryption Keys | CTRL-121 Wireless Network |
3.1.1 Maintaining Security Policies Procedures | CTRL-194 Cryptography Management |
3.1.2 Assigning Requirement 3 Responsibilities | CTRL-194 Cryptography Management |
3.2.1 Data Retention Policies | CTRL-896 Information Management and Retention |
3.3.1 SAD Erased After Authorization | CTRL-923 Removal of Direct Identifiers |
3.3.1.1 Track Contents Not Retained | CTRL-923 Removal of Direct Identifiers |
3.3.1.2 Card Verification Code Not Retained | CTRL-923 Removal of Direct Identifiers |
3.3.1.3 PIN Not Retained Post-Authorization | CTRL-923 Removal of Direct Identifiers |
3.3.2 SAD Electronic Storage Encryption | CTRL-112 Encryption of Data at Rest and in Transit |
3.3.3 Additional Requirement for issuers and companies that support issuing services | CTRL-112 Encryption of Data at Rest and in Transit |
3.4.1 PAN Display Limitations | CTRL-923 Removal of Direct Identifiers |
3.4.2 Remote-Access Control for PAN | CTRL-110 Remote Access |
3.5.1 Securing PAN through Cryptography | CTRL-923 Removal of Direct Identifiers |
3.5.1.1 Keyed Hashes for PAN Security | CTRL-194 Cryptography Management |
3.5.1.2 Disk-Level Encryption Guidelines | CTRL-194 Cryptography Management |
3.5.1.3 Managing Disk-Level Encryption | CTRL-194 Cryptography Management |
3.6.1 Cryptographic Key Protection Procedures | CTRL-194 Cryptography Management |
3.6.1.1 Additional Requirement for Service Providers Only | CTRL-194 Cryptography Management |
3.6.1.2 Secure Key Storage Methods | CTRL-194 Cryptography Management |
3.6.1.3 Limited Access to Cryptographic Keys | CTRL-194 Cryptography Management |
3.6.1.4 Minimizing Cryptographic Key Storage | CTRL-194 Cryptography Management |
3.7.1 Implementing Key-Management Policies | CTRL-194 Cryptography Management |
3.7.2 Secure Cryptographic Key Distribution | CTRL-194 Cryptography Management |
3.7.3 Secure Cryptographic Key Management | CTRL-194 Cryptography Management |
3.7.4 Cryptographic Key Management Policies | CTRL-194 Cryptography Management |
3.7.5 Key-Management Policy Procedures | CTRL-194 Cryptography Management |
3.7.6 Cryptographic Key-Management Procedures | CTRL-194 Cryptography Management |
3.7.7 Cryptographic Key-Management Policies | CTRL-194 Cryptography Management |
3.7.8 Cryptographic Key Custodian Policies | CTRL-194 Cryptography Management |
3.7.9 Additional Requirement for Service Providers Only | CTRL-194 Cryptography Management |
4.1.1 Maintaining Security Policies Procedures | CTRL-932 System Protection Policy and Procedures |
4.1.2 Assigning Requirement 4 Responsibilities | CTRL-545 Position Descriptions |
4.2.1 Safeguarding PAN via Cryptography | CTRL-112 Encryption of Data at Rest and in Transit |
4.2.1.1 Maintaining Secure PAN Transmission | CTRL-435 System Inventory |
4.2.1.2 Secure Wireless Network Practices | CTRL-112 Encryption of Data at Rest and in Transit |
4.2.2 Securing PAN with Cryptography | CTRL-112 Encryption of Data at Rest and in Transit |
5.1.1 Maintaining Security Policies Procedures | CTRL-932 System Protection Policy and Procedures |
5.1.2 Assigning Requirement 5 Responsibilities | CTRL-545 Position Descriptions |
5.2.1 Anti-Malware Deployment Exceptions | CTRL-822 Malicious Code Protection |
5.2.2 Comprehensive Anti-Malware Solution | CTRL-822 Malicious Code Protection |
5.2.3 Periodic Evaluation of not at risk System Components | CTRL-833 Logging and Monitoring |
5.2.3.1 Periodic Evaluations of System Components | CTRL-822 Malicious Code Protection |
5.3.1 Automatic Anti-Malware Updates | CTRL-822 Malicious Code Protection |
5.3.2 Anti-Malware Solution Functions | CTRL-822 Malicious Code Protection |
5.3.2.1 Periodic Malware Scan Requirements | CTRL-822 Malicious Code Protection |
5.3.3 Anti-Malware Solutions for Removable Media | CTRL-822 Malicious Code Protection |
5.3.4 Anti-Malware Audit Log Compliance | CTRL-833 Logging and Monitoring |
5.3.5 Strict Anti-Malware Policy | CTRL-9 Privileged User Accounts |
5.4.1 Automated Anti-Phishing Mechanisms | CTRL-883 Spam and Phishing Protection |
6.1.1 Maintaining Security Policies Procedures | CTRL-190 Change Management and Software Development Life Cycle |
6.1.2 Assigning Requirement 6 Responsibilities | CTRL-545 Position Descriptions |
6.2.1 Secure Custom Software Development | CTRL-190 Change Management and Software Development Life Cycle |
6.2.2 Annual Training for Software Developers | CTRL-253 Role-Based Training |
6.2.3 Reviewing Custom Software Vulnerabilities | CTRL-190 Change Management and Software Development Life Cycle |
6.2.3.1 Manual Code Review Process | CTRL-190 Change Management and Software Development Life Cycle |
6.2.4 Preventing Software Attack Techniques | CTRL-190 Change Management and Software Development Life Cycle |
6.3.1 Managing Security Vulnerabilities | CTRL-652 Vulnerability Management |
6.3.2 Managing Software Inventory | CTRL-435 System Inventory |
6.3.3 Implementing Security Patches/Updates | CTRL-652 Vulnerability Management |
6.4.1 Securing Public-Facing Web Applications | CTRL-652 Vulnerability Management |
6.4.2 Automated Web Attack Prevention | CTRL-652 Vulnerability Management |
6.4.3 Managing Payment Page Scripts | CTRL-190 Change Management and Software Development Life Cycle |
6.5.1 System Change Management Procedures | CTRL-190 Change Management and Software Development Life Cycle |
6.5.2 PCI DSS Requirements Post Significant Change | CTRL-190 Change Management and Software Development Life Cycle |
6.5.3 Separating Pre-Production Environments | CTRL-198 Network Segmentation |
6.5.4 Separating Roles for Accountability | CTRL-65 Separation of Duties |
6.5.5 PANs Usage in Pre-Production Environments | CTRL-1186 Sensitive Data in Non-Production Environments |
6.5.6 Pre-Production System Cleanup | CTRL-190 Change Management and Software Development Life Cycle |
7.1.1 Maintaining Security Policies Procedures | CTRL-1 Access Control Policy and Procedures |
7.1.2 Assigning Requirement 7 Responsibilities | CTRL-545 Position Descriptions |
7.2.1 Defining Access Control Model | CTRL-1 Access Control Policy and Procedures |
7.2.2 User Access Based on Job | CTRL-9 Privileged User Accounts |
7.2.3 Approving Required Privileges | CTRL-16 Access Provisioning |
7.2.4 Reviewing User Account Privileges | CTRL-73 Review of User Privileges |
7.2.5 Managing System Access Privileges | CTRL-9 Privileged User Accounts |
7.2.5.1 Reviewing System Access Privileges | CTRL-73 Review of User Privileges |
7.2.6 Restrictions on Cardholder Data Access | CTRL-9 Privileged User Accounts |
7.3.1 User-Based Access Control System | CTRL-16 Access Provisioning |
7.3.2 Access Control System Configuration | CTRL-23 Role-Based Access Control |
7.3.3 Default Setting: Deny All | CTRL-16 Access Provisioning |
8.1.1 Maintaining Security Policies Procedures | CTRL-319 Identification and Authentication |
8.1.2 Assigning Requirement 8 Responsibilities | CTRL-545 Position Descriptions |
8.2.1 Unique ID for System Access | CTRL-319 Identification and Authentication |
8.2.2 Managing Shared Account Usage | CTRL-2 Shared and Temporary Accounts |
8.2.3 Additional requirement for service providers only | CTRL-110 Remote Access |
8.2.4 Managing User ID Modifications | CTRL-1 Access Control Policy and Procedures |
8.2.5 Terminated Users Lose Access | CTRL-535 Access Termination |
8.2.6 Inactive Accounts' 90-Day Removal | CTRL-535 Access Termination |
8.2.7 Managing Third-Party Remote Access | CTRL-110 Remote Access |
8.2.8 Re-authentication After Idle Time | CTRL-91 Session Termination |
8.3.1 Multi-Factor Authentication Methods | CTRL-319 Identification and Authentication |
8.3.2 Cryptography Secures System Components | CTRL-112 Encryption of Data at Rest and in Transit |
8.3.3 Pre-Modification User Identity Verification | CTRL-319 Identification and Authentication |
8.3.4 Limiting Invalid Authentication Attempts | CTRL-77 Unsuccessful Logon Attempts |
8.3.5 Password Authentication Requirement Guidelines | CTRL-349 Password-Based Authentication |
8.3.6 Password Complexity Requirements | CTRL-349 Password-Based Authentication |
8.3.7 Password Reuse Restrictions | CTRL-349 Password-Based Authentication |
8.3.8 User Authentication Policy Guidelines | CTRL-319 Identification and Authentication |
8.3.9 Single-Factor Authentication Guidelines | CTRL-349 Password-Based Authentication |
8.3.10 Additional Requirement for Service Providers Only | CTRL-349 Password-Based Authentication |
8.3.10.1 Additional Requirement for Service Providers Only | CTRL-349 Password-Based Authentication |
8.3.11 Secure User Authentication Measures | CTRL-319 Identification and Authentication |
8.4.1 MFA Implementation for All Non-Console Access | CTRL-320 Multi-Factor Authentication |
8.4.2 MFA Implementation in CDE | CTRL-320 Multi-Factor Authentication |
8.4.3 MFA Implementation for Remote Access | CTRL-320 Multi-Factor Authentication |
8.5.1 MFA System Implementation Guidelines | CTRL-320 Multi-Factor Authentication |
8.6.1 Managing Interactive System Accounts | CTRL-1 Access Control Policy and Procedures |
8.6.2 Avoid Hard-Coding Passwords | CTRL-349 Password-Based Authentication |
8.6.3 Secure Password/Passphrase Management | CTRL-349 Password-Based Authentication |
9.1.1 Maintaining Security Policies Procedures | CTRL-546 Physical and Environmental Protection Policy and Procedures |
9.1.2 Assigning Requirement 9 Responsibilities | CTRL-545 Position Descriptions |
9.2.1 CDE Systems Access Control | CTRL-255 Physical Security Controls |
9.2.1.1 Monitoring Physical Access to CDE | CTRL-255 Physical Security Controls |
9.2.2 Implementing Network Jack Controls | CTRL-255 Physical Security Controls |
9.2.3 Restricted Physical Access to Networks | CTRL-551 Physical Access Control |
9.2.4 Restricted Console Access | CTRL-255 Physical Security Controls |
9.3.1 Managing Personnel Physical Access | CTRL-546 Physical and Environmental Protection Policy and Procedures |
9.3.1.1 Controlling Physical Access Protocol | CTRL-551 Physical Access Control |
9.3.2 Managing Visitor Access Procedures | CTRL-546 Physical and Environmental Protection Policy and Procedures |
9.3.3 Visitor Badge Deactivation Protocol | CTRL-255 Physical Security Controls |
9.3.4 Maintaining Visitor Log Records | CTRL-255 Physical Security Controls |
9.4.1 Securing Cardholder Data Media | CTRL-499 Media Access |
9.4.1.1 Secure Offline Data Storage | CTRL-503 Media Storage |
9.4.1.2 Annual Offline Media Security Review | CTRL-503 Media Storage |
9.4.2 Classifying Cardholder Data Sensitivity | CTRL-896 Information Management and Retention |
9.4.3 Securing Offsite Cardholder Data | CTRL-506 Media Transport |
9.4.4 Management Approves Data Transfers | CTRL-506 Media Transport |
9.4.5 Maintaining Electronic Media Inventory | CTRL-435 System Inventory |
9.4.5.1 Annual Electronic Data Inventory | CTRL-435 System Inventory |
9.4.6 Secure Destruction of Cardholder Data | CTRL-511 Media Sanitization and Disposal |
9.4.7 Destroying Unneeded Cardholder Data | CTRL-511 Media Sanitization and Disposal |
9.5.1 Securing Payment Card Devices | CTRL-556 Tamper Protection |
9.5.1.1 POI Devices Inventory Management | CTRL-435 System Inventory |
9.5.1.2 Periodic Inspection of POI Devices | CTRL-556 Tamper Protection |
9.5.1.2.1 Frequency of Periodic POI Device Inspections | CTRL-646 Risk Assessment |
9.5.1.3 POI Device Tampering Prevention Training | CTRL-253 Role-Based Training |
10.1.1 Maintaining Security Policies Procedures | CTRL-431 Information Security Policy and Procedures |
10.1.2 Assigning Requirement 10 Responsibilities | CTRL-545 Position Descriptions |
10.2.1 Audit Logs Activated System-Wide | CTRL-833 Logging and Monitoring |
10.2.1.1 Audit Logs Track Access | CTRL-833 Logging and Monitoring |
10.2.1.2 Audit Logs Track Actions | CTRL-833 Logging and Monitoring |
10.2.1.3 Audit Logs Access Tracking | CTRL-833 Logging and Monitoring |
10.2.1.4 Audit Logs Track Invalid Access | CTRL-833 Logging and Monitoring |
10.2.1.5 Audit Logs Track Credential Changes | CTRL-833 Logging and Monitoring |
10.2.1.6 Audit Logs' Functions Overview | CTRL-833 Logging and Monitoring |
10.2.1.7 Tracking System-Level Object Changes | CTRL-833 Logging and Monitoring |
10.2.2 Audit Logs' Recorded Details | CTRL-833 Logging and Monitoring |
10.3.1 Limited Audit Log Access | CTRL-9 Privileged User Accounts |
10.3.2 Audit Log Files Protection | CTRL-833 Logging and Monitoring |
10.3.3 Secure Backup of Audit Logs | CTRL-300 System Backup |
10.3.4 Securing Audit Logs Integrity | CTRL-833 Logging and Monitoring |
10.4.1 Daily Audit Log Review | CTRL-833 Logging and Monitoring |
10.4.1.1 Automated Audit Log Reviews | CTRL-833 Logging and Monitoring |
10.4.2 Periodic Review of System Logs | CTRL-833 Logging and Monitoring |
10.4.2.1 Periodic Log Review Frequency | CTRL-833 Logging and Monitoring |
10.4.3 Addressing Review Anomalies | CTRL-833 Logging and Monitoring |
10.5.1 Audit Log Retention Guidelines | CTRL-833 Logging and Monitoring |
10.6.1 Synchronizing System Clocks Technology | CTRL-1063 Synchronization |
10.6.2 Configuring System Time Consistency | CTRL-1063 Synchronization |
10.6.3 Securing Time Synchronization Settings | CTRL-1063 Synchronization |
10.7.1 Additional Requirement for Service Providers Only | CTRL-833 Logging and Monitoring |
10.7.2 Managing Security Control Failures | CTRL-149 Control Assessments |
10.7.3 Prompt Response to Security Failures | CTRL-149 Control Assessments |
11.1.1 Maintaining Security Policy Requirements | CTRL-932 System Protection Policy and Procedures |
11.1.2 Assigning Requirement 11 Responsibilities | CTRL-545 Position Descriptions |
11.2.1 Managing Wireless Access Points | CTRL-121 Wireless Network |
11.2.2 Maintaining Authorized Wireless Inventory | CTRL-435 System Inventory |
11.3.1 Internal Vulnerability Scan Procedures | CTRL-652 Vulnerability Management |
11.3.1.1 Managing Non-Critical Vulnerabilities | CTRL-652 Vulnerability Management |
11.3.1.2 Authenticated Internal Vulnerability Scans | CTRL-652 Vulnerability Management |
11.3.1.3 Conducting Internal Vulnerability Scans | CTRL-652 Vulnerability Management |
11.3.2 Quarterly External Vulnerability Scans | CTRL-652 Vulnerability Management |
11.3.2.1 Managing External Vulnerability Scans | CTRL-652 Vulnerability Management |
11.4.1 Implementing Penetration Testing Methodology | CTRL-174 Penetration Testing |
11.4.2 Internal Penetration Testing Guidelines | CTRL-174 Penetration Testing |
11.4.3 External Penetration Testing Guidelines | CTRL-174 Penetration Testing |
11.4.4 Correcting Penetration Testing Vulnerabilities | CTRL-652 Vulnerability Management |
11.4.5 Segmentation Penetration Testing Guidelines | CTRL-174 Penetration Testing |
11.4.6 Additional Requirement for Service Providers Only | CTRL-174 Penetration Testing |
11.4.7 Additional Requirement for Multi-Tenant Service Providers Only | CTRL-174 Penetration Testing |
11.5.1 Network Intrusion Detection/Prevention Techniques | CTRL-833 Logging and Monitoring |
11.5.1.1 Additional Requirement for Service Providers Only | CTRL-833 Logging and Monitoring |
11.5.2 Deploying Change-Detection Mechanisms | CTRL-833 Logging and Monitoring |
11.6.1 Implementing Tamper-Detection Mechanism | CTRL-833 Logging and Monitoring |
12.1.1 Implementing Information Security Policy | CTRL-431 Information Security Policy and Procedures |
12.1.2 Annual Information Security Policy | CTRL-431 Information Security Policy and Procedures |
12.1.3 Defining Information Security Responsibilities | CTRL-431 Information Security Policy and Procedures |
12.1.4 Assigning Information Security Responsibility | CTRL-432 Information Security Program Leadership Role |
12.2.1 Implementing End-User Technology Policies | CTRL-539 Access Agreements |
12.3.1 Risk Analysis | CTRL-646 Risk Assessment |
12.3.3 Annual Cryptographic Protocol Review | CTRL-435 System Inventory |
12.3.4 Annual Technology Review Process | CTRL-1109 Supplier Assessments and Reviews |
12.4.1 Additional Requirement for Service Providers Only | CTRL-432 Information Security Program Leadership Role |
12.4.2 Additional Requirement for Service Providers Only | CTRL-1127 Performance Reviews |
12.4.2.1 Additional Requirement for Service Providers Only | CTRL-1109 Supplier Assessments and Reviews |
12.5.1 Maintaining PCI DSS Inventory | CTRL-435 System Inventory |
12.5.2 Annual PCI DSS Scoping Validation | CTRL-149 Control Assessments |
12.5.2.1 Biannual PCI DSS Scoping Validation (Service Providers Only) | CTRL-149 Control Assessments |
12.5.3 Organizational Structure Change Review (Service Providers Only) | CTRL-149 Control Assessments |
12.6.1 Implementing Security Awareness Program | CTRL-245 Security and Privacy Awareness Training |
12.6.2 Annual Security Awareness Program | CTRL-245 Security and Privacy Awareness Training |
12.6.3 Annual Security Awareness Training | CTRL-245 Security and Privacy Awareness Training |
12.6.3.1 Security Awareness Training Essentials | CTRL-245 Security and Privacy Awareness Training |
12.6.3.2 Security Awareness Training Requirements | CTRL-245 Security and Privacy Awareness Training |
12.7.1 Pre-Hire Screening for CDE Access | CTRL-530 Personnel Screening |
12.8.1 Third-Party Service Providers List | CTRL-1109 Supplier Assessments and Reviews |
12.8.2 Maintaining TPSPs Security Agreements | CTRL-539 Access Agreements |
12.8.3 Implementing TPSP Engagement Process | CTRL-1094 Third-Party Risk Management Policy and Procedures |
12.8.4 Annual TPSPs' PCI DSS Monitoring | CTRL-1094 Third-Party Risk Management Policy and Procedures |
12.8.5 Managing PCI DSS Requirements | CTRL-1094 Third-Party Risk Management Policy and Procedures |
12.9.1 Additional Requirement for Service Providers Only | CTRL-1129 Third-Party Agreements |
12.9.2 Additional Requirement for Service Providers Only | CTRL-1094 Third-Party Risk Management Policy and Procedures |
12.10.1 Comprehensive Security Incident Plan | CTRL-423 Incident Response Plan |
12.10.2 Annual Security Plan Review | CTRL-423 Incident Response Plan |
12.10.3 24/7 Security Incident Response | CTRL-423 Incident Response Plan |
12.10.4 Training for Security Incident Responders | CTRL-253 Role-Based Training |
12.10.4.1 Periodic Training Frequency Determination | CTRL-423 Incident Response Plan |
12.10.5 Security Incident Response Plan | CTRL-423 Incident Response Plan |
12.10.6 Updating Security Response Plan | CTRL-423 Incident Response Plan |
12.10.7 Managing Unexpected PAN Detection | CTRL-423 Incident Response Plan |
A1.1.1 Multi-tenant Service Providers Protect and Separate of Data | CTRL-198 Network Segmentation |
A1.1.2 Multi-tenant Service Providers Protect and Separate of Data | CTRL-198 Network Segmentation |
A1.1.3 Multi-tenant Service Providers Protect and Separate of Data | CTRL-198 Network Segmentation |
A1.1.4 Multi-tenant Service Providers Protect and Separate of Data | CTRL-198 Network Segmentation |
A1.2.1 Multi-tenant Service Providers Facilitate Logging and Incident Response | CTRL-833 Logging and Monitoring |
A1.2.2 Multi-tenant Service Providers Facilitate Logging and Incident Response | CTRL-423 Incident Response Plan |
A1.2.3 Multi-tenant Service Providers Facilitate Logging and Incident Response | CTRL-423 Incident Response Plan |
A2.1.1 Securing POS POI Terminals | CTRL-194 Cryptography Management |
A2.1.2 Additional Requirement for Service Providers Only | CTRL-194 Cryptography Management |
A2.1.3 Additional Requirement for Service Providers Only | CTRL-1094 Third-Party Risk Management Policy and Procedures |
AC-01-PCIv3 Access Control Policy and Procedures | CTRL-1 Access Control Policy and Procedures |
AC-02-PCIv3 User Account Management | CTRL-1 Access Control Policy and Procedures |
AC-02(03)-PCIv3 Disable Accounts | CTRL-535 Access Termination |
AC-02(11)-PCIv3 Unique IDs | CTRL-319 Identification and Authentication |
AC-03-PCIv3 Role-based Access Controls (RBAC) | CTRL-23 Role-Based Access Control |
AC-05-PCIv3 Separation of Duties | CTRL-65 Separation of Duties |
AC-06-PCIv3 Least Privilege Access | CTRL-23 Role-Based Access Control |
AC-06(07)-PCIv3 Review of Access Privileges | CTRL-73 Review of User Privileges |
AC-07-PCIv3 Unsuccessful Logon Attempts | CTRL-77 Unsuccessful Logon Attempts |
AC-11-PCIv3 Device Lock and Session Timeouts | CTRL-91 Session Termination |
AC-17-PCIv3 Remote Access | CTRL-110 Remote Access |
AC-18-PCIv3 Wireless Access | CTRL-121 Wireless Network |
AT-01-PCIv3 Awareness and Training Policy and Procedures | CTRL-245 Security and Privacy Awareness Training |
AT-02-PCIv3 Security Awareness and Privacy Training | CTRL-245 Security and Privacy Awareness Training |
AT-03-PCIv3 Role-based Training | CTRL-245 Security and Privacy Awareness Training |
AT-04-PCIv3 Training Records | CTRL-245 Security and Privacy Awareness Training |
AU-01-PCIv3 Audit and Accountability Policy and Procedures | CTRL-814 System Integrity Policy and Procedures |
AU-02-PCIv3 Event Logging in IT Systems | CTRL-833 Logging and Monitoring |
AU-03-PCIv3 Informative Log Content | CTRL-833 Logging and Monitoring |
AU-05-PCIv3 Response to Audit Logging Process Failures | CTRL-833 Logging and Monitoring |
AU-06-PCIv3 Log Review and Reporting | CTRL-833 Logging and Monitoring |
AU-08-PCIv3 Time Stamps | CTRL-1063 Synchronization |
AU-09-PCIv3 Protection of Audit Information | CTRL-833 Logging and Monitoring |
AU-09(02)-PCIv3 Store on Separate Physical Systems or Components | CTRL-283 Alternate Storage Site |
AU-09(06)-PCIv3 Read-only Access to Audit Logs | CTRL-9 Privileged User Accounts |
AU-11-PCIv3 Audit Record Retention | CTRL-896 Information Management and Retention |
CA-01-PCIv3 Assessment, Authorization, and Monitoring Policy and Procedures | CTRL-814 System Integrity Policy and Procedures |
CA-02-PCIv3 Control Assessments | CTRL-149 Control Assessments |
CA-03-PCIv3 Third-Party Agreements | CTRL-1129 Third-Party Agreements |
CA-07-PCIv3 Continuous Monitoring | CTRL-167 Continuous Monitoring |
CA-08-PCIv3 Penetration Testing | CTRL-174 Penetration Testing |
CM-01-PCIv3 Configuration and Change Management Policy and Procedures | CTRL-262 Change Management and Software Development Policy and Procedures |
CM-03-PCIv3 Configuration Management | CTRL-190 Change Management and Software Development Life Cycle |
CM-03(02)-PCIv3 Testing, Validation, and Documentation of Changes | CTRL-190 Change Management and Software Development Life Cycle |
CM-04-PCIv3 Impact Analyses | CTRL-190 Change Management and Software Development Life Cycle |
CM-04(01)-PCIv3 Separate Environments | CTRL-190 Change Management and Software Development Life Cycle |
CM-04(02)-PCIv3 Verification of Controls | CTRL-190 Change Management and Software Development Life Cycle |
CM-06-PCIv3 System Hardening through Baseline Configurations | CTRL-208 Configuration Management |
CM-06(01)-PCIv3 Automated Management, Application, and Verification | CTRL-208 Configuration Management |
CM-07-PCIv3 Least Functionality | CTRL-118 Network Protocols |
CM-08-PCIv3 Asset Inventory | CTRL-435 System Inventory |
IA-01-PCIv3 Identification and Authentication Policy and Procedures | CTRL-319 Identification and Authentication |
IA-02-PCIv3 Internal Users Identification and Authentication | CTRL-319 Identification and Authentication |
IA-05-PCIv3 Password Management | CTRL-349 Password-Based Authentication |
IA-08-PCIv3 External Users Identification and Authentication | CTRL-319 Identification and Authentication |
IR-01-PCIv3 Incident Response Policy and Procedures | CTRL-423 Incident Response Plan |
IR-02-PCIv3 Incident Response Training | CTRL-23 Role-Based Access Control |
IR-03-PCIv3 Incident Response Testing | CTRL-23 Role-Based Access Control |
IR-04-PCIv3 Incident Handling and Reporting | CTRL-423 Incident Response Plan |
IR-08-PCIv3 Incident Response Plan | CTRL-423 Incident Response Plan |
IR-09-PCIv3 CHD Information Spillage | CTRL-423 Incident Response Plan |
MP-01-PCIv3 Media Protection Policy and Procedures | CTRL-498 Media Protection Policy and Procedures |
MP-02-PCIv3 Media Access | CTRL-499 Media Access |
MP-03-PCIv3 Media Marking | CTRL-502 Media Marking |
MP-04-PCIv3 Media Storage | CTRL-506 Media Transport |
MP-05-PCIv3 Media Transport | CTRL-506 Media Transport |
MP-06-PCIv3 Media Sanitization | CTRL-511 Media Sanitization and Disposal |
PE-01-PCIv3 Physical and Environmental Policy and Procedures | CTRL-546 Physical and Environmental Protection Policy and Procedures |
PE-02-PCIv3 Physical Access Authorizations | CTRL-551 Physical Access Control |
PE-02(01)-PCIv3 Access by Position or Role | CTRL-551 Physical Access Control |
PE-03-PCIv3 Physical Access Control | CTRL-255 Physical Security Controls |
PE-06-PCIv3 Monitoring Physical Access | CTRL-423 Incident Response Plan |
PE-06(03)-PCIv3 Video Surveillance | CTRL-255 Physical Security Controls |
PE-08-PCIv3 Visitor Access Records | CTRL-255 Physical Security Controls |
PL-01-PCIv3 Planning Policy and Procedures | CTRL-263 Contingency Planning Policy and Procedures |
PL-04-PCIv3 Rules of Behavior | CTRL-539 Access Agreements |
PM-01-PCIv3 Information Security Program Management Policy and Procedures | CTRL-431 Information Security Policy and Procedures |
PM-02-PCIv3 Information Security Program Leadership Roles | CTRL-432 Information Security Program Leadership Role |
PM-07-PCIv3 Network Architecture and Dataflow Diagrams | CTRL-198 Network Segmentation |
PM-09-PCIv3 Risk Management Program and Strategy | CTRL-643 Risk Assessment Policy and Procedures |
PS-01-PCIv3 Personnel Security Policy and Procedures | CTRL-528 Personnel Security Policy and Procedures |
PS-02-PCIv3 Security Job and Risk Descriptions | CTRL-545 Position Descriptions |
PS-03-PCIv3 Personnel Screening | CTRL-530 Personnel Screening |
PS-04-PCIv3 Personnel Termination | CTRL-535 Access Termination |
RA-01-PCIv3 Risk Assessment Policy and Procedures | CTRL-643 Risk Assessment Policy and Procedures |
RA-03-PCIv3 Risk Assessment | CTRL-646 Risk Assessment |
RA-05-PCIv3 Vulnerability Monitoring and Scanning | CTRL-652 Vulnerability Management |
SA-01-PCIv3 System Development Life Cycle (SDLC) Policy and Procedures | CTRL-262 Change Management and Software Development Policy and Procedures |
SA-03-PCIv3 System Development Life Cycle | CTRL-190 Change Management and Software Development Life Cycle |
SA-03(02)-PCIv3 Use of Live or Operational Data | CTRL-1186 Sensitive Data in Non-Production Environments |
SA-08-PCIv3 Security and Privacy Engineering Principles | CTRL-190 Change Management and Software Development Life Cycle |
SA-09-PCIv3 External System Services | CTRL-1094 Third-Party Risk Management Policy and Procedures |
SA-11-PCIv3 Developer Testing and Evaluation | CTRL-190 Change Management and Software Development Life Cycle |
SA-11(04)-PCIv3 Manual Code Reviews | CTRL-190 Change Management and Software Development Life Cycle |
SC-01-PCIv3 System Protection Policy and Procedures | CTRL-932 System Protection Policy and Procedures |
SC-07-PCIv3 Boundary Protection and Firewalls | CTRL-950 Boundary Protection |
SC-07(05)-PCIv3 Deny by Default; Allow by Exception | CTRL-950 Boundary Protection |
SC-07(08)-PCIv3 Route Traffic to Authenticated Proxy Servers | CTRL-950 Boundary Protection |
SC-07(11)-PCIv3 Restrict Incoming Communications Traffic | CTRL-950 Boundary Protection |
SC-07(12)-PCIv3 Personal Firewalls | CTRL-950 Boundary Protection |
SC-08-PCIv3 Transmission Confidentiality and Integrity | CTRL-112 Encryption of Data at Rest and in Transit |
SC-08(01)-PCIv3 Cryptographic Protection (Transmission) | CTRL-112 Encryption of Data at Rest and in Transit |
SC-12-PCIv3 Cryptographic Key Establishment and Management | CTRL-194 Cryptography Management |
SC-13-PCIv3 Cryptographic Protection | CTRL-923 Removal of Direct Identifiers |
SC-45-PCIv3 System Time Synchronization | CTRL-1063 Synchronization |
SC-45(01)-PCIv3 Synchronization with Authoritative Time Source | CTRL-1063 Synchronization |
SI-01-PCIv3 System Integrity Policy and Procedures | CTRL-814 System Integrity Policy and Procedures |
SI-02-PCIv3 Flaw Remediation and Patch Management | CTRL-652 Vulnerability Management |
SI-03-PCIv3 Malware and Endpoint Protection | CTRL-833 Logging and Monitoring |
SI-04-PCIv3 System Monitoring | CTRL-833 Logging and Monitoring |
SI-04(14)-PCIv3 Wireless Intrusion Detection | CTRL-833 Logging and Monitoring |
SI-12-PCIv3 Data Handling, Retention, and Disposal | CTRL-896 Information Management and Retention |
SI-19-PCIv3 De-identification | CTRL-923 Removal of Direct Identifiers |
SR-01-PCIv3 Third-Party Risk Management Policy and Procedures | CTRL-1094 Third-Party Risk Management Policy and Procedures |
SR-10-PCIv3 Inspection of Systems or Components | CTRL-556 Tamper Protection |
Viewing Framework Controls in Thoropass
You can view the framework requirements satisfied by a Unified Control by clicking References on the side panel when viewing the Unified Control.
The IDs and names of all framework controls satisfied by the Unified Control are listed by framework. Click a framework control to view its description.