• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English

How to Manage PCI DSS Compliance Using Zero Trust Principles.

You are here: Home / Blog / How to Manage PCI DSS Compliance Using Zero Trust Principles.

Many companies have implemented work-from-home policies, which challenge how PCI DSS compliance has been traditionally managed.

The Payment Card Industry Data Security Standard (PCI DSS) is a standard established by the leading payment card issuers. The PCI DSS provides guidelines for securely processing, storing or transmitting payment card data. It aims to protect organizations and their customers against payment card fraud and is made up of 12 requirements or control objectives that comprehensively protect the payments ecosystem. This standard has been around since 2006; providing organizations with a framework they can use to implement, maintain and measure the strength of their cardholder data environment. Then the lockdown happened, forcing organizations across the globe to allow employees to work remotely.

Today more and more organizations are operating remotely and allowing employees to work from home. This has presented a bigger risk for many organizations who process, store or transmit payment card data. Achieving and maintaining compliance with PCI DSS has become increasingly challenging and yet; more important than ever. This paper introduces Zero Trust Principles and encourages organizations to adopt these principles across all 12 requirements of the PCI DSS.

What are Zero Trust Principles?
Zero Trust Principles suggest that an organization should consider itself at risk from attackers within both its internal and external network and implement stringent controls for complete security. These principles enforce the idea that no machine or user within the organization’s network should be automatically trusted; therefore, organizations must examine their access controls and adopt least-privilege controls across all processes.

Here are the 12 requirements of the PCI DSS applied to Zero Trust Principles:

Requirement 1 – Building and maintaining a secure network.
It is necessary to implement personal firewall software on every single device that employees have access to – including their personal devices. Additionally, they must use only required access control rules on their personal firewall. It is also vital to ensure that employees do not have the ability to modify or disable the firewall software.

Requirement 2 – Configuration Scans
In addition to maintaining an up-to-date inventory of workstations, organizations system configuration standards are also enforced on working from home user’s workstations.

Requirement 3 – Protecting Stored Cardholder Data
With many employees now working remotely, the frequency of card data discovery scanning must be increased. There must be a clear process for running automated scans, removing any sensitive data found and reducing risk and exposure of full card numbers.

Requirement 4 – Protecting Cardholder Data In Transmission
In addition to using encrypted VPN connection, remote employees must only access the internet using HTTPS (TLS v1.2). The use of unofficial email and messaging of cardholder data must also be strictly prohibited.

Requirement 5 – Antivirus and Malware
This goes without saying; an antivirus solution that cannot be disabled and is regularly updated must be installed on all systems.

Requirement 6 – Securing Applications
Clear segregation and regular patch management is needed here– development workstations should not be able to access remote productions environments.

Requirement 7: Access Control
Unless an employee is a recognized power user; access to any systems within the cardholder data environment must be prohibited. Access should be on a need-to-know basis along with least privileges access.

Requirement 8: User IDs
Without exception, all remote workers must use two factor authentication to connect to cardholder data environment.

Requirement 9: Physical Security
With employees working form home, organizations must ensure full cardholder data cannot be viewed, printed or downloaded. The review of data centers may now need to be completed using time stamped cameras and CCTV.

Requirement 10: Logging and Monitoring
All activities done on remote employees’ workstations must be logged and frequently synchronizing with designated servers.

Requirement 11: Vulnerability Management
Internal vulnerability scanning and penetration testing that emulates working from home user scenarios must be performed.

And finally;

Requirement 12: Policies and Procedures
It is more important than ever to communicate the risk introduced by having employees work from home. Information Security training and awareness must be provided to ensure security and compliance goals are a business as usual consideration across the entire organization.

Conclusion
The above list provides solutions for addressing each of the PCI DSS requirements using zero trust principles. However, managing security is still no easy task. Wherever possible, organizations must use technology to automate processes, increase accuracy and reduce risk.

There are 3 key areas that an organization may simplify their PCI DSS compliance management using technology to implement zero trust principles:
1. Automation – By automating remote scanning, testing and evidence collection, organizations can save time and reduce risk while employees are working from home.
2. The use of CCTV and cameras – this provides a mechanism to enable remote assessments and PCI DSS certification.
3. Make PCI DSS Compliance Business as Usual – Organizations must develop, implement and maintain a continuous compliance program that includes more frequent reviews and scans across the entire network.

Book a FREE 30 minute Consultation to discuss your environment.

Related Blog

Importance of building a culture of security and compliance within your organization
How ControlCase’s “OneAudit” and “Continuous Compliance” Solutions Support Clients
One Audit – Concept to Reality – The path forward
HIPAA / HITECH Compliance
A HIPAA / HITECH attestation report demonstrates that an organization has implemented safeguards to protect sensitive ePHI. HIPAA establishes administrative, physical, technical, security and privacy standards that apply to both healthcare providers and business associates.
"One Audit" for IT Security Compliance Explained!
The One Audit solution provides the ability for organizations to perform a single audit and certify/comply with multiple regulations including but not limited to PCI DSS, ISO 27001, BITS FISAP, HIPAA, SOC 1/2/3, and FISMA NIST 800-53.
About the PCI Software Security Framework
The PCI Secure SLC Standard provides a baseline of requirements with corresponding assessment procedures and guidance to help payment software vendors design, develop, and maintain secure payment software throughout the software lifecycle. Enabling organizations to build more secure payment software.

About Us

ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premise and cloud environments.
ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC2, CMMC, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PCI SSF, CSA STAR, HIPAA, GDPR, SWIFT, and FedRAMP.

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2025 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}