Compliance

PCI DSS compliance

Payment Card Industry Data Security Standard (PCI DSS) compliance comes with strict requirements. Businesses are required to perform network security scans to ensure no credit card data is leaked. This must be done in accordance with a defined set of procedures using a PCI DSS Approved Scanning Vendor (ASV). Holm Security, together with partners, provides a complete service for PCI DSS compliance. 

PCI DSS_logo
OUR SOLUTION

A complete service

We provide a full service for PCI DSS compliance together with our partners

Automated and continuous scanning

Automated and continuous scanning of infrastructure ensures you are able to proactively find and remediate any vulnerabilities in your systems.

Continuous audits

Audits by an accredited auditor - a so-called Qualified Security Assessor (QSA). 

Quarterly compliance scans

Quarterly ASV scanning to ensure compliance with PCI DSS. 

Reporting

Scan reports showing that your organization has assessed vulnerabilities and applied fixes in a timely manner.

Let’s talk PCI DSS compliance

REQUIREMENTS

Scanning requirements

To achieve compliance, your business needs to identify and remediate all critical vulnerabilities detected during the scan.  

Quarterly scans

You must conduct external vulnerability scans at least once every three months but continuous scanning is recommended.

Post-significant change scans

Scans are required after any significant change to your network or system components.

Remediation and rescanning

Your business must address identified vulnerabilities promptly, often within 30 days of discovery, and rescan as necessary to confirm that vulnerabilities have been resolved.

Passing scan criteria

A scan is considered “passing” when no vulnerabilities with a Common Vulnerability Scoring System (CVSS) score of 4.0 or higher are detected. ​​

GET STARTED

Get started with PCI DSS compliance today

We would love to help your organization with PCI DSS compliance. Please fill out the form, and we will get back to you shortly. 

  • Automated and continuous assessments of critical infrastructure.
  • Quarterly scans using an Approved Scanning Vendor (ASV).
  • Audits by a Qualified Security Assessor (QSA).