{"id":4522,"date":"2023-05-01T14:54:08","date_gmt":"2023-05-01T09:24:08","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=4522"},"modified":"2023-05-01T14:59:45","modified_gmt":"2023-05-01T09:29:45","slug":"understanding-the-12-requirements-of-the-pci-dss-standard","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/","title":{"rendered":"Understanding the 12 Requirements of the PCI DSS Standard"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4522\" class=\"elementor elementor-4522\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c9ab953 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c9ab953\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab30aac\" data-id=\"ab30aac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d91bcc6 elementor-widget elementor-widget-text-editor\" data-id=\"d91bcc6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p><span style=\"font-weight: 400\">As businesses continue to move online, it is essential to ensure the safety and security of sensitive information. One way to do this is by complying with the Payment Card Industry Data Security Standard (PCI DSS) requirements. The PCI DSS is a set of 12 requirements designed to ensure that businesses handling credit card data do so securely.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">In this article, we will discuss each of the 12 requirements of the PCI DSS in detail, so that you can better understand what it takes to comply with this standard and protect your customers&#8217; data.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 1: Install and maintain a firewall configuration to protect cardholder data<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The first requirement of the PCI DSS is to install and maintain a firewall configuration to protect cardholder data. This means that you must have a firewall in place that is configured to restrict access to cardholder data.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The second requirement of the PCI DSS is to not use vendor-supplied defaults for system passwords and other security parameters. This means that you must change default passwords and settings that are provided by your hardware and software vendors.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 3: Protect stored cardholder data<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The third requirement of the PCI DSS is to protect stored cardholder data. This means that you must ensure that any stored cardholder data is encrypted and that access to it is restricted.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 4: Encrypt transmission of cardholder data across open, public networks<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The fourth requirement of the PCI DSS is to encrypt transmission of cardholder data across open, public networks. This means that you must ensure that any data transmitted over a public network is encrypted and cannot be intercepted by unauthorized parties.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 5: Use and regularly update anti-virus software or programs<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The fifth requirement of the PCI DSS is to use and regularly update anti-virus software or programs. This means that you must have anti-virus software in place that is regularly updated to protect against new threats.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 6: Develop and maintain secure systems and applications<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The sixth requirement of the PCI DSS is to develop and maintain secure systems and applications. This means that you must ensure that any systems and applications used to handle cardholder data are secure and up to date.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 7: Restrict access to cardholder data by business need-to-know<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The seventh requirement of the PCI DSS is to restrict access to cardholder data by business need-to-know. This means that you must ensure that only authorized personnel have access to cardholder data and that access is restricted to what is necessary to perform their job functions.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 8: Assign a unique ID to each person with computer access<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The eighth requirement of the PCI DSS is to assign a unique ID to each person with computer access. This means that you must ensure that each individual with computer access has a unique identifier to enable you to track their activity.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 9: Restrict physical access to cardholder data<\/b><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">The ninth requirement of the PCI DSS is to restrict physical access to cardholder data. This means that you must ensure that any physical location where cardholder data is stored or processed is secure and that access is restricted to authorized personnel only.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 10: Regularly test security systems and processes.<\/b><\/p>\n<p><span style=\"font-weight: 400\">This requirement emphasizes the importance of regularly testing security systems and processes to identify vulnerabilities and ensure that they are functioning as intended. To comply with this requirement, organizations should perform regular vulnerability scans and penetration testing to identify security vulnerabilities that could be exploited by attackers.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">Regularly test security systems and processes.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This requirement emphasizes the importance of regularly testing security systems and processes to identify vulnerabilities and ensure that they are functioning as intended. To comply with this requirement, organizations should perform regular vulnerability scans and penetration testing to identify security vulnerabilities that could be exploited by attackers.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">Vulnerability scanning is the process of using automated tools to scan networks, systems, and applications for known vulnerabilities. This can help organizations to identify vulnerabilities before they are exploited by attackers.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">Penetration testing, on the other hand, involves simulating an attack on a network, system, or application to identify vulnerabilities that may not be detected through automated scanning. Penetration testing is typically performed by trained security professionals and can help organizations to identify potential security weaknesses and improve their overall security posture.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">In addition to vulnerability scanning and penetration testing, organizations should also regularly review their security policies and procedures to ensure that they are up-to-date and effective. This can include reviewing access controls, authentication procedures, and other security controls to identify areas that may need improvement.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">By regularly testing security systems and processes, organizations can identify vulnerabilities and weaknesses in their security defenses and take proactive measures to mitigate them. This can help to reduce the risk of data breaches and other security incidents, and demonstrate a commitment to information security and compliance with the PCI DSS standard.<\/span><\/p>\n<p><\/p>\n<p><b>Requirement 12: Maintain a policy that addresses information security for all personnel.<\/b><\/p>\n<p><span style=\"font-weight: 400\">This requirement focuses on the importance of having a comprehensive security policy in place that addresses information security for all personnel, including employees, contractors, and third-party vendors. The policy should outline security procedures, responsibilities, and expectations for all individuals who have access to cardholder data.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">To comply with this requirement, organizations should create a security policy that clearly defines the roles and responsibilities of personnel with respect to information security. The policy should also outline the procedures for reporting security incidents, the consequences of violating security policies, and the measures in place to monitor compliance.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">In addition, organizations should provide regular security training and awareness programs to all personnel to ensure that they are aware of their roles and responsibilities in maintaining the security of cardholder data. This can help to ensure that all personnel understand the importance of information security and are equipped with the knowledge and skills necessary to protect cardholder data.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">By implementing a comprehensive security policy and providing regular security training and awareness programs, organizations can demonstrate their commitment to information security and reduce the risk of data breaches and security incidents.<\/span><\/p>\n<p><\/p>\n<p><span style=\"font-weight: 400\">Overall, compliance with the PCI DSS standard requires organizations to implement a range of security measures and practices to protect cardholder data. By complying with these requirements, organizations can reduce the risk of data breaches and other security incidents, and maintain the trust of their customers and partners.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9bae59f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9bae59f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5f12710\" data-id=\"5f12710\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18ed55f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"18ed55f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/xiarch.com\/company\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Get in Touch with Our Team for PCI DSS Compliance Assistance for Your Small Business<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As businesses continue to move online, it is essential to ensure the safety and security of sensitive information. One way to do this is by complying with the Payment Card Industry Data Security Standard (PCI DSS) requirements. The PCI DSS is a set of 12 requirements designed to ensure that businesses handling credit card data [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keeping Your Data Safe: The Importance of PCI DSS Compliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Your Data Safe: The Importance of PCI DSS Compliance\" \/>\n<meta property=\"og:description\" content=\"As businesses continue to move online, it is essential to ensure the safety and security of sensitive information. One way to do this is by complying with the Payment Card Industry Data Security Standard (PCI DSS) requirements. The PCI DSS is a set of 12 requirements designed to ensure that businesses handling credit card data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-01T09:24:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-01T09:29:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/04\/asdfdsfafasdf.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devyansh Sharda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devyansh Sharda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\"},\"author\":{\"name\":\"Devyansh Sharda\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/6064d698afb3f0276fc69b5753905c52\"},\"headline\":\"Understanding the 12 Requirements of the PCI DSS Standard\",\"datePublished\":\"2023-05-01T09:24:08+00:00\",\"dateModified\":\"2023-05-01T09:29:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\"},\"wordCount\":1085,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Consulting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\",\"url\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\",\"name\":\"Keeping Your Data Safe: The Importance of PCI DSS Compliance\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2023-05-01T09:24:08+00:00\",\"dateModified\":\"2023-05-01T09:29:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the 12 Requirements of the PCI DSS Standard\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/6064d698afb3f0276fc69b5753905c52\",\"name\":\"Devyansh Sharda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&d=mm&r=g\",\"caption\":\"Devyansh Sharda\"},\"sameAs\":[\"https:\/\/xiarch.com\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Your Data Safe: The Importance of PCI DSS Compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Your Data Safe: The Importance of PCI DSS Compliance","og_description":"As businesses continue to move online, it is essential to ensure the safety and security of sensitive information. One way to do this is by complying with the Payment Card Industry Data Security Standard (PCI DSS) requirements. The PCI DSS is a set of 12 requirements designed to ensure that businesses handling credit card data [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2023-05-01T09:24:08+00:00","article_modified_time":"2023-05-01T09:29:45+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2023\/04\/asdfdsfafasdf.png","type":"image\/png"}],"author":"Devyansh Sharda","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Devyansh Sharda","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/"},"author":{"name":"Devyansh Sharda","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/6064d698afb3f0276fc69b5753905c52"},"headline":"Understanding the 12 Requirements of the PCI DSS Standard","datePublished":"2023-05-01T09:24:08+00:00","dateModified":"2023-05-01T09:29:45+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/"},"wordCount":1085,"commentCount":1,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Consulting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/","url":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/","name":"Keeping Your Data Safe: The Importance of PCI DSS Compliance","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2023-05-01T09:24:08+00:00","dateModified":"2023-05-01T09:29:45+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/understanding-the-12-requirements-of-the-pci-dss-standard\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding the 12 Requirements of the PCI DSS Standard"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/6064d698afb3f0276fc69b5753905c52","name":"Devyansh Sharda","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50d601176e210b3384d4a000ddd3a837?s=96&d=mm&r=g","caption":"Devyansh Sharda"},"sameAs":["https:\/\/xiarch.com\/"],"url":"https:\/\/xiarch.com\/blog\/author\/devyansh-sharda\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4522"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=4522"}],"version-history":[{"count":5,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4522\/revisions"}],"predecessor-version":[{"id":4527,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4522\/revisions\/4527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/4514"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=4522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=4522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=4522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}