Which PCI DSS requirement covers encrypting transmission of cardholder data across open, public networks?

Study for the PCI Data Security Standard Exam. Master your knowledge with interactive flashcards and multiple-choice questions, each with hints and explanations. Prepare confidently for your certification test!

Multiple Choice

Which PCI DSS requirement covers encrypting transmission of cardholder data across open, public networks?

Explanation:
Protecting data as it moves across networks is essential because open, public networks can be intercepted by attackers. Encrypting cardholder data during transmission ensures that even if the data is captured, it remains unreadable without the proper cryptographic keys. PCI DSS explicitly requires this for data in transit: use strong cryptography and robust key management to encrypt cardholder data when it travels over open networks. This safeguards confidentiality during transmission and mitigates the risk of eavesdropping or tampering as data crosses the boundary into or out of the organization’s control. The other protections address different risk areas: physical security of devices and media, controls that identify and authenticate who can access systems, and logging/monitoring of access and activity. While important, they don’t specifically mandate encryption of data in transit, which is why encryption of transmission across open networks is the correct focus for this requirement.

Protecting data as it moves across networks is essential because open, public networks can be intercepted by attackers. Encrypting cardholder data during transmission ensures that even if the data is captured, it remains unreadable without the proper cryptographic keys. PCI DSS explicitly requires this for data in transit: use strong cryptography and robust key management to encrypt cardholder data when it travels over open networks. This safeguards confidentiality during transmission and mitigates the risk of eavesdropping or tampering as data crosses the boundary into or out of the organization’s control.

The other protections address different risk areas: physical security of devices and media, controls that identify and authenticate who can access systems, and logging/monitoring of access and activity. While important, they don’t specifically mandate encryption of data in transit, which is why encryption of transmission across open networks is the correct focus for this requirement.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy