March 30, 2020 By Stephanie Schmader
Gopal Indurkhya
2 min read

IBM Cloud PCI DSS Guidance provides the framework for how clients can deploy PCI DSS compliant systems and applications on IBM public cloud.

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance cardholder data security and facilitate the global adoption of consistent security measures. PCI DSS provides a baseline of technical and operational requirements designed to protect account information (including card number, expiration date, and verification data).

The IBM Cloud PCI DSS guide includes a high-level overview of PCI DSS requirements, a responsibility matrix summary, and example architectures to help clients deploy and operate a payment processing system to properly handle credit card data in a secure, compliant environment on IBM Cloud. 

Example architecture end-to-end secure flow for a sample IBM Cloud Kubernetes Service application

This guide is intended for IBM Cloud clients who require their IBM Cloud environment and related applications to be PCI DSS-compliant. Readers should be familiar with the latest PCI DSS requirements, as well as have some background on IBM Cloud Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) architecture.

IBM Cloud clients must independently analyze their particular environments and use cases in order to verify that their own control environment meets the requirements set forth by the PCI Security Standards Council (SSC) and cannot rely solely on this guide. No information in this guide can, or is intended to, supplant any guidance provided to the client by a Qualified Security Assessor (QSA,) the PCI SSC, or the entity’s acquirer.

Learn more

More from Security

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Enhancing data security and compliance in the XaaS Era 

2 min read - Recent research from IDC found that 85% of CEOs who were surveyed cited digital capabilities as strategic differentiators that are crucial to accelerating revenue growth. However, IT decision makers remain concerned about the risks associated with their digital infrastructure and the impact they might have on business outcomes, with data breaches and security concerns being the biggest threats.   With the rapid growth of XaaS consumption models and the integration of AI and data at the forefront of every business plan,…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters