PCI-DSS v4.0 — SOC Requirements Checklist¶
Map SOC operational requirements to PCI-DSS v4.0 controls.
Use this document for audit preparation and gap identification.
1. Overview¶
PCI-DSS v4.0 (effective March 2024) defines security requirements for organizations handling payment card data. SOC teams play a critical role in meeting monitoring, detection, and response requirements.
SOC-Relevant Requirements¶
pie title PCI-DSS Requirements Covered by SOC
"SOC Directly Responsible" : 4
"SOC Contributes" : 5
"Not SOC Scope" : 3
SOC operations directly address Requirements 10, 11, 12.10 and contribute to Requirements 1, 2, 5, 6, 7.
2. Requirement 10 — Log and Monitor All Access¶
SOC Role: Primary owner of log management and monitoring.
| Sub-Req | Control | SOC Coverage | SOC Document |
|---|---|---|---|
| 10.1 | Processes and mechanisms for logging and monitoring | ✅ | Log Source Matrix |
| 10.2 | Audit logs capture required events | ✅ | Log Source Onboarding |
| 10.3 | Audit logs are protected from destruction | 🟡 | Log Clearing PB |
| 10.4 | Audit logs are reviewed for anomalies | ✅ | Alert Tuning, Detection Rules |
| 10.5 | Audit log history is retained | 🟡 | Data Handling Protocol |
| 10.6 | Time-synchronization technology | 🟡 | Log Source Matrix |
| 10.7 | Failures of critical security controls detected & reported | ✅ | SOC Checklists, Shift Handoff |
3. Requirement 11 — Test Security Regularly¶
SOC Role: Detection validation and vulnerability scanning.
| Sub-Req | Control | SOC Coverage | SOC Document |
|---|---|---|---|
| 11.1 | Processes for regular security testing | ✅ | Simulation Guide |
| 11.2 | Wireless access points managed | ⬜ | Not SOC scope (network team) |
| 11.3 | Vulnerabilities identified and addressed | ✅ | Vulnerability Management |
| 11.4 | External/internal penetration testing | 🟡 | Purple Team Exercise |
| 11.5 | Network intrusions/changes detected and responded to | ✅ | Network Security Monitoring, IDS/IPS Sigma Rules |
| 11.6 | Unauthorized changes to payment pages detected | 🟡 | Web Attack PB |
4. Requirement 12.10 — Incident Response¶
SOC Role: Primary owner of incident response.
| Sub-Req | Control | SOC Coverage | SOC Document |
|---|---|---|---|
| 12.10.1 | Incident response plan exists | ✅ | IR Framework |
| 12.10.2 | Plan is reviewed and tested annually | ✅ | Purple Team Exercise, Phishing Simulation |
| 12.10.3 | Specific personnel available 24/7 | ✅ | SOC Team Structure, Shift Handoff |
| 12.10.4 | Personnel are properly trained | ✅ | Training Checklist, Analyst Onboarding |
| 12.10.4.1 | Frequency of IR training defined | ✅ | Training Checklist |
| 12.10.5 | Alerts from security monitoring trigger response | ✅ | Escalation Matrix, 50 Playbooks |
| 12.10.6 | IR plan is modified based on lessons learned | ✅ | Lessons Learned Template |
| 12.10.7 | IR procedures in place for critical alerts | ✅ | Severity Matrix; P1 playbooks |
5. SOC Contributions to Other Requirements¶
| Req | Title | SOC Contribution | Document |
|---|---|---|---|
| 1 | Network Security Controls | Monitor firewall & IDS alerts | Network Security Monitoring |
| 2 | Secure Configurations | Detect misconfigurations via monitoring | Cloud Security Monitoring |
| 5 | Anti-Malware | Monitor endpoint protection alerts | Malware PB, Ransomware PB |
| 6 | Secure Systems & Software | Monitor for exploitation attempts | Exploit PB, Zero-Day PB |
| 7 | Restrict Access | Monitor access control violations | Access Control, Privilege Escalation PB |
6. Audit Preparation Checklist¶
Use this checklist before a PCI-DSS audit:
- Log retention — Verify 12 months of logs available (3 months immediately accessible)
- Monitoring coverage — Confirm all CDE (Cardholder Data Environment) systems in Log Source Matrix
- Alert response — Document SLA compliance for P1/P2 alerts
- IR testing — Provide evidence of annual Purple Team exercise or tabletop
- Training records — Show analyst training completion dates
- Change detection — Demonstrate file integrity monitoring on payment pages
- Vulnerability scans — Show quarterly internal/external scan results
- Incident log — Provide ticketing system export with resolution times
7. Key Differences: PCI-DSS v3.2.1 → v4.0¶
| Area | v3.2.1 | v4.0 (New) | SOC Impact |
|---|---|---|---|
| Log review | Daily manual review | Automated monitoring + targeted risk analysis | Increase SIEM automation |
| Detection | IDS/IPS required | + Network behavioral analysis | Add network anomaly detection |
| IR testing | Annual test | Annual test + scenario-specific exercises | Add Purple Team exercises |
| Authentication | MFA for remote access | MFA for all CDE access | Monitor for MFA bypass |
| Customized approach | N/A | Organizations can customize controls | Document alternative approaches |