Overview
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. Wazuh helps organizations monitor and maintain PCI DSS compliance through automated security event detection and mapping.PCI DSS Requirements Coverage
Wazuh maps security events to PCI DSS requirements through therule.pci_dss field. The compliance requirements are defined in:
Source: plugins/main/common/compliance-requirements/pci-requirements.ts
Network Security Requirements
1.1.1 - Firewall Configuration Management
1.1.1 - Firewall Configuration Management
1.3.4 - Outbound Traffic Control
1.3.4 - Outbound Traffic Control
1.4 - Personal Firewall Requirements
1.4 - Personal Firewall Requirements
System Hardening Requirements
2.2 - Configuration Standards
2.2 - Configuration Standards
2.2.2 - Unnecessary Services
2.2.2 - Unnecessary Services
2.2.3 - Additional Security Features
2.2.3 - Additional Security Features
2.2.4 - Security Parameters
2.2.4 - Security Parameters
Cryptography and Data Protection
4.1 - Encryption in Transit
4.1 - Encryption in Transit
5.1 - Anti-virus Deployment
5.1 - Anti-virus Deployment
5.2 - Anti-virus Maintenance
5.2 - Anti-virus Maintenance
Vulnerability Management
6.2 - Security Patch Management
6.2 - Security Patch Management
6.5 - Secure Development
6.5 - Secure Development
6.5.1 - Injection Flaws
6.5.1 - Injection Flaws
6.5.2 - Buffer Overflows
6.5.2 - Buffer Overflows
6.5.7 - Cross-site Scripting (XSS)
6.5.7 - Cross-site Scripting (XSS)
6.6 - Web Application Protection
6.6 - Web Application Protection
Access Control Requirements
8.1.2 - User ID Management
8.1.2 - User ID Management
8.1.4 - Inactive Account Removal
8.1.4 - Inactive Account Removal
8.1.6 - Account Lockout
8.1.6 - Account Lockout
8.1.8 - Session Timeout
8.1.8 - Session Timeout
8.7 - Database Access Restrictions
8.7 - Database Access Restrictions
Logging and Monitoring
10.1 - Audit Trails
10.1 - Audit Trails
10.2.1 - Cardholder Data Access
10.2.1 - Cardholder Data Access
10.2.2 - Administrative Actions
10.2.2 - Administrative Actions
10.2.4 - Invalid Access Attempts
10.2.4 - Invalid Access Attempts
10.2.5 - Authentication Changes
10.2.5 - Authentication Changes
10.5.2 - Audit Log Protection
10.5.2 - Audit Log Protection
10.5.5 - Log Integrity Monitoring
10.5.5 - Log Integrity Monitoring
10.6 - Log Review
10.6 - Log Review
Intrusion Detection
11.4 - IDS/IPS Implementation
11.4 - IDS/IPS Implementation
11.5 - File Integrity Monitoring
11.5 - File Integrity Monitoring
Using the PCI DSS Dashboard
Accessing PCI DSS Compliance View
Filter by Requirement
Dashboard Components
The PCI DSS dashboard includes:- Top requirements by alert count - Identifies most violated controls
- Alert distribution - Shows compliance coverage across requirements
- Timeline view - Tracks compliance violations over time
- Requirement details - Displays full text of each PCI DSS requirement
plugins/main/public/components/overview/pci/dashboards/dashboard-panels.ts
Data Source Implementation
The PCI DSS data source filters events by therule.pci_dss field:
plugins/main/public/components/common/data-source/pattern/events/pci-dss/pci-dss-data-source.ts:5
Event Columns
PCI DSS events table displays:- Timestamp
- Rule description
- PCI DSS requirement (
rule.pci_dssfield) - Alert level
- Agent information
plugins/main/public/components/overview/pci/events/pci-columns.tsx:8
Compliance Reporting
Generating PCI DSS Reports
Integration with Other Modules
PCI DSS requirements appear in:- MITRE ATT&CK view - Maps compliance to attack techniques
- Threat Hunting - Includes PCI DSS aggregations
- Agent overview - Per-agent PCI DSS compliance status
plugins/main/public/components/overview/mitre/framework/components/techniques/components/rule-details.tsx:111
Requirement Data Structure
The complete PCI DSS requirements mapping:plugins/main/common/compliance-requirements/pci-requirements.ts:12
Best Practices
Daily Reviews
Focus on Critical Requirements
Integrate with Change Management
Quarterly Audits
Related Documentation
- Compliance Overview
- [File Integrity Monitoring(/modules/file-integrity-monitoring) - Supports requirements 10.5.5 and 11.5
- [Vulnerability Detection(/modules/vulnerability-detection) - Supports requirement 6.2
- [Log Analysis(/modules/threat-hunting) - Supports requirements 10.x