Skip to content

jrivas-cyber/PCI-scoping-exercises

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 

Repository files navigation

Scoping your CDE

Generally speaking, scoping can be defined as the identification and tracking of people, processes, and technologies that directly interact with account data or could impact the security of account data in your cardholder data environment (CDE).

Key items to consider:

  • Scoping exercises should be performed annually (at minimum)
  • Should include validation of people, processes and technologies that handle account data
  • Should include the identification of all current and new payment channels
  • Include policies and standards that enforce PCI requirements for your organization

Screenshot 2026-01-09 063146

In-scope vs out-of-scope systems

Systems are in-scope when:

  • They store, process, or transmit account data
  • They are on the same network segment (i.e., same subnet or VLAN) as systems that store, process or transmit account data
  • They can impact the configurations or security of the CDE

Systems are out-of-scope when:

  • They do not store, process, or transmit account data
  • They are not on the same network segment (i.e., same subnet or VLAN) as systems that store, process or transmit account data
  • They cannot connect to any system in the CDE and do not impact configurations or security of the CDE

Creating sustainable, long-term processes for success

In this project, we simulate an organization that is just starting their scoping journey with the goal of identifying and tracking both in-scope and out-of-scope systems.

Inception State: organization has no existing policies, standards or processes in place to identify their CDE.

Completion State: formal policies, standards and processes are created, stakeholders are bought-in to their annual scoping responsibilities, and a full cycle of scoping exercises are is successfully completed.


Technology Utilized

  • PowerShell & BASH scripts (rule out storage of account data across the organization)

Table of Contents


Step 1) Gather a full list of MIDs


Step 2) Creating data flow diagrams


Step 3) Creating network diagrams


Step 4) Identifying in-scope software


Step 5) Identifying in-scope hardware


Step 6) Identifying in-scope policies and standards


About

Guide on how to properly scope your entire CDE.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors