FREE CHECKLIST
PCI DSS Compliance Checklist on AWS
The Ultimate Checklist for PCI DSS Compliance on AWS in 2020

Get the Free Ebook
This PCI DSS Checklist 2020 carefully explains and details the requirements of PCI Compliance. And is specifically tailored to secure cardholder data, in order to preserve customer’s trust and organization’s security.
This PCI DSS Compliance Checklist 2020 is based on the 12 core requirements of the PCI DSS.
Our DevOps experts have helped customers from a wide variety of industries to become PCI DSS Compliant through the implementation of PCI requirements.
Why Choose ClickIT?
At ClickIT we offer PCI DSS compliance assistance to help companies automate processes and secure data.
We can help you become fully PCI compliant.


Security Matters
For you and your customers. Becoming PCI Compliant will help to secure cardholder data and preserve customers' trust.

Cyber Defenses
Following and implementing the PCI Data Security Standards will keep your applications primed against attacks.

Track Processes
The implementation of tracking and monitoring processes will help to identify user access and vulnerabilities.
More about this Checklist
This PCI DSS Compliance Checklist 2020 is based on the 12 core requirements of the PCI DSS
and detailed corresponds with the latest version 3.2.1 of the PCI DSS Standard.

Requirement 1:
Install and maintain a firewall configuration to protect the cardholder data.

Requirement 2:
Do not use vendor-supplied defaults for system passwords and other security parameters.

Requirement 3:
Protect stored cardholder data.

Requirement 4:
Encrypt transmission of cardholder data across public networks.

Requirement 5:
Protect all systems against malware and regularly update antivirus software or programs.

Requirement 6:
Develop and maintain secure systems and applications

Requirement 7:
Restrict access to cardholder data by business need-to-know.

Requirement 8:
Identify and authenticate access to system components.

Requirement 9:
Restrict physical access to cardholder data.

Requirement 10:
Track and monitor all access to network resources and cardholder data.

Requirement 11:
Regularly test security systems and processes.

Requirement 12:
Maintain a policy that addresses information security for all personnel.



PCI DSS Compliance Checklist on AWS
AWS mantains a secures network and system through a Vulnerability Program and a Strong Access Control in order to continuously protect cardholder data.
