3 PCI-Compliant Wireless Settings (PA DSS 6.1.a and 6.2.b)

Oracle Hospitality Cruise SPMS does not support wireless technologies. However, should the merchant implement wireless access within the cardholder data environment, the following guidelines for secure wireless settings must be followed per PCI Data Security Standard 1.2.3, 2.1.1 and 4.1.1:

1.2.3: Perimeter firewalls must be installed between any wireless networks and systems that store cardholder data, and these firewalls must deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder data environment.

2.1.1: Change wireless vendor defaults per the following 5 points:

  1. Encryption keys must be changed from default at installation, and must be changed anytime anyone with knowledge of the keys leaves the company or changes positions.

  2. Default SNMP community strings on wireless devices must be changed.

  3. Default passwords/passphrases on access points must be changed..

  4. Firmware on wireless devices must be updated to support strong encryption for authentication and transmission over wireless networks.

  5. Other security-related wireless vendor defaults, if applicable, must be changed.

4.1.1: Industry best practices (for example, IEEE 802.11i) must be used to implement strong encryption for authentication and transmission of cardholder data.

Note:

The use of WEP as a security control was prohibited as of June 30, 2010.