- No public admin interfaces
- AWS SSO with MFA enforcement
- VPN or DirectConnect required
- SSM Session Manager for shell access
- Hardened bastion hosts in DMZ

Deploy AWS Inspector for EC2 instances, ECR images, and Lambda functions. Quarterly internal and external scans required per Req. 11.3.

Enforce image scanning in CI/CD pipelines using Sysdig, Prisma, Aqua, or Trivy. Block deployments with high/critical vulnerabilities before production.

Apply critical patches within 30 days. Automate EC2 patching via Systems Manager and orchestrate EKS node upgrades with zero-downtime strategies.

Apply CIS Benchmarks for Amazon Linux/Ubuntu and EKS. Detect configuration drift continuously using AWS Config and Security Hub.
Deploy AWS Network Firewall for VPC ingress/egress filtering. Configure Security Groups for stateful traffic control and NACLs for stateless filtering. Implement explicit deny-all policies with allowlist exceptions.
Enable AWS WAF on ALB and API Gateway with OWASP Top 10 managed rules. Apply custom rate limiting for blockchain RPC endpoints to prevent enumeration attacks.
Isolated VPC for Cardholder Data Environment with no direct internet gateway. Segmented from non-PCI services, logging infrastructure, and developer networks.
Mandate TLS 1.2+ end-to-end. Implement mTLS for blockchain node-to-node communication. All workloads deployed in private subnets with NAT gateway egress only.
Deploy Kubernetes Network Policies to restrict pod-to-pod traffic. Leverage service mesh (Istio/App Mesh) for identity-based routing, mTLS, and policy enforcement.
Enable VPC Flow Logs, GuardDuty, and Network Firewall inspection. Alert on anomalies including port scanning, unusual API calls, and lateral movement attempts.
All storage encrypted with AES-256 via AWS KMS: S3 buckets, RDS/Aurora databases, DynamoDB tables, EBS volumes, EKS secrets, and EFS file systems. Automated key rotation policies enforced.
Never store PAN or sensitive cardholder data immutably on-chain. Implement tokenization before any blockchain writes. Cryptographic keys must remain independent from blockchain node infrastructure.
Mandatory TLS 1.2+ for all external traffic. mTLS recommended for inter-service and blockchain node communication. Certificate lifecycle managed via ACM and ACM Private CA.
Mask cardholder data in all UI displays. Tokenize PAN before storage in any system. Leverage AWS Payment Cryptography service for cryptographic operations and key management.
Comprehensive penetration testing must cover external endpoints, internal VPC/CDE networks, EKS API servers, microservices architecture, smart contracts, blockchain nodes, and segmentation validation.
Engage qualified third-party penetration testers with blockchain and Kubernetes expertise. Remediate findings based on risk severity within documented timeframes.

VPC Flow Logs, CloudTrail, GuardDuty, and Network Firewall alerts detect lateral movement, suspicious DNS lookups, and anomalous outbound traffic patterns. Machine learning baselines identify deviations.

CloudWatch, OpenTelemetry, Prometheus, and Grafana monitor performance metrics, blockchain transaction throughput, node health, chain synchronization status, and API latency distributions.

Enable control plane logs, audit logs, pod logs, and metrics server. Implement distributed tracing with OpenTelemetry to track request flows across microservices and blockchain components.
Aggregate all logs from applications, EKS, EC2, network devices, security tools, WAF, and GuardDuty into CloudWatch Logs. Stream to Kinesis for real-time processing and archive to S3 with Object Lock for immutability.
01
Documented information security policies (12.1). Defined roles, segregation of duties, and executive oversight of PCI program with monthly security council reviews.
02
Annual enterprise risk assessments including blockchain and cloud threat models. Maintain documented risk register with tiered prioritization and treatment plans.
03
Quarterly access reviews (Req. 7, 8). Maintain AWS AOC and vendor attestations. Annual QSA certification. Continuous compliance validation via AWS Config and Security Hub.
04
Formal IR plan with escalation workflows, forensic procedures, EKS/blockchain restore playbooks, and immutable evidence retention for investigations.
05
CCB-approved changes only. IaC versioning with approval gates. Mandatory security testing before production deployments with rollback procedures.