Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » PCI DSS Approved Scanning Vendor

PCI DSS Approved Scanning Vendor

An ASV is an organization that uses a set of security tools and services (called “ASV scan solution”) to perform external vulnerability scans. Their goal is to test the security posture of a business environment and identify vulnerabilities, misconfigurations, and other gaps in a security system that can be used to cause a security incident. 

This helps organizations improve their data security and meet PCI DSS requirements.

An ASV’s scan solution is rigorously tested and approved by the PCI SSC. Only then do they earn a spot on the PCI SSC’s List of Approved Scanning Vendors.

Key stages in PCI ASV scanning:

  • Determine the scope: The customer determines what parts of their internet-facing system, including components related to cardholder data, should be scanned.
  • Scan: The ASV conducts vulnerability scans using its scanning tools. Different sections of the Cardholder Data Environment (CDE) can be scanned separately.
  • Remediation: After scanning, the ASV shares interim results with the customer, who then takes necessary actions to fix any issues.
  • Resolution: If there are disagreements about scan results, the client and ASV work together to resolve them.
  • Rescan (if needed): Additional scans are performed until all conflicts and exceptions are resolved.
  • Final reporting: When no vulnerabilities remain, the ASV generates a report approved by PCI ASV and securely delivers it to the customer.

Additional reading

Zero-Days Don’t Wait For Patches; And Neither Should You

Hackers don’t stumble into systems; they’re deliberate, calculating, and patient. They look for weak spots: the misconfigured firewall, the unpatched vulnerability, or the employee who unknowingly clicks on a carefully disguised email. And once they’re in, it’s rarely a smash-and-grab. They move silently, escalating privileges, mapping out networks, and embedding themselves deeper before launching their…

ISO 27001 Controls: A Guide to Implementing Annex A Controls

ISO 27001 is an international standard that outlines various clauses and controls that organizations can implement for effectively building an Information Security Management System (ISMS). The ISO 27001 clauses and controls are utilized by organizations to manage security risks and achieve ISMS certification. The controls are detailed in Annex A, and organizations should choose and…

A Beginner-friendly Guide to ISO 27001 Data Protection Policy

Somewhere, in a dusty corner of your office, lies a document titled ‘Data Protection Policy.’ It’s a well-intentioned file, full of dense paragraphs and legal jargon. As you expect, most employees have never read it, and those who have probably forgotten what it said moments later. This situation is too common, while it shouldn’t be. The…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.