Can I use a Content Security Policy to Satisfy PCI DSS Requirement 11.6.1?
While Content Security Policies (CSPs) are an important tool for securing web applications against a range of security threats—particularly related to content injection attacks like Cross-Site Scripting (XSS)—they are not a complete solution for meeting PCI DSS 4.0’s Requirement 11.6.1. This article will explore why CSPs do not fully satisfy this requirement and why webpage integrity monitoring is the easiest and most effective method that does.
Functionality Necessary to Fully Satisfy PCI DSS Version 4 Requirement 11.6.1
The Payment Card Industry Data Security Standard (PCI DSS) is a rigorous security standard designed to protect cardholder data and secure the systems that store, process, or transmit it. A new requirement introduced in PCI DSS version 4.0 is Requirement 11.6.1, which mandates that organizations must deploy a change- and tamper- detection mechanism to do all of the following:
- Evaluate the HTTP headers and all the content of payment pages, as received by the browser
- Alert personnel of unauthorized modification to HTTP headers and website content, including content loading from third parties