Reorganizing 272 requirements by threat category so you can build actual defense, not just tick compliance boxes.
┌──────────────────────────────────────────────────────────────────┐
│ PCI DSS v4.0.1 → 12 Defensive Frameworks → Measurable Security │
│ │
│ Traditional Approach Defensive Framework Approach │
│ ───────────────────── ────────────────────────────── │
│ Requirement 1.1.1 ✓ Phishing Attack Defense │
│ Requirement 1.1.2 ✓ ↳ Layer 1: User Training │
│ Requirement 1.2.1 ✓ ↳ Layer 2: Email Filtering │
│ ... ↳ Layer 3: MFA Enforcement │
│ Requirement 12.10.7 ✓ ↳ Layer 4: Monitoring Detection │
│ │
│ Result: Compliant Result: Defensible │
└──────────────────────────────────────────────────────────────────┘
A complete reorganization of PCI DSS v4.0.1's 272 requirements into 12 threat-based defensive frameworks. Each framework:
- Addresses a specific attack type with real-world breach examples
- Provides layered defense architecture showing how requirements work together
- Includes implementation sequences with realistic timelines
- Defines measurable metrics proving effectiveness
- Maps back to PCI DSS requirements for audit trail
PCI DSS compliance doesn't prevent breaches. Security teams that understand how requirements combine to defeat specific attacks build more effective defenses. This repository transforms compliance checkbox exercise into strategic security architecture.
Example: PCI DSS Requirement 8.3.1 requires MFA for administrative access. That's a checkbox. The Phishing Attack Defense Framework shows how MFA (Layer 3) combines with user training (Layer 1), email filtering (Layer 2), and behavioral monitoring (Layer 4) to create comprehensive anti-phishing defense. It provides metrics (phishing click rates <5% after 6 months) and real-world examples (Google's zero successful phishing attacks over 2 years with hardware tokens + training).
- Phishing Attack Defense - Email filtering, training, MFA, behavioral detection
- Insider Threat Defense - Access controls, activity monitoring, privileged action auditing
- Data Exfiltration Prevention - Network segmentation, DLP, encryption, egress monitoring
- DoS Attack Mitigation - Traffic monitoring, rate limiting, capacity planning, failover
- Zero-Day Vulnerability Response - Patch management, WAF, IDS/IPS, incident response
- Third-Party Vendor Risk - Due diligence, contracts, monitoring, compliance verification
- System Hardening - Secure configuration, minimal services, FIM, change management
- Authentication & Authorization - Identity management, MFA, RBAC, lifecycle management
- Encryption & Key Management - Data-at-rest, data-in-transit, key lifecycle, HSM
- Physical Security - Facility access, surveillance, media destruction, device tampering
- Policy & Governance - Policy documentation, procedures, incident response, compliance
- Security Training - Baseline awareness, role-specific training, simulations, measurement
| Path | Description | Link |
|---|---|---|
| Root | ||
├── README.md |
Main documentation and getting started guide | 📄 |
├── CONTRIBUTING.md |
Contribution guidelines | 📄 |
├── CHANGELOG.md |
Version history and releases | 📄 |
├── LICENSE |
MIT License | 📄 |
| docs/ | Core documentation | |
├── 00-introduction.md |
Overview and philosophy | 📄 |
├── 01-executive-summary.md |
Business case and ROI | 📄 |
├── 02-framework-architecture.md |
How frameworks interconnect | 📄 |
├── 98-closing-summary.md |
Implementation guidance | 📄 |
├── 99-glossary.md |
Terms and definitions | 📄 |
└── addendum-platform0.md |
Platform0 reference implementation | 📄 |
| docs/frameworks/ | 12 defensive frameworks | |
├── phishing-defense.md |
Email filtering, training, MFA, detection | 📄 |
├── insider-threat-defense.md |
Access controls, monitoring, auditing | 📄 |
├── data-exfiltration-prevention.md |
Network segmentation, DLP, encryption | 📄 |
├── dos-attack-mitigation.md |
Traffic monitoring, rate limiting, failover | 📄 |
├── zero-day-response.md |
Patch management, WAF, incident response | 📄 |
├── vendor-risk-management.md |
Due diligence, contracts, monitoring | 📄 |
├── system-hardening.md |
Secure config, minimal services, FIM | 📄 |
├── authentication-authorization.md |
Identity management, MFA, RBAC | 📄 |
├── encryption-key-mgmt.md |
Data-at-rest, data-in-transit, key lifecycle | 📄 |
├── physical-security.md |
Facility access, surveillance, media destruction | 📄 |
├── policy-governance.md |
Policy documentation, procedures, compliance | 📄 |
└── security-training.md |
Awareness training, simulations, measurement | 📄 |
- Start with your biggest threat: If phishing is your primary concern, read
phishing-defense.mdfirst - Identify gaps: Compare your controls against the framework's 4-layer architecture
- Prioritize implementation: Use the implementation sequence and timeline
- Measure effectiveness: Track the metrics that matter
- Map existing controls: Each framework shows which PCI DSS requirements it addresses
- Identify control gaps: Missing requirements become obvious when viewed as incomplete defenses
- Explain to auditors: "We implement MFA as part of our phishing defense strategy" is more defensible than "We do it because requirement 8.3.1 says so"
Read:
00-introduction.md- What and why01-executive-summary.md- Business case98-closing-summary.md- Implementation approach and ROI
Traditional compliance approach:
- 6-12 months to "achieve compliance"
- Requirements implemented in isolation
- Limited understanding of security posture
- High breach risk despite compliant status
Defensive framework approach:
- 3-6 months to defensible security posture
- Requirements implemented as cohesive defenses
- Clear metrics showing security effectiveness
- Compliance as byproduct of security
- Security architects building PCI DSS environments
- Security engineers implementing controls
- Compliance teams preparing for assessments
- QSAs and ISAs helping clients understand requirements
- CISOs prioritizing security investment
- Developers building payment processing systems
The addendum-platform0.md demonstrates how these frameworks can be implemented as platform capabilities rather than application responsibilities. Platform0 is a Docker-first, stack-agnostic developer platform that implements 8 of 12 frameworks as built-in patterns.
Platform0 provides:
- Authentication and audit logging by default
- Policy-as-code enforcement in CI pipelines
- Automatic SBOM and vulnerability scanning
- Evidence generation for auditors
- Reference implementations in Python and Go
Platform0 is optional - the frameworks are implementation-agnostic and valuable regardless of your technology stack.
Contributions welcome! See CONTRIBUTING.md for guidelines.
Especially valuable:
- Additional real-world breach examples
- Industry-specific adaptations
- Updated metrics from production implementations
- Technical corrections and clarifications
MIT License - See LICENSE for details.
These frameworks are based on publicly available PCI DSS v4.0.1 requirements published by PCI Security Standards Council. This repository provides interpretation and implementation guidance, not the official standard.
See CHANGELOG.md for version history.
- PCI Security Standards Council for publishing PCI DSS v4.0.1
- Security researchers and incident response teams whose breach analyses inform these frameworks
- Organizations that have shared implementation experiences
Begin with: Introduction to Defensive Frameworks
Or jump directly to the framework addressing your biggest threat.