Requirement 4: Encrypt transmission of cardholder data across open, public networks

The detailed requirements in this section are relevant to WebSphere Commerce. Review each point carefully. 4.1 Use strong cryptography and security protocols (for example, SSL/TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks, including the following:

Examples of open, public networks that are in scope of the PCI DSS are:

All payments in WebSphere Commerce are submitted via SSL requests.

For information on controlling and protecting WebSphere Commerce Payment Plugin Controller, see Payment plug-in specification To meet the requirements of the PCI-DSS, we must disable weak keys and protocol implementations (such as SSL v2.0, SSL v3.0, SSH v1.0 and TLS 1.0) that have known vulnerabilities on your Web server. These encryption types are considered too weak for PCI-DSS compliance. Instead, you should use stronger implementations like TLS 1.1 or higher.