Skip to content
View JacquelineOmollo's full-sized avatar

Block or report JacquelineOmollo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
JacquelineOmollo/README.md

Hi πŸ‘‹, I'm Jacqueline Omollo

A passionate GRC Analyst looking for new career oportunities

jacquelineomollo

  • πŸ”­ I’m currently working on: Studying for ISACA CISA Exam and making videos showcasing my accessing skills with PCI DSS and NIST frameworks

  • 🌱 I’m currently learning: Splunk using Linux on a Virtual Machine

  • πŸ‘― I’m looking to collaborate: With anyone th

  • 🀝 I’m looking for help with: Getting my first engineering job.

  • πŸ‘¨β€πŸ’» All of my old coding projects and new videos on GRC are available at: JacquelineOmollo.com

  • πŸ˜„ Pronouns: She/Her

  • πŸ’¬ Ask me about: Why I decided to switch from a software engineer career to Cybersecurity

  • πŸ“« How to reach me: [email protected] or Linkedin: https://linkedin.com/in/jacquelineomollo

  • ⚑ Fun fact: Nearly finished building my dream home with the help of my family. Here's a simplified version of the provided code:

My Thought Process on Doing a PCI DSS Assessment as an Internal Security Accessor

Step 1: Getting Familiar with PCI DSS Requirements πŸ“š

Let's kick things off by getting cozy with the magical world of PCI DSS requirements. These are the golden rules designed to shield our payment card data. They cover areas like network security, data encryption, and access controls. 🌐

Step 2: Figuring Out What's In Scope πŸ”

Time to put on our detective hats! We'll pinpoint the systems, networks, and processes that dance with payment card data. This laser focus will keep us on the right track. πŸ”¦

Step 3: Taking Stock of Data πŸ—‚οΈ

Gather 'round, data wizards! We'll conjure up a list of all the payment card data we handle. Cardholder data (CHD) and sensitive authentication data (SAD) are our enchanting ingredients. πŸ“Š

Step 4: Checking Compliance βœ”οΈ

It's audit o'clock! We'll dive into each PCI DSS requirement and give them a thumbs-up or a high-five. Tech inspections, document readings, and friendly chats with fellow wizards might be in store. πŸ•΅οΈβ€β™‚οΈ

Step 5: Finding Weaknesses πŸ•³οΈ

Time for some digital spelunking! We're on the hunt for hidden vulnerabilities in our systems and networks. Penetration tests will help us see if any sneaky goblins can break in. ⛏️

Step 6: Making Things Secure πŸ”’

Wave your magic wand! If we spot any cracks, we'll seal 'em up. Setting up strong boundaries, casting encryption spells, and controlling access are our secret potions. πŸͺ„

Step 7: Keeping Records πŸ“

Let's keep scrolls of wisdom! Detailed notes will chronicle our epic journey. This parchment will show everyone we mean business when it comes to security. πŸ“œ

Step 8: The Questionnaire or Report πŸ“‹

Choose your adventure! Depending on our card data prowess, we'll either complete a "Self-Assessment Questionnaire" (SAQ) or summon a Qualified Security Assessor (QSA) to weave a "Report on Compliance" (ROC). πŸ“œ

Step 9: Fixing Stuff πŸ› οΈ

Abracadabra! If anything's amiss, we'll wield our tools and make things right. Swift fixes and rechecks are our spells for safeguarding. πŸ§™

Step 10: Sharing the News πŸ“£

Spread the word like phoenix feathers! We'll tell the card companies and our banking pals that we're in tune with the rules. A special parchment (Attestation of Compliance or AOC) might be the key. πŸ’Œ

Step 11: Keeping Watch πŸ‘οΈ

Stay vigilant, guardians! Safety is an ongoing quest. Regular system scans will repel any lurking dragons and keep our castle secure. 🏰

Step 12: Teaching Everyone πŸŽ“

Empower the tribe! We'll enlighten our team about the ways of PCI DSS, the art of staying safe, and their vital roles in this grand adventure. 🌠

Remember, this guide is your friendly compass. For the full map, consult the wise scrolls of the PCI Security Standards Council and perhaps summon an expert guide to ensure our journey is beyond legendary.

Guardians of the data realm, let's keep the treasure safe! πŸ’ŽπŸ”

Pinned Loading

  1. Newsfeed-Components Newsfeed-Components Public

    Forked from bloominstituteoftechnology/Newsfeed-Components

    JavaScript

  2. Build-Week-FoodTruck-TrackR2/Back-End Build-Week-FoodTruck-TrackR2/Back-End Public

    JavaScript 1

  3. audiobook_reader audiobook_reader Public

    Using Python to build a simple audio book reader

    Python

  4. VideoChat VideoChat Public

    This is a zoom clone that's secure. Using Node, express, Socket.io and WebRTC.

    JavaScript

  5. buildweek-haircare/HairCare buildweek-haircare/HairCare Public

    Lambda BuildWeek showcasing HairCare.

    HTML 1