Identify whether a process is in place to ensure all applications are not vulnerable to “High” vulnerabilities as identified in PCI DSS Requirement 6.2.
If there is a process in place:
i. Identify the document that defines the process for ensuring that all applications are not vulnerable to “High” vulnerabilities as identified in PCI DSS Requirement 6.2.
ii. Describe the processes observed to be in place for ensuring that applications are not vulnerable to all “High” vulnerabilities, as identified in PCI DSS Requirement 6.2.