LiquidFiles Documentation
LiquidFiles Documentation

PCI DSS 4.0 — LiquidFiles Compliance Mapping

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements for organisations that store, process or transmit payment card data. PCI DSS 4.0 (effective March 2024, with all requirements mandatory from March 2025) is organised into 12 requirements under six security goals. This page maps those requirements to the capabilities LiquidFiles provides.

A downloadable spreadsheet with all the control mappings is available at the bottom of this page.

Why PCI DSS Matters for File Transfer

PCI DSS becomes relevant for LiquidFiles when the system is used to transfer files that contain cardholder data or other payment-related information. Any system within the Cardholder Data Environment (CDE) must meet PCI DSS requirements, and a file transfer system used to move payment data falls within scope.

LiquidFiles is a self-hosted product. PCI DSS compliance is your organisation's responsibility — we don't manage your systems, and we have no access to your data or your CDE. However, LiquidFiles provides the technical capabilities that PCI DSS auditors (QSAs) look for in a file transfer system.

How to Use This Page

PCI DSS 4.0 has 12 requirements grouped under six goals:

  1. Build and maintain a secure network and systems (Req 1–2)
  2. Protect account data (Req 3–4)
  3. Maintain a vulnerability management programme (Req 5–6)
  4. Implement strong access control measures (Req 7–9)
  5. Regularly monitor and test networks (Req 10–11)
  6. Maintain an information security policy (Req 12)

For each requirement, we describe the product capability LiquidFiles provides. How you configure and operate these capabilities within your CDE is part of your PCI DSS compliance programme and is your responsibility.

Requirement 1: Install and Maintain Network Security Controls

Control Area LiquidFiles Capability
Firewall / Network Controls LiquidFiles includes a built-in Netfilter firewall configured to only expose necessary ports (HTTP/HTTPS by default). Internal services such as PostgreSQL are configured to not listen on any TCP port — even with the firewall disabled, no vulnerable services are exposed. See Built-in Firewall.
Network Segmentation Customer responsibility. Segmenting your LiquidFiles system within your CDE is your responsibility. LiquidFiles supports admin network restrictions to separate administrative access from user access.

Requirement 2: Apply Secure Configurations to All System Components

Control Area LiquidFiles Capability
Secure Defaults LiquidFiles is delivered as a hardened virtual appliance. The underlying OS is a minimal Ubuntu installation. No vendor-supplied default passwords are used — administrator credentials are set during initial configuration. Default configurations are secure (TLS only, strong ciphers, firewall enabled). See Hardening LiquidFiles.
System Hardening Only required packages and services are installed. The appliance model prevents installation of arbitrary software. Ubuntu Pro is supported for additional hardening (CIS benchmarks, DISA-STIG). See Platform Security.

Requirement 3: Protect Stored Account Data

Control Area LiquidFiles Capability
Data Retention and Disposal Configurable automatic message and file deletion with retention policies per group. System-wide message retention policy (default 365 days). Manual deletion by administrators. Files are automatically purged when messages expire.
Encryption at Rest Full disk encryption (LUKS/AES-256) available for the virtual appliance. FIPS 140-3 mode available via Ubuntu Pro for validated cryptographic modules. Passwords stored using bcrypt hashing. See Full Disk Encryption and FIPS Mode.

Requirement 4: Protect Cardholder Data with Strong Cryptography During Transmission

Control Area LiquidFiles Capability
Encryption in Transit All web traffic encrypted with TLS 1.2/1.3 using AES-256 with strong cipher suites. Weak protocols and ciphers are disabled by default. HSTS supported and recommended. Default configuration achieves an A+ rating on SSL Labs. SFTP/FTPS available for automated file transfer. See Web Server, SSL and Transmit Encryption and SSL Labs Validation.

Requirement 5: Protect All Systems and Networks from Malicious Software

Control Area LiquidFiles Capability
Antivirus / Anti-Malware ClamAV antivirus is built in and enabled by default. Virus signatures are updated every 2 hours. All uploaded files are scanned automatically. Custom file scanning via Attachment Upload Actionscripts and Share Files Upload Actionscripts enables integration with additional AV engines, DLP solutions or content inspection tools. See Antivirus Scanning.

Requirement 6: Develop and Maintain Secure Systems and Software

Control Area LiquidFiles Capability
Vulnerability Management Automatic daily security updates enabled by default. Ubuntu CVE database checking. Ubuntu Pro for extended security maintenance. LiquidFiles responds to reported vulnerabilities within 24–48 hours. Dependabot and GitHub alerts monitor all third-party dependencies. See System Vulnerabilities.
Secure Development TDD methodology. Automated security scanning with Brakeman (Rails), RuboCop (Ruby) and ESLint (JavaScript). GitHub Actions CI runs full test suite and scanners on every build — builds fail if any issue is detected. Pull request code review. OWASP Top 10 and SANS Top 25 guidelines followed. See Secure Development Practices.
Web Application Security Built on Ruby on Rails with built-in protection against SQL Injection, XSS and CSRF. Regular external scanning with OWASP ZAP. Customers encouraged to perform their own web application security testing. See Web Application Framework.

Requirements 7–9: Implement Strong Access Control Measures

Req Control Area LiquidFiles Capability
7 Restrict Access by Business Need Role-based access (Sysadmin/Admin/User). Group-based permissions control who can send to whom. LDAP/Active Directory integration for centralised access management. Admin network restrictions limit administrative access to designated networks. Configurable user auto-expiration for inactive accounts.
8 Identify Users and Authenticate Access Unique user accounts (identified by email). Configurable password policy with CrackLib dictionary validation. Password expiration. Multi-factor authentication (TOTP, SMS, Duo Security) enforceable per group — meets PCI DSS 4.0 MFA requirements (Req 8.4.2). SAML2 SSO. Brute force protection. Passwords stored using bcrypt. See Strong Authentication.
9 Restrict Physical Access Customer responsibility. Physical access to the systems hosting LiquidFiles is your responsibility. LiquidFiles supports full disk encryption (LUKS/AES-256) to protect data on physical media.

Requirement 10: Log and Monitor All Access to System Components and Cardholder Data

Control Area LiquidFiles Capability
Audit Logging All uploads, downloads, login activity (successful and failed) and admin activity are logged. System log available in Admin → System Log. Message log with configurable retention (default 365 days). PCI DSS requires at least 12 months of audit trail history — use syslog forwarding to ensure long-term retention. See Logging and Auditing.
Log Forwarding and SIEM Syslog forwarding to external servers for integration with SIEM solutions. PCI DSS 4.0 requires automated audit log reviews (Req 10.4.1.1) — syslog forwarding enables this through your SIEM platform.
Time Synchronization NTP configured by default to ensure accurate timestamps across all log entries.

Requirement 11: Test Security of Systems and Networks Regularly

Control Area LiquidFiles Capability
Vulnerability Scanning LiquidFiles is regularly scanned with external tools: SSL Labs, SecurityHeaders.com, OWASP ZAP and OpenVAS. Customers are encouraged to perform their own vulnerability assessments and penetration tests. See External Scanners.
Penetration Testing Customer responsibility. You should include your LiquidFiles system in your regular penetration testing programme. Common findings are documented in Frequent Responses After Security Reviews.

Requirement 12: Support Information Security with Organisational Policies and Programmes

Control Area LiquidFiles Capability
Security Policies Customer responsibility. Your organisation's information security policies, security awareness training, incident response plans, and PCI DSS scope documentation. Not addressed by LiquidFiles as a product.
Vendor Management LiquidFiles is a product vendor, not a service provider. We don't store, process or transmit cardholder data on your behalf. See Vendor Onboarding Forms for our position on vendor questionnaires.

Customer Responsibility

PCI DSS compliance is your organisation's responsibility. The following areas cannot be addressed by LiquidFiles as a product vendor:

  • Scoping — determining whether your LiquidFiles system is within your CDE and which PCI DSS requirements apply.
  • Network segmentation — your network architecture and how LiquidFiles fits within your CDE.
  • Physical security (Req 9) — physical access to your data centre and equipment.
  • Configuration — how you have configured LiquidFiles. We can describe capabilities and defaults, not your actual settings.
  • Log management — your SIEM configuration, automated log review and 12-month retention.
  • Penetration testing (Req 11) — your testing programme and remediation process.
  • Policies and training (Req 12) — your security policies, awareness training and incident response plans.

For more context on this distinction, see our Vendor Onboarding Forms page.

Download

A spreadsheet with the PCI DSS 4.0 requirement mapping for LiquidFiles is available for download.

Download PCI DSS Control Mapping (CSV)