De4sec
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

POS Security and Deployment Guide

Securing Point of Sale systems in retail and hospitality โ€” from network design to endpoint protection and PCI DSS compliance considerations.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. Why POS Systems Are a Primary Target
  2. POS Network Architecture
  3. POS Endpoint Security
  4. Access Control
  5. PCI DSS Compliance Overview
  6. De4sec POS Security Service
01

Why POS Systems Are a Primary Target

Point of Sale systems process payment card data and cash transactions โ€” making them a high-value target for cybercriminals. POS malware has stolen payment data from hundreds of thousands of businesses globally, often operating undetected for months.

The vulnerability isn't primarily in the POS software itself. It's in how POS systems are networked, maintained, and secured โ€” or more commonly, not secured โ€” alongside the rest of the business IT environment.

The most common POS breach vector: POS terminal on the same network as office computers and internet access, with no segmentation. A phishing email opened on an office workstation gives attackers access to the payment network.

02

POS Network Architecture

Network segmentation โ€” the most critical control

โœ“POS terminals must be on a completely separate network segment from office computers and guest Wi-Fi
โœ“Dedicated VLAN for POS โ€” firewall rules prevent any communication between POS VLAN and office VLAN
โœ“POS systems should only communicate with: the payment processor, software update servers, and management systems โ€” nothing else
โœ“No internet browsing from POS terminals โ€” deny all outbound except required destinations
โœ“Guest Wi-Fi completely isolated โ€” no access to POS or office network

If a customer can see your guest Wi-Fi network and your POS system is on the same physical switch, you have a network segmentation problem. Guest traffic must be completely isolated โ€” physically or via VLAN with enforced firewall rules.

03

POS Endpoint Security

Operating system

โœ“POS terminals running Windows must be on a supported OS โ€” Windows 10 (now EOL) or Windows 11
โœ“End-of-life OS on POS terminals cannot receive security patches โ€” must be replaced or isolated to a fully air-gapped network
โœ“Disable all unnecessary services โ€” Windows Remote Desktop, SMB file sharing, Bluetooth where not required
โœ“Auto-run disabled โ€” no USB autoplay

Endpoint protection

โœ“Antivirus or EDR deployed on all POS terminals โ€” Microsoft Defender for Business or equivalent
โœ“Defender Application Control โ€” allowlist only approved applications. POS terminal should only run POS software, nothing else
โœ“Block USB storage devices โ€” prevent malware introduction via USB, and prevent card data exfiltration
โœ“Screen lock with strong PIN โ€” POS terminals lock after inactivity

Patch management

โœ“POS software updates applied promptly โ€” critical updates within 7 days
โœ“OS patches applied on monthly cadence โ€” test in staging first
โœ“Patching window during non-trading hours โ€” minimise trading disruption
04

Access Control

Staff access to POS

โœ“Unique login credentials per staff member โ€” no shared POS login
โœ“Role-based access โ€” sales staff cannot access management functions, refunds, or reporting
โœ“Manager override requires manager credentials โ€” not a shared override code
โœ“Automatic session timeout โ€” return to login screen after inactivity

Remote access

โœ“POS vendor remote access โ€” restrict to on-demand only, disabled when not in active support session
โœ“Log all remote access sessions โ€” who connected, from where, what duration
โœ“Never allow persistent remote access from POS vendor โ€” disable after each session
โœ“De4sec remote management โ€” via dedicated management VLAN, separate from POS VLAN, MFA required

Physical security

โœ“POS terminal mounting โ€” secured to counter, tamper-evident seal
โœ“Payment terminal (EFTPOS) โ€” checked daily for skimming device attachment
โœ“Back-of-house systems โ€” physically secured, not accessible to customers or non-IT staff
05

PCI DSS Compliance Overview

If your POS system processes payment cards (EFTPOS, credit card), Payment Card Industry Data Security Standard (PCI DSS) applies to your business. PCI DSS v4.0 is the current version.

PCI DSS RequirementPractical meaning
1: Install and maintain network security controlsFirewall between POS and other networks โ€” segmentation
2: Apply secure configurationsNo default passwords on POS systems, only required services enabled
3: Protect stored account dataDo not store full card numbers โ€” POS system should only store tokens
5: Protect all systems against malwareAV/EDR on all in-scope systems
6: Develop and maintain secure systemsPatch POS software and OS promptly
7: Restrict access to cardholder dataLeast privilege โ€” only staff who need access have access
8: Identify users and authenticate accessUnique user IDs, strong passwords or PINs, MFA for remote access
10: Log and monitor all accessAudit logs for all access to cardholder data environment
12: Support information security with policiesDocumented security policy, incident response plan

De4sec assists businesses in Kenya and Australia with PCI DSS scoping, gap assessment, and control implementation.

06

De4sec POS Security Service

POS Deployment
Hardware supply and installation, network design and VLAN configuration, POS software setup and testing. Kenya and Australia.
Security Hardening
OS hardening, endpoint protection deployment, application control configuration, access control setup.
Network Architecture
Firewall configuration, POS VLAN design, traffic policy implementation, guest Wi-Fi isolation.
Ongoing Support
Remote monitoring, patch management, security incident response, PCI DSS compliance support.
// NEXT STEP

Ready to get started?

De4sec provides hands-on implementation. Book a free discovery call at no cost.

Book a Free Discovery Call โ†’de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.