Skip to content

🧱 System Architecture — Windows 11 PCI DSS Hardening

This architecture defines the secure foundation of a Windows 11 workstation hardened to meet PCI DSS v4.0 requirements for protecting sensitive financial and cardholder data.

Unlike traditional multi-server environments, this design demonstrates endpoint-centric compliance — ensuring a single workstation can be PCI-aligned when configured and monitored correctly.


🖥️ High-Level Overview

The workstation environment is structured around five key security layers:

Layer Component Purpose
1️⃣ Hardware & Firmware TPM 2.0, Secure Boot, BIOS password Ensures trusted hardware and prevents firmware tampering.
2️⃣ Operating System Windows 11 Pro / Home (hardened) Base layer configured with Group Policy, firewall, and encryption.
3️⃣ Security Controls BitLocker, Defender, Malwarebytes Full-disk encryption and dual-layer malware protection.
4️⃣ Update & Patch Management Patch My PC, Windows Update Maintains current patch levels and closes vulnerabilities.
5️⃣ Monitoring & Logging GlassWire, Event Viewer, PowerShell transcripts Provides visibility and traceability of all activities.

🌐 Network Path & Segmentation

The system operates within a segmented home/office lab environment that emulates PCI DSS network separation.
All connections are routed through an encrypted and monitored VLAN.

flowchart TB
    ISP["ISP Router"]

    subgraph NETWORK["SEGMENTED NETWORK"]
        direction TB
        ROUTER["GL.iNet MT6000"]

        subgraph PCI["VLAN 2 - PCI ZONE"]
            direction LR
            VOIP["Polycom VVX311 Encrypted SIP/TLS"]
            WS["Windows 11 PCI-DSS Hardened"]
        end
    end

    ISP --> ROUTER
    ROUTER --> PCI

    style NETWORK fill:#f8fafc,stroke:#334155,stroke-width:2px
    style PCI fill:#e0f2fe,stroke:#0284c7,stroke-width:2px

Each VLAN enforces: - Strict inbound/outbound rules - No peer-to-peer workstation visibility - TLS-only traffic for remote updates and VoIP control channels


🧩 Core Components

Component Role PCI DSS Alignment
BitLocker Encrypts all drives with TPM key storage Req. 3 – Protect Stored Data
Windows Defender Provides anti-malware protection and behavior-based analysis Req. 5 – Anti-Virus Software
Malwarebytes Adds heuristic and web-threat defense Req. 5 – Layered Protection
Patch My PC Automates Windows and third-party updates Req. 6 – Security Patching
Macrium Reflect Validates recoverability via full-disk imaging Req. 10 – Log & Audit Integrity
GlassWire Monitors network traffic, alerts on anomalies Req. 11 – Regular Testing
Firewall (All Profiles) Blocks unsolicited inbound connections Req. 1 – Network Protection
Event Viewer & PowerShell Logs Captures full audit trails Req. 10 – Logging and Monitoring

🧠 Logical Architecture Diagram

Windows 11 PCI-DSS Hardening Figure: Logical PCI-DSS endpoint architecture — encryption, monitoring, and audit layers.


🔐 Security Control Summary

Security Area Implementation
Disk Encryption BitLocker (AES-XTS 256-bit, TPM-sealed)
User Separation AdminLocal for maintenance, StandardUser for daily use
Network Firewall Domain, Private, and Public all active
Update Management Automated via Patch My PC
Malware Defense Real-time protection + weekly deep scans
Backups Full-image backups stored offline, verified monthly
Logging Event logs archived with timestamp validation
Monitoring GlassWire continuous outbound alerting

⚙️ Implementation Highlights

  1. TPM Verification
  2. Confirmed TPM 2.0 active and owned by the OS.
  3. BitLocker configured for hardware binding and PIN unlock (optional).

  4. Secure Boot Enforcement

  5. Verified UEFI Secure Boot enabled and integrity checked.

  6. Firmware Protection

  7. BIOS password applied, boot order locked.

  8. User Account Policy

  9. AdminLocal for administrative tasks only.
  10. StandardUser for all operational use.

  11. Audit Log Retention

  12. Minimum retention: 90 days local, 365 days backup images.

🧩 Alignment with PCI DSS v4.0 Objectives

PCI Objective Implementation Example
Build and Maintain a Secure Network Windows Firewall + VLAN segmentation
Protect Cardholder Data Full disk encryption and TLS enforcement
Maintain a Vulnerability Management Program Patch My PC + Defender updates
Implement Strong Access Control User separation, password policy, 2FA readiness
Regularly Monitor and Test Networks GlassWire, event log review
Maintain an Information Security Policy Documented local security policy and backup SOP

🧾 Summary

This design illustrates that PCI DSS compliance can extend to individual endpoints when proper configuration, segmentation, and monitoring are applied.
The system demonstrates zero cloud dependency, full offline recoverability, and persistent audit traceability — all essential to PCI DSS assurance.

Validated on Windows 11 23H2 (Build 22631.2715) — all screenshots captured from live hardened deployment.