The PCI Security Standards Council published revisions to the Payment Application Data Security Standard (PA-DSS) this week to address concerns over the Secure Sockets Layer (SSL) protocol.
Effective June 1, the update aligns the regulation with the latest version of the Payment Card Industry Data Security Standard (PCI-DSS), which was revised recently due to concerns over SSL security. According to the PCI Security Standards Council (PCI SSC), organizations need to understand if and how their payment applications are using SSL and upgrade to a secure version of Transport Layer Security (TLS). Under the new rules, upgrading payment applications and systems to TLS 1.1 at a minium is the only way to properly address recent SSL vulnerabilities such as POODLE and BEAST.
Though PA-DSS 3.1 was effective June 1, there is a transition period for applications currently undergoing PA-DSS 3.0 validations, according to the council. New application submissions to PA-DSS 3.0 will be accepted until August 31, and apps being validated against PA-DSS 3.0 that are “in queue” by Aug. 31 will have until Nov. 30, 2015, to complete the validation process. The expiry date for payment application listings validated to PA-DSS 3.1 is Oct. 28, 2019.
“The Council works closely with the payment security community on any changes made to the PCI Standards,” said PCI SSC Chief Technology Officer Troy Leach, in a statement. “This update falls in line with our mission of pushing for the best security as soon as possible, while empowering organizations to take a pragmatic, risk-based approach to protecting their data.”
The revisions also includes other minor modifications to improve clarity based on stakeholder feedback.
“With the release of version 3.1 of the PA-DSS standard, the PCI SSC has provided payment application vendors with clear guidance on how to best proceed to ensure that their applications align with the PCI DSS v3.1 for which their end-customers (merchants) are responsible,” said Don Brooks, senior security engineer at Trustwave. “Business should reach out to their payment application vendor(s) to obtain information about compliance dates for PA-DSS 3.1 as well as determine any compensating controls or risk mitigation efforts that are required in the short term if longer-term fixes are needed for a given application.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
