The PCI Security Standards Council published revisions to the Payment Application Data Security Standard (PA-DSS) this week to address concerns over the Secure Sockets Layer (SSL) protocol.
Effective June 1, the update aligns the regulation with the latest version of the Payment Card Industry Data Security Standard (PCI-DSS), which was revised recently due to concerns over SSL security. According to the PCI Security Standards Council (PCI SSC), organizations need to understand if and how their payment applications are using SSL and upgrade to a secure version of Transport Layer Security (TLS). Under the new rules, upgrading payment applications and systems to TLS 1.1 at a minium is the only way to properly address recent SSL vulnerabilities such as POODLE and BEAST.
Though PA-DSS 3.1 was effective June 1, there is a transition period for applications currently undergoing PA-DSS 3.0 validations, according to the council. New application submissions to PA-DSS 3.0 will be accepted until August 31, and apps being validated against PA-DSS 3.0 that are “in queue” by Aug. 31 will have until Nov. 30, 2015, to complete the validation process. The expiry date for payment application listings validated to PA-DSS 3.1 is Oct. 28, 2019.
“The Council works closely with the payment security community on any changes made to the PCI Standards,” said PCI SSC Chief Technology Officer Troy Leach, in a statement. “This update falls in line with our mission of pushing for the best security as soon as possible, while empowering organizations to take a pragmatic, risk-based approach to protecting their data.”
The revisions also includes other minor modifications to improve clarity based on stakeholder feedback.
“With the release of version 3.1 of the PA-DSS standard, the PCI SSC has provided payment application vendors with clear guidance on how to best proceed to ensure that their applications align with the PCI DSS v3.1 for which their end-customers (merchants) are responsible,” said Don Brooks, senior security engineer at Trustwave. “Business should reach out to their payment application vendor(s) to obtain information about compliance dates for PA-DSS 3.1 as well as determine any compensating controls or risk mitigation efforts that are required in the short term if longer-term fixes are needed for a given application.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
