Compliance

PA-DSS Compliance Rules Revised to Ditch SSL

The PCI Security Standards Council published revisions to the Payment Application Data Security Standard (PA-DSS) this week to address concerns over the Secure Sockets Layer (SSL) protocol.

<p><span><span><strong>The PCI Security Standards Council published revisions to the Payment Application Data Security Standard (<a href="https://www.pcisecuritystandards.org/security_standards/documents.php" target="_blank" rel="noopener">PA-DSS</a>) this week to address concerns over the Secure Sockets Layer (SSL) protocol.</strong></span></span></p>

The PCI Security Standards Council published revisions to the Payment Application Data Security Standard (PA-DSS) this week to address concerns over the Secure Sockets Layer (SSL) protocol.

Effective June 1, the update aligns the regulation with the latest version of the Payment Card Industry Data Security Standard (PCI-DSS), which was revised recently due to concerns over SSL security. According to the PCI Security Standards Council (PCI SSC), organizations need to understand if and how their payment applications are using SSL and upgrade to a secure version of Transport Layer Security (TLS). Under the new rules, upgrading payment applications and systems to TLS 1.1 at a minium is the only way to properly address recent SSL vulnerabilities such as POODLE and BEAST.

Though PA-DSS 3.1 was effective June 1, there is a transition period for applications currently undergoing PA-DSS 3.0 validations, according to the council. New application submissions to PA-DSS 3.0 will be accepted until August 31, and apps being validated against PA-DSS 3.0 that are “in queue” by Aug. 31 will have until Nov. 30, 2015, to complete the validation process. The expiry date for payment application listings validated to PA-DSS 3.1 is Oct. 28, 2019.

“The Council works closely with the payment security community on any changes made to the PCI Standards,” said PCI SSC Chief Technology Officer Troy Leach, in a statement. “This update falls in line with our mission of pushing for the best security as soon as possible, while empowering organizations to take a pragmatic, risk-based approach to protecting their data.”

The revisions also includes other minor modifications to improve clarity based on stakeholder feedback.

“With the release of version 3.1 of the PA-DSS standard, the PCI SSC has provided payment application vendors with clear guidance on how to best proceed to ensure that their applications align with the PCI DSS v3.1 for which their end-customers (merchants) are responsible,” said Don Brooks, senior security engineer at Trustwave. “Business should reach out to their payment application vendor(s) to obtain information about compliance dates for PA-DSS 3.1 as well as determine any compensating controls or risk mitigation efforts that are required in the short term if longer-term fixes are needed for a given application.”

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version