Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

PCI 3.0 Compliance Standard Arrives With Start of New Year

The New Year brought many things – good tidings, champagne…and new requirements for the Payment Card Industry Data Security Standard (PCI DSS).

The New Year brought many things – good tidings, champagne…and new requirements for the Payment Card Industry Data Security Standard (PCI DSS).

PCI DSS 3.0 is a reality now for businesses, and though some of the requirements in it won’t be mandatory until July 1, businesses need to adjust to the standard. A full summary of the changes can be read here.

There are a number of important new provisions in the standard for businesses to focus on. For example, noted Michael Aminzade, Trustwave’s vice president of global compliance and risk services, many online retailers who redirect payments to a third party will now be in scope for compliance audits – even if they don’t touch cardholder data.

“For example, a retailer who is selling products online and taking payments through a third party payment provider will now be in scope to fulfill the compliance requirements,” he told SecurityWeek. “Whilst technically speaking, retailers are not actually transmitting, storing or processing the cardholder data they will be in scope for compliance since they can impact the flow of the card data. PCI 3.0 provides online retailers with greater clarity and education on the security of cardholder data and the need to be fully compliant with the new requirements.”

On July 1, requirements mandating more stringent penetration testing will also go into effect.

“When conducting penetration tests, merchants or whoever is performing the test, must follow an industry standard framework,” Aminzade added. “Merchants must ensure that the service they use for penetration testing for their networks, applications, databases or POS (point-of-sale) systems complies with the new requirements. The standard also mandates tester independence, meaning the person who tests the system cannot be the same individual who manages or administers the system. Finally, if a merchant puts up firewalls to segment an area of the network handling card data to reduce their scope for PCI compliance, they must now prove isolation for this area in order to enable the QSA to verify this reduction of scope, a level of assurance that is needed to be provided in penetration test reporting.”

Related to this, in section 1 the updated standard includes tighter requirements for network mapping.

“The new news is that the map requirement got tougher, starting Jan 1 – you can’t just make a diagram of wires and routers, you now need to show access, end to end, as data flows across the network,” said Mike Lloyd, CTO of RedSeal Networks. “That is, you can’t just show how many routers you own any more – you have to show how your infrastructure works, supporting your business, as you handle credit card transactions.”

Advertisement. Scroll to continue reading.

Pieter Penning, an advisory principal with PricewaterhouseCoopers, noted that version 3.0 of the standard also adds a new set of requirements focused on the physical security of payment card readers.

“These new requirements (9.9, 9.9.1, 9.9.2, 9.9.3) state that the validating organization must “protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution” through maintenance of an inventory list, regular inspection of the devices, and the delivery of focused card reader security training,” he explained. “This requirement is particularly challenging to larger merchants with a geographically dispersed operating model.”

“Whilst not representing a silver bullet solution to the problem of payment card theft, the latest PCI DSS changes highlight some of the problem areas most susceptible to exploitation by cyber criminals,” said Aminzade. “They should be used as a baseline on which to build a robust, multi-layered security strategy that consists of risk assessments to identify where their valuable data lives, technologies that protect that data, services such as vulnerability scanning and pen testing to continuously identify and remediate security weak spots, and enough manpower and skill sets to make sure their security controls are installed, updated and working properly.”

“By adopting this kind of security-first strategy, businesses will have a full understanding of the level of risk that the business must maintain and be able to implement a business-as-usual approach whilst being fully-compliant with PCI 3.0,” he said. 

 *This story was updated to correct a quote impacted by a formatting error. 

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...