Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

PCI Council Publishes Guidance on Working With Third-party Providers

The Payment Card Industry (PCI) Security Standards Council has published an information supplement to help organizations that want to achieve or maintain PCI DSS compliance and work efficiently with third-party service providers.

The Payment Card Industry (PCI) Security Standards Council has published an information supplement to help organizations that want to achieve or maintain PCI DSS compliance and work efficiently with third-party service providers.

Many entities turn to third-parties to store, process and transmit cardholder data, but they must keep in mind that these service providers can impact not only PCI DSS compliance, but also the security of the cardholder data environment. Furthermore, the use of third party services doesn’t exempt and organization from accountability and its obligation to keep cardholder data (CHD) and the cardholder data environment (CDE) secure.

The guidance, developed by a PCI Special Interest Group (SIG) comprised of over 160 organizations, provides recommendations on how to implement a robust third-party assurance program to ensure that payment data and systems entrusted to other companies are maintained in a secure and compliant manner (requirement 12.8), the PCI Security Standards Council said.

The document advises organizations to conduct due diligence and risk assessment to understand how the provided services will meet PCI DSS requirements. Another recommendation refers to the implementation of a consistent process for engaging external service providers, which includes the establishment of a communication plan, setting expectations, and understanding how the services provided by the third party correspond to applicable PCI DSS requirements to determine the potential security impact on the CDE.

While an organizations is ultimately responsible for compliance, it can be useful to develop written  agreements, policies and procedures with third parties to specify their responsibilities and obligations.

An ongoing process through which relationships with service providers are maintained and managed throughout the engagement should be implemented, organizations are advised.

“Knowing the TPSP’s (third-party service provider’s) PCI DSS compliance status helps to provide the organization engaging a TPSP with assurance and awareness about whether the TPSP complies with the applicable requirements for the services provided. If the TPSP offers a variety of services, this knowledge will assist the entity in determining which TPSP services will be in scope for the entity’s PCI DSS assessment,” the document reads.

Advertisement. Scroll to continue reading.

All of these recommendations are detailed in the 47-page guide published on the website of the PCI Security Standards Council.

“One of the big focus areas in PCI DSS 3.0 is security as a shared responsibility,” said Bob Russo, PCI SSC General Manager. “This guidance is an excellent companion document to the standard in helping merchants and their business partners work together to protect consumers’ valuable payment information.”

Businesses that handle payment card data must become PCI DSS 3.0 compliant by December 31, 2014. PCI DSS 3.0 focuses on security, not compliance, and this represents one of the key challenges, Russo said in a recent interview.

“Compliance does not equal security. There’s too much focus on cramming for the test and not on being a good student year round. We have to change the conversation in the boardroom and all the way down and across our businesses. Security has to be a daily priority, built into business practices, not a one-time effort,” Russo told SecurityWeek.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...