Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

PCI Council Publishes Risk Assessment Guidelines

On Friday, the PCI Security Standards Council published a set of guidelines for organizations looking to get a handle on risk assessment and threat identification. Specifically, the guidelines relate to section 12.1.2 of the standard, and are drafted to act as a supplement to help businesses discover vulnerabilities and other threats to payment card data.

On Friday, the PCI Security Standards Council published a set of guidelines for organizations looking to get a handle on risk assessment and threat identification. Specifically, the guidelines relate to section 12.1.2 of the standard, and are drafted to act as a supplement to help businesses discover vulnerabilities and other threats to payment card data.

PCI Assessment StrategiesPCI DSS Requirement 12.1.2 requires organizations to establish a formal process for identifying threats and vulnerabilities that could impact the security of cardholder data. The thought is that by performing this risk assessment, businesses are better equipped to determine the appropriate controls for reducing the likelihood and/or the impact of potential threats to their business.

“As there are a number of risk assessment methodologies out there, our stakeholders were looking for guidance on how to effectively apply these principles to their organizations to meet PCI requirements,” said Bob Russo, general manager, PCI Security Standards Council.

The guidelines were developed by more than 60 organizations representing banks, merchants, assessors, and vendors. According to the PCI Council, the supplemental data outlines the relationship between PCI DSS and risk assessments; “…the various industry-recognized risk methodologies and key components of a risk assessment, including developing a risk assessment team and building a risk assessment methodology; risks introduced by third parties; as well as the risk reporting process and critical success factors.”

The key points from the document itself center on the need for continuous risk assessments, and that said risk assessments must not be used as a means of avoiding or bypassing PCI DSS requirements.

“Any organization that stores, processes, or transmits cardholder data can benefit from this guidance, including merchants, service providers, acquirers (merchant banks) and issuers,” the Council said.

The guidance can be downloaded here, but remember, If PCI is your whole security program, you’re not doing your job right.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...