Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

PCI Council Publishes Risk Assessment Guidelines

On Friday, the PCI Security Standards Council published a set of guidelines for organizations looking to get a handle on risk assessment and threat identification. Specifically, the guidelines relate to section 12.1.2 of the standard, and are drafted to act as a supplement to help businesses discover vulnerabilities and other threats to payment card data.

On Friday, the PCI Security Standards Council published a set of guidelines for organizations looking to get a handle on risk assessment and threat identification. Specifically, the guidelines relate to section 12.1.2 of the standard, and are drafted to act as a supplement to help businesses discover vulnerabilities and other threats to payment card data.

PCI Assessment StrategiesPCI DSS Requirement 12.1.2 requires organizations to establish a formal process for identifying threats and vulnerabilities that could impact the security of cardholder data. The thought is that by performing this risk assessment, businesses are better equipped to determine the appropriate controls for reducing the likelihood and/or the impact of potential threats to their business.

“As there are a number of risk assessment methodologies out there, our stakeholders were looking for guidance on how to effectively apply these principles to their organizations to meet PCI requirements,” said Bob Russo, general manager, PCI Security Standards Council.

The guidelines were developed by more than 60 organizations representing banks, merchants, assessors, and vendors. According to the PCI Council, the supplemental data outlines the relationship between PCI DSS and risk assessments; “…the various industry-recognized risk methodologies and key components of a risk assessment, including developing a risk assessment team and building a risk assessment methodology; risks introduced by third parties; as well as the risk reporting process and critical success factors.”

The key points from the document itself center on the need for continuous risk assessments, and that said risk assessments must not be used as a means of avoiding or bypassing PCI DSS requirements.

“Any organization that stores, processes, or transmits cardholder data can benefit from this guidance, including merchants, service providers, acquirers (merchant banks) and issuers,” the Council said.

The guidance can be downloaded here, but remember, If PCI is your whole security program, you’re not doing your job right.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Web scraping is a sensitive issue. Should a third party be allowed to visit a website and use automated tools to gather and store...

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...