The PCI Security Standards Council (PCI SSC) has published the latest version of its data security standard to address increased threats and more sophisticated attacks targeting customer payment information.
Designed to protect payment data before, during and after a purchase, PCI Data Security Standard (PCI DSS) version 3.2 replaces version 3.1, which will expire on October 31, 2016. Companies that accept, process or receive payments should adopt the new version as soon as possible, the Council says.
“The payments industry recognizes PCI DSS as a mature standard, so the primary changes in version 3.2 are clarifications on requirements that help organizations confirm that critical data security controls remain in place throughout the year, and that they are effectively tested as part of the ongoing security monitoring process,” said PCI Security Standards Council General Manager Stephen Orfei.
“This includes new requirements for administrators and services providers, and the cardholder data environments they are responsible to protect,” Orfei added. “PCI DSS 3.2 advocates that organizations focus on people, process and policy, with technology playing an important role in reducing the overall cardholder data footprint.”
Key changes in PCI DSS 3.2 include:
Revised Secure Sockets Layer (SSL) and early Transport Layer Security (TLS) sunset dates as outlined in the Bulletin on Migrating from SSL and Early TLS
Expansion of requirement 8.3 to include use of multi-factor authentication for administrators accessing the cardholder data environment
Additional security validation steps for service providers and others, including the “Designated Entities Supplemental Validation” (DESV) criteria, which was previously a separate document.
“These new guidelines will marginally improve PCI security or prevent breaches,” John Bambenek, Threat Systems Manager of Fidelis Cybersecurity, told SecurityWeek. “No compliance regime is ever truly successful in preventing breaches. Attackers will continue to try – some successfully – to breach networks to obtain valuable information.”
However, Bambenek says there is some good brought about by the latest security requirements. “The use of two-factor authentication for access into financially significant environments is something we’ve been advocating for almost ten years,” he said.
“Requiring actual penetration tests, versus scanning, is also a great leap forward,” Bambenek says. “Static vulnerability scanners can miss a great deal, and the move to penetration tests shifts the focus from retrospective testing to what an attacker can actually do.”
The full details on PCI DSS version 3.2, including a Summary of Changes document, are available online.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Webinar Today: How to Build Resilience Against Emerging Cyber Threats
- Make Your Picks: Cyber Madness Bracket Challenge Starts Today
- Cyber Madness Bracket Challenge – Register to Play
- Watch Sessions: Ransomware Resilience & Recovery Summit
- Webinar Today: Entering the Cloud Native Security Era
- White House Releases National Cybersecurity Strategy
- Watch on Demand: Attack Surface Management Summit
- Webinar Today: Building Sustainable OT Cybersecurity Programs
Latest News
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- Latitude Financial Services Data Breach Impacts 300,000 Customers
