Your Shopping Cart
By using this site you agree to our use of cookies. Please refer to our privacy policy for more information. Close
Payment Card Industry Data Security Standard (PCI DSS) – Background, Overview and Compliance Requirements
- By: Staff Editor
- Date: August 08, 2010
Background
The PCI DSS is defined by the Payment Card Industry Security Standards Council. It was created after a series of card payment related frauds. The aim of the PCI DSS is to increase controls around cardholder data to reduce credit card fraud.
PCI DSS applies to all entities involves in payment card processing - including merchants, processors, acquirers, issuers and services providers as well as other entities that store, process or transmit cardholder data.
The Payment Card Industry (PCI) Data Security Standards (DSS) are now required for all merchants, including:
- Retail (brick-and-mortar)
- Mail/telephone order
- e-Commerce
All major credit card associations such as Visa, MasterCard, American Express, Discover, Diners Club and JCB all endorse, and require the unified PCI Data Security Standards.
Overview of PCI DSS Requirements
PCI DSS 2.0 was released on 26 October 2010. All organizations handling payment card data have to comply with it by 1 January 2011, and from 1 January 2012 all assessments must be under version 2.0 of the standard.
PCI DSS comprises a minimum set of requirements for protecting cardholder data, and may be enhanced by additional controls and practices to further mitigate risks.
The table below gives a brief overview of the PCI DSS’ 12 requirements:
Build and Maintain a Secure Network | 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters. |
Protect Cardholder Data | 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks |
Maintain a Vulnerability Management Program | 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications |
Implement Strong Access Control Measures | 7. Restrict access to cardholder data by business need to know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data |
Regularly Monitor and Test Networks | 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes |
Maintain an Information Security Policy | 12. Maintain a policy that addresses information security for all personnel |
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
A firewall is a device that examines all network traffic and blocks those transmissions that do not meet the specified security criteria.
All systems associated with cardholder data must be protected from unauthorized access from un-trusted networks.
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Vendor default passwords and other vendor default settings to compromise systems are well known to hacker communities, making it easy for systems to be compromised. Therefore, these passwords should be changed immediately.
Requirement 3: Protect stored cardholder data
Protection methods such as encryption, truncation, masking, and hashing are critical components of cardholder data protection. If an intruder circumvents other security controls and gains access to encrypted data, without the proper cryptographic keys, the data is unreadable and unusable to that person.
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Sensitive information must be encrypted during transmission over networks that are easily accessed by malicious individuals.
Requirement 5: Use and regularly update anti-virus software or programs
Malicious software, commonly referred to as “malware”—including viruses, worms, and Trojans—enters the network during many business approved activities including employee e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities.
Therefore, anti-virus software must be used on all systems.
Requirement 6: Develop and maintain secure systems and applications
All critical systems must have the most recently released, appropriate software patches to protect against exploitation and compromise of cardholder data by malicious individuals and malicious software.
Requirement 7: Restrict access to cardholder data by business need to know
To ensure critical data can only be accessed by authorized personnel, systems and processes must be in place to limit access based on need to know and according to job responsibilities.
Requirement 8: Assign a unique ID to each person with computer access
Assigning a unique identification (ID) to each person with access ensures that each individual is uniquely accountable for his or her actions. When such accountability is in place, actions taken on critical data and systems are performed by, and can be traced to, known and authorized users.
Requirement 9: Restrict physical access to cardholder data
Any physical access to data or systems that house cardholder data provides the opportunity for individuals to access devices or data and to remove systems or hardcopies. Therefore, physical access should be appropriately restricted.
Requirement 10: Track and monitor all access to network resources and cardholder data
Tracking and monitoring user access to network resources and cardholder data is vital to determine the cause in case of security breaches/ compromises.
The presence of activity logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong.
Requirement 11: Regularly test security systems and processes.
Testing is critical to protect card payment data because vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. System components, processes, and custom software should be tested frequently to ensure security controls continue to reflect a changing environment.
Requirement 12: Maintain a policy that addresses information security for all personnel
Why is a security policy necessary?
- A strong security policy sets the security tone for the whole entity and informs personnel what is expected of them.
- All personnel should be aware of the sensitivity of data and their responsibilities for protecting it.
PCI DSS Compliance
The following are the completion steps to achieve PCI DSS compliance:
1. Assess the environment for compliance with the PCI DSS.
2. Complete the Self-Assessment Questionnaire (SAQ D) according to the instructions in the Self-Assessment Questionnaire Instructions and Guidelines.
3. Complete a passing vulnerability scan with a PCI SSC Approved Scanning Vendor (ASV), and obtain evidence of a passing scan from the ASV.
4. Complete the Attestation of Compliance in its entirety.
5. Submit the SAQ, evidence of a passing scan, and the Attestation of Compliance, along with any other requested documentation, to the acquirer (for merchants) or to the payment brand or other requester (for service providers).
Both Visa and MasterCard impose fines for non-compliance.
Validation of Compliance
Validation of compliance is done annually - by an external Qualified Security Assessor (QSA) for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.
Additional Resources:
- Read the requirements and security assessment procedures of PCI DSS version 2.0 in full here.
- Want to learn more about complying with PCI DSS? Then attend the following ComplianceOnline webinars:
Compliance Trainings
Your Responsibilities as a Company to protect Personal Information
By - Henry Theberge
On Demand Access Anytime
By - Henry Theberge
On Demand Access Anytime
COBIT and ITIL Framework Alignment to Improve the IT Organization while Improving Compliance
By - Angela Polania
On Demand Access Anytime
By - Angela Polania
On Demand Access Anytime
SSAE 16 (formally known as SAS70), SOC1 to SOC 3 Reporting Demystified
By - Angela Polania
On Demand Access Anytime
By - Angela Polania
On Demand Access Anytime
IT Auditing - Principles and Practices for Executives and Directors
By - Robert Davis
On Demand Access Anytime
By - Robert Davis
On Demand Access Anytime
Compliance Standards
Best Sellers
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
-
By: Miles HutchinsonAdd to CartPrice: $249
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
-
San Francisco, CA | Aug 6-7, 2020
-
Virtual Seminar | Jul 16-17, 2020
-
Virtual Seminar | Jun 18-19, 2020
-
Los Angeles, CA | Aug 20-21, 2020
-
Virtual Seminar | Jul 16-17, 2020
-
Virtual Seminar | Jun 25-26, 2020
-
Virtual Seminar | Jun 10, 2020
-
Virtual Seminar | Jun 3-4, 2020
-
Virtual Seminar | Jul 6-7, 2020
-
San Francisco, CA | Oct 22-23, 2020
-
Virtual Seminar | Jul 9-10, 2020
-
Virtual Seminar | Jun 3-4, 2020
-
Virtual Seminar | June 3-4, 2020
-
Miami, FL | Jul 29-31, 2020
-
Virtual Seminar | Jun 17, 2020
-
Provider: ANSIAdd to CartPrice: $142
- Add to Cart
- Add to Cart
- Add to Cart
-
Provider: ANSIAdd to CartPrice: $120
-
Provider: ANSIAdd to CartPrice: $250
-
Provider: SEPTAdd to CartPrice: $299
- Add to Cart
-
Provider: Quality-Control-PlanAdd to CartPrice: $37
- Add to Cart
-
Provider: At-PQCAdd to CartPrice: $397
- Add to Cart
- Add to Cart
- Add to Cart
- Add to Cart
You Recently Viewed