Week 40: PCI DSS
Puneet Tanwani Manghnani
Cybersecurity Consultant ?? | Risk & Compliance, Strategy and IAM | Mental Health Ally
In the last two weeks, we’ve looked at ISO 27001 as well as the CIS Controls. Today we’ll focus on the Payment Card Industry Data Security Standard (a.k.a. PCI DSS).?
(Note: This article will not help you achieve compliance, but rather provide you with a notion around the key points).
Let’s answer the first question that’s probably looming in your head, “What is PCI DSS? And who oversees its enforcement?”
Adhering to PCI implies compliance with a set of policies that aim to protect sensitive data (Don’t worry if this sounds vague, we’ll expand on this shortly). Since the early 2000s, any and all organizations that process, store, or transmit credit, debit, or even prepaid cards are expected to meet its requirements due to the surge in the number of breaches (According to this pdf from PCI, PrivacyRights.org found that between 2005 and 2018 more than 10.9 billion records were disclosed). This standard consists of 12 requirements (containing more than 300 sub-requirements) and was created by the following members – American Express, Visa, Mastercard, Discover, and JCB.?
(Note: While not a law, PCI DSS can be enforced contractually through continuous assessments and audits. You can download the latest version as well as other documents and templates related to the standard here).
What are the benefits of PCI DSS compliance?
What are the common challenges around PCI compliance?
Now let’s circle back to the question, “What is sensitive data according to PCI DSS?”
PCI DSS distinguishes this into the following:
Cardholder data:
Sensitive Authentication Data (SAD):
(Note: Under PCI DSS it is not permitted to store SAD (even if encrypted) after authorization).
What is the first thing I need to know about PCI DSS compliance?
(Note: It’s important that you familiarize yourself with concepts/ acronyms like Report on Compliance (or ROC, which is a tool used to document an entity’s result and needs to be completed by a Qualified Security Assessor (QSA) or an Internal Security Assessor (ISA). A QSA company is a qualified PCI body to ensure that the organization in question is adhering to the requirements set forth by the standard. An ISA also needs to be recognized by PCI but is an internal assessor within the organization that needs to be “assessed”.), Self-Assesment Questionnaire (or SAQ, which is another tool to document an entity’s result but is signed by an officer from within the organization) and Approved Scanning Vendor (ASV who is responsible for conducting an external vulnerability scan. You can find the list of ASVs here).
There are 4 levels of PCI compliance based on the number of card transactions processed (Figure 2).
(Note: The SAQ or ROC should be completed once a year or when significant changes occur. You can find more information about these here).?
So, What are the different types of SAQs?
A
Card-not-present merchants (e-commerce or mail/telephone-order) that completely outsource all account data functions to PCI DSS validated and compliant third parties. No electronic storage, processing, or transmission of account data on their systems or premises.?
Not applicable to face-to-face channels. Not applicable to service providers.
A-EP
E-commerce merchants that partially outsource payment processing to PCI DSS validated and compliant third parties, and with a website(s) that does not itself receive account data but which does affect the security of the payment transaction and/or the integrity of the page that accepts the customer’s account data. No electronic storage, processing, or transmission of account data on the merchant’s systems or premises.?
Applicable only to e-commerce channels. Not applicable to service providers.
B
Merchants using only:?
Not applicable to e-commerce channels. Not applicable to service providers.
领英推荐
B-IP
Merchants using only standalone, PCI-listed approved PIN Transaction Security (PTS) point-of-interaction (POI) devices with an IP connection to the payment processor. No electronic account data storage.?
Not applicable to e-commerce channels. Not applicable to service providers.
C-VT
Merchants who manually enter payment account data a single transaction at a time via a keyboard into a PCI DSS validated and compliant third-party virtual payment terminal solution, with an isolated computing device and a securely connected web browser. No electronic account data storage.?
Not applicable to e-commerce channels. Not applicable to service providers.
C
Merchants with payment application systems connected to the Internet, no electronic account data storage.?
Not applicable to e-commerce channels. Not applicable to service providers.
P2PE
Merchants using only a validated, PCI-listed Point-to-Point Encryption (P2PE) solution. No access to clear-text account data and no electronic account data storage.?
Not applicable to e-commerce channels. Not applicable to service providers.
SPoC
Merchants using a commercial off-the-shelf mobile device (for example, a phone or tablet) with a secure card reader included on PCI SSC’s list of validated SPoC Solutions. No access to clear-text account data and no electronic account data storage.?
Not applicable to unattended card-present, mail-order/telephone order (MOTO), or e-commerce channels.?
Not applicable to service providers.
D
SAQ D for Merchants: Merchants not included in descriptions for the above SAQ types. Not applicable to service providers.
SAQ D for Service Providers: All service providers defined by a payment brand as eligible to complete an SAQ.
What are the 12 PCI DSS requirements?
I heard that PCI DSS v4.0 came with the option of a customized approach. What does that mean?
To get a better understanding of what the defined and customized approach as well as compensating controls are, we recommend you read the following articles from PCI:
(Note: You can learn more about the changes between PCI DSS Version 3.2.1 to 4.0 here).
So, what are the penalties for non-compliance?
To reiterate, PCI DSS is not a law. It can be enforced via contracts between merchants, acquiring banks (entities that process card transactions for merchants), and the different payment brands. Payment brands can fine the acquiring banks for violations and the banks, in turn, can choose not to work with those merchants. Fines for non-compliance can range between $5000 to $100,000 per month. It’s important to remember that cardholder data breach or theft can also penalized under GDPR, where the fines can go up to €20 million or 4% of annual global turnover.?
(Note: For more information regarding fines and most common violations, please read this article).
(Note: You can find the PCI DSS glossary here).?
Next week’s article will deal with Security and Legacy Systems.?
This article is part of a project called Security Chronicles, written jointly with Walter Buyu .
Sources: