Changes to PCI DSS and What It Means for You

If you are a merchant or service provider, then you may know about the changes coming for Payment Card Industry Data Security Standard (PCI DSS) in Version 3.2.

The Council periodically reviews and updates PCI DSS to ensure it continues to protect against old threats and new emerging threats.

The first portion of the changes are officially in effect, and the second portion come into effect later this year.

Before we dive in, let's review the PCI DSS basics.

As the payment card industry rapidly expanded, the Payment Card Industry Security Standard Council (PCI SSC) developed a set of requirements called the PCI DSS. These specifications ensure that all companies that process, store, or transmit credit card information maintain a secure environment.

PCI DSS applies to all organizations or merchants that accept, transmit, or store cardholder data, regardless of size or number of transactions.

Restaurants, retailers, hotels, doctors' and lawyers' offices, and much, much more, all need to watch for PCI DSS updates to remain compliant.

Are you compliant with PCI DSS Version 3.2, which requires increased network security?

By not upgrading to more secure protocols, you put your business at serious risk for a security breach. The following requirements just went into effect on February 1, 2018, for merchants and service providers:

Requirement 6.4.6

Change management implementation and documentation; all relevant PCI DSS requirements must be implemented on all new or changed systems and networks. This change is to address organizations who are not following the change portions of these requirements.

Requirement 8.3.1

Implement multi-factor authentication for any admin access to the cardholder data environment (CDE). This change is going into effect to minimize the number of breaches that have occurred due to phishing attacks of administrators.

The remainder of the changes are for service providers only:

Requirement 3.5.1

Maintain documentation of the cryptographic architecture. This is to curtail service providers from offering end-to-end encryption solutions that do not meet the Council's P2PE standards.Requirement 10.8

Implement detection and reporting of critical security controls when they fail. Service providers will now have to provide proof that there is an alert when critical systems fail.

Requirement 10.8.1

Respond and document failures of any critical security controls in a timely fashion. In addition to implementing alerting, service providers will also have to prove that they responded to the alert in a timely fashion.

Requirement 11.3.4.1

Implementation of six-month penetration testing of segmentation controls. The Council is requiring that penetration testing occur every six months or if changes are made that affect segmentation controls.

Requirement 12.4.

Assign responsibility for the cardholder data, PCI DSS compliance, create a PCI DSS charter, and communication plan to management.

Requirement 12.11.a

Quarterly management review of policy and process compliance with personnel.

Requirement 12.11.1

Maintain documentation of the six-month management review to remain in compliance with 12.11.a.

The remainder of the changes to the standards will be enforced beginning July 1, 2018. Merchants and service providers must discontinue support for the Secure Sockets Layer (SSL) and early Transport Layer Security (TLS) cryptographic protocols on or before June 30, 2018 to remain compliant. Although the protocols once provided the basis of secure network communications, they have been compromised and are no longer considered secure.

The PCI Security Standards Council website stresses the dangers that SSL and early TLS pose to merchants and providers:

  • There are many serious vulnerabilities in SSL and early TLS that, if left unaddressed, put organizations at risk of being breached. The widespread POODLE and BEAST exploits are just a couple examples of how attackers have taken advantage of weaknesses in SSL and early TLS to compromise organizations.
  • According to NIST, there are no fixes or patches that can adequately repair SSL or early TLS. Therefore, it is critically important that organizations upgrade to a secure alternative as soon as possible and disable any fallback to both SSL and early TLS.

So, what can you do now to protect yourself from SSL and early TLS vulnerabilities?

Begin the process of migrating to safe protocols.

While in that process, it is suggested to migrate to a minimum of TLS 1.1, or better yet, TLS 1.2, then patch TLS software and configure TLS securely.

Need help? Netsurion is here for you.

We've been helping merchants with PCI compliance since its inception by providing affordable managed network security solutions that make compliance easy and efficient.

Your focus should remain on running your business, not worrying about the status of your compliance.

For more information on PCI Compliance, visit our compliance support resource.

  • What You Don't Know Can Hurt You: Three InfoSec Retail Predictions

    December 14, 2017

    It has been a turbulent year for industry as a whole, and retail has been in the center of the turbulence. Amazon bought Whole Foods, grocery chains moved into new markets, and myriad players invested heavily in building digital capabilities. The catchphrase on everyone’s lips has been, “Transform the customer experience.”

    Read More
  • The Top Five Threats That Restaurant Franchisees Need to Know About

    March 29, 2017

    Restaurants with multiple locations are taxed with increased pressure to succeed in different geographic locations, with potentially different demographics. This means implementing popular technology to serve that area—sometimes quickly—to keep the business afloat. The faster their success, customer enjoyment, and diner loyalty accelerate the more likely these locations are to become and remain go-to dining spots. However, in the rapid shuffle of getting these technologies set up, security is often forgotten.

    Read More
  • Demystifying PCI Compliance

    August 30, 2016

    PCI compliance: that daunting phrase you always hear in the world of payments…but never truly understand. Well we’re here to sum it up for you—what it is, why it’s important and what you need to meet this standard.
     

    Read More