| The Hacker News |
| The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers // via fulltextrssfeed.com |
What Does PCI 3.0 Mean to Security Practitioners?
10/23/2013 3:32:00 PM
PCI makes the process smooth
Awareness : Most security breaches happen due to lack of awareness in the following areas:
- Payment security
- Maintenance of PCI standards
- Proper implementation methods
Shared Responsibility : PCI 3.0 cites that securing cardholder data is a shared responsibility due to an increase in the number of access points for the cardholder data. The challenge posed by the upgrade is how well equipped you are to embrace PCI 3.0.
Factors considered for the revisions in PCI 3.0
- Improvement of payment security
- Global applicability
- Cost of change for your infrastructure
- Impact of the changes
What's new with PCI 3.0 and why the new version?
| PCI Requirement No. | Current PCI DSS Standard (as of October 2013) | Proposed PCI DSS Update for 3.0 on top of existing standards | Purpose |
| 1 | Install and maintain a firewall configuration to protect cardholder data. | Have a current diagram that shows cardholder data flows. | To clarify that documented cardholder data flows are an important component of network diagrams. |
| 2 | Do not use vendor-supplied defaults for system passwords and other security parameters. | Maintain an inventory of system components in scope for PCI DSS. | To support effective scoping practices. |
| 3 | Protect stored cardholder data. | No change from the existing version | |
| 4 | Encrypt transmission of cardholder data across open, public networks. | No change from the existing version | |
| 5 | Use and regularly update antivirus software. | Evaluate evolving malware threats for systems not commonly affected by malware. | To promote ongoing awareness and due diligence to protect systems from malware |
| 6 | Develop and maintain secure systems and applications. | Update list of common vulnerabilities in alignment with OWASP, NIST, and SANS for inclusion in secure coding practices. | To keep current with emerging threats. |
| 7 | Restrict access to cardholder data by business need-to-know. | No change from the existing version | |
| 8 | Assign a unique ID to each person with computer access. | Security considerations for authentication mechanisms such as physical security tokens, smart cards, and certificates. | To address feedback about requirements for securing authentication methods, other than passwords, that need to be included. |
| 9 | Restrict physical access to cardholder data. | Protect POS terminals and devices from tampering or substitution. | To address the need for physical security of payment terminals. |
| 10 | Track and monitor all access to network resources and cardholder data. | No change from the existing version | |
| 11 | Regularly test security systems and processes. | Implement a methodology for penetration testing, and perform penetration tests to verify that the segmentation methods are operational and effective. | To address requests for more details about penetration tests, and for more stringent scoping verification. |
| 12 | Maintain a policy that addresses information security. | Maintain information about which PCI DSS requirements are managed by service providers and which are managed by the entity. Service providers need to accept responsibility for maintaining applicable PCI DSS requirements. | To address feedback from the 3rd-Party Security Assurance SIG. |
So, what do these changes mean to you?
The changes in PCI 3.0 have been more structural in nature, which means they would make your organization more proactive in protecting cardholder data.
The upgrade includes the following improvements:
- Elimination of the redundant sub-requirements
- Clarification of the testing procedures for each requirement
- Strengthens the requirements around penetration testing and validation of network segments
- More flexibility around risk mitigation methods comprising password strength and complexity requirements.
- Provide policy guidance and operational procedures for each requirement
- Maintain an inventory of all systems within your PCI scope
SolarWinds® Log & Event Manager (LEM) provides 300 pre-built "audit-proven" report templates that you can use to generate reports complying with PCI DSS and other federal compliance regulations, or customize them for internal requirements.
Yaagneshwaran Ganesh - Product Marketing Specialist at SolarWinds, with a primary focus on Information Security. Market Research, Managed Hosting services, etc.(Google+ Profile)Popular Stories
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

0 comments:
Post a Comment