RSI Security

Breaking Down the PCI Compliance Process

Vulnerability Management Lifecycle

Payment Card Industry (PCI) compliance is required for organizations that receive, process, or transmit card payment data. The PCI compliance process protects sensitive card payment data from threats and risks while helping organizations strengthen overall cybersecurity. Read on for a step-by-step guide.

 

How Can You Achieve PCI Compliance?

Although the PCI compliance process broadly applies to all organizations that process card payment data, every organization must define organization-specific approaches to meeting PCI compliance goals. 

The typical PCI compliance steps include:

Achieving PCI compliance is essential for minimizing risks to sensitive card payment data. Working with a PCI compliance specialist can help you navigate the PCI compliance process.

 

Step 1: Understanding Basics of the PCI Compliance Process 

The basics of the PCI compliance process include:

Understanding key aspects of this process helps simplify PCI compliance steps.


Download Our PCI DSS Checklist


What is the PCI DSS Framework?

The PCI Data Security Standards (DSS) guides sensitive data security protections for organizations that process card payments. Broken into six goals and 12 Requirements (see below), the PCI DSS framework outlines best practices for organizations to achieve PCI compliance and secure global card payment transactions.

The PCI Security Standards Council (SSC)—formed by Founding Members Visa, Mastercard, American Express, Discover, and JCB International—oversees the overall implementation of the PCI compliance process.

 

Request a Free Consultation

 

What is PCI Sensitive Data?

The PCI DSS stipulates protections for sensitive card payment data, which include:

Protecting CHD and SAD is of the utmost importance in the PCI compliance process. Note that aside from the specific subgroup of payment card issuers, SAD storage is explicitly not permitted by merchants in any capacity once it is used to verify cardholder identities.

What are the PCI Levels for Merchants?

A merchant’s PCI Level is dependent on the volume and level of its transactions. PCI Level also determines the PCI compliance process for assessing and reporting compliance (see below). 

According to Visa’s PCI DSS compliance guide, the four PCI levels (based on merchant transactions processed across all payment channels or global merchants) are:

The breakdown of Levels slightly varies per payment card company but generally follows the same transaction volumes for each of the four. Determining your organization’s PCI Level helps define PCI DSS scope and compliance reporting, simplifying the overall PCI compliance process.

 

What are the PCI Levels for Service Providers?

The PCI Levels for service providers also depend on the volume of transactions for services. Per Mastercard’s compliance guide, the service-provider PCI levels (based on third-party processing and related services) include:

Similar to the guidelines for merchants, the PCI SSC requires service providers to report compliance. Therefore, determining PCI Levels for service providers is essential to the overall PCI compliance process.

 

Step 2: Defining DSS Scope for the PCI Compliance Process  

PCI DSS scope is simply the collection of environments, networks, and processing capabilities that store or interact with CHD in any manner. The DSS Requirements must be adhered to regarding these IT resources and their activities to ensure compliance. To reduce PCI compliance scope, organizations can implement segmentations that contain CHD and similar sensitive data to better secure and manage it.

PCI DSS implementations and annual reporting necessitates defining your organization’s compliance scope as one of the first PCI compliance steps.

 

Personnel and Elements Involved in PCI Sensitive Data Processing

The PCI compliance process mandates the institution of specific security policies and controls to address all aspects of adherence for the various personnel, entities, and IT resources involved in card payment processing, which oversee:

The effectiveness of a PCI compliance process relies on addressing compliance at all stages of card payment processing, especially those with the highest sensitive data exposure risks. 

Determining which entities, personnel, and IT resources are involved in your organization’s card processing operations helps simplify the PCI compliance steps, especially with the help of a PCI compliance partner.

 

What are the PCI DSS Requirements?

The bulk of guidance required for the PCI compliance process is found in the 12 Requirements of the PCI DSS v3.2.1. Further broken into sub-requirements, the PCI DSS Requirements address all aspects of PCI compliance and are a springboard for protecting CHD and SAD from threat risks. 

The 12 Requirements of the PCI DSS (categorized by goals) include:

Implementing the guidelines stipulated by the PCI DSS Requirements is essential to the PCI compliance process and helps protect CHD and SAD from breach risks.

Step 3: Completing a PCI Self-Assessment

The main goal of completing a self-assessment in the PCI compliance process is to analyze the overall security of CHD processing. A PCI self-assessment also helps identify vulnerability risks and sets the stage for relevant and appropriate remediation efforts.

 

PCI DSS Vulnerability Assessment 

Within the PCI compliance process, vulnerability assessment helps identify cybersecurity gaps in the technologies and processes involved in CHD processing. 

Common vulnerabilities that pose risks to the security of CHD include:

Identifying vulnerabilities that present risks to payment card data security informs vulnerability assessment efforts and ensures optimal PCI compliance.

 

Completing a Self-Assessment Questionnaire (SAQ)

The PCI compliance process requires all PCI-eligible organizations (except those required to submit a Report on Compliance (ROC)) to complete a Self-Assessment Questionnaire (SAQ). 

SAQs primarily require completing a series of “yes” or “no” questions to assess compliance to each PCI DSS Requirement and consists of two components:

Merchants must fill out the appropriate SAQ, depending on the environment used to process CHD. SAQ classification depends on:

After completing the SAQ, the next step in the PCI compliance process is verification of the self-assessment by a Qualified Security Assessor (QSA) (see below). 

However, any vulnerabilities or risks to CHD identified during the self-assessment must be remediated before completing the PCI DSS certification process.

 

Step 4: Remediation of PCI Vulnerabilities

Vulnerability assessment, whether internally (via SAQ completion) or externally (via QSA assessment), can reveal gaps in your organization’s PCI data security. Additionally, the DSS Requirements stipulate that merchants must have an Approved Scanning Vendor (ASV) perform quarterly vulnerability scans. Therefore, vulnerability remediation is critical to the PCI compliance process and helps close security gaps. 

Your organization can employ commonly used vulnerability remediation techniques to best address PCI security gaps.

 

Penetration testing 

Also known as ethical hacking, penetration testing is one of the best practices for identifying remediable vulnerabilities in PCI data security. Pen-testing helps identify existing and unknown vulnerabilities within an organization’s systems by simulating threat attacks. 

As part of the PCI compliance process, the PCI DSS requires organizations to implement penetration testing methodologies that address:

Penetration testing helps identify vulnerabilities immediately, preventing materialization into breach risks. Working with a qualified Approved Scanning Vendor (ASV) will help your organization determine best practices for penetration testing in the PCI compliance process.

 

Threat Detection and Mitigation

Threat detection and mitigation supports vulnerability remediation efforts should an attack manage to find and exploit one. Specific tools for threat detection and subsequent mitigation in the PCI compliance process include:

Robust threat detection and mitigation tools can help your organization address vulnerabilities to PCI data security and simplify the PCI compliance process

 

Step 5: Submitting PCI Compliance Reports

Compliance reporting is the final step of the PCI DSS certification process. PCI DSS reporting must be performed annually to maintain compliance.

 

Reporting by PCI Level

Depending on an organization’s PCI level (see above), certification of compliance requires submission of the completed reporting documentation (i.e., some combination of an SAQ, Attestation of Compliance (AOC), and Report on Compliance (ROC)). A QSA must fill out both AOCs and ROCs; while QSA involvement is not mandatory for SAQ completion, it significantly streamlines reporting efforts.

The PCI DSS certification process for merchants, based on Visa’s compliance guidance, is as follows:

Determining your organization’s PCI Level will ensure completion of the appropriate PCI DSS certification process, especially with the help of an experienced QSA.

 

Role of a QSA in PCI DSS Certification

Working with a leading QSA is critical to a smooth PCI DSS certification process. Essential points to consider for discussions with a QSA include:

With the help of a QSA, your organization will protect CHD from data breaches, which have significant legal, financial, reputational consequences. 

RSI Security is an experienced QSA and ASV that will guide you throughout the PCI compliance process and help minimize PCI data breach risks. 

 

Optimize Compliance Processes, Gain PCI DSS Certification

The PCI compliance process helps protect CHD and SAD from data breaches and demonstrates your commitment to PCI data security. Virtually all organizations that collect, process, transmit, or store CHD must maintain and demonstrate compliance with the DSS.

Experienced as a QSA and ASV, RSI Security will help your organization achieve PCI compliance and gain PCI DSS certification. Contact RSI Security today to learn more.

 

 

Exit mobile version