RSI Security

How to Conduct a PCI Gap Assessment

Technical

Is your organization ready to comply with the Payment Card Industry (PCI) Data Security Standard (DSS) framework? If you process or store credit card data, you’ll need to be. A PCI gap analysis, also known as a PCI gap assessment, can help you identify any missing or incomplete cybersecurity infrastructure you’ll need to patch before your next required audit for certification, internal or external.

 

How to Prepare for Compliance with a PCI Gap Assessment

The DSS framework, developed and enforced by the Security Standards Council (SSC), has 12 primary Requirements that eligible merchants need to follow. These are distributed across six primary sections, or Goals, within the framework. A successful PCI DSS gap analysis should assess for complete implementation of the given Requirements and their sub-requirements within each Goal. So, the six steps outlined below correspond directly to the PCI DSS Goals.

 

Step 1: Assess Security Across All Networks and Systems

The first major step in your PCI DSS gap assessment involves assessing weaknesses relevant to the first two Requirements, which collectively make up the first Goal in the DSS. The first Goal is one of the more technical of the six, governing specific architectural implementation and approaches to device and network settings and configurations for cardholder data (CHD) and the broader CHD environment (CDE).

Goal 1 is established across two Requirements and 11 sub-Requirements.

 

Request a Free Consultation

 

PCI DSS Requirement 1: Install and Maintain Protective Firewalls

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 1:

PCI DSS Requirement 2: Replace all Settings Supplied by Vendors

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 2:

 

Step 2: Assess Protections Across All Cardholder Data

The second major step in a PCI DSS gap assessment involves assessing integrity across all the specific safeguards required for CHD, both within the CDE and in preparation for transmission outside it. These include various protections specific to personal and personally identifiable information (PII) included within CHD sets, for which a PII scanner can help immensely.

In total, this step assesses for 10 DSS sub-Requirements, distributed across two primary DSS Requirements.

 

PCI DSS Requirement 3: Protect Cardholder Data in Storage

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 3:

 

PCI DSS Requirement 4: Encrypt Cardholder Data for Transit

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 4:

 

Step 3: Assess Approaches to Vulnerability Management

The third step involved in a PCI DSS gap assessment includes assessing risk management programs. More specifically, you should be scanning for threat and vulnerability management capacities. These can function passively or more actively, as in the case of a threat hunting or managed detection and response (MDR) program.

There are 11 sub-Requirements to assess.

 

PCI DSS Requirement 5: Maintain Antimalware Configurations

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 5:

 

PCI DSS Requirement 6: Develop Secure Apps and Systems

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 6:

Step 4: Assess Identity and Access Management Measures

The fourth step to implementing a successful PCI DSS gap assessment involves scanning for effective identity and access management (IAM) protocols, such as multifactor authentication (MFA) and various other technical and physical measures. This is the most robust Goal within the PCI DSS framework, encompassing 21 sub-Requirements across three Requirements.

 

PCI DSS Requirement 7: Restrict Data Access By Need to Know

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 7:

 

PCI DSS Requirement 8: Authenticate Identity for System Access

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 8:

 

PCI DSS Requirement 9: Restrict Physical and Proximal Access

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 9:

 

Step 5: Assess Network Monitoring or Testing Capabilities

The penultimate step toward a successful PCI DSS gap assessment involves a meta-level assessment of your capacities to assess. Specifically, this PCI DSS Goal ensures that your organization has the required visibility and reporting architecture in place to conduct regular patch availability reports and other audits, which in turn inform repetitive work.

You’ll need to assess the implementation of 15 total sub-Requirements, distributed across 2 Requirements.

 

PCI DSS Requirement 10: Monitor Access to Networks and Data

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 10:

 

PCI DSS Requirement 11: Run Regular Tests of System Efficacy

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 11:

 

Step 6: Assess Information Security Policy Implementation

The final step to your PCI DSS gap assessment should be relatively straightforward compared to all the others. Requirements 1-11 all include a sub-requirement for the formal documentation of all pertinent policies specific to that parent Requirement. These efforts directly pertain to Requirement 12, which builds on these formalities.

Security program advisory is the best way to ensure that all 11 sub-Requirements within Requirement 12 are followed beyond conducting gap assessment.

 

PCI DSS Requirement 12: Maintain Policies Addressing all Staff

A PCI gap analysis needs to focus on the following sub-Requirements for Requirement 12:

 

RSI Security: Professional PCI DSS Gap Analysis Partners

Preparing for long-term PCI compliance involves much more than PCI gap assessment. You also need to address identified issues, install required controls, and then (depending on Merchant Level) verify your implementation.

RSI Security offers a suite of PCI compliance advisory and verification services. As an Approved Scanning Vendor (ASV) who can assist with Requirement 11, and as a Qualified Security Assessor (QSA), we can complete an Attestation of Compliance (AOC) or Report on Compliance (ROC)—if you need one. Contact us today to get started!

 


Speak with a PCI compliance expert today – Schedule a free consultation

Exit mobile version