RSI Security

Overview of Credit Card Industry Data Security Standards

managed it

Nearly all companies that collect, store, process, or transmit credit card data must comply with the Payment Card Industry (PCI) Data Security Standard (DSS). The PCI DSS, which prioritizes the protection of cardholder data (CHD), establishes the overarching framework organizations must follow for their credit card compliance policy.

 

The PCI DSS and Your Credit Card Compliance Policy

The majority of companies interact with credit card data in some way or another, even if payment processing is outsourced to a third-party platform. As a result, they must ensure that their IT infrastructure, outsourced services, and organizational processes comply with these credit card data security standards.

Developing a comprehensive credit card compliance policy requires:

 

The PCI DSS Framework’s 12 Requirements

The PCI DSS was established by the Security Standards Council (SSC) as the credit card industry standard. The SSC’s members—which include some of the most globally recognized credit card companies, such as Visa and MasterCard—enforce the PCI DSS as a means to protect CHD and minimize the likelihood and impact of data breaches. To this end, most of the PCI DSS focuses on companies’ cybersecurity efforts.

The current PCI DSS framework (version 3.2.1) comprises six Goals, 12 Requirements, numerous sub-requirements:

 

Request a Free Consultation

 

Requirement 1 Sub-requirements

Requirement 1 primarily focuses on the cybersecurity perimeter protecting a company’s entire IT environment—notably, implemented firewalls. Requirement 1’s sub-requirements are:

Requirement 2 Sub-requirements

Requirement 2 seeks to eliminate data breaches caused by the unsecure use of the default passwords and configurations set for newly implemented technologies. The PCI DSS equates unchanged passwords and configurations to leaving a company’s physical doors unlocked, as the defaults can easily be hacked.

Requirement 2’s sub-requirements are:

 

Requirement 3 Sub-requirements

While the PCI DSS as a whole prioritizes CHD protections, Requirement 3 specifically establishes the security efforts companies must maintain for the credit card data they store (e.g., primary account numbers (PAN), names, authentication data). Generally, stored CHD must (or should) be encrypted and rendered unreadable.

Requirement 3’s sub-requirements are:

 

Requirement 4 Sub-requirements

Requirement 4 similarly covers CHD encryption, but when transmitted across open, public networks. Public networks’ absent protections require CHD to be rendered unreadable without the associated cryptographic key should it be intercepted.

Requirement 4’s sub-requirements are:

 

Requirement 5 Sub-requirements

Requirement 5 specifies that companies must enhance their firewall protections with up-to-date antivirus and antimalware software. Requirement 5’s sub-requirements are:

 

Requirement 6 Sub-requirements

Requirement 6 relates to companies’ software, hardware, and firmware patch management. Security teams must monitor vendor-provided patch releases to implement the most up-to-date vulnerability fixes. Requirement 6’s sub-requirements are:

 

Requirement 7 Sub-requirements

Requirement 7 adopts the “principle of least privilege” regarding CHD environments—restricting user access so that only those who require it for their role’s responsibilities receive authorization. Requirement 7’s sub-requirements are:

 

Requirement 8 Sub-requirements

Requirement 8’s sub-requirements revolve around companies’ identity and access management systems and procedures. Each user must be provided with unique accounts or IDs to allow the company to track and log all of their activity related to CHD environments. Requirement 8’s sub-requirements are:

Requirement 9 Sub-requirements

Requirement 9 covers physical access restrictions to facilities and rooms that house technologies storing CHD—or hosting the software or services enabling its collection, processing, or transmission. Requirement 9’s sub-requirements are:

 

Requirement 10 Sub-requirements

Requirement 10 instructs PCI DSS-applicable companies to compile user activity logs for all network resources and CHD environments to create audit trails. Requirement 10’s sub-requirements are:

 

Requirement 11 Sub-requirements

Requirement 11 mandates that companies regularly test CHD environments for vulnerabilities to existing and emerging threats. Requirement 11’s sub-requirements are:

 

Requirement 12 Sub-requirements

Requirement 12 relates to managing a credit card compliance policy and ensuring its distribution to all personnel. All employees and involved parties must be aware of the credit card data security standards and compliance efforts. Policies must be redistributed following any updates.

Requirement 12’s sub-requirements are:

 

Credit Card Compliance Policy Advisory

The PCI DSS establishes the credit card industry standards for protecting CHD, and your organization’s credit card compliance policy should directly follow its specifications. RSI Security leverages its expertise as a PCI SSC-approved third party for constructing policies, conducting assessments, and reporting.

Contact RSI Security today to receive expert compliance and cybersecurity guidance for constructing and implementing company policies that adhere to credit card data security standards.

 

 

Exit mobile version