- January 29, 2013
PCI compliance requirements are affecting virtually every industry and business sector, ultimately requiring organizations to undergo extensive measures for ensuring adherence to the Payment Card Industry Data Security Standards (PCI DSS) provisions. It’s thus important for merchants, service providers, and all other entities involved in the storage, processing, and/or transmission of cardholder data to understand what PCI compliance really means, that is, the “who, what, when, where, and why” of this ever-growing and expanding framework. Charles Denyer, a noted Payment Card Industry Qualified Security Assessor (PCI-QSA), discusses the following 8 PCI compliance requirements that every business should know about:
1. Compliance is mandatory – Are you an organization that stores, processes, and/or transmits cardholder data, or have some type of credible nexus with such cardholder data? If so, then welcome to the world of PCI DSS compliance, which seems to be growing and expanding more and more. For purposes of PCI, organizations are identified as either merchants or service providers, and along with these designations come varying compliance requirements, ranging from onsite assessments by a Payment Card Industry Qualified Security Assessor (PCI-QSA) to self-assessment procedures via the Self-Assessment Questionnaires (SAQ) available from the PCI Security Standards Council (PCI SSC).
2. Policies and Procedures are a Must – One of the biggest mistakes I see as a PCI-QSA is merchants and service providers failing to understanding the fundamental importance of having documented policies and procedures in place for PCI compliance. Sure, there are many technical requirements that must be met – no question about it – but the policy requirements can be just as arduous and taxing to complete. I recommend finding high-quality PCI compliance polices, such as those provided by pcipolicyportal.com.
3. Quarterly Scanning – Compliance with PCI for all merchants and service providers (regardless of transaction level) also consists of quarterly network scans, also known as “vulnerability scans”, and it requires them to undergo both internal and external network scans. And for initial PCI DSS compliance, four (4) passing quarterly scans is NOT required, but it is a strict requirement thereafter. Additionally, scans are to be conducted by an Approved Scanning Vendor, known as an ASV, which is an organization ultimately approved by the Payment Card Industry Security Standards Council (PCI SSC) for conducting scans. Lastly – and this is important to note – internal and external scans are to be performed after any “significant” changes. What is “significant” – that’s a question to discuss with a PCI-QSA, such as me, so give me a call if you have any questions at 1-800-277-5415, ext. 705.
4. Penetration Testing – PCI compliance requirements also include penetration testing, which is detailed in Requirement 11 of the actual Payment Card Industry Data Security Standards. In short, organizations will need to conduct a comprehensive pen test, which includes both external and internal tests, both from a network layer and application layer perspective.
5. Report on Compliance – If it’s an onsite assessment that’s required for your organization, then you’ll need to contact a Payment Card Industry Qualified Security Assessor (PCI-QSA), such as myself (Charles Denyer | 1-800-277-5415, ext. 705 | email@example.com). The end deliverable for an onsite assessment is known as the Report on Compliance, or “RoC” as it’s called in the industry.
6. SAQ vs. Onsite Assessments – The vast majority of merchants and service providers can meet PCI compliance via the self-assessment process, which essentially means completing a “Self-Assessment Questionnaire” and the accompanying Attestation of Compliance (AoC). However, a small, but growing number of organizations still require onsite assessments by an actual PCI-QSA. The SAQ vs. Onsite Assessments are apples vs. oranges – very different in many ways – with costs being one of the most important to note.
7. If you process, store or transmit cardholder data, you’re in scope for PCI compliance – It’s really that simple and clear-cut. If you are involved in working with cardholder data in any way, then PCI compliance will surely be something to discuss amongst your organization. Not only is non-compliance not a good idea, but your customers and other entities are starting to demand it now, more than ever before. And this holds true especially for service providers, who are now being required to undertake compliance via SAQ D, or with an actual onsite assessment by a Payment Card Industry Qualified Security Assessor (PCI-QSA), such as Charles Denyer of NDB Advisory (firstname.lastname@example.org | 1-800-277-5415, ext. 705).
8. PCI is a moving target – Forget about the “one and done” notion – compliance with the PCI DSS provisions requires a constant commitment, so just remember that.
About Charles Denyer
Charles Denyer is a member of NDB, a nationally recognized firm specializing in Regulation AB, Service Organization Control (SOC) reporting (SSAE 16, AT 101, Trust Services Principles | TSP), ISAE 3402, FISMA, NIST, HIPAA, ISO and PCI DSS compliance, along with many other regulatory compliance initiatives. He is also actively involved in numerous professional associations and organizations for a wide range of industries and business sectors, such as the American Nuclear Society (ANS), ISACA, and the Cloud Security Alliance (CSA), just to name a few.
Additionally, Charles holds numerous accounting and technology certifications along with a Masters in Information and Telecommunication Systems from the Johns Hopkins University and a Masters in Nuclear Engineering from the University of Tennessee at Knoxville. He has a keen interest in all topics related to information security, national security and homeland defense, and conducts independent research projects on specific subject matter for various entities.
Author: Charles Denyer