The Coming Storm: PCI DSS 2.0

Welcome! Please comment and leave me a note telling me what you like and what you'd like to see more of. Sign up to my RSS Feed!

On January 1, 2012 ce, the next version of PCI DSS, 2.0, will come into effect. Are you ready?

The Coming Storm: PCI DSS 2.0

I have always felt that PCI-DSS was no more than a lip service to proper security. Some HP employees will recall me saying that I think that PCI has as much to do with security as a monkey has to do with blueberry juice. I slay myself.

While I do not believe PCI-DSS is prescriptive or a panacea to whatever ails your organization, I have to admit that more money and effort has been spent on security and privacy due to PCI.

On January 1st, the new version of PCI DSS will become effective.  What’s the big deal, you ask?

Some of us had to deal with the 12 current requirements of PCI:

PCI DSS 2.0 Requirements

 

And especially in the USA (although European adoption is, reportedly, growing). In fact, to some organization, the annual ritual of ‘let’s pass PCI’ has become the only rallying call for security. Indeed, some treat it as the ‘Gospel’.

The Twelve Requirements today

  1. Install and maintain a firewall configuration to protect cardholder data
  2. Do not use vendor-supplied defaults for system passwords and other security parameters
  3. Protect stored cardholder data
  4. Encrypt transmission of cardholder data across open, public networks
  5. Use and regularly update anti-virus software on all systems commonly affected by malware
  6. Develop and maintain secure systems and applications
  7. Restrict access to cardholder data by business need-to-know
  8. Assign a unique ID to each person with computer access
  9. Restrict physical access to cardholder data
  10. Track and monitor all access to network resources and cardholder data
  11. Regularly test security systems and processes
  12. Maintain a policy that addresses information security

 

PCI DSS 2.0 – The Storm

The huge change coming this year is not found in any of the twelve. We have to read the document closer to understand, in fact, the change is ‘hidden’ in the SCOPE section. So here goes (emphasis mine):

“the first step of a PCI DSS review is to accurately determine the scope of the assessment, by identifying all locations and flows of cardholder data and ensuring that all such locations are included in the assessment.”

Now, a QSA will need to certify per a new auditing requirement, 3.1.1, that:

  1. a quarterly automatic or manual process for identifying, and
  2. and [that a quarterly automatic or manual process for] securely deleting stored cardholder data …exists

While this may seem to some as another ‘no auditor left behind act’, meant to further enrich QSA, this is actually a welcome and needed change.

 

How to Stay Dry

Some of the most frequent requests I receive nowadays relate here. What we need to do for starters is:

  1. understand the new requirement
  2. Create a policy as to what to keep, and what not, and for how long
  3. Look for data. This might seem simple at first, but consider that data can reside:
    1. in a database
    2. in a flat file
    3. in an encrypted form
    4. in log files
    5. on laptops and cell phone
    6. in non-SQL databases
    7. in your old backup tapes,
    8. etc.

I am offering, in conjunction with Caliber Security, a quick-start program aimed at assisting organizations getting their hand on this requirement before the time to annual certification come. So please contact me here and help in addressing PCI DSS 2.0 is on the way.

 

 

DeliciousStumbleUponDiggTwitterFacebookRedditLinkedIn

One thought on “The Coming Storm: PCI DSS 2.0

  1. Please let me know how it is decided that what merchant should adopt PCI DSS….if i say that there is a merchant who is running only a small Chocolate Vending shop and has a Card scanner for payment. It also takes cash…but does have only a small mobile shop. Does that vendor require to follow the standard? if so why?

Leave a Reply

Your email address will not be published. Required fields are marked *


*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>