You are on page 1of 6

opinion piece

Understanding the
12 Requirements of PCI DSS
Practical steps to achieve and maintain compliance
opinion piece | Understanding the 12 Requirements of PCI DSS

Regardless of whether you are a


retailer, service provider or a bank,
In an attempt to secure transactions and
if you process any form of credit or personal data, the PCI Security Standard
debit card data you have to ensure
a thorough understanding of the
Council drafted the Data Security Standard
Payment Card Industry Data Security (PCI DSS).
Standard (PCI DSS) and how it impacts
your organisation, writes Brian
Demystifying the DSS Requirement 4: Encrypt
Pennington, Business Development transmission of cardholder data
Manager at Dimension Data UK. requirements
across open, public networks
Understanding what the requirements of Key action: The highly distributed
Cardholder information is increasingly
the PCI DSS mean to your organisation nature of today’s supply chain and service
becoming a target for cyber thieves.
and being able to articulate this outside relationships creates a dependency on
In an attempt to secure transactions and
the IT department is a crucial first step in public networks. In view of this, the
personal data, the PCI Security Standard
achieving and maintaining compliance. easiest way to fail this requirement is
Council drafted the Data Security Standard
(PCI DSS). This standard applies to every by not addressing how your wireless
Requirement 1: Install and network and remote access solutions are
organisation that processes credit or debit
maintain a firewall configuration configured. Most other transmissions can
card information, including merchants and
to protect cardholder data be configured to use VPN software such
third-party service providers that store,
process or transmit data. Key action: To comply with this standard as SSL & IPSec. Mapping the route of
you have to demonstrate that your firewalls the transmission will quickly show where
The 12 requirements specified in the DSS
and routers are correctly maintained and encryption is required. From 31st March
are structured under five key areas to
independently tested. 2009 Wireless Networks using the WEP
ensure that there are no loopholes when it
encryption standard will no longer be
comes to securing cardholder transaction Requirement 2: Do not use allowed to transmit credit card data of
and personal data. vendor-supplied defaults for any type.
The key areas are: system passwords and other
• Building and maintaining a secure security parameters Requirement 5: Use and regularly
network (requirement 1 – 4) Key action: A firewall is a fundamental update anti-virus software
part of network security. Following on from Key action: Cyber criminals’ capabilities
• Maintaining a vulnerability management
our first step, a correctly implemented to break into networks are increasing at
programme (requirements 5 – 6)
firewall will automatically comply with this an alarming rate. Although organisations
• Implementing strong access control requirement, but is it really that easy? have anti-virus software to safeguard
measures (requirements 7 – 9) The answer is ‘yes’ as long as you can against attacks, they need to ensure that
• Regularly monitoring and testing prove that the appropriate steps have been the frequently published updates reach
networks (requirements 10 – 11) taken both during the implementation every device.
phase and afterwards under change The clarification in v1.2 of the PCI
• Maintaining an information security
management. Again, it is about process DSS standard notes that anti-malware
policy (requirement 12)
and people – not simply products protection is to include all operating
Although the DSS is clearly structured, that provide a technical solution. The systems and all forms of malware. Intrusion
there is no doubt that organisations may requirement also includes Wireless LANs detection or prevention systems are
find it challenging to interpret how they since the v1.2 clarification/update. becoming an even more important form
match their overall security roadmap and of protection, because they do not need
also previous investments in technology Requirement 3: Protect stored regular patching (unlike anti-virus software
and processes. A single violation of cardholder data which fundamentally depends on it) and
any of the requirements can trigger an Key action: All stored data must be they can be both device and network
overall non-compliant status resulting in encrypted. If you assess where the credit aware. Install these systems in front of the
fines, suspension and revocation of card card data is stored you can quickly achieve devices storing credit card details to ensure
processing privileges. compliance using any one of several maximum protection. Alternatively, to
commercially available tools. Some details ensure that all your anti-virus software is
should never be stored, e.g. PIN numbers patched, make a comparison between the
and the full details on the magnetic strip. total number of devices connected with
the number that is being updated.
In addition, Network Access Control (NAC)
is a mechanism to ensure that anti-virus
patches have been applied to individual
workstations as they attempt to connect to
the network.
opinion piece | Understanding the 12 Requirements of PCI DSS

Requirement 6: Develop and Requirement 8: Assign a Requirement 11: Regularly test


maintain secure systems and unique ID to each person with security systems and processes
applications computer access Key action: All organisations that are
Key action: In an increasingly complex Key action: It is a well-known fact in the affected by the PCI DSS regulations should
and integrated world of applications, industry that the majority of database conduct regular vulnerability scans for
middleware and servers, maintaining a breaches are internal. Assigning a unique possible exploitable weaknesses. When
comprehensive view of security is a major identification (ID) to each person with there are significant changes to the
challenge. Review the alerts of all the access ensures that actions taken on critical network, device operating systems or
software vendors used in your systems data and systems are performed by, applications, organisations should run
and apply their patches methodically. and can be traced to, known and internal and external vulnerability scans.
If the application has been customised, authorised users. All remote users
patching can be very difficult as the should access the data via two factor Requirement 12: Maintain
extended code may be affected by the authentications (e.g. tokens or smartcards). a policy that addresses
patch. In this situation, the application In addition, inactive devices should be information security
needs to be properly tested to see whether logged off after a pre-determined period Key action: Business is becoming more
the application is vulnerable and then a of inactivity. It is a requirement of this dependent on IT and the organisation
plan must be put in place to address any standard to have passwords tested to prove therefore needs to be more aware of IT
issues. In addition, organisations with they are unreadable during transmission security as part of their overall policies and
customised applications may consider and storage. risk management strategies. Ownership of
conducting a vulnerability assessment. this must be assigned to a person or group
Version 1.2 of the standard indicates that Requirement 9: Restrict physical within the organisation. A strong security
a risk based approach may be used to access to cardholder data policy sets the tone for the entire company
prioritise patching. In addition, 6.6 which Key action: Physical access to any building and informs employees of what is expected
governs web based applications and their needs to be via a reception area with all of them. This standard specifies that critical
protection is now mandatory. This means visitors and contractors signing in. All employee facing technologies includes
the application code needs to be either devices that store or could store credit card remote access technologies, wireless
regularly assessed or protected by an details have to be in a secure environment. technologies, removable electronic media,
“application firewall”. For some merchants Server rooms need to be locked with CCTV email usage, internet usage, laptops,
both the application checking and installed. Access to the wireless and wired and Personal Data Assistants (PDAs).
application firewall are mandatory. network components must be restricted. The standard also states that service
providers should be monitored
Requirement 7: Restrict access Requirement 10: Track and and managed.
to cardholder data by business monitor all access to network
need-to-know resources & cardholder data
Key action: Access to critical data should
be restricted and recorded. For example,
Key action: The logs of the network and
appropriate devices need to be recorded
In an increasingly
access should only be given to staff
working with credit/debit card details.
and analysed for anomalies. The logs need complex and
to be stored so that legitimate access,
Remember, through the use of encryption intrusions and attempted intrusions can integrated world
and directory access controls, it is possible be tracked. The logs must be available as
to allow administrators and support evidence in case of a breach and this can of applications,
staff appropriate access to the services
they need without them seeing sensitive
be achieved by using log management,
Security Event Management (SEM) middleware and
data. Important to note, however, is that
all access should be documented and
and Security Information and Event
Management (SIEM). All external system
servers, maintaining
regularly audited. logs e.g. wireless, firewalls, DNS etc must
be stored internally. Penetration tests
a comprehensive
do not have to be undertaken by QSAs view of security is
(Qualified Security Advisors) or ASVs
(Approved Scan Vendors). a major challenge.
opinion piece | Understanding the 12 Requirements of PCI DSS

As a first step, it is important to build


a roadmap to determine your existing
status and future goals, because the
requirements on the different merchants
and provider levels will affect your approach
to the project.

Proactive steps to become Once the assessment is completed, you Step 5: Proactively monitor and
compliant should map PCI mandatory requirements manage the network
and government regulations to current While larger organisations seem to be more
Once you understand the requirements, it is business processes and systems. This is focused on ensuring that sensitive data
recommended that you communicate these an important step since mandates and remains secure throughout the life cycle
to the broader organisation and follow regulations may overlap, and also to ensure of business applications, businesses of all
proactive steps to achieve and maintain previous investments and work is leveraged. sizes find tracking and monitoring a major
PCI DSS compliance without losing sight of Once this mapping exercise has been business challenge. This can be mitigated
your overall IT security posture. completed, you can then prioritise changes by enacting clear policies of network
to both operational processes and systems. administration, but again, can only be
Step 1: Build a roadmap accomplished once full understanding
As a first step, it is important to build Step 3: Build a secure architecture of the “real view” of current practices
a roadmap to determine your existing Once assessments have taken place is attained. Logging and monitoring are
status and future goals, because the organisations need to build an key technology enablers in ensuring a
requirements on the different merchants architecture that supports the overall IT secure network, as are frequent network
and provider levels will affect your security and compliance roadmap. This penetration tests.
approach to the project. Each project often includes re-architecting the existing In addition, having a centralised control
should have an agreed start, target and network and security controls to create an framework allows companies to effectively
end date and should be assigned the right architecture that can address changes in implement policies while providing a
resources within your business to ensure the 12 requirements. linkage to business controls, including
successful implementation. A resource In an ideal world, all consumer-specific controls over financial reporting.
within the IT department or if appropriate, data, not just payment data, should It helps protect sensitive information from
the entire business, should be tasked with be encrypted. While the PCI DSS has unauthorised disclosure, safeguards the
keeping abreast of new threats and any very specific requirements regarding accuracy and completeness of information,
impending changes/additions to the PCI encryption of personal account numbers, ensures that information and vital IT
DSS requirements. This ensures that you forward-thinking organisations should services are available when required, and
can adapt your roadmap and milestone view this as an opportunity to remain provides information and services with a
projects accordingly. at least one step ahead of industry high level of efficiency.
In addition, validation should be an mandates and potential legislation. In conclusion, it is crucial that IT
ongoing effort with quarterly and annual organisations build a platform to achieve
tasks, including onsite assessments and Step 4: Develop appropriate PCI compliance and maintain the
audits, self-assessment questionnaires and storage, retrieval and disposal appropriate level of compliance going
quarterly security scanning of all Internet- processes forward. Organisations that successfully
accessible systems and applications. The vast majority of retailers, large and demonstrate to executives what their
small, hold on to sensitive data for a period current security practices are through a
Step 2: Assess performance of two years. However, many experts consolidated view, where the dangers
and risk strongly advise, “Don’t store it if you lie, and what their practices should be
Organisations need to conduct a thorough don’t need it” as the golden rule of data as defined by industry regulations and
assessment of where personal account security risk avoidance. Businesses need to benchmarks, have a far greater chance of
data is held. They need to understand become more systematic in the destruction defining the financial risk that surrounds
where weaknesses exist and how they of transactional data once the business non-secured customer-specific data
need to be addressed. Without conducting purpose for keeping it has passed. and securing appropriate boardroom
this assessment, virtually no retailer can be commitment and investment.
anything more than reactive in their data
security practice.
opinion piece | Understanding the 12 Requirements of PCI DSS

The building blocks of


compliance
PCI Sarbanes-Oxley Data protection act
Many of the controls required for the

Monitoring
various regulatory and governance
requirements are common. Understanding Security controls
what regulations affect your business will
enable you to map the common activities
into an overall compliance plan. Network infrastructure

Why should PCI DSS be the PCI DSS is a comprehensive regulation from an IT perspective, because it
basis of your compliance plan? deals with major issues. It is therefore the best standard upon which to
build your compliance plan.
It assists you to:
• Build and maintain a secure network and
thereby ensuring that you have the most
appropriate network technology and
configurations for your business
• Maintain a vulnerability management
programme which is about maintaining
the network correctly and having the
right malware protection for your systems
• Implement strong access control measures
which entail who can access what data
and how you control their access
• Regularly monitor and test networks
to prove that malicious activity is not
occurring
• Maintain an information security policy,
which is often conducted at too high
a level. The definitions in the PCI DSS
standards allow for a greater level of
control which in turn leads to more
effective management

CS / DDCC-0776 / 04/11 © Copyright Dimension Data 2011 For further information visit: www.dimensiondata.com
Middle East & Africa Asia Australia Europe Americas
·
ALGERIA ANGOLA ·
CHINA HONG KONG AUSTRALIAN CAPITAL TERRITORY ·
BELGIUM CZECH REPUBLIC · ·
BRAZIL CANADA CHILE
·
BOTSWANA GHANA KENYA · ·
INDIA INDONESIA JAPAN · ·
NEW SOUTH WALES QUEENSLAND ·
FRANCE GERMANY ·
MEXICO UNITED STATES
· ·
MOROCCO NAMIBIA NIGERIA ·
KOREA MALAYSIA ·
SOUTH AUSTRALIA VICTORIA ·
ITALY LUXEMBOURG
·
SAUDI ARABIA SOUTH AFRICA ·
NEW ZEALAND PHILIPPINES WESTERN AUSTRALIA ·
NETHERLANDS SPAIN
·
TANZANIA UGANDA SINGAPORE TAIWAN · ·
SWITZERLAND UNITED KINGDOM
UNITED ARAB EMIRATES ·
THAILAND VIETNAM

For contact details in your region please visit www.dimensiondata.com/globalpresence

You might also like