Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1

Similar documents
Transitioning from PCI DSS 2.0 to 3.1

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Becoming PCI Compliant

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI Compliance 3.1. About Us

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

PCI DSS Requirements - Security Controls and Processes

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

PCI DSS v3.0 Vulnerability & Penetration Testing

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Thoughts on PCI DSS 3.0. September, 2014

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Continuous compliance through good governance

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) Penetration Testing Standard

Payment Card Industry (PCI) Data Security Standard

VMware Product Applicability Guide for. Payment Card Industry Data Security Standard

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

Payment Card Industry (PCI) Data Security Standard Report on Compliance. Template for Report on Compliance for use with PCI DSS v3.0. Version 1.

How To Protect Your Data From Being Stolen

Payment Card Industry Data Security Standard

New PCI Standards Enhance Security of Cardholder Data

PCI Compliance for Cloud Applications

Why Is Compliance with PCI DSS Important?

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Payment Card Industry (PCI) Data Security Standard

Payment Application Data Security Standard

Payment Card Industry (PCI) Data Security Standard

So you want to take Credit Cards!

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

PCI DSS 3.0 Overview. OSU Business Affairs Business Affairs PIT Crew - Project, Improvement, & Technology Robin Whitlock

Passing PCI Compliance How to Address the Application Security Mandates

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

PCI DSS v3.0. Compliance Guide

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

North Carolina Office of the State Controller Technology Meeting

Payment Card Industry (PCI) Compliance. Management Guidelines

Payment Card Industry (PCI) Policy Manual. Network and Computer Services

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard

PCI Data Security Standards

Payment Card Industry (PCI) Data Security Standard

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Technology Innovation Programme

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

PCI DSS 3.1 and the Impact on Wi-Fi Security

PCI DSS v2.0. Compliance Guide

Four Keys to Preparing for a PCI DSS 3.0 Assessment

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Payment Card Industry (PCI) Data Security Standard

Achieving PCI-Compliance through Cyberoam

PCI Compliance Updates

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

PCI Requirements Coverage Summary Table

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Policies and Procedures

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

University of Sunderland Business Assurance PCI Security Policy

Understanding the SAQs for PCI DSS version 3

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

HOW SECURE IS YOUR PAYMENT CARD DATA?

PCI Compliance Top 10 Questions and Answers

Transcription:

Payment Card Industry (PCI) Data Security Standard Summary of Changes from PCI DSS Version 3.0 to 3.1 April 2015

Introduction This document provides a summary of changes from PCI DSS v3.0 to PCI DSS v3.1. Table 1 provides an overview of the types of changes. Table 2 summarizes the material changes found in PCI DSS v3.1. Table 1: Change Types 1 Change Type Definition guidance Clarifies intent of requirement. Ensures that concise wording in the standard portrays the desired intent of requirements. Explanation, definition and/or instruction to increase understanding or provide further information or guidance on a particular topic. Changes to ensure that the standards are up to date with emerging threats and changes in the market. 2006-2015 PCI Security Standards Council, LLC. All Rights Reserved. Page 2

Table 2: Summary of Changes Section PCI DSS v3.0 PCI DSS v3.1 Change Type 1 All All Addressed minor typographical errors (grammar, punctuation, formatting, etc.) and incorporated minor updates for readability throughout the document. Introduction Introduction Changed reference from protecting cardholder data to protecting account data. Introduction Introduction Clarified that PCI DSS applies to any entity that stores, processes or transmits account data. Introduction Introduction Changed reference from personally identifiable information to personal information. Changed reference from financial institutions to acquirers, issuers. Removed reference to environments to clarify applicability at the organization level rather than the system level. Scope of PCI DSS s Scope of PCI DSS s Aligned with language used earlier in the same section regarding steps for confirming accuracy of the defined CDE. Use of Third Party Service Providers / Outsourcing Use of Third Party Service Providers / Outsourcing Clarified that validation processes for service providers include undergoing their own annual assessments or undergoing multiple ondemand assessments. PCI DSS Assessment Process PCI DSS Assessment Process Reordered assessment steps to clarify that a ROC, SAQ, or AOC may be submitted without all requirements being in place. General General Updated language in requirements and/or testing procedures for consistency. 2.2.3 2.2.3 Removed SSL as an example of a secure technology. Added note that SSL and early TLS are no longer considered to be strong cryptography and cannot be used as a security control after June 30, 2016. guidance provided in column. Also impacts s 2.3 and 4.1. 2.3 2.3 Removed SSL as an example of a secure technology and added a note to the requirement. See explanation above at 2.2.3. 2006-2015 PCI Security Standards Council, LLC. All Rights Reserved. Page 3

3.2.1 3.2.3 3.2.1 3.2.3 Clarified in requirements that storage of sensitive authentication data is not permitted after authorization. 3.4 3.4 Clarified in requirement note that additional controls are required if hashed and truncated versions of the same PAN are present in an environment. Added Testing Procedure 3.4.e to assist with validation of the Note. Clarified intent of truncation in Column. 3.5.2 3.5.2 Clarified that HSM may refer to a Hardware or Host Security Module. Aligned with language in PCI PTS. 3.6 3.6 Clarified that Testing Procedure 3.6.a only applies if the entity being assessed is a service provider. 4.1 4.1 Removed SSL as an example of a secure technology and added a note to the requirement. See explanation above at 2.2.3. 4.1.1 4.1.1 Updated testing procedure to recognize all versions of SSL as examples of weak encryption. 4.2 4.2 Included SMS as an example of end-user messaging technology and added guidance. 6.6 6.6 Added clarification to testing procedure and column that if an automated technical solution is configured to alert (rather than block) web-based attacks, there must also be a process to ensure timely response. 8.1.4 8.1.4 Clarified that inactive user accounts must be removed/disabled within 90 days. 8.1.6.b 8.2.1.d 8.2.1.e 8.1.6.b 8.2.1.d 8.2.1.e Clarified that Testing Procedure only applies if the entity being assessed is a service provider, and for non-consumer customer accounts. 8.2.3.b 8.2.3.b 8.2.4.b 8.2.4.b 8.2.5.b 8.2.5.b 8.2.4 8.2.4 Clarified that passwords must be changed at least once every 90 days. 8.5.1 8.5.1 Clarified this requirement only applies if the entity being assessed is a service provider. 2006-2015 PCI Security Standards Council, LLC. All Rights Reserved. Page 4

9.2 9.2 Clarified that the requirement applies to all onsite personnel and visitors. Combined Testing Procedures 9.2.b and 9.2.d to remove redundancy. 9.9.1.b 9.9.1.b Updated testing procedure to clarify both devices and device locations need to be observed. 10.6 10.6 Removed redundant language in guidance column. 10.6.1 10.6.1 Updated requirement to more clearly differentiate intent from 10.6.2. 11.1.c 11.1.c Clarified that testing procedure applies where wireless scanning is utilized. 11.2 11.2 Clarified in Column that a vulnerability scan could be a combination of automated and manual tools, techniques, or other methods. 11.3.2.a 11.3.2.a Removed redundant language from testing procedure. 11.3.4 11.3.4 Clarified that the intent of the penetration testing is to verify that all out-of-scope systems are segmented (isolated) from systems in the CDE. 11.5 11.5 Clarified that unauthorized modifications include changes, additions, and deletions of critical system files, etc. 12.2 12.2 Clarified that the risk assessment process must result in a formal, documented analysis of risk. 12.9 12.9 Clarified this requirement only applies if the entity being assessed is a service provider and added related guidance. Appendix C: Compensating Controls Worksheet Completed Example Appendix C: Compensating Controls Worksheet Completed Example Updated description of compensating control example to reflect use of sudo rather than SU for improved technical accuracy. 2006-2015 PCI Security Standards Council, LLC. All Rights Reserved. Page 5