[Approx. 12 minutes reading time]
The PCI Compliance landscape is evolving rapidly.
New technologies, new regulations, and compliance requirements are constantly emerging.
This means that organizations need to be able to address changes in the environment while adhering to existing rules and regulations.
This blog post will cover some of the major changes for 2022 including:
- The release of the new version 3.2 of Payment Card Industry Data Security Standard (PCI DSS).
- Changes to TLS/SSL encryption protocols
But, before we get too ahead of ourselves, let's make sure everyone reading this article is on the same page, and understands the core fundamentals of PCI Compliance as well.
(Hint: Use the links below to skip ahead to the most relevant section for your needs)
- What is PCI Compliance?
- Which companies are required to be PCI DSS compliant?
- How do you maintain PCI compliance?
- What are the penalties for not maintaining PCI compliance?
- What are the 12 requirements of PCI DSS Compliance?
- Build and maintain a secure network
- Do not use vendor-supplied defaults for system passwords and other security parameters.
- Protect stored credit card and cardholder data
- Encrypt transmission of credit card and cardholder data across open, public networks.
- Use and regularly update anti-virus software or programs.
- Develop and maintain secure systems and applications.
- Implement strong access control measures
- Assign a unique ID to each person with computer access.
- Restrict physical access to cardholder data.
- Track and monitor all access to network resources and cardholder data.
- Regularly test information security systems and processes.
- Provide staff training on the importance of data protection.
- How much does it cost to become PCI compliant?
- We use a third-party processor. Do we need to be PCI DSS compliant?
- What's new in Version 3.2 of PCI DSS?
- Changes to TLS/SSL encryption protocols for 2022
- Conclusion
1. What is PCI Compliance?
PCI compliance refers to maintaining data security standards, under the requirements as set out by the Payment Card Industry Data Security Standards (PCI DSS) for any companies that process, store, or transmit credit card information.
Due to the privacy and fraud implications of having this sensitive cardholder data, these PCI DSS compliance standards are developed by an independent body but are enforced by the payment card industry itself.
If you deal with any sort of payment cardholder in your organization, PCI DSS compliance management should be a key focus for your compliance team.
Everything from your network resources, firewall configuration, access control system, wireless access points, and more play a role in maintaining PCI compliance.
The requirements are set out by the PCI Security Standards Council (PCI SSC) and are continually being revised in line with changes in the cardholder data environment as industry data security standards shift.
2. Which companies are required to be PCI compliant?
Any organization that accepts, transmits, or stores credit card information is required to be PCI DSS compliant.
It doesn't matter how many payment transactions you process, what size the transaction is, or anything else.
PCI doesn't just apply to traditional financial institutions. This is a blanket approach.
This is because the PCI Council wants to promote industry data security standards that protect credit card data at every step of the value chain.
Consumers demand this sort of data security, and it only works if the entire industry pulls in the same direction.
3. How do you maintain PCI compliance?
Maintaining PCI compliance is a continual process that relies on effective internal systems and processes - in line with the 12 PCI DSS requirements.
The first step to achieve PCI compliance is to do an audit of your current workflows and identify any PCI compliance areas where you are lacking - so you can rectify them.
These guidelines can vary depending on your company's credit card transaction volume, so be sure to check where you stand according to the PCI council guidelines.
On a regular basis, you then should be looking to continually monitor how you are managing these guidelines operationally, and keep up with new developments as they arise.
This should be codified into some form of vulnerability management program which tests the security controls and measures your internal systems against PCI security standards and more general data security standards.
A good way to make this work is to use a self-assessment questionnaire to perform this introspection.
If you're looking for enhanced accountability, you also can hire the services of a professional firm that:
- Understands the PCI data security standard
- Can improve network security and implement access control measures
- Can validate PCI compliance, and
- Provide recommendations as to what might need to be improved.
4. What are the penalties for not maintaining PCI compliance?
The fines themselves are not published or reported, so it's difficult to give an accurate answer here.
Some estimates say that penalties vary from $5,000 to $100,000 per month until compliance is validated again, but this doesn't tell the whole picture.
You'll often find that on top of the official penalties, non-compliant companies will also face lawsuits, federal investigations, and a number of other financial complications.
Short story, the penalties are severe.
So, it's imperative that you regularly test security systems and make sure they're meet the PCI DSS requirements.
5. What are the 12 requirements of PCI DSS Compliance?
These requirements are set out by the PCI SSC, and they range across both technical and operational guidelines that must be adhered to if you are to remain compliant.
We'll go through each of the requirements in a summarized level of detail.