Overcoming the complexities of PCI DSS compliance

PCI DSS has been in place for years, but we still see many businesses struggling to achieve compliance with the standard.

Even those that do achieve compliance often struggle to maintain it due to the complexity of the standard itself, since each of the twelve requirements have their own nuances and obligations.

As a Level 1 provider on the Visa Europe Merchant Agent List, we’re often brought in to help businesses understand exactly what they need to do to properly safeguard cardholder data on an ongoing basis.

With that in mind, we’ve broken each requirement down to help you understand some of the common complexities associated with PCI DSS, and how you can overcome them to become – and remain – compliant.

 

Requirement 1: Install and maintain a firewall to protect cardholder data.

Many businesses understand the importance of installing and maintaining a firewall, but fewer realise that this is just the first step to PCI DSS compliance.

We have a lot of experience in reconfiguring firewalls to help businesses cover their entire IT infrastructure, examine all network traffic regardless of how insignificant it may seem, and block any transmissions that don’t meet specified security criteria. This helps them maintain compliance over time.

Under PCI DSS, businesses must also keep a log of all changes made to the firewall in readiness for mandatory checks every six months.

 

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.

Forgetting to change vendor default passwords can give businesses a false sense of confidence around the security of their systems. Attackers can, and often do use these and other system defaults to access shared files and unencrypted cardholder data.

One of the first pieces of advice we often give businesses is to immediately change defaults upon receipt from vendors, and regularly audit their attack surface to confirm whether certain pieces of software are really needed.

 

Requirement 3: Protect stored cardholder data.

PCI DSS mandates that businesses have audited, end-to-end processes in place to store, transfer and process cardholder data securely. Importantly, this data should only be held if it’s business critical, and if so, the processing system should mask the Primary Account Number (PAN) when it is displayed.

 

Requirement 4: Encrypt transmission of cardholder data across open, public networks.

We’ve worked with several organisations that believed the minimum was enough when it came to encryption, but approved standards such as TLS 1.1 only apply to one point in time, and relying on these can still leave data exposed.

We’ve helped multiple businesses to put encryption at the heart of their security strategies by understanding internal data entry and exit points and throughout their supply chain. This helps to ensure that sensitive information is encrypted whether at rest or in transit, guaranteeing ongoing compliance with PCI DSS.

 

Requirement 5: Use and regularly update antivirus software or programs.

Although many businesses already have antivirus software in place, some still fall foul of malware and other threats by failing to ensure that it is regularly updated and tested. This ongoing maintenance is essential for PCI DSS compliance – especially with new threats emerging on a daily basis.

For many businesses, this is a job that they don’t have time to treat as a priority, which is why clients often pass the responsibility to us.

 

Requirement 6: Develop and maintain secure systems and applications.

Developing and maintaining secure systems and applications has been seen as a complex process by many organisations that we’ve worked with, partly because of differences in defining ‘secure’ among organisations, and a lack of interest from board members.

Implementing robust processes here is important. This is where we often come in to help businesses categorise vulnerabilities, carry out security reviews of code and ensure that an auditable trail is left to track changes.

 

Requirement 7: Restrict access to cardholder data by business need-to-know.

Left unchecked, businesses can quickly lose track of who has access to private information. While helping one retailer investigate multiple credit card fraud incidents, we found that some employees were trusted to access the Cardholder Data Environment (CDE) just because they had worked there for a long time.

Under PCI DSS, its vital that businesses have a tighter grip on access to cardholder data. This can be achieved by implementing Role Based Access Control (RBAC), which restricts unnecessary exposure by assigning access according to an individual’s role.

 

Requirement 8: Assign a unique ID to each person with computer access.

Some businesses we encounter believe that they will be sacrificing productivity for security by reducing employee access to databases through unique IDs, but this doesn’t have to be the case.

By implementing clear policies and procedures, we’ve helped many organisations track exactly who has access to data, issue unique access codes to suppliers, and implement two-factor authentication to further secure their perimeter.

 

Requirement 9: Restrict physical access to cardholder data.

Restricting physical access to cardholder data is often overlooked when it comes to PCI DSS, but failing to address this requirement can undo all the hard work that organisations put in to secure their IT estates.

If, unlike us, you don’t have access to an underground bomb-proof nuclear bunker to house your data in, it’s worth starting with a full audit of where cardholder data is physically held, along with how it’s transferred and destroyed – including on USBs.

 

Requirement 10: Track and monitor all access to network resources and cardholder data.

Many organisations simply track access to network resources but it’s essential to analyse and log the traffic, too.

This enables businesses to respond to an issue on the network via an automated Security Information and Event Management (SIEM) system, or following dedicated analysis – such systems should be upgraded or modified regularly to suit businesses’ changing needs over time.

 

Requirement 11: Regularly test security systems and processes.

Businesses can struggle to implement the proper knowledge and skills necessary to test their systems against new threats, and the increasing complexity of legacy systems combined with new assets only serves to compound the issue.

We spend a lot of time educating organisations on the need to test security systems at least quarterly through both internal and external vulnerability scans, and conducting penetration tests annually, as a minimum. Once a vulnerability or issue is identified, we also help businesses put procedures in place to escalate them and respond appropriately.

 

Requirement 12: Maintain a policy that addresses information security for employees and contractors.

We’ve found that the final requirement of PCI DSS can also be one of the most complex for businesses to understand and implement. Maintaining a robust policy that addresses information security for employees and contractors – and ensuring that everyone adheres to it – is often seen as an insurmountable task.

A lot of our work is focussed on businesses becoming aligned with other standards such as ISO27005 and ISO27001 to build a clear framework and simplify the journey to PCI DSS compliance.

 

Still unsure of how to be PCI DSS compliant?

PCI DSS is complex, but businesses that treat it as a tick-box exercise will only endure more problems down the line. To ensure ongoing compliance, its vital to understand both the fundamentals and the finer points of each requirement, and how these should be maintained over time.

We are currently offering a free one-hour risk assessment, conducted over the phone by one of our PCI DSS specialists, to help you establish a clearer picture of your current situation and risks, and the opportunities that compliance can bring to your business. Our compliance experts are always on hand to help you rationalise your scope of PCI compliance, implement QSA processes and assist in your compliance journey with our range of services, which have been designed around the standard.

Download our whitepaper here to find out what the impact of non-compliance with PCI DSS can look like, and see some war stories from those who have fallen foul.

The price of PCI non-compliance in a post-GDPR world

Despite monetary penalties being long-established for non-compliance with PCI DSS, it is only in the eight months following the introduction of the General Data Protection Regulation (GDPR) that businesses have truly started to pay attention to the potential cost of inadequate data security.

Although GDPR was brought in to properly safeguard the collection and processing of sensitive personal information as a whole, and PCI DSS was specifically designed to protect payment card data, there is some cross-over that it is important to recognise.

With payment card data falling under personally identifiable information (PII), any breach involving this type of data will now not only contravene PCI DSS requirements, but could also result in companies being given a potentially devastating fine from the Information Commissioner’s Office (ICO) under GDPR.

The fast-paced evolution of the payment industry, and the technology it is built on, is making it increasingly difficult for organisations that collect, store and process payment card data to achieve compliance. It is therefore more important than ever to understand PCI DSS and its relationship with GDPR in order to avoid having to face the music for security negligence.

The cost of non-compliance

We recently analysed all non-marketing-related ICO fines issued between 2015 and 2018 involving breached financial information, to highlight the importance of compliance with PCI DSS now that GDPR is in force.

Overall, this research revealed that these fines could have risen from £1.74 million to nearly £889 million under GDPR.

In one case, an organisation was fined £400,000 for simply neglecting to update its database software – this could have very easily equated to a cumbersome £71.3 million under current regulations.

Another saw hackers exploiting a vulnerability that went unnoticed, resulting in a £500,000 bill – the highest fine that could be issued by the ICO at the time, which could now equate to £102 million when taking the company’s global turnover into consideration.

These fines resulted in both a financial and reputational hit for the companies involved and, what’s worse, implementing a few simple security measures could’ve prevented many of these breaches in the first place.

The bigger picture

As data security remains centre stage, it’s clear that basic security measures are still being missed. Businesses therefore need to place a renewed focus on creating robust security defences that cover the right areas – and complying with PCI DSS is a vital avenue to follow for those that handle cardholder data.

Maintaining continuous compliance with PCI DSS can be a complex process, but putting the necessary measures in place will not only safeguard your customers and your reputation, it can also result in other dividends for your organisation.

Since the requirements of PCI DSS offer an end-to-end approach to keeping information safe and cover people, processes and technology, its principles can be applied to a wide range of different data sets.

Embedding these technical controls into your business can therefore hugely improve the security of all types of data across your organisation, helping to lay the necessary foundations needed to comply with GDPR and other compliance mandates.

But PCI DSS and implementing robust security measures are problem areas that businesses are still struggling to tackle, often because they try to go it alone.

Our PCI DSS experts at The Bunker know the standard inside out, and can work with your business to help you understand how to satisfy each requirement, while enhancing overall security to meet further regulations.

Download our whitepaper here to find out more about the penalties you could face and what you can do to make your PCI DSS compliance journey as smooth as possible.

PCI DSS compliance explained

Most organisations are aware of the importance of the Payment Card Industry Data Security Standard (PCI DSS), a set of regulations introduced to tackle credit card fraud in the early 2000’s. What might not be as clear, however, is exactly what this standard entails and the considerations that organisations need to make in regard to it – an issue exemplified by the drop in PCI DSS compliance over the last twelve months, reported in Verizon research.

What is PCI DSS?

The mistake that some organisations make is seeing PCI DSS as a tick-box exercise, rather than as an ongoing process which requires continual improvement. However, it necessitates careful consideration to ensure that your organisation is – and remains – compliant. Failure to do so can result in hefty fines or a damaged reputation.

Being compliant with PCI DSS means that the people, processes and technologies within your organisation must all be driven by security, creating a secure environment that can handle payment details securely.

Does it apply to me?

As PCI DSS is such a far-reaching standard, it can often be difficult for organisations to know whether it applies to them in the first place.

Put simply, PCI DSS applies to any business that stores, processes or transmits cardholder data. More generally, this means that PCI DSS applies to merchants, payment processors, payment gateways or ecommerce providers. If you handle payment details of any kind, then PCI DSS will apply to you.

It’s also worth noting that PCI DSS is just one of three security standards, each of which has separately defined applications:

1. PCI PTS, which applies to manufacturers and PIN entry devices
2. PCI PA DSS, which applies to software developers and payment applications
3. PCI DSS, which applies to merchants, service providers and secure environments

Even if PCI DSS doesn’t apply to your organisation specifically, being compliant to the standard can still be beneficial since it can help towards compliance with other regulations, including GDPR, and also highlights that your businesses prioritises the safety and security of the data it handles.

What do I need to consider?

PCI DSS is complex. There are many facets to the standard that organisations will need to consider to ensure compliance – from the physical security of cardholder details, to the continuous testing necessary to ensure that systems remain secure.

It’s also essential that security is prioritised when storing, transferring or handling data in order to comply with PCI DSS regulations, and just as vital is making sure that everyone in your organisations is onboard and well versed with exactly what PCI DSS is, as well as what is required to remain compliant with the standard.

It’s worth noting that since cardholder data can be passed from pillar to post in the process of a transaction, tracking exactly who and what has access to this data at any given time is essential under PCI DSS regulations.

PCI DSS spans your entire IT estate, both physically and digitally, so there isn’t a one-size-fits-all solution to the regulation – it may require large scale changes to guarantee compliance, and many organisations often struggle to succeed with this in-house.

With so many things to consider, organisations often don’t have the capacity to effectively tackle PCI DSS singlehandedly. At The Bunker, our team have a decade of experience in guiding companies to full PCI DSS compliance.

We work closely with organisations to ensure that the process of meeting the standard is simple and straightforward, giving peace of mind and compliance guaranteed.

To find out more about PCI DSS, and the impact of non-compliance, as well as the most common challenges we’ve seen and how we can support your compliance journey – download our whitepaper here.

PSD2 Is A Disruptive Game Changer And Success Depends On Security, Privacy And Trust

A game-changer

There is no shortage of finance industry news, media and special interest group information about the revised Directive on Payment Services, and for good reason. The revised Directive on Payment Services – or PSD2 – is a game-changer for the financial sector, including the Payment Card Industry (PCI).

A brief recap of the PSD story so far…

The aim of the original Directive on Payment Services or PSD instrument which was adopted in 2007 was very much aligned with the bigger economic vision for the EU – namely to create a single market for payments within the European Union. PSD:

  • Created the rules and guidelines for modern payment services across the EU
  • Simplified payments and processing across the EU
  • Was intended to promote competition by opening payments up to new entrants
  • Set an agenda for payment efficiency, innovation and reduced cost
  • Provided the legal platform for SEPA or Single Euro Payments Area

Building on PSD, the revised Payment Services Directive (PSD2) is more ambitious, aiming to create a level playing field. This was proposed by the European Commission in 2013.

The mechanism by which this has proceeded through to law does seem protracted. This informs a little on the UK’s current debate on its existing relationship with the EU and its continuing membership. PSD2 was:

  • Thrashed out by 28 different governments within the EU over some 2 years
  • Formally adopted by vote in the European Parliament on 08 October 2015
  • Text was published in the Official Journal of the EU on 23 December 2015
  • Entered into force on 12 January 2016

Where are we now?

The deadline for member states to transpose PSD2 into national legal and regulatory frameworks is 13 January 2018. This enshrines the objectives of the new legislation within the laws of individual countries. In the UK this provides the Financial Conduct Authority (FCA) with an enforceable set of compliance standards to achieve PSD2’s objectives:

  • Standardising, integrating and improving payment efficiency across EU states
  • Harmonise pricing and improve security of payment processing across the EU
  • Providing better consumer protection
  • Encouraging innovation and reducing costs
  • Create a level playing field and enable new entrant payment service providers
  • Incorporate emerging payment methods such as mobile payments
  • Bring new and emerging payment services under regulatory control

What changes does PSD2 bring?

There are three key changes that result from the implementation of PSD2:

  • Third party Access to Accounts (XS2A)
    • E-commerce providers take online or mobile payment directly from a consumer’s bank account without going via PCI intermediaries; this is known as Trusted Third Party Account Access, defined by the acronyms: TPP (Third Party Payment) and XS2A (Access to Accounts)
  • The use of API’s to take payment
    • The use of an Application Programming Interface (API) to enable payment by directly connecting the merchant and the bank
  • The ability to consolidate account information in a single portal
    • An API enables a new type of financial services company – an Account Information Service Provider or AISP – which aggregates account information to let consumers with multiple banks view all bank details in one portal

What PSD2 means for… The PCI and developers

PSD2 is an alternative, direct payment business model which is disruptive to the PCI. It carries a significant threat of disintermediation to third-party payment intermediaries. This creates a need for change, forcing PCI intermediaries to become more innovative.

PSD2 supports the expansion of the market for two key service provider roles. Intermediaries in the PCI industry may be good candidates for adopting roles as either an:

  • Account Information Services Provider (AISP)
    • To offer online services providing a consolidated view of a user’s payment accounts from across one or more payment service providers
  • Payment Initiation Services Provider (PISP)
    • Initiating payment transactions requested by the user from an account held at another payment service provider

What PSD2 means for… E-commerce and merchants

For e-commerce and other merchants this diversifies payments away from established payment gateways, card schemes and PCI networks. This eliminates costs for card schemes and other intermediaries in the PCI ecosystem.

  • The current ‘pull’ model means merchants ‘call’ for payment via a card scheme
  • An open Application Program Interface (API) communicates directly with the payer’s bank or via a third party payment initiator
  • Effectively, online payments are moving to a ‘push’ model – money is taken from a customer account via APIs and transferred to the merchant’s account

What PSD2 means for… Banks

Banks sit in a position of significant power in the new PSD2 payment model. However, industry analysts identify that the new suite of externally published APIs, that are required to open up the market to new entrants (TPPs – AISP & PISP), is likely to cause a significant departure from the ‘hub and spoke’ model which has traditionally governed the relationship between centralised data and the internal distribution channels within banking organisations.

Banks will have to ensure they implement PSD2 in line with compliance requirements and the layers defined by the Open Banking Technical Standards being developed by the Open Banking Working Group (OBWG).

What PSD2 means for… Consumers

For consumers, the implementation of PSD2 by-passes card schemes and the supporting network of intermediaries in the PCI ecosystem. This:

  • Eliminates card payment processing costs to merchants, presenting them with the opportunity to pass the savings to consumers…
  • Means dissatisfaction with the card payments is likely to become a thing of the past!
  • Requires consumers to consent to merchants taking payments from bank accounts directly via APIs
  • Creates a need for explicit consent by consumers to let TPPs use data for marketing purposes

PSD2 may be a new model but it’s still about an old value: Trust

There is little doubt that the effect of PSD2 is going to be anything other than tectonic. For the first time ever banks are able to do away with intermediates, allowing the ecommerce provider to take monies directly from a consumers account via an API. This is a fundamental shift in how the payments system works and it will have a huge impact on standards across the board.

For all stakeholders, the single most important aspect of PSD2 is trust. Consumer confidence in privacy and security must be protected at all costs. The same applies for preventing unscrupulous or prejudicial practices by the members of the PSD2 community.

Consumers will need to give their explicit consent to allow certain levels of bank account information to be made available through the APIs to the TPP businesses, AISPs and PISPs.

However, with consumer consent, TPPs have the opportunity to bring together key bank data, including income, purchasing history and debt repayments to obtain a 360 degree view of the consumer. This includes the credit risk of each individual, as well as their likes and dislikes from the product and service marketing perspective.

Such a dataset presents huge commercial opportunities, such as cross selling. However, consumers are unlikely to jump at the chance of giving their permission simply so that they can be sold to more efficiently and effectively.

The industry will need to identify a strong value proposition to ensure consumer buy-in. Above all, consumers must trust the system is secured against fraud and that data cannot be misused.

Whatever the specific trials and tribulations for the PCI, developers, banks and merchants, the overarching challenge for everyone in the industry is in securing consumer trust by adopting an exemplary approach to privacy and data security.