The Protiviti View  | Insights From Our Experts on Trends, Risks and Opportunities

The Protiviti View

Insights From Our Experts on Trends, Risks and Opportunities
Search

POST

2 mins to read

PCI DSS 3.2 Kicks In Today: Do You Know What the Changes Are?

Views
Understand the GDPR legitimate interest vs. consent dilemma
Larger Font
2 minutes to read

Version 3.2 of the Payment Card Industry Data Security Standard (PCI DSS 3.2), the information security standard that guides how entities process, hold and transmit cardholder data, comes into effect today, Nov. 1, 2016. In a post last month we discussed the details and implications of the new standard. Here, we want to point out one change of the new standard that has gone largely unnoticed.

This change affects online order merchants that redirect customers to third-party payment pages to avoid collecting, processing, or storing credit card data on their own servers.

Aimed at addressing known vulnerabilities on the merchant side of the redirect process — including the ability for hackers to change the redirect and therefore to capture credit card data— the change does not represent new requirements. Rather, it consists of adding six controls drawn from current aspects of Requirement 2 (changing default passwords and implementing an incident response plan) and Requirement 8 (unique user ID and strong password, disabling access for terminated users, and not using group or shared passwords) to the self-assessment questionnaire (SAQ A), which much be completed annually.

E-commerce merchants that redirect customers from their website to a third party for payment processing will need to validate these requirements for the webserver upon which the redirection mechanism is located.

MOTO (mail order/telephone order) or e-commerce merchants that have completely outsourced all operations may not have any systems in scope for SAQ A, and in these circumstances these requirements could be considered “not applicable.” If a requirement is deemed not applicable, the merchant should select the “N/A” option for that requirement, and complete an “Explanation of Non-Applicability” worksheet for each “N/A” entry.

As controls go, these are pretty light duty, certainly much lighter than the hundreds of controls required of merchants that collect and hold credit card information. They are easy to address, and these are things that merchants should probably already be doing anyway. We recommend immediate adoption.

For a broader and more detailed discussion of PCI DSS 3.2, download our May 9 flash report, or login to our free archived webinar.

Was this post helpful to you?

Thanks for your feedback!

Subscribe to The Protiviti View Blog

To face the future confidently, you need to be equipped with valuable insights that align with your interests and business goals.

In this Article

Find a similar post by topics

Authors

Jeff Sanchez

By Jeff Sanchez

Verified Expert at Protiviti

EXPERTISE

No noise.
Just insights.

Subscribe now

Related posts

Article

What is it about

The big picture: C-suite leaders in traditional aerospace and defense (A&D) companies are launching and growing their aftermarket services and...

Article

What is it about

What to watch: President-elect Donald Trump will take office in January 2025 with Republican control of both the Senate and...

Article

What is it about

What’s new: HR leaders are having to rethink and relearn traditional rewards strategies in response to the growing need to...