Befuddled companies get checklist for complying with PCI security standard
PCI council releases compliance framework for meeting payment card data-security rules
Computerworld - The organization responsible for administering the Payment Card Industry Data Security Standard (PCI DSS) is offering new guidance to companies on how to comply with the rules for protecting credit and debit card data.
PCI Security Standards Council LLC, which was set up by Visa, MasterCard, American Express and other credit card companies in 2006, last week released a document (download PDF) that lists the most efficient order for companies to implement the 12 security controls mandated under PCI DSS. The prioritized approach groups the controls under six milestones that companies can use as a road map towards compliance, according to council officials.
Bob Russo, the council's general manager, said the framework is "the culmination of a lot of input" from various stakeholders within the payment card industry. It's designed, he added, to help companies that haven't yet to start on their PCI compliance efforts and are wondering what they should do first.
The release of the rollout guidance by the council comes nearly four years after the PCI standard first went into effect, imposing a set of data security requirements on all entities that accept credit and debit card payments. The effort to create the framework indicates that many merchants, especially smaller ones, still aren't fully compliant with the standard and need help implementing it, said Jim Huguelet, an independent PCI consultant in Bolingbrook, Ill.
"I think there are a lot of merchants who feel overwhelmed at the amount of remediation they need to undertake to become fully compliant," Huguelet said. That, he added, has resulted in a sort of "paralysis" in which some merchants either are doing nothing in regards to PCI compliance or are only taking on some of the easier requirements, which by themselves do little to reduce the overall security risks faced by companies that process card transactions.
By offering a framework that explicitly ranks the relative importance of the different requirements, the PCI council has finally given businesses that have yet to comply with the rules a way to move forward, according to Huguelet. "The journey of a thousand miles begins with a single step, and the PCI [council] has now officially announced what those first steps for merchants really should be," he said.
The first of the six milestones outlined in the framework deals with the need for companies to purge sensitive card-authentication data from their systems and limit the amount of data that they collect and retain. Among the measures that have to be implemented in this stage are purging magnetic-stripe data and personal identification numbers (PIN) from systems and destroying old data storage devices via measures such as shredding.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
Enhance Your Virtualization Infrastructure With IBM and Vmware
Date: Wednesday, May 14, 2014, 1:00 PM EDT
Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
All Legal White Papers |