PCI-DSS 2.0 Emphasises Transaction Log Management

The Payment Card Industry (PCI) Security Standards Council officially unveiled version 2.0 of its Data Security Standard (PCI-DSS) and Payment Application DSS (PCI PA-DSS) compliance regulations with minor changes designed to clarify their requirements.

“While most of the changes in PCI-DSS 2.0 clarify the existing requirements, some key areas are around encryption, application security, wireless and virtualisation technologies,” noted Mandeep Khera, chief marketing officer for Web application security specialist Cenzic.

“Changes related to application security, including ranking of vulnerabilities according to risk and expanding the scope of vulnerability testing, are critical as these changes will help improve the Web security of online merchants… These changes will go a long way toward preventing credit card fraud, but we must make sure these guidelines are enforced,” he said.

Better Understanding Of PCI Requirements

The revisions to the PCI DSS and PCI PA-DSS are largely language changes and clarifications. The new versions will become effective January 1.

“All of these changes are coming as a direct result of the feedback that we got and, I guess, what they prove is that the standard is basically maturing in that people are understanding it and adhering to it much better,” said Bob Russo, general manager of the PCI Security Standards Council.

The key revisions cover areas such as log management and scoping the environment to understand where cardholders reside. There were also revisions meant to enable organisations to develop a risk-based assessment approach, based on their specific business circumstances, as well as changes designed to appeal to small merchants to simplify their compliance efforts.

“Some of the biggest changes… are in the small merchant area, [such as] simplifying the self-assessment questionnaire and the validation process for these guys,” Russo said.

The council is pushing hard for centralised logging with both standards, he added.

“If you don’t use a centralised logging facility then your guys have got to look in more places, and chances are if [they] have to look in more than one place… you’ll wind up missing some of this stuff,” he said, adding it is a “proven fact that every time we find a breach, it’s always found in the log”.

Validation against the previous versions of the standards (1.2.1) will be allowed until December 31, 2011, in order to give organisations time to implement the latest changes. From January 1, 2012, and moving forward, all assessments must be under version 2.0 of the standards.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Tencent Capex Triples As It Invests In AI

Chinese social media giant Tencent triples capital expenditure on AI data centres and other areas…

26 mins ago

EU Hands Apple First Interoperability Requirements

EU gives Apple demands for third-party developer access to iOS features and greater responsiveness in…

8 hours ago

EU Charges Google Over DMA Violations

Preliminary findings from European Commission argue Google unfairly restricts app developers, self-preferences in search

9 hours ago

Suspects Charged In Huawei EU Parliament Corruption Probe

Belgian authorities charge five people in probe into suspected corruption involving Huawei, following raids and…

13 hours ago

Adobe Launches AI Agents To Enhance Online Marketing

Adobe announces range of AI-based tools for engaging with users as they navigate websites and…

21 hours ago

Xiaomi Raises EV Target Amidst Sales Surge

Xiaomi raises full-year EV delivery target to 350,000, says it has delivered more than 135,000…

22 hours ago