PCI Compliance

by Sagar Joshi
Payment card industry (PCI) compliance plays a crucial role in data security. Learn more about PCI compliance, how it helps businesses keep credit card data secure, and helpful information on PCI compliance benefits and best practices.

What is PCI compliance?

Payment card industry (PCI) compliance, originally known as payment card industry data security standard (PCI DSS) compliance, is a self-regulatory industry code of conduct administered by the Payment Card Industry Security Standards Council.

PCI compliance mandates organizations that handle branded credit cards under major card schemes (Visa, Mastercard, American Express, etc.)  to securely accept, store, process, and transmit cardholder data. 

Companies need to discover sensitive data stored, transmitted, or processed in their system and protect it from unauthorized access to comply with PCI. Sensitive data discovery software makes it easier to locate this sensitive data and helps companies set proper measures to prevent hackers from accessing it.

Organizations need the following to become PCI compliant:

  • 12 general requirements of PCI compliance
  • 78 base requirements based on your business
  • Four hundred test procedures to ensure your organization is complying with PCI requirements (depending on your business)

PCI  compliance regulations ensure that both customers and businesses stay protected from data breaches. It applies to all enterprises carrying credit card information and is a cornerstone of every organization’s security protocol. 

PCI standards have expanded their outlines to include encrypted internet transactions and added new rules and regulations to accommodate recent advances in payment technology and commerce.

PCI compliance levels

Four PCI compliance levels determine the number of transactions a merchant handles every year.

  • Level 1: Merchants that process over 6 million card transactions per year.
  • Level 2: Merchants that process 1 to 6 million card transactions per year.
  • Level 3: Merchants that process 20,000 to 1 million card transactions per year.
  • Level 4: Merchants that process fewer than 20,000 card transactions per year.

For organizations on PCI compliance level 1, achieving PCI compliance includes performing external audits by a qualified security assessor (QSA) or an internal security assessor (ISA). QSA or ISA conducts an on-site evaluation to: 

  • Validate the scope of assessment 
  • Review technical information and documentation, 
  • Determine if PCI requirements are met 
  • Offer guidance and support during the compliance process 
  • Evaluate compensating controls

After successful evaluation, the qualified security assessor submits a Report on Compliance (RoC) to the organization’s operational banks to demonstrate compliance. 

PCI compliance Level 2 organizations should also complete an RoC. 

Level 2 to 4 organizations can complete a self-assessment questionnaire instead of external audits to determine compliance. 

Benefits of PCI DSS compliance

PCI DSS compliance provides a set of regulations and requirements to ensure optimal data confidentiality and security.

Some of the benefits to being PCI DSS compliant are:

  • PCI DSS compliance ensures that company assets have multiple layers of security. 
  • It enlists evolving threats and attacks vectors, making the data environment more secure.
  • PCI DSS involves setting up firewalls, SIEM systems, and other security infrastructure to gather threat intelligence in the event of anomalies.
  • PCI compliance emphasizes encrypting cardholder data,  making a PCI DSS compliant business a less valuable target for cybercriminals.
  • PCI compliance principles put a strong focus on protecting cardholder data as it’s stored or transmitted. It emphasizes enforcing PCI principles with an appropriate security infrastructure to help organizations prevent data breaches. 
  • PCI DSS compliance builds and maintains customer trust and makes data security hassle-free.
  • PCI compliance helps align businesses with industry-accepted standards in storing, processing, and transmitting cardholder information. 
  • PCI DSS compliance helps organizations comply with industry-recognized data security standards.

PCI compliance requirements

PCI DSS compliance requirements focus on achieving PCI compliance and protecting cardholder data from unauthorized access.

1. Protect the company network with firewalls

Steps you can take to protect your network:

  • Configure firewalls to secure the company network and regulate incoming and outgoing traffic based on the organizational criteria.
  • Use hardware firewalls and software firewalls to protect the network.
  • Configure the firewalls for inbound and outbound traffic. If an attacker penetrates the system, it’ll be difficult for them to export the stolen information owing to outbound rules.

2. Refrain from using default passwords and configure settings

To comply with the second requirement of PCI compliance:

  • Change default passwords and implement system hardening and system configuration management.
  • Address all vulnerabilities in the system, remediate and report them, and ensure that the system hardening standards align with industry best practices.
  • Adopt system management software, which serves as a complete package for monitoring, scanning, and configuring devices and system hardening options.
  • Verify that the system hardening standard is securely implemented as new devices and applications are introduced into the system environment.

3. Protect stored cardholder data against unauthorized access

Adopt the following measure to protect cardholder data against unauthorized access:

  • Encrypt cardholder data using strong and industry-accepted encryption standards like AES-256.
  • Ensure that the systems store confidential cardholder details in an encrypted format.
  • Create and document the cardholder data (CHD) flow diagram. It’s a graphical representation of the data flow within an organization.
  • Use a sensitive data discovery tool to find sensitive information like social security number in the company systems to encrypt or remove it.

4. Encrypt transmission of cardholder data across open, public networks

Consider the following to encrypt the transmission of cardholder data across open or public networks:

  • Identify how and where the data is being transmitted. Keep track of all areas where similar details are being sent.
  • Make the transition from secure sockets layer (SSL) and early versions of transport layer security (TLS) to more secure versions of TLS.
  • Check the gateways, terminal providers, service providers, and banks to see if they use updated encryption for transactional applications.

5. Use an updated version of antivirus software

Adopt the following measures to comply with the fifth PCI DSS requirement.

  • Use antivirus software and prevent the systems from known malware.
  • Update the antivirus software regularly.
  • Gather information on emerging malware and the different ways it can penetrate company systems.
  • Configure the systems and design processes to be alerted when any malicious activity occurs in the system environment.
  • Run periodic malware scans to ensure that you have a process designed to implement it.

6. Develop and maintain secure systems and applications

Practice the following methods to develop and maintain secure systems and applications:

  • Patch security weaknesses with recent patches released by the software provider.
  • Install latest security updates and patched vulnerabilities in applications and systems that are crucial to the flow of card data.
  • Install critical patches within a month of their release to ensure compliance
  • Be proactive in patch management and implementation as soon as the patch is released.

7. Restrict access to cardholder data by business need to know

Consider the following to restrict access to cardholder data:

  • Ensure strict access controls to cardholder data by implementing role-based access control (RBAC) systems that grant access to cardholder details on a need-to-know basis.
  • Refrain from creating group users or share a common user account with other users. It’ll be challenging to track data breaches. `

8. Assign a unique ID to each person with computer access

Take the following steps  to comply with the eighth requirement of the PCI DSS requirement:

  • Assign a unique ID to each user with computer access and create strong passwords to prevent unauthorized access. 
  • Create multiple layers of security when protecting user accounts.
  • Use multi-factor authentication solutions to provide additional layers of defense and to shield your systems from attackers.

9. Restrict physical access to workplace and cardholder data

Important things to consider to comply with the ninth requirement of PCI DSS:

  • Limit employee access to areas with stored cardholder data.
  • Document employees with access to secure environments and the ones in need of access privileges. List all authorized device users, locations where the device isn’t allowed, and where it’s currently located. Note all applications that can be accessed on a device. Record what, where, when, and why devices are being used.
  • Differentiate between employees and visitors in the organization, and use methods to monitor people with access to secure environments.
  • Ensure that the user’s access privileges are removed, and physical access mechanisms like keys and access cards are disabled or returned when offboarding employees.

10. Track and monitor access to rework resources and cardholder data

Crucial points to consider while tracking and monitoring access to network resources and cardholder data:

  • Implement and maintain a logging system to view all logs and get alerts in the event of anomalies. 
  • Check the system event logs at least once a day to identify patterns, gather threat intelligence, and detect behaviors that contradict expected trends.
  • Use security information and event management (SIEM) solutions to build and manage a centralized log collection system, monitoring, and inspection.

11. Regularly test security systems and process

Follow the practices mentioned below to comply with the eleventh requirement of PCI DSS.

  • Conduct frequent vulnerability scans to identify if the security weaknesses were successfully patched.
  • Perform quarterly vulnerability scans for all external IPs and domains exposed in the cardholder data environment using a PCI-approved scanning vendor (ASV).
  • Conduct regular penetration tests to identify different ways hackers can exploit vulnerabilities to safely configure your security systems and protect the data against similar malicious tactics. (Penetration test frequency depends on your self-assessment questionnaire (SAQ), environment, size, procedures, and other factors).

12. Risk assessment and documentation

Adopt the following practices to comply with the final requirement of PCI DSS compliance:

  • Document all policies, procedures, and evidence associated with the organization’s information security practices.
  • Assess formal and annual risks to determine critical threats, vulnerabilities, and associated risks.
SJ

Sagar Joshi

Sagar Joshi is a former content marketing specialist at G2 in India. He is an engineer with a keen interest in data analytics and cybersecurity. He writes about topics related to them. You can find him reading books, learning a new language, or playing pool in his free time.

PCI Compliance Software

This list shows the top software that mention pci compliance most on G2.

VGS is the modern approach to data security. Its SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Trustwave Managed SIEM helps enterprises see through data noise easily, respond to emerging threats quickly, and cost-effectively maximize protection while proving compliance. Whether your challenge is choosing the right SIEM, fully staffing it, containing costs, or keeping up with new threats and compliance requirements, Trustwave can help.

Stripe offers solutions for web and mobile payments that are built for developers. Stripe provides a set of unified APIs and tools that instantly enable businesses to accept and manage online payments.

AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Clover replaces your cash register, payment terminal, receipt printer, and barcode scanner with an integrated suite of products. Accept credit cards, EMV and Apple Pay.

Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.

PCI Pal is a suite of solutions designed to help run your customer contact operations in adherence with the Payment Card Industry Data Security Standard (PCI DSS).

With BlueSnap, you finally get everything you need to process payments – a payment gateway solution, merchant account, and advanced features to boost your bottom line – all in one place.

Shopify is a cloud-based commerce platform designed for small and medium-sized businesses. Merchants can use the software to design, set up and manage their stores across multiple sales channels, including web, mobile, social media, brick-and-mortar locations, and pop-up shops.

Braintree's robust, multifaceted platform is ideal for subscription-based businesses wanting to set up recurring billing or accept repeat payments online.

It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.

Chargent payment processing for Salesforce. 100% native credit card/ACH payment processing on Opportunities, Cases, Chargent Orders, or Force.com sites.

EBizCharge payment gateway integrates with over 50 ERP, CRM, accounting, and eCommerce solutions, and is designed to: reduce processing costs by 15-40%, increase payment processing efficiency, eliminate double entry, reduce human error, improve security and simplify the customer experience. EBizCharge provides online and mobile credit card processing, unlimited transaction history, customizable reports, electronic invoicing, secure encryption and tokenization, and more.

LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats

REPAY (NASDAQ: RPAY) is a payment technology provider that offers card and ACH processing, Instant Funding, automated outbound accounts payable functions, and online bill payment systems with web, text, mobile app, and IVR capabilities. With REPAY’s integrated omni-channel payment solutions, customers can pay and get paid anytime, anywhere. Learn more: www.repay.com

The billing and monetization platform built for the AI economy.

Zuora provides a leading monetization platform to build, run and grow a modern business through a dynamic mix of usage-based models, subscription bundles and everything in between. From pricing and packaging, to billing, payments and revenue recognition, Zuora’s flexible, modular software solutions are designed to help companies evolve and scale monetization with demand. More than 1,000 customers around the world, including BMC Software, Box, Caterpillar, General Motors, The New York Times, Schneider Electric and Zoom use Zuora’s unique combination of technology and expertise to transform their financial operations and how they go to market. Zuora is headquartered in Silicon Valley with offices in the Americas, EMEA and APAC. To learn more, please visit zuora.com.

80% of today's data breaches are the result of lost, weak or stolen passwords. Every organization, regardless of size, must implement a secure identity and access management platform to protect their data, employees, networks and ensure business continuity. Passly is the multi-functional weapon that you need to fight back against cybercriminal intrusion. Passly strengthens your defenses by adding multiple secure identity and access management essentials, including two-factor authentication, single sign-on and password manager in one comprehensive, cost-effective solution.

Ostendio is a cloud-based cybersecurity and information management platform that delivers an easy to use, cost-effective way for companies to demonstrate information security compliance to multiple industry standards and regulations.

Incapsula is a cloud-based security and acceleration service that makes websites safer, faster, and more reliable.