why pci dss 3.0?pdqpos.com/wp-content/uploads/2015/06/pcidss_3-0_infographic.pdf · pci dss...

1
Either because of lack of education or policy enforcement, employees leave the door open for attacks by picking weak passwords, clicking on phishing links, or sharing company information on social and public platforms. Employees directly involved in the payment chain—like cashiers, waiters, and bank tellers—often are most often responsible for internal breaches. By increasing awareness and education across organizations, we can help drive payment security as good business practice. What’s New? Best practices for implementing security into business-as-usual activities to maintain on-going PCI DSS compliance Navigating the PCI DSS guidance added for easier understanding of each requirement and security goal Req. 8.4 – Password education for users Req. 9.9 – POS security training and education For more on what’s new, go to PCISSC.org Following PCI DSS is not only good for business, 9 10 out of security professionals recommend it for payment security. Sources • Maintaining PCI Compliance: Assess the Impact of Changes in Business, Technology, and PCI DSS, Anton Chuvakin, Gartner Research • Verizon 2011 Payment Card Industry Compliance Report • Trustwave 2013 Global Security Report • Verizon 2013 Data Breach Investigation Report • Trustwave 2013 Global Security Report • Trustwave 2013 Global Security Report • Real Cost of Security Report (group size: 451) To stay competitive in terms of security and compliance, organizations need a structured, predictable, and continuous approach to solving ongoing challenges that’s easy enough to do every day. By raising security standards and making PCI DSS compliance the status quo, organizations can monitor the effectiveness of their security controls and maintain their PCI DSS compliant environment. 1. Increased Education and Awareness For more information on how to make sure your company is aware of its PCI DSS responsibilities, go to PCISSC.org Why PCI DSS 3.0? PCI DSS 3.0: What You Need to Know What’s New? • Guidance on outsourcing PCI DSS responsibilities • Req. 12.9 – PCI DSS responsibilities for service providers For more on what’s new, go to PCISSC.org 3. Security as a Shared Responsibility Organizations can implement the password strength that is appropriate for their security strategy. Greater ¾e[ibility recognizes there is more than one way to do security, allowing organizations to choose the approach that works best for their business. What’s New? • Req. 8.2.3 – Allows for organizations to implement the password strength that is appropriate for its security strategy • Req. 10. – More ¾e[ibility to prioritize log reviews based on organization’s risk management strategy For more on what’s new, go to PCISSC.org PCI DSS 3.0 helps organizations focus on security, not compliance, by making payment security business-as-usual. How? • 63 percent of investigations identifying a security de½ciency easily e[ploited by hackers revealed a third party responsible for system support, development, or maintenance. Many businesses are adopting an outsourced, third-party IT operations model, but this can be a security risk. • As industry leaders, we need to work together to manage risks and keep information secure. In-house Single Point Multiple Points 63% 3 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 63 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3% % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % 6 63 3% % p://NOTyourbank.com/yourbank.com ourbank.com/yourbank.com //NOTyourb p: :/ JSMITH2 1234 JSMIT LOGIN: LOGIN: PASSWORD: PASSWORD: LO LO LO k.com/yourbank.com 1234 1 ASSWORD: SSWORD PAS ASSWORD: ASSWORD: PAS PAS Security DON’Ts Be careless with clients’ payment methods/data Use weak passwords Fall for phishing scams Outsourced Potential Payment Processing Failure Points 2. Greater Flexibility

Upload: others

Post on 07-Oct-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Why PCI DSS 3.0?pdqpos.com/wp-content/uploads/2015/06/PCIDSS_3-0_InfoGraphic.pdf · PCI DSS compliance • Navigating the PCI DSS guidance added for easier understanding of each requirement

• Either because of lack of education or policy enforcement, employees leave the door open for attacks by picking weak passwords, clicking on phishing links, or sharing company information on social and public platforms.

• Employees directly involved in the payment chain—like cashiers, waiters, and bank tellers—often are most often responsible for internal breaches.

• By increasing awareness and education across organizations, we can help drive payment security as good business practice.

What’s New?• Best practices for implementing security into business-as-usual activities to maintain on-going PCI DSS compliance

• Navigating the PCI DSS guidance added for easier understanding of each requirement and security goal

• Req. 8.4 – Password education for users

• Req. 9.9 – POS security training and education

For more on what’s new, go to PCISSC.org

Following PCI DSS is not only good for business,

9 10 out of

security professionals recommend it for payment security.

Sources • Maintaining PCI Compliance: Assess the Impact of Changes in Business, Technology, and PCI DSS, Anton Chuvakin, Gartner Research • Verizon 2011 Payment Card Industry Compliance Report • Trustwave 2013 Global Security Report • Verizon 2013 Data Breach Investigation Report • Trustwave 2013 Global Security Report • Trustwave 2013 Global Security Report • Real Cost of Security Report (group size: 451)

To stay competitive in terms of security and compliance, organizations need a structured, predictable, and continuous approach to solving ongoing challenges that’s easy enough to do every day. By raising security standards and making PCI DSS compliance the status quo, organizations can monitor the effectiveness of their security controls and maintain their PCI DSS compliant environment.

1. Increased Education and Awareness

For more information on how to make sure your company is aware of its PCI DSS responsibilities, go to PCISSC.org

Why PCI DSS 3.0?

PCI DSS 3.0: What You Need to Know

What’s New?• Guidance on outsourcing PCI DSS responsibilities

• Req. 12.9 – PCI DSS responsibilities for service providers

For more on what’s new, go to PCISSC.org

3. Security as a Shared Responsibility

• Organizations can implement the password strength that is appropriate for their security strategy.

• Greater e ibility recognizes there is more than one way to do security, allowing organizations to choose the approach that works best for their business.

What’s New?• Req. 8.2.3 – Allows for organizations to implement the password strength that is appropriate for its security strategy

• Req. 10. – More e ibility to prioritize log reviews based on organization’s risk management strategy

For more on what’s new, go to PCISSC.org

PCI DSS 3.0 helps organizations focus on security, not compliance, by

making payment security business-as-usual. How?

• 63 percent of investigations identifying a security de ciency easily e ploited by hackers revealed a third party responsible for system support, development, or maintenance.

• Many businesses are adopting an outsourced, third-party IT operations model, but this can be a security risk.

• As industry leaders, we need to work together to manage risks and keep information secure.

In-houseSingle Point Multiple Points

63%

3

666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666663333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%6633%%

p://NOTyourbank.com/yourbank.comourbank.com/yourbank.com//NOTyourbp::/JSMITH2

1234

JSMITLOGIN:LOGIN:

PASSWORD:PASSWORD:

LOLOLO

k.com/yourbank.com

12341ASSWORD:SSWORDPASASSWORD:ASSWORD:PASPAS

Security DON’Ts

Be careless with clients’ payment methods/data

Use weak passwords

Fall for phishing

scams

Outsourced

Potential Payment Processing Failure Points

2. Greater Flexibility