PCI DSS do not become the Weakest link
By David Ricketts Head of Marketing C24



All merchants and service providers who store, process and transmit credit card information
must comply with PCI DSS which was developed as part of a collaboration by MasterCard
Worldwide, Visa International, American Express, Discover Financial Services and JCB. The
standard serves as directive and guideline to help organisations prevent the misuse of credit
card data. To comply retailers must undergo quarterly self-assessments as well as audits
(vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS
Scanning Procedures.


Large merchants (i.e. more than 6 million transactions per year for all outlets including e-
commerce) and service providers (i.e. more than 1 million transactions per year) must also
undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The
audit is inclusive of all systems, applications and technical measures, as well as policies and
procedures used in the storing, processing and transmission of cardholder and credit card
information.


What Is Considered Sensitive Data
Per the standard, the following information is considered sensitive:


         Primary Account Number (PAN)
         Cardholder name
         Service code
         Expiration date
         Pin Verification Value (PVV)
         Security code (3 or 4 digit)


In accordance with the standard, merchants or service providers are not allowed to store the
PVV or the security code that uniquely identifies the piece of plastic in the cardholder’s


                                                                                                  1
C24 David Ricketts PCI DSS
possession at the time of the transaction. However, the PAN, cardholder name, service code and
expiration date may be stored.


PCI Compliance Is More Than Just Securing Cardholder Information Within Databases
Many organisations naturally focus efforts for protecting cardholder information within
databases, a challenge for which technical solutions abound. However, as breaches like
Citigroup’s1 and Pfizer’s have shown, enterprises also face challenges controlling access to and
dissemination of spreadsheets and documents that contain cardholder information. Exporting
sensitive cardholder data out of databases is all too common, often done so that the
information may be analysed as part of market research or be imported into other applications.
In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course
according to Ventana Research2, and these figures don’t include the individual users who
conduct such exports on their own for business analytics or other purposes.


In the case of PCI, it is important to protect not only databases, but also file shares and
SharePoint sites that house these spreadsheets and documents. Organisations need to
implement a comprehensive system for not only finding the PCI information that resides outside
of databases, but also for authorization, access control and auditing of all unstructured & semi-
structured data stores. When file shares contain any of the PCI-designated sensitive information,
organisations need to audit, review, and tighten up access to these shared networked resources
as part of their PCI compliance efforts.


What Are The Costs/Risks Of Non-Compliance
Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per
incident may vary by merchant size, they include:


         Loss of income from fraudulent transaction

1
 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer-
Data-Leaked-on-LimeWire/

2
  Organisations Struggle To Manage Customer Data As Information Assets (2007):
http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to-
managecustomer-data-as-information-assets/?cs=22600


                                                                                                            2
C24 David Ricketts PCI DSS
      Cost to reissue cards
         Costs of investigation and possible litigation
         Possible fines imposed by credit card companies
         Loss of reputation, customer confidence and business
         Possible loss of ability to accept credit cards for payment


PCI Compliance the Easy Way
There are five principles organisations need to address when seeking to comply with PCI DSS:


         Continual identification of relevant data
         A process to identify and revoke unwarranted access
         A process to configure and review logical access controls
         Proper separation of duties
         Evidence that these processes are being followed


Logical access control objectives are based on the principal of least privilege; access should be
granted to only those resources that are required to perform a user’s function. Many audit
regulations now focus on proper access and use of unstructured data on file systems and
SharePoint servers.


It stands to reason that wherever the organisation has permissions to write or read data, a data
owner, or steward, should be designated to make decisions about who gets access, acceptable
use, etc. Otherwise, decisions about that data are left up to members of IT, who have little
organisational context about the data they are trying to manage and protect.
In order to identify an owner/steward, IT needs to know who is making use of data—analysing
data usage over time provides actionable business intelligence on the probable data owner of
any folder. Using these statistics, administrators can quickly see the most active users of a data
container. Often, one of the active users is the data owner. If none of the active users is the
business owner, he or she will likely work for the data owner, or at least know who the data
owner is likely to be.




                                                                                                    3
C24 David Ricketts PCI DSS
Data Owners/stewards need to be automatically involved in the authorisation workflows and
reviews for their data. Automation should enable users to request access to data, route the
requests to the data owner and other appropriate parties, execute the appropriate actions, and
track each requests. Entitlement reviews, or attestations, should also be similarly automated
and auditable.


While this may all seem an insurmountable task, software solutions are available to find PCI
data, aggregate user and group information, permissions information, access information, and
content information (which files actually contain PCI data) from directories and file servers.
Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine
rightful access based on business need. Using this intelligence, organisations can then:


         Continually scan for PCI data (the audit trail enables true incremental scanning for only
          changed or modified files)
         Protect data by removing overly permissive access controls
         Ensure on-going compliance with automated entitlement reviews, and authorization
          workflows
         Restrict unstructured data access to those with a business need for that data
         Automatically update access controls to account for changes in roles and file server
          contents
         Track and monitor file touches for each and every user
         Alert on behavioural deviations that may signal a possible data breach


Securing your customers sensitive information is not only important for PCI DSS compliance it is
also good business sense, as a breach doesn’t just affect the person whose account has been
emptied— it will affect your reputation and your partners if the violation is traced to doing
business with you. Compliance is important, for every one in the chain, and it is easier than
many people realize to not be the weakest link.


If you require further information about PCI or solution from C24 please visit www.c24.co.uk




                                                                                                 4
C24 David Ricketts PCI DSS

More Related Content

PPTX
PCI DSS Slidecast
PDF
Tripwire pci basics_wp
PDF
BigID Datasheet: CCPA Data Rights Automation
PDF
Tokenization: What's Next After PCI?
 
DOCX
6 ways reduce pci dss audit scope tokenizing cardholder data
PDF
Pci dss v3-2-1
PDF
BigID DataSheet: Data Access Intelligence
PDF
BigID Data Sheet HIPAA Data Security & Privacy
PCI DSS Slidecast
Tripwire pci basics_wp
BigID Datasheet: CCPA Data Rights Automation
Tokenization: What's Next After PCI?
 
6 ways reduce pci dss audit scope tokenizing cardholder data
Pci dss v3-2-1
BigID DataSheet: Data Access Intelligence
BigID Data Sheet HIPAA Data Security & Privacy

What's hot (18)

PDF
BigID Enterprise Privacy Management Data Sheet
PDF
BigID Virtual MDM Data Sheet
PDF
Pcidss qr gv3_1
PDF
Pcidss
PDF
BigID Data Sheet: LGPD Compliance Automated
PPT
PCI DSS Certification
PDF
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
DOCX
Online_Transactions_PCI
PDF
BigID GDPR RoPA / Article 30 Automation Data Sheet
PDF
BigID Data sheet: Consent Governance & Orchestration
PDF
BigID Data Sheet: Smart Data Labeling and Tagging
PDF
BigID Data Inventory & Data Mapping Data Sheet
PDF
BigID Data Sheet: GDPR Compliance
PDF
BigID GDPR Privacy Automation Data Sheet
PDF
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
PDF
Pci dss scoping and segmentation with links converted-converted
PDF
Reduce PCI Scope - Maximise Conversion - Whitepaper
PPT
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
BigID Enterprise Privacy Management Data Sheet
BigID Virtual MDM Data Sheet
Pcidss qr gv3_1
Pcidss
BigID Data Sheet: LGPD Compliance Automated
PCI DSS Certification
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Online_Transactions_PCI
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID Data sheet: Consent Governance & Orchestration
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Sheet: GDPR Compliance
BigID GDPR Privacy Automation Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
Pci dss scoping and segmentation with links converted-converted
Reduce PCI Scope - Maximise Conversion - Whitepaper
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Ad

Viewers also liked (6)

PDF
C24 10 good reasons insert
PDF
Gazeta Kardec Ponto Com - Abril 2016
PPTX
Creative commons i t
PDF
Evolving trend of drug delivery system
PPS
Haiti 2010 - 2
PDF
C24 Top 12 tips
C24 10 good reasons insert
Gazeta Kardec Ponto Com - Abril 2016
Creative commons i t
Evolving trend of drug delivery system
Haiti 2010 - 2
C24 Top 12 tips
Ad

Similar to PCI Article C24 (20)

PDF
PCI DSS Implementation: A Five Step Guide
PDF
PCI Certification and remediation services
PDF
Pci ssc quick reference guide
PDF
PCI-DSS for IDRBT
PDF
Quick Reference Guide to the PCI Data Security Standard
PDF
Verizon 2014 pci compliance report
PDF
Verizon 2014 PCI Compliance Report
DOCX
PCI DSS 6 Key Objectives You Must Know for Compliance.docx
PDF
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
PPT
pci-comp pci requirements and controls.ppt
PDF
5 Challenges to Continuous PCI DSS Compliance
PPT
eCommerce Summit Atlanta Mountain Media
PDF
Payment card industry data security standard 1
PDF
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PDF
PCI_Presentation_OASIS
DOCX
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
DOC
Log Management for PCI Compliance [OLD]
PDF
PCI Compliance Report
PPTX
Payment card industry data security standard
PPTX
Evolving regulations are changing the way we think about tools and technology
PCI DSS Implementation: A Five Step Guide
PCI Certification and remediation services
Pci ssc quick reference guide
PCI-DSS for IDRBT
Quick Reference Guide to the PCI Data Security Standard
Verizon 2014 pci compliance report
Verizon 2014 PCI Compliance Report
PCI DSS 6 Key Objectives You Must Know for Compliance.docx
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
pci-comp pci requirements and controls.ppt
5 Challenges to Continuous PCI DSS Compliance
eCommerce Summit Atlanta Mountain Media
Payment card industry data security standard 1
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PCI_Presentation_OASIS
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
Log Management for PCI Compliance [OLD]
PCI Compliance Report
Payment card industry data security standard
Evolving regulations are changing the way we think about tools and technology

More from David Ricketts (19)

PDF
C24 Arthur Terry Case Study 365
PDF
C24 bi datasheet leading in the legal sector with big data
PDF
C24 wright hassall casestudy a4 3pp
PDF
Briefing - April 2016
PDF
C24 Arthur Terry case study Office 365
PDF
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
PDF
Columbus-7-Reasons-ERP-Cloud-A4
PDF
threeW aquired document
PDF
C24 Tinsdills Case Study
PDF
Bi brochure v3
PDF
Bi24 brochure
PDF
Datasheet varonis solutions overview - c24
PDF
Shoe Zone
PDF
C24 Sandbox Insert
PDF
Origin Enterprises
PDF
MPA Financial
PDF
MHA Care Homes
PDF
Arthur Terry School
PDF
C24 company overview brochure lowres
C24 Arthur Terry Case Study 365
C24 bi datasheet leading in the legal sector with big data
C24 wright hassall casestudy a4 3pp
Briefing - April 2016
C24 Arthur Terry case study Office 365
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Columbus-7-Reasons-ERP-Cloud-A4
threeW aquired document
C24 Tinsdills Case Study
Bi brochure v3
Bi24 brochure
Datasheet varonis solutions overview - c24
Shoe Zone
C24 Sandbox Insert
Origin Enterprises
MPA Financial
MHA Care Homes
Arthur Terry School
C24 company overview brochure lowres

Recently uploaded (20)

PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PDF
Kishore Vora - Best CFO in India to watch in 2025.pdf
DOCX
ola and uber project work (Recovered).docx
PDF
Challenges of Managing International Schools (www.kiu. ac.ug)
PDF
Value-based IP Management at Siemens: A Cross-Divisional Analysis
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PDF
Handouts for Housekeeping.pdfhsjsnvvbdjsnwb
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PDF
Comments on Clouds that Assimilate Parts I&II.pdf
PPTX
basic introduction to research chapter 1.pptx
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PPTX
003 seven PARTS OF SPEECH english subject.pptx
PDF
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
PPTX
Market and Demand Analysis.pptx for Management students
PDF
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPT
Retail Management and Retail Markets and Concepts
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
DOCX
Hand book of Entrepreneurship 4 Chapters.docx
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
Kishore Vora - Best CFO in India to watch in 2025.pdf
ola and uber project work (Recovered).docx
Challenges of Managing International Schools (www.kiu. ac.ug)
Value-based IP Management at Siemens: A Cross-Divisional Analysis
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
Handouts for Housekeeping.pdfhsjsnvvbdjsnwb
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
Comments on Clouds that Assimilate Parts I&II.pdf
basic introduction to research chapter 1.pptx
533158074-Saudi-Arabia-Companies-List-Contact.pdf
003 seven PARTS OF SPEECH english subject.pptx
Stacey L Stevens - Canada's Most Influential Women Lawyers Revolutionizing Th...
Market and Demand Analysis.pptx for Management students
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
CTG - Business Update 2Q2025 & 6M2025.pptx
Retail Management and Retail Markets and Concepts
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
Hand book of Entrepreneurship 4 Chapters.docx

PCI Article C24

  • 1. PCI DSS do not become the Weakest link By David Ricketts Head of Marketing C24 All merchants and service providers who store, process and transmit credit card information must comply with PCI DSS which was developed as part of a collaboration by MasterCard Worldwide, Visa International, American Express, Discover Financial Services and JCB. The standard serves as directive and guideline to help organisations prevent the misuse of credit card data. To comply retailers must undergo quarterly self-assessments as well as audits (vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS Scanning Procedures. Large merchants (i.e. more than 6 million transactions per year for all outlets including e- commerce) and service providers (i.e. more than 1 million transactions per year) must also undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The audit is inclusive of all systems, applications and technical measures, as well as policies and procedures used in the storing, processing and transmission of cardholder and credit card information. What Is Considered Sensitive Data Per the standard, the following information is considered sensitive:  Primary Account Number (PAN)  Cardholder name  Service code  Expiration date  Pin Verification Value (PVV)  Security code (3 or 4 digit) In accordance with the standard, merchants or service providers are not allowed to store the PVV or the security code that uniquely identifies the piece of plastic in the cardholder’s 1 C24 David Ricketts PCI DSS
  • 2. possession at the time of the transaction. However, the PAN, cardholder name, service code and expiration date may be stored. PCI Compliance Is More Than Just Securing Cardholder Information Within Databases Many organisations naturally focus efforts for protecting cardholder information within databases, a challenge for which technical solutions abound. However, as breaches like Citigroup’s1 and Pfizer’s have shown, enterprises also face challenges controlling access to and dissemination of spreadsheets and documents that contain cardholder information. Exporting sensitive cardholder data out of databases is all too common, often done so that the information may be analysed as part of market research or be imported into other applications. In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course according to Ventana Research2, and these figures don’t include the individual users who conduct such exports on their own for business analytics or other purposes. In the case of PCI, it is important to protect not only databases, but also file shares and SharePoint sites that house these spreadsheets and documents. Organisations need to implement a comprehensive system for not only finding the PCI information that resides outside of databases, but also for authorization, access control and auditing of all unstructured & semi- structured data stores. When file shares contain any of the PCI-designated sensitive information, organisations need to audit, review, and tighten up access to these shared networked resources as part of their PCI compliance efforts. What Are The Costs/Risks Of Non-Compliance Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per incident may vary by merchant size, they include:  Loss of income from fraudulent transaction 1 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer- Data-Leaked-on-LimeWire/ 2 Organisations Struggle To Manage Customer Data As Information Assets (2007): http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to- managecustomer-data-as-information-assets/?cs=22600 2 C24 David Ricketts PCI DSS
  • 3. Cost to reissue cards  Costs of investigation and possible litigation  Possible fines imposed by credit card companies  Loss of reputation, customer confidence and business  Possible loss of ability to accept credit cards for payment PCI Compliance the Easy Way There are five principles organisations need to address when seeking to comply with PCI DSS:  Continual identification of relevant data  A process to identify and revoke unwarranted access  A process to configure and review logical access controls  Proper separation of duties  Evidence that these processes are being followed Logical access control objectives are based on the principal of least privilege; access should be granted to only those resources that are required to perform a user’s function. Many audit regulations now focus on proper access and use of unstructured data on file systems and SharePoint servers. It stands to reason that wherever the organisation has permissions to write or read data, a data owner, or steward, should be designated to make decisions about who gets access, acceptable use, etc. Otherwise, decisions about that data are left up to members of IT, who have little organisational context about the data they are trying to manage and protect. In order to identify an owner/steward, IT needs to know who is making use of data—analysing data usage over time provides actionable business intelligence on the probable data owner of any folder. Using these statistics, administrators can quickly see the most active users of a data container. Often, one of the active users is the data owner. If none of the active users is the business owner, he or she will likely work for the data owner, or at least know who the data owner is likely to be. 3 C24 David Ricketts PCI DSS
  • 4. Data Owners/stewards need to be automatically involved in the authorisation workflows and reviews for their data. Automation should enable users to request access to data, route the requests to the data owner and other appropriate parties, execute the appropriate actions, and track each requests. Entitlement reviews, or attestations, should also be similarly automated and auditable. While this may all seem an insurmountable task, software solutions are available to find PCI data, aggregate user and group information, permissions information, access information, and content information (which files actually contain PCI data) from directories and file servers. Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine rightful access based on business need. Using this intelligence, organisations can then:  Continually scan for PCI data (the audit trail enables true incremental scanning for only changed or modified files)  Protect data by removing overly permissive access controls  Ensure on-going compliance with automated entitlement reviews, and authorization workflows  Restrict unstructured data access to those with a business need for that data  Automatically update access controls to account for changes in roles and file server contents  Track and monitor file touches for each and every user  Alert on behavioural deviations that may signal a possible data breach Securing your customers sensitive information is not only important for PCI DSS compliance it is also good business sense, as a breach doesn’t just affect the person whose account has been emptied— it will affect your reputation and your partners if the violation is traced to doing business with you. Compliance is important, for every one in the chain, and it is easier than many people realize to not be the weakest link. If you require further information about PCI or solution from C24 please visit www.c24.co.uk 4 C24 David Ricketts PCI DSS