PCI DSS 3.0 changes
By Kishor Vaswani – CEO, ControlCase
Agenda
• About PCI DSS
• Overview of changes
• Changes by requirement number
• Implementation tips
• Q&A
1
About PCI DSS
What is PCI DSS?
Payment Card Industry Data Security Standard:
• Guidelines for securely processing, storing, or
transmitting payment card account data
• Established by leading payment card issuers
• Maintained by the PCI Security Standards Council
(PCI SSC)
2
PCI DSS Requirements
Control Objectives Requirements
Build and maintain a secure network 1. Install and maintain a firewall configuration to protect
cardholder data
2. Do not use vendor-supplied defaults for system passwords and
other security parameters
Protect cardholder data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public
networks
Maintain a vulnerability
management program
5. Use and regularly update anti-virus software on all systems
commonly affected by malware
6. Develop and maintain secure systems and applications
Implement strong access control
measures
7. Restrict access to cardholder data by business need-to-know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly monitor and test networks 10. Track and monitor all access to network resources and
cardholder data
11. Regularly test security systems and processes
Maintain an information security
policy
12. Maintain a policy that addresses information security
3
Timeline of PCI DSS 3.0
4
• The new PCI DSS 3.0 have been published
• Effective Jan 1st, 2014
• Can comply to PCI DSS 2.0 or 3.0 in 2014
• Must comply to PCI DSS 3.0 starting 2015
Overview of changes
Overview
5
Segmentation
• Adequacy of segmentation
• Penetration test
Third parties/Service providers
• Must validate PCI DSS compliance; OR
• Must participate is customers PCI DSS
compliance audit
Overview contd…
6
PCI DSS as Business as Usual
• Monitoring of security controls
• Review changes to environment
• Review changes to org structure
• Periodic review of controls vs. during audit
• Separation of duties (operational vs. security)
Physical protection of POS, ATM and Kiosks
• Maintain inventory
• Periodic inspection for tampering
• Train personnel
Changes by requirement number
Firewalls
• Network Diagram
› Must include cardholder data flows
› Must include clear boundary showing PCI DSS CDE scope
7
Configuration Standards
• Maintain an inventory of system components
› Business as usual function
› Inventory of hardware and software must be maintained
› Function of systems must be maintained
8
Protect Stored Cardholder Data
No significant changes
9
Protect Cardholder Data in Transmission
No significant changes
10
Antivirus
• Intent to prevent malware in addition to viruses
› Evaluate malware threats against systems EVEN if it is not a
system commonly affected by viruses/malicious software,
for e.g. AS/400
› Anti-virus should be running in an active mode AND
cannot be disabled by regular users without management
approval
11
Secure Applications
12
• Test applications for broken authentication and session
management flaws
• Renamed “Web Application Firewall” to “Automated Technical
Solution” to detect flaws
Access Control and User IDs
• Provides for flexibility is password controls
› Minimum of 7 characters
› Alphanumeric
› Alternatives are acceptable as long as objective is met
› Allows for alternative mechanisms such as tokens and
certificates
• Service Providers with access to customer
environments MUST ensure unique password per
customer
13
Physical Security
• Physical security access to “sensitive areas” must
be implemented for onsite personnel
› Data center
› Computer room
› Telecommunications room
• Protect physical devices such as POS
› Maintain a list
› Periodically inspect for tampering of device
› Train personnel to be aware of suspicious behavior
14
Logging and Monitoring
• Clarified what is meant by identification and
authentication logging
› Elevation of privileges must be logged
› Changes, addition or deletion to root or admin must be
logged
• Logging the audit logs
› Initialization of audit logs must be captured
› Stopping or pausing of audit logs must be captured
15
Vulnerability Management
• Maintain an inventory of authorized wireless
access points
• Penetration testing MUST validate segmentation
› Testing must be done to prove conclusively that a
compromise in non CDE network will not result in a breach
to the CDE network (if segmentation was implemented)
• Critical files must be compared at least weekly
AND an individual must evaluate and investigate
change to a critical files.
16
Policies and Procedures
• Third Party/Service provider requirements have
been enhanced
› Must maintain an inventory of which requirements are
dependent upon service provider
› Written acknowledgement required from service providers
attesting to PCI DSS requirements
› Third parties to provide PCI DSS certificate OR be willing to
be a part of customers PCI DSS audit
17
PCI DSS Requirements
18
Control Objectives Requirements
Build and maintain a secure network 1. Install and maintain a firewall configuration to protect
cardholder data
2. Do not use vendor-supplied defaults for system passwords and
other security parameters
Protect cardholder data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public
networks
Maintain a vulnerability
management program
5. Use and regularly update anti-virus software on all systems
commonly affected by malware
6. Develop and maintain secure systems and applications
Implement strong access control
measures
7. Restrict access to cardholder data by business need-to-know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly monitor and test networks 10. Track and monitor all access to network resources and
cardholder data
11. Regularly test security systems and processes
Maintain an information security
policy
12. Maintain a policy that addresses information security
Key Implementation Tips
Key Takeaways
• Revisit segmentation for adequacy
• Focus on third party compliance
• Identify GRC technology for business as usual
implementation
• Revisit penetration testing methodology
• Identify how to secure physical devices such as
POS, ATM and Kiosks
19
Available Documents
Following documents are available at
https://www.pcisecuritystandards.org/security_standards/documents.php
• PCI DSS ver 3.0
• PCI DSS Summary of Changes v2.0 to v3.0
• ROC reporting template for v3.0
• PCI DSS and PA DSS 3.0 Ver 3.0 change highlights
20
ControlCase Solutions
ControlCase PCI 3.0 transition package
21
PCI DSS 3.0 change assessment
Implement business as usual using ControlCase GRC
Third party PCI DSS data collection program
Review of penetration test methodology
To Learn More About PCI Compliance…
• Visit www.controlcase.com
• contact@controlcase.com
22
Thank You for Your Time

More Related Content

PPTX
Making Compliance Business as Usual
PPTX
PCI DSS & PA DSS Version 3.0
PPTX
Integrated Compliance
PPTX
PCI DSS Business as Usual
PPTX
Data Discovery and PCI DSS
PPTX
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PDF
PCI DSS Business as Usual
PPTX
ControlCase Data Discovery and PCI DSS
Making Compliance Business as Usual
PCI DSS & PA DSS Version 3.0
Integrated Compliance
PCI DSS Business as Usual
Data Discovery and PCI DSS
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PCI DSS Business as Usual
ControlCase Data Discovery and PCI DSS

What's hot (19)

PDF
PCI DSS and PA DSS Version 3.0 Changes
PPTX
Making PCI V3.0 Business as Usual (BAU)
PPTX
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PPTX
PCI Compliance in the Cloud
PPTX
PCI Compliance in the Cloud
PPTX
Continual Compliance Monitoring
PPTX
Log monitoring and file integrity monitoring
PPTX
PCI DSS and PA DSS Compliance
PPTX
Log Monitoring and File Integrity Monitoring
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
PCI Compliance in the Cloud
PPTX
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Integrated Compliance
PPTX
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
PDF
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PPTX
Card Data Discovery and PCI DSS
PPTX
PCI DSS Business as Usual (BAU)
PPTX
Data Discovery and PCI DSS
PCI DSS and PA DSS Version 3.0 Changes
Making PCI V3.0 Business as Usual (BAU)
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PCI Compliance in the Cloud
PCI Compliance in the Cloud
Continual Compliance Monitoring
Log monitoring and file integrity monitoring
PCI DSS and PA DSS Compliance
Log Monitoring and File Integrity Monitoring
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PCI Compliance in the Cloud
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Integrated Compliance
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Card Data Discovery and PCI DSS
PCI DSS Business as Usual (BAU)
Data Discovery and PCI DSS
Ad

Viewers also liked (17)

PPTX
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
PPTX
Health Insurance Portability and Accountability Act (HIPAA) Compliance
PDF
PCI DSS - Payment Card Industry Data Security Standard
PPT
PCI DSS
PDF
PCI DSS Essential Guide
PPTX
PCI DSS 2.0 Detailed Introduction
PPT
Using the PDCA model to improve cervical cancer
PDF
1. PCI Compliance Overview
PPTX
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PPTX
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
PPTX
Introduction to PCI DSS
PPTX
PCI DSS Simplified: What You Need to Know
PPTX
Iso 27001 2013 clause 6 - planning - by Software development company in india
PPTX
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
PDF
ISO 27001 Implementation_Documentation_Mandatory_List
PPTX
PCI Compliance in Cloud
DOCX
Iso 27001 2013 Standard Requirements
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Health Insurance Portability and Accountability Act (HIPAA) Compliance
PCI DSS - Payment Card Industry Data Security Standard
PCI DSS
PCI DSS Essential Guide
PCI DSS 2.0 Detailed Introduction
Using the PDCA model to improve cervical cancer
1. PCI Compliance Overview
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
Introduction to PCI DSS
PCI DSS Simplified: What You Need to Know
Iso 27001 2013 clause 6 - planning - by Software development company in india
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 Implementation_Documentation_Mandatory_List
PCI Compliance in Cloud
Iso 27001 2013 Standard Requirements
Ad

Similar to PCI DSS & PA DSS Version 3.0 Changes Webinar (20)

PPTX
PCI DSS and PA DSS
PPTX
PCI DSS 3.2 - Business as Usual
PPTX
PCI DSS Business as Usual
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI DSS and PA DSS
PPTX
PCI DSSand PA DSS
PPTX
PCI presentation
PPT
PCIs_Changing_Environment_-_What_You_Need_to_Know_&_Why_You_Need_To_Know_It..ppt
PDF
PCI DSS for Pentesting
PPTX
How to Achieve PCI Compliance with an Enterprise Job Scheduler
PPTX
PCI DSS v3.2 Implementation - Bliss or Nightmare
PPTX
PCI DSS for Penetration Testing
PPTX
Things to Keep in Mind Regarding PCI DSS Compliance
PDF
PCI Certification and remediation services
PPTX
PCI Compliance - Delving Deeper In The Standard
PPTX
PCI DSS Business as Usual
PPTX
Performing PCI DSS Assessments Using Zero Trust Principles
PDF
Pci dss-for-it-providers
PDF
PCI Compliance White Paper
PDF
Pci standards, from participation to implementation and review
PCI DSS and PA DSS
PCI DSS 3.2 - Business as Usual
PCI DSS Business as Usual
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS
PCI DSSand PA DSS
PCI presentation
PCIs_Changing_Environment_-_What_You_Need_to_Know_&_Why_You_Need_To_Know_It..ppt
PCI DSS for Pentesting
How to Achieve PCI Compliance with an Enterprise Job Scheduler
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS for Penetration Testing
Things to Keep in Mind Regarding PCI DSS Compliance
PCI Certification and remediation services
PCI Compliance - Delving Deeper In The Standard
PCI DSS Business as Usual
Performing PCI DSS Assessments Using Zero Trust Principles
Pci dss-for-it-providers
PCI Compliance White Paper
Pci standards, from participation to implementation and review

More from ControlCase (20)

PDF
Logging and Automated Alerting Webinar.pdf
PDF
Navigating Compliance for MSPs From First Audit to Monetization
PDF
Principes de base des tests d’intrusion Webinar
PDF
Penetration Testing Basics Webinar ControlCase
PDF
PCI PIN Basics Webinar from the Controlcase Team
PDF
Maintaining Data Privacy with Ashish Kirtikar
PDF
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PDF
ISO 27001 2002 Update Webinar.pdf
PPTX
Integrated Compliance Webinar.pptx
PDF
2022-Q2-Webinar-ISO_Spanish_Final.pdf
PDF
French PCI DSS v4.0 Webinaire.pdf
PDF
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
PPTX
Webinar-MSP+ Cyber Insurance Fina.pptx
PDF
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
PDF
Webinar-Spanish-PCI DSS-4.0.pdf
PDF
2022 Webinar - ISO 27001 Certification.pdf
PPTX
PCI DSS 4.0 Webinar Final.pptx
PPTX
Webinar - CMMC Certification.pptx
PPTX
HITRUST Certification
PPTX
CMMC Certification
Logging and Automated Alerting Webinar.pdf
Navigating Compliance for MSPs From First Audit to Monetization
Principes de base des tests d’intrusion Webinar
Penetration Testing Basics Webinar ControlCase
PCI PIN Basics Webinar from the Controlcase Team
Maintaining Data Privacy with Ashish Kirtikar
PCI DSS v4 - ControlCase Update Webinar Final.pdf
ISO 27001 2002 Update Webinar.pdf
Integrated Compliance Webinar.pptx
2022-Q2-Webinar-ISO_Spanish_Final.pdf
French PCI DSS v4.0 Webinaire.pdf
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
Webinar-MSP+ Cyber Insurance Fina.pptx
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
Webinar-Spanish-PCI DSS-4.0.pdf
2022 Webinar - ISO 27001 Certification.pdf
PCI DSS 4.0 Webinar Final.pptx
Webinar - CMMC Certification.pptx
HITRUST Certification
CMMC Certification

Recently uploaded (20)

PDF
Human Appeal in Gaza – Emergency Aid, Healthcare & Hope for Families.pdf
PPTX
Beige and Black Vintage Floral Border Project Presentation_20250818_091954_00...
PPTX
Lipulekh Pass Despite Nepal’s Objection.pptx
PPTX
15 Years of Fraud The Shocking Case of CA Impersonation.pptx
PPTX
Understanding The Architecture of Erasure Narcissists and the Power of Incons...
PPTX
Vietnam’s Ambassador Cruise II Takes Out Two National Records.
PPTX
Bruce Green and Muhammad Yoefikar.pptx new 2025
PDF
How India’s First AI-Powered Anganwadi in Nagpur is Changing Education – As F...
PPTX
POLY[1]....pptxtheiowqt4h3ioth4iofhe2toh42i0fhe2io3
PPTX
Syrian ongoing Civil War it's origi s and effects.pptx
PPTX
The Changing World Order-From G7 Dominance to BRICS Emergence.pptx
PPTX
History Of India.and its significats to the worldpptx
PPTX
INTRODUCTION TO WORLD RELIGION WEEK 1 Quarter 1
PPTX
Starlink to Use Aadhaar for Customer Verification in India.pptx
PDF
Opher Bryer-The Rise and Fall of Opher Bryer How an AI Startup Turned from Pr...
DOC
购买SFSU毕业证学历认证,德克萨斯大学阿灵顿分校毕业证成绩单、
DOC
了解UVM毕业证学历认证,迪拉徳大学毕业证仿制文凭证书
PDF
19082025_First India Newspaper Jaipur.pdf
PPTX
Elias Salame Uses Fake Trades to Make Real Money Disappear.pptx
PDF
Lipulekh Pass Despite Nepal’s Objection.pdf
Human Appeal in Gaza – Emergency Aid, Healthcare & Hope for Families.pdf
Beige and Black Vintage Floral Border Project Presentation_20250818_091954_00...
Lipulekh Pass Despite Nepal’s Objection.pptx
15 Years of Fraud The Shocking Case of CA Impersonation.pptx
Understanding The Architecture of Erasure Narcissists and the Power of Incons...
Vietnam’s Ambassador Cruise II Takes Out Two National Records.
Bruce Green and Muhammad Yoefikar.pptx new 2025
How India’s First AI-Powered Anganwadi in Nagpur is Changing Education – As F...
POLY[1]....pptxtheiowqt4h3ioth4iofhe2toh42i0fhe2io3
Syrian ongoing Civil War it's origi s and effects.pptx
The Changing World Order-From G7 Dominance to BRICS Emergence.pptx
History Of India.and its significats to the worldpptx
INTRODUCTION TO WORLD RELIGION WEEK 1 Quarter 1
Starlink to Use Aadhaar for Customer Verification in India.pptx
Opher Bryer-The Rise and Fall of Opher Bryer How an AI Startup Turned from Pr...
购买SFSU毕业证学历认证,德克萨斯大学阿灵顿分校毕业证成绩单、
了解UVM毕业证学历认证,迪拉徳大学毕业证仿制文凭证书
19082025_First India Newspaper Jaipur.pdf
Elias Salame Uses Fake Trades to Make Real Money Disappear.pptx
Lipulekh Pass Despite Nepal’s Objection.pdf

PCI DSS & PA DSS Version 3.0 Changes Webinar

  • 1. PCI DSS 3.0 changes By Kishor Vaswani – CEO, ControlCase
  • 2. Agenda • About PCI DSS • Overview of changes • Changes by requirement number • Implementation tips • Q&A 1
  • 4. What is PCI DSS? Payment Card Industry Data Security Standard: • Guidelines for securely processing, storing, or transmitting payment card account data • Established by leading payment card issuers • Maintained by the PCI Security Standards Council (PCI SSC) 2
  • 5. PCI DSS Requirements Control Objectives Requirements Build and maintain a secure network 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect cardholder data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a vulnerability management program 5. Use and regularly update anti-virus software on all systems commonly affected by malware 6. Develop and maintain secure systems and applications Implement strong access control measures 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly monitor and test networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an information security policy 12. Maintain a policy that addresses information security 3
  • 6. Timeline of PCI DSS 3.0 4 • The new PCI DSS 3.0 have been published • Effective Jan 1st, 2014 • Can comply to PCI DSS 2.0 or 3.0 in 2014 • Must comply to PCI DSS 3.0 starting 2015
  • 8. Overview 5 Segmentation • Adequacy of segmentation • Penetration test Third parties/Service providers • Must validate PCI DSS compliance; OR • Must participate is customers PCI DSS compliance audit
  • 9. Overview contd… 6 PCI DSS as Business as Usual • Monitoring of security controls • Review changes to environment • Review changes to org structure • Periodic review of controls vs. during audit • Separation of duties (operational vs. security) Physical protection of POS, ATM and Kiosks • Maintain inventory • Periodic inspection for tampering • Train personnel
  • 11. Firewalls • Network Diagram › Must include cardholder data flows › Must include clear boundary showing PCI DSS CDE scope 7
  • 12. Configuration Standards • Maintain an inventory of system components › Business as usual function › Inventory of hardware and software must be maintained › Function of systems must be maintained 8
  • 13. Protect Stored Cardholder Data No significant changes 9
  • 14. Protect Cardholder Data in Transmission No significant changes 10
  • 15. Antivirus • Intent to prevent malware in addition to viruses › Evaluate malware threats against systems EVEN if it is not a system commonly affected by viruses/malicious software, for e.g. AS/400 › Anti-virus should be running in an active mode AND cannot be disabled by regular users without management approval 11
  • 16. Secure Applications 12 • Test applications for broken authentication and session management flaws • Renamed “Web Application Firewall” to “Automated Technical Solution” to detect flaws
  • 17. Access Control and User IDs • Provides for flexibility is password controls › Minimum of 7 characters › Alphanumeric › Alternatives are acceptable as long as objective is met › Allows for alternative mechanisms such as tokens and certificates • Service Providers with access to customer environments MUST ensure unique password per customer 13
  • 18. Physical Security • Physical security access to “sensitive areas” must be implemented for onsite personnel › Data center › Computer room › Telecommunications room • Protect physical devices such as POS › Maintain a list › Periodically inspect for tampering of device › Train personnel to be aware of suspicious behavior 14
  • 19. Logging and Monitoring • Clarified what is meant by identification and authentication logging › Elevation of privileges must be logged › Changes, addition or deletion to root or admin must be logged • Logging the audit logs › Initialization of audit logs must be captured › Stopping or pausing of audit logs must be captured 15
  • 20. Vulnerability Management • Maintain an inventory of authorized wireless access points • Penetration testing MUST validate segmentation › Testing must be done to prove conclusively that a compromise in non CDE network will not result in a breach to the CDE network (if segmentation was implemented) • Critical files must be compared at least weekly AND an individual must evaluate and investigate change to a critical files. 16
  • 21. Policies and Procedures • Third Party/Service provider requirements have been enhanced › Must maintain an inventory of which requirements are dependent upon service provider › Written acknowledgement required from service providers attesting to PCI DSS requirements › Third parties to provide PCI DSS certificate OR be willing to be a part of customers PCI DSS audit 17
  • 22. PCI DSS Requirements 18 Control Objectives Requirements Build and maintain a secure network 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect cardholder data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a vulnerability management program 5. Use and regularly update anti-virus software on all systems commonly affected by malware 6. Develop and maintain secure systems and applications Implement strong access control measures 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly monitor and test networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an information security policy 12. Maintain a policy that addresses information security
  • 24. Key Takeaways • Revisit segmentation for adequacy • Focus on third party compliance • Identify GRC technology for business as usual implementation • Revisit penetration testing methodology • Identify how to secure physical devices such as POS, ATM and Kiosks 19
  • 25. Available Documents Following documents are available at https://www.pcisecuritystandards.org/security_standards/documents.php • PCI DSS ver 3.0 • PCI DSS Summary of Changes v2.0 to v3.0 • ROC reporting template for v3.0 • PCI DSS and PA DSS 3.0 Ver 3.0 change highlights 20
  • 27. ControlCase PCI 3.0 transition package 21 PCI DSS 3.0 change assessment Implement business as usual using ControlCase GRC Third party PCI DSS data collection program Review of penetration test methodology
  • 28. To Learn More About PCI Compliance… • Visit www.controlcase.com • contact@controlcase.com 22
  • 29. Thank You for Your Time