Understanding the Fundamentals of Third-Party Risk Management (TPRM)
Introduction to TPRM As businesses continue to rely on third-party vendors for critical services, the need for a…
Requirements across security frameworks must evolve to account for new technology and safeguard against the latest threats. Serving as a baseline of technical and operational requirements designed to protect payment account data, the Payment Card Industry Data Security Standard (PCI DSS) is no exception since its initial release by the Payment Card Industry Security Standards Council (PCI SSC) in 2004. The core goal of PCI DSS is to protect cardholder data, supported by:
While this set of security standards is not enforced by a specific law, PCI DSS compliance is a contractual agreement made between merchants, service providers, card brands, and the banks that process payments. Merchants and service providers are required to implement, assess, and attest compliance across 12 core security requirements—each including a subset of more specific requirements. Banks and other payment processors are then responsible for verifying compliance, managing potential risks, and imposing fines.
The PCI SSC published v4.0 in March 2022 and has since released minor revisions in v4.0.1. From identifying compliance gaps, scoping risk assessments, to implementing a Customized Approach, LogicGate is your partner in PCI compliance.
If you’re already PCI DSS v3.2.1 compliant, you may be wondering how much effort it will take to become fully compliant with v4.0. The good news is, we’re about to tell you! Risk Cloud’s automated control gap analysis helps teams compare two different versions of the same framework to identify coverage gaps and prioritize corrective action.
When comparing requirements published by the Payment Card Industry Security Standards Council, we find that 13.9% of PCI DSS 4.0 requirements do not have a similar, existing control already implemented as part of version 3.2.1. This analysis is supported by control relationships defined by the Secure Controls Framework (SCF). Below you will find a summary of the most notable gaps to address:
Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know
Requirement 8: Identify Users and Authenticate Access to System Components
Requirement 9: Restrict Physical Access to Stored Cardholder Data
Requirement 12: Support Information Security with Organizational Policies and Programs
If you’re new to PCI DSS altogether, don’t worry! We’ve got you covered. Let’s use Risk Cloud’s automated control gap analysis to compare PCI DSS v4.0 to popular frameworks that your organization may already be compliant with so you can reduce redundant controls, effectively identify remaining gaps, and accelerate compliance.
SOC 2 is a voluntary framework designed to protect stored customer data through the core pillars of security, availability, processing integrity, confidentiality, and privacy. Many companies require vendors to demonstrate SOC 2 compliance as part of their core buying requirements. If you’re already SOC 2 compliant, your broader focus on data security and privacy will help minimize the investment needed to become PCI DSS compliant. Due to the niche focus of PCI DSS on protecting cardholder data and securing merchant technology, control gaps include but are not limited to:
Requirement 3: Protect Stored Account Data
Requirement 8: Identify Users and Authenticate Access to System Components
Requirement 12: Support Information Security with Organizational Policies and Programs
The NIST Cybersecurity Framework (NIST CSF) is a commonly adopted framework for managing cybersecurity risk. While NIST CSF and PCI DSS share the goal of enhancing data security, the specificity of payment systems and stored cardholder data within PCI DSS requirements leaves a 25.4% coverage gap when compared to NIST CSF outcomes.
If you’ve already implemented NIST CSF and would also like to become PCI DSS compliant, the most notable areas of attention will likely be:
Requirement 3: Protect Stored Account Data
Requirement 8: Identify Users and Authenticate Access to System Components
Requirement 9: Restrict Physical Access to Cardholder Data
Requirement 11: Test Security of Systems and Networks Regularly
If you’re exploring PCI DSS Compliance from the lens of existing ISO 27001 control coverage, unfortunately, there’s quite a bit of work left to be done. Here we see that only 25.7% of PCI DSS requirements map to a related ISO 27001 control, leaving a substantial gap of 74.3%.
Requirement 1: Install and Maintain Network Security Controls
Requirement 2: Apply Secure Configurations to All System Components
Requirement 3: Protect Stored Account Data
Requirement 5: Protect All Systems and Networks from Malicious Software
Requirement 6: Develop and Maintain Secure Systems and Software
Requirement 7: Restrict Access to System Components and Cardholder Data by Business Need to Know
Requirement 9: Restrict Physical Access to Cardholder Data
Requirement 10: Log and Monitor All Access to System Components and Cardholder Data
Requirement 11: Test Security of Systems and Networks Regularly
A key aspect of accelerating audit readiness is appropriately scoping PCI DSS risk assessments. Enterprise-grade organizations often spend months mapping out impacted business units and all related processes, assets, and risks before starting the assessment process. A manual approach to this scoping phase not only delays audit-readiness, but can easily lead to too many or too few assessments being launched. LogicGate customers have streamlined this process with Risk Cloud’s assessment scoping tool.
Let’s say you’re a multinational hospitality company with hundreds or thousands of properties. Risk Cloud can strategically limit the scope of your assessments to specific assets impacted by PCI DSS requirements in just a few clicks. Program leaders can simply select a facility and its systems to automatically select related controls. Once the in-scope items are confirmed, Risk Cloud automatically generates each individual assessment and assigns them to the appropriate control owners.
If your organization has a complex or unique compliance environment that cannot easily align with standard PCI DSS requirements, the Payment Card Industry Security Standards Council offers the option to instead demonstrate how your internal control set meets each required security objective as part of PCI DSS v4.0. Before working with a PCI Qualified Security Assessor (QSA) or Internal Security Assessor (ISA) to evaluate each custom control for adequacy and effectiveness, there are a few common challenges to you may need to address:
You’re likely well on your way to achieving PCI DSS compliance — if you haven’t already. If during that process you’ve spent time on manual workarounds and don’t have clear visibility into your compliance posture, let us know. Our team would be happy to show you how your peers are leveraging Risk Cloud to help automate their compliance programs, including PCI DSS.
Request a custom GRC software demo from one of our experts
Introduction to TPRM As businesses continue to rely on third-party vendors for critical services, the need for a…
Introduction to NIST CSF 2.0 The acronym NIST CSF has become synonymous with cybersecurity risk management since its…
In a time where data breaches and privacy concerns dominate headlines, Data Privacy Day serves as a call…