Blogg

How PCI QSAs Contribute to Safer Cloud Services

aug 30, 2020

3 min

cartoon of hand checking of requirements on a piece of paper

Can We Combine High Security with Easy Data Access?

Being hacked and having sensitive data exposed is many organisations’ worst nightmare. At the same time, today’s society demands constant data access. Can we have both, high security and data access at our fingertips? The answer is yes.

Let’s take a closer look at the safest security standard in the market, and the people whose mission it is to protect it.

What Is PCI DSS?

The payment card industry has the world’s toughest standard for data security. It is called PCI DSS (Payment Card Industry Data Security Standard) and reaches beyond the world of payment cards.

The standard is designed to protect customers against hackers and unauthorized users, preventing them from stealing valuable card data that businesses store. This security standard is becoming increasingly important as societies become more digitized and consumers move away from cash payments.

PCI DSS covers everything from verifying identity when modifying payment terminals, to encryption requirements for card data, and security demands on data centers handling card information.

PCI DSS Requirements Overview

PCI DSS includes 12 requirements, divided into over 250 controls. Which requirements apply depends on factors such as industry and transaction volume. For example, an e-commerce platform with thousands of daily transactions faces stricter requirements than a business selling one product per month.

The 12 PCI DSS Requirements

  1. Install and maintain a firewall configuration
  2. Do not use vendor-supplied default passwords
  3. Protect stored cardholder data
  4. Encrypt transmission of cardholder data
  5. Protect systems against malware
  6. Develop and maintain secure systems and applications
  7. Restrict access based on business need-to-know
  8. Identify and authenticate access
  9. Restrict physical access to cardholder data
  10. Track and monitor access
  11. Regularly test security systems
  12. Maintain an information security policy

The Challenge of PCI DSS Compliance

Becoming PCI DSS certified places high demands on a company’s knowledge of data security. Many organisations struggle to achieve compliance on their own. For this reason, it can be beneficial to use external expertise and purchase IT operations within a PCI DSS-certified environment.

The Role of a QSA (Qualified Security Assessor)

Once a company becomes PCI DSS certified, it must maintain compliance through annual audits. These audits are performed by a Qualified Security Assessor (QSA).

A QSA is a highly trained IT security expert certified by the PCI Security Standards Council. Their role is to validate compliance and ensure ongoing adherence to standards.

They compile a Report on Compliance (RoC), which confirms whether the organisation meets all requirements. This report can be several hundred pages long, detailing every control.

The PCI DSS Certification Process

Once a company becomes PCI DSS certified, it must maintain compliance through annual audits. These audits are performed by a Qualified Security Assessor (QSA).

A QSA is a highly trained IT security expert certified by the PCI Security Standards Council. Their role is to validate compliance and ensure ongoing adherence to standards.

They compile a Report on Compliance (RoC), which confirms whether the organisation meets all requirements. This report can be several hundred pages long, detailing every control.

Defining Scope

The first, and often most important, step is defining what is ”in scope”. Since PCI DSS focuses on card data, organisation must isolate card data and use segmented network.

Gap Analysis

A gap analysis evaluates the organisation’s current position against PCI DSS requirements. It identifies missing controls and required improvements.

Remediation

The organisation must fix all identified issues before moving forward.

Penetration Testing

A penetration test (pentest) simulates a real cyberattack to identify vulnerabilities in servers, systems and external services.

Final Validation and RoC

After fixing vulnerabilities, the QSA performs final validation and delivers the Report on Compliance (RoC). With this, risks are minimized, and the “Knight” moves on to protect the next organisation.