January 20, 2014, Dan Fritsche, Principal, Retail and Financial Services
There’s been a lot of chatter about PA-DSS 3.0 among several early-adopter application vendors. As of January 1, 2014 it’s permissible to validate against 3.0 in place of a 2.0 validation. Longevity of the 3.0 validation and the desire to be validated first on a new standard seem to be driving the move to 3.0. The expiration date of a 3.0 validation is October 28, 2019 vs. October 28, 2016 for a 2.0 validation.
However, you should pause and ask yourself if you’re ready for a 3.0 validation. It’s important to note that the PCI Council made several significant changes and additions to PA-DSS 3.0 that are necessary to meet ongoing risk management activities and evolving security best practices.
A document titled “PA-DSS Summary of Changes V2.0 to V3.0” , on the PCI SSC web site, contains valuable information for application vendors regarding the changes of the standard. For your convenience, here are the highlights of the impactful changes and additions to PA-DSS 3.0.
Changes to PA-DSS 3.0
Changes to existing requirements that could potentially impact your PA-DSS validation include:
Requirement 2.1: Clarification to include secure deletion of cardholder data stored by the application, including data stored on underlying software or systems (such as OS, databases, etc.).
Requirement 2.2.a: Clarification to include details of all instances where PAN is displayed and confirmation that the payment application masks PAN by default on all displays.
Requirement 2.2.c: Instructions on how to configure the payment application so that only personnel with legitimate business need can see full PAN must be documented in the Implementation Guide.
Requirement 2.3: Instructions on how to configure each method for all locations where PAN is stored must be documented in the Implementation Guide as a list of all output mechanisms for PAN and instructions to merchants that they are responsible for protection and secure deletion of PAN.
Requirement 3.3.2: Significant change that passwords be secured by strong, one-way cryptographic algorithm with a unique input variable that is concatenated with the password prior to the application of the cryptographic algorithm. Storage of passwords using encryption is no longer acceptable in PA-DSS 3.0; all passwords must be salted and hashed using strong cryptographic methods.
Requirement 4.2.5: Clarification to logging requirement for Identification and Authentication Mechanisms should include creation of new accounts, elevation of privileges, and all changes, additions, deletions to application accounts with administrative privileges.
Requirement 5.1: Clarification that your SDLC should include security reviews conducted prior to the release of an application or application update.
Requirement 5.1.7: Clarification that training provided to application developers include: Secure Application Design; Secure Coding techniques; managing sensitive data in memory; code reviews; security testing; and risk assessment techniques. In addition, records must be maintained for developer training as they will be reviewed as part of your application assessment.
We recommend that you partner with a third party to address these training areas. Coalfire’s Secure Development Training is a program you can leverage to meet your training needs in these areas.
Requirement 7.1: Clarification that resources that are monitored for vulnerabilities are “reputable”.
New Requirements for PA-DSS 3.0
Highlights of the new requirements that could potentially impact your PA-DSS validation include:
Requirement 3.4.x: New requirement for applications to limit access to required functions/resources and enforce least privilege for built-in application accounts.
Requirement 5.1.5: New requirement for payment application developers to verify integrity of source code during the development process.
Requirement 5.1.6: New requirement for payment applications to be developed according to industry best practices for secure coding techniques, including:
Developing with least privilege for the environment.
Developing with fail-safe defaults—i.e., all execution is by default denied unless specified within initial design.
Developing for all access-point considerations, including input variances such as multi-channel input to the application.
Documentation of how PAN and/or SAD are handled in memory.
Requirement 5.2.10: New requirement to address “Broken authentication and session management.”
Requirement 5.4: New requirements for the payment application vendor to define and implement a versioning methodology in accordance with PA-DSS Program Guide. A.K.A WILDCARDS!!
Requirement 5.5: New requirement for payment application vendors to incorporate risk assessment techniques into their software development process.
Requirement 5.6: New requirement for payment application vendors to implement a formal authorization process prior to final release.
Requirement 7.3: New requirement for the application vendor to provide release notes for all application updates.
Requirement 10.2.2: New requirement for vendors who provide support/maintenance services to customers to maintain unique authentication credentials for each customer.
Requirement 14.1 - New requirement for providing information security and PA-DSS training for vendor personnel with PA-DSS responsibility at least annually.
Requirement 14.2 - New requirement for assignment of PA-DSS responsibilities to vendor personnel.
Clients often ask us if they should seek a 3.0 validation or continue with a 2.0 validation. For 2014 you can do either because it’s an overlap year. We recommend that you review the changes and additions to the PA-DSS 3.0 standard, “pre-assess” your application and development environment, and then make a decision based on whether or not you can complete the validation.
Best practices include a readiness program and pre-assessment activities that are tailored to your application with a PA-DSS 3.0 gap analysis. This includes evaluating your application in light of PA-DSS 3.0 changes and then providing a list of areas (broken into three categories: documentation, operational, and technical changes) that need improvement with best-practice guidance on how to meet the intent of each of the requirements. Coalfire is here to help.
Dan Fritsche — Principal, Retail and Financial Services
Coalfire started in 2001 with a simple idea – cyber threats are increasing, compliance mandates are getting more complicated, and a well-designed cybersecurity program can help fuel your overall success.
Coalfire helps organizations comply with global financial, government, industry and healthcare mandates while helping build the IT infrastructure and security systems that will protect their business from security breaches and data theft. The company is a leading provider of IT advisory services for security in retail, payments, healthcare, financial services, higher education, hospitality, government and utilities.
The Coalfire Board of Directors provides invaluable guidance for the organization and reflects Coalfire’s dedication to achieving success for our customers.
Coalfire’s executive leadership team comprises some of the most knowledgeable professionals in cybersecurity, representing many decades of experience leading and developing teams to outperform in meeting the security challenges of commercial and government clients. With diverse backgrounds in IT systems security, governmental security, compliance, and reducing risk while implementing the latest enabling technologies (such as the Cloud and IoT), our leaders understand the challenges customers face.
With a passion for quality, Coalfire uses a process-driven quality approach to improve the customer experience and deliver unparalleled results.
Created in honor of the late co-founder of Coalfire, the Richard E. Dakin Fund at The Denver Foundation is supporting scholarship programs at several universities for promising college students studying cybersecurity and related fields.
Security is a team game. If your organization values both independence and security, perhaps we should become partners.
The increased need for cyber security has become a common enterprise priority across the globe. However, industry requirements for effective cyber risk management are as distinct as the individual entities under fire. Enterprises and government organizations need more than an off-the-shelf audit to provide an effective threat assessment. They need industry- and organization-specific insights, tools and processes to protect digital assets and ensure compliance.
Coalfire can help cloud service providers prioritize the cyber risks to the company, and find the right cyber risk management and compliance efforts that keeps customer data secure, and helps differentiate products.
“Success” at a government entity looks different than at a commercial organization. Create cybersecurity solutions to support your mission goals with a team that understands your unique requirements.
The financial services industry was built upon security and privacy. As cyber-attacks become more sophisticated, a strong vault and a guard at the door won’t offer any protection against phishing, DDoS attacks and IT infrastructure breaches.
The continuum of care is a concept involving an integrated system of care that guides and tracks patients over time through a comprehensive array of health services spanning all levels of care. Interoperability is the central idea to this care continuum making it possible to have the right information at the right time for the right people to make the right decisions.
Maintaining network and data security in any large organization is a major challenge for information systems departments. However, in the higher education environment, the protection of IT assets and sensitive information must be balanced with the need for ‘openness’ and academic freedom; making this a more difficult and complex task.
When it comes to cyber threats, the hospitality industry is not a friendly place. Hotels and resorts have proven to be a favorite target for cyber criminals who are looking for high transaction volume, large databases and low barriers to entry.
The payments industry is undergoing rapid changes and unfortunately, an increasing risk for data breaches. Cyber criminals are growing increasingly businesslike, and payments leaders need to move quickly to cover their cyber risk.
The food and beverage industry is under attack from cyber criminals intent on stealing payment information. The food and beverage industry makes up the highest percentage of breach investigations, at nearly 73 percent, according to Visa.
The global retail industry has become the top target for cyber terrorists, and the impact of this onslaught has been staggering to merchants. To secure the complex IT infrastructure of a retail environment, merchants must embrace enterprise-wide cyber risk management practices that reduces risk, minimizes costs and provides security to their customers and their bottom line.
Private enterprises serving government and state agencies need to be upheld to the same information management practices and standards as the organizations they serve. Coalfire has over 16 years of experience helping companies navigate increasing complex governance and risk standards for public institutions and their IT vendors.
Technology innovations are enabling new methods for corporations and governments to operate and driving changes in consumer behavior. The companies delivering these technology products are facilitating business transformation that provides new operating models, increased efficiency and engagement with consumers as businesses seek a competitive advantage.
Cybersecurity has entered the list of the top five concerns for U.S. electric utilities, and with good reason. According to the Department of Homeland Security, attacks on the utilities industry are rising "at an alarming rate."
Cyber risk management, advisory, technology and compliance services. Manage risk and maximize return on investment to prevent data breaches and theft. Coalfire’s solutions are led by a team of industry experts that help enterprise organizations understand a wide range of compliance and risk management initiatives, which enables a consistent cybersecurity framework across the organization.
Assess your cloud strategy and the maturity of your cloud security program, and then chart a path to a more secure program that aligns with business objectives
Better understand the unique risks posed by the cloud and how to assess your cloud program to effectively identify cloud-specific risks and threats and close critical security gaps
Ensure compliance by leveraging our unparalleled expertise across multiple frameworks and extensive experience with more than 350 cloud service providers
Identify risk and vulnerabilities across all devices, and apply solutions to mitigate security issues across your business’s entire cloud ecosystem
Build customized, automated processes so you can stand up and manage secure, compliant, audit-ready cloud environments to get to market faster
Expert assessments that provide an accurate understanding of what you are trying to protect, the inherent and residual cyber risk to your enterprise and the maturity of the your security program and underlying controls
Customized services to help CISOs and Senior Management develop cybersecurity strategy, implement controls, and govern a security program
Adopt a proactive approach to cybersecurity
Make more informed security-related decisions
Design, engineer, and scale with confidence
Certification and Accreditation (C&A) process for DoD
Get FedRAMP authorized with the leading 3PAO
Reducing Financial IT Security Risk
Meet your FISMA authorization needs
Privacy programs to secure consumer data
Health data protection for all shapes and sizes
A risk management and third-party assurance solution
An internationally recognized approach to information security
ITAR, EAR, and DFARS Advisory and Assessment
Cyber security for electric grid critical infrastructure
Protect Controlled Unclassified Information for Nonfederal
Payment Application Security Validation
PCI Data Security Standard Compliance
Have you suffered a data breach of cardholder data?
Establish and report controls to differentiate your organization
Demonstrate your commitment to cybersecurity
Secure the design, development, and deployment of your applications
Collect, preserve and analyze digital evidence to better understand security incidents
Test your IoT solution from field devices to the cloud
Understand vulnerabilities and implement remediation before they’re exploited
Test your organization’s defense against a simulated real-world attack
Listen to real-life stories of our security team exploiting vulnerabilities
Use malware and vulnerability research, open-source tools, and opinions to provide realistic adversary simulations
Control your Compliance
Easily identify IT vulnerabilities