PCI DSS Requirements

Merchants, banks, payment service providers, and other parties that play a role in processing credit and debit card payments must protect the privacy of account data—both to meet core business goals and to fulfil obligations under the Payment Card Industry Data Security Standard (PCI DSS). The standard defines strict compliance requirements for the processing, storage, and transmission of account data. PCI DSS compliance must be validated periodically, and failure to comply can result in fines or even the termination of the ability to process card payments.

Thales eSecurity can help organizations working with cardholder data to comply with several aspects of PCI DSS compliance, including those relating to data encryption, access control, authentication, monitoring and auditing.


Over 200 Tests against Six Core Principles

The PCI DSS standard (www.pcisecuritystandards.org) involves assessment against over 200 tests that fall into 12 general security areas representing six core principles. These tests span a wide variety of common security practices along with technologies such as encryption, key management, and other data protection techniques.

Risks Associated with PCI DSS Auditing and Compliance

  • Failure to comply can result in fines, increased fees, or even the termination of your ability to p rocess payment card transactions.
  • Complying with the PCI DSS cannot be considered in isolation; organizations are subject to multiple security mandates and data breach disclosure laws or regulations. On the other hand, PCI compliance projects can easily be side-tracked by broader enterprise security initiatives.
  • Guidance and recommendations linked to PCI DSS requirements include common practices that are likely to be already in place. However some aspects, specifically those associated with encryption, might be new to the organization and implementations can be disruptive, negatively impacting operational efficiency if not designed correctly.
  • It is all too easy to end up with a fragmented approach to security based on multiple proprietary vendor solutions and inadequate technologies that are expensive and complex to operate.
  • Opportunities exist to reduce the scope of PCI DSS obligations and therefore reduce cost and impact; however, organizations can waste time and money if they do not exercise care to ensure that new systems and processes will in fact be accepted as compliant.


An Integrated Compliance Solution

Drawing on decades of experience helping banks and financial institutions comply with industry mandates, Thales eSecurity offers integrated products and services that enable you to protect stored cardholder data, encrypt it for transfer, and restrict access on a need to know basis. In addition, Thales works closely with partners to offer comprehensive solutions that can reduce the scope of your compliance burden.

Addressing the Six Core Principles of PCI DSS

Thales eSecurity offers comprehensive solutions that help organizations address the six core principles of PCI DSS:

  • Protect cardholder data. Compliance requires the encryption of cardholder data flowing over public networks and the protection of stored cardholder data. This begins at the transaction. Thales eSecurity nShield and payShield HSMs work with leading mobile device payment acceptance (mPOS) solutions as well as leading payments data protection solutions to protect cardholder data and help ensure PCI DSS compliance. Merchant organizations also need to deploy network encryption and SSL/TLS encryption for protecting data in transit and technologies such as Vormetric Transparent Encryption for storage and database encryption, Vormetric Application Encryption, Vormetric Tokenization with Dynamic Masking, and ‘point-to-point’ encryption to protect data at rest and reduce scope.
  • Implement strong access control measures. All data protection techniques go hand-in-hand with access controls. Cryptographic technologies such as PKI and digital certificates are widely used to go beyond password-grade security for authenticating users and systems. Furthermore, using the Vormetric Data Security Manager and Vormetric Encryption Key Management to control access to data decryption keys so as to unlock encrypted data only on a “need to know” basis provides a powerful additional layer of security.
  • Build and maintain a secure network. In addition to network level encryption, an essential component of network security is the strong authentication of network devices; digital credentials are increasingly employed at the device level to control network access and are an important security consideration for a corporate PKI.
  • Regularly monitor and test networks. Control and monitoring of all network access to sensitive data, including that by privileged users, must be underpinned by PCI-compliant audit logs. Vormetric Transparent Encryption provides logging of access at the file-system level, supporting log storage in the Vormetric Data Security Manager, in an organization’s security information and event management (SIEM) system, or in another log collection solution.
  • Maintain a vulnerability management program. The rise of advanced persistent attacks that attempt to corrupt business applications by injecting malware has brought the use of digital signatures and code signing into focus as a way to prove the integrity and authenticity of business systems and application software.
  • Maintain an information security policy. PCI DSS places great emphasis on establishing a clear separation of duties between staff members to minimize the risk of insider attack. The Vormetric Data Security Manager provides a powerful mechanism to enforce this separation and for creating a trusted record of events to demonstrate compliance.

Related Resources

eBooks : PCI Compliance & Data Protection for Dummies

If your business relies on card payments and faces the challenge of maintaining ongoing compliance with PCI DSS, this book is for you. It explains the requirements for protecting account data, controlling access to the data and the associated monitoring and logging activities that you need to adopt. Ultimately the book acts as a valuable and practical reference guide that you can come back to time and again to assist with your ongoing compliance and help you avoid the common pitfalls that can lead to serious data breaches or failed audits


Research and Whitepapers : Using Encryption and Access Control for PCI DSS 3.0 Compliance in AWS

Compliance and security continue to be top concerns for organizations that plan to move their environment to cloud computing. Besides that, achieving PCI compliance is not a simple task….


It is difficult for many organizations to navigate the current landscape of information systems and adequately fulfill all PCI DSS requirements. Vormetric, working with Coalfire, is continuing its leadership role in the industry by data security solutions from the data center to the cloud to help clients meet their compliance needs.

This white paper goes through the PCI DSS 3.0 controls in great detail and describes how the Vormetric Data Security Platform deployed in a Payment Card Environment running in Amazon Web Service (AWS) can help gain compliance.

The findings and recommendations contained in this document are provided by certified professionals at Coalfire®, a leading PCI Qualified Security Assessor and independent IT audit firm.


Research and Whitepapers : Vormetric Data Security: Complying with PCI DSS 3.0 Encryption Rules

This white paper outlines how to use Vormetric Transparent Encryption to meet PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs in traditional server, virtual, cloud and big data environments….

Learn about the Payment Card Industry Data Security Standard (PCI DSS) 3.0 compliance rules and how Vormetric Transparent Encryption helps achieve PCI DSS encryption and key management compliance by protecting both structured and unstructured data in traditional server, virtual, cloud and big data environments.

Discover how:

  • PCI DSS 3.0 compliance mandates challenge organizations accepting payment card information
  • Policy-based encryption protects stored cardholder data and ensures that only authorized users and services can encrypt and decrypt the data (Requirement 3)
  • Restrict access to cardholder data by business need to know with controls that deliver least privileged access (Requirement 7)
  • Restrict, track and monitor access to cardholder data encryption protects cardholder data on servers, all cardholder data access is monitored and logged (Requirement 9 and 10)

View the whitepaper and learn about how Vormetric can help you comply with compliance rules today


Research and Whitepapers : Fortrex: Evaluation of the Vormetric Token Server

Fortrex Qualified Security Assessor (QSA) evaluated the Vormetric Token Server, and determined when properly implemented and configured within a secured cardholder environment, it can reduce the scope of the systems included in the scope of a PCI DSS assessment. They also qualified that the solution can be leveraged to tokenize other sensitive data within a corporate environment. Fortrex detailed their evaluation process in their white paper, Evaluation of the Vormetric Token Server.

Since 1997, Fortrex Technologies has served as a trusted security and risk management advisor to its clients throughout the world. Fortrex focuses exclusively on IT security, operational risk and regulatory compliance and helps organizations throughout the world identify, assess, remediate and manage their operational risks through consulting, audit, vendor management and human capital assistance. By providing expert technical assessments, Fortrex ensures the confidentiality, integrity and availability of data and systems through world-class, enterprise-wide information security services and solutions. Powered by a team of security and risk management experts and the industry’s leading technology, Fortrex’s in-depth risk assessments and solutions ensure that its clients’ information assets remain safe and secure.

Fortrex Qualified Security Assessor (QSA) evaluated the Vormetric Token Server, and determined when properly implemented and configured within a secured cardholder environment, it can reduce the scope of the systems included in the scope of a PCI DSS assessment. They also qualified that the solution can be leveraged to tokenize other sensitive data within a corporate environment.

Fortrex detailed their evaluation process in their white paper, Evaluation of the Vormetric Token Server