Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment card account data security and facilitate the broad adoption of consistent data security measures globally
PCI DSS comprises a minimum set of requirements for protecting account data and may be enhanced by additional controls and practices to further mitigate risks, and to incorporate local, regional, and sector laws and regulations
PCI DSS is intended for all entities that store, process, or transmit cardholder data (CHD) and/or sensitive authentication data (SAD) or could impact the security of the cardholder data environment (CDE)
PCI DSS requirements apply to entities with environments where account data (cardholder data and/or sensitive authentication data) is stored, processed, or transmitted, and entities with environments that can impact the security of the CDE
Entities that outsource their payment environments or payment operations to third parties remain responsible for ensuring that the account data is protected by the third party per applicable PCI DSS requirements
Examples of when PCI DSS requirements may still apply even without PAN
If the entity stores SAD, requirements specifically related to SAD storage in Requirement 3 will be applicable
If the entity engages third-party service providers to store, process or transmit PAN on its behalf, requirements related to the management of service providers in Requirement 12 will be applicable
If the entity can impact the security of a CDE because the security of an entity's infrastructure can affect how cardholder data is processed, some requirements will be applicable
If cardholder data is only present on physical media, requirements relating to the security and disposal of physical media in Requirement 9 will be applicable
Requirements related to an incident response plan are applicable to all entities, to ensure that there are procedures to follow in the event of a suspected or actual breach of the confidentiality of cardholder data
PCI DSS includes requirements that specifically refer to account data, cardholder data, and sensitive authentication data. The requirements apply specifically to the type of data that is referenced.
Primary Account Number (PAN) - Storage is kept to a minimum as defined in Requirement 3.2, must be rendered unreadable when stored as defined in Requirement 3.5
Cardholder Name - Storage is kept to a minimum as defined in Requirement 3.2, does not need to be rendered unreadable
Service Code - Storage is kept to a minimum as defined in Requirement 3.2
Expiration Date - Storage is kept to a minimum as defined in Requirement 3.2
Full Track Data - Cannot be stored after authorization as defined in Requirement 3.3.1, must be protected with strong cryptography if stored until authorization is complete as defined in Requirement 3.3.2
Card verification code - Cannot be stored after authorization as defined in Requirement 3.3.1
PIN/PIN Block - Cannot be stored after authorization as defined in Requirement 3.3.1
Sensitive authentication data must not be stored after authorization, even if encrypted. This applies even for environments where there is no PAN present.
PCI SSC supports the use of secure payment software within cardholder data environments (CDE) via the Payment Application Data Security Standard (PA-DSS) and the Software Security Framework (SSF)
The use of validated payment software does not by itself make an entity PCI DSS compliant. The entity's PCI DSS assessment should include verification that the software is properly configured and securely implemented to support applicable PCI DSS requirements.
If PCI-listed payment software has been customized, a more in-depth review will be required during the PCI DSS assessment because the software may no longer be representative of the version that was originally validated.
Entities that develop their own software are encouraged to refer to PCI SSC's software security standards and consider the requirements therein as best practices to use in their development environments.
PCI DSS may apply to a payment software vendor if the vendor is also a service provider that stores, processes, or transmits account data, or has access to their customers' account data.
All bespoke and custom software that stores, processes, or transmits account data, or that could impact the security of account data or a CDE, is in scope for an entity's PCI DSS assessment.
Bespoke and custom software that has been developed and maintained in accordance with one of PCI SSC's Software Security Framework standards will support an entity in meeting PCI DSS Requirement 6.
PCI DSS requirements apply to the cardholder data environment (CDE) and system components, people, and processes that could impact the security of the CDE.
Examples of system components in scope for PCI DSS
Systems that store, process, or transmit account data
Systems that provide security services
Systems that facilitate segmentation
Systems that could impact the security of account data or the CDE
Virtualization components
Cloud infrastructure and components
Network components
Server types
End-user devices
Printers and multi-function devices
Storage of account data in any format
Applications, software, and software components
Tools, code repositories, and systems that implement software configuration management or for deployment of objects to the CDE or to systems that can impact the CDE
The entity must confirm the accuracy of their PCI DSS scope according to PCI DSS Requirement 12.5.2 by identifying all locations and flows of account data, and identifying all systems that are connected to or, if compromised, could impact the CDE.
Segmentation (or isolation) of the CDE from the remainder of an entity's network is not a PCI DSS requirement, but it is strongly recommended as a method that may reduce the scope, cost, and risk of the PCI DSS assessment.
To be considered out of scope for PCI DSS, a system component must be properly segmented (isolated) from the CDE, such that the out-of-scope system component could not impact the security of the CDE, even if that component was compromised.
If segmentation is used to reduce the scope of the PCI DSS assessment, the assessor must verify that the segmentation is adequate to reduce the scope of the assessment.
How count data comes into an organization, where it resides within the organization, and how it traverses through various systems within the organization
Data-flow diagrams illustrate all locations where account data is stored, processed, and transmitted
Data-flow diagrams support an entity implementing segmentation and can also support confirming that segmentation is being used to isolate the CDE from out-of-scope networks
If segmentation is used to reduce the scope of the PCI DSS assessment, the assessor must verify that the segmentation is adequate to reduce the scope of the assessment
Isolates systems that store, process, or transmit account data from those that do not
Adequacy of a specific segmentation implementation is highly variable and depends on several factors such as a given network's configuration, the technologies deployed, and other controls that may be implemented
If wireless technology is used to store, process, or transmit account data, or if a WLAN is part of or connected to the CDE, the PCI DSS requirements and testing procedures for securing wireless environments apply and must be performed
Rogue wireless detection must be performed per PCI DSS Requirement 11.2.1 even when wireless is not used within the CDE and the entity has a policy that prohibits the use of wireless technology within its environment