Top 5 common pitfalls of PCI DSS compliance

Latest update:
8 Aug
2022

As a Payment Card Industry Qualified Security Assessor (PCI QSA) company, we are often asked by organisations which process card payments what are main pitfalls to avoid in complying with the Payment Card Industry Data Security Standard (PCI DSS).  Well, here’s our top five (5) pitfalls to avoid if your organisation is looking achieve or maintain compliance with the Standard.

Scope creep

The PCI DSS defines the cardholder data environment (CDE) as all of the systems, processes, people and technologies that handle cardholder data and this includes systems that secure and support the CDE (i.e. connected-to systems).  On numerous occasions, we have found organisations that have overlooked some aspect of the systems and functions including domain controllers, key management servers, firewalls, intrusion detection / prevention systems (IDS/IPS), log management, security information and event management (SIEM) and antivirus (AV) management servers, amongst others.  Our best advice on addressing the issue of scoping is to maximise your network segmentation.  Isolating the ‘in-scope’ systems from the rest of the environment will greatly reduce the number of supporting systems and functions you will need to consider.

Lack of understanding where and in what form the organisation retains CHD

It is impossible to design defence strategies on how to protect the CHD stored by an organisation if there isn’t a comprehensive understanding of what type of data is being held and in what format it is retained.  As per the age-old QSA mantra ‘if you don’t need it, don’t store it’.  If the type of service that an organisation provides dictates that some elements of CHD must be retained, ensure that data retention is well defined and that data is deleted/stored/tokenized/archived according to PCI DSS requirements.

Lack of effective vulnerability management

PCI DSS requires organisations to perform internal and external vulnerability scans and any vulnerabilities that are found need to be addressed.  Failure to do so not only complicates an organisation’s attempts to recertify, but it can leave CHD vulnerable and increases the chance of a breach. Organisations looking to comply for the first time only needs to have one clean scan, i.e. no ‘High / Critical’ rated vulnerabilities from the last quarter.  In order to achieve compliance in subsequent years, a clean scan from each quarter from the previous twelve (12) months is mandatory.

Lack of firewall rule reviews and associated six-monthly segmentation tests

In addition to reviewing firewall rules every 6 months, service providers must also conduct internal segmentation testing twice a year.  While most organisations remember to perform the annual penetration testing leading up to the audit, we often come across occurrences of segmentation testing being neglected.  These compliance milestones, along with the many other time-based requirements, should be recorded in an operational security ‘calendar of events’, to ensure they are not overlooked at the appropriate time.

Lack of commitment to PCI DSS compliance efforts ‘offseason”

Unfortunately, many organisations regard PCI as a ‘once a year’ exercise and fail to incorporate the necessary behaviours into their ‘business as usual’ (BAU) processes.  To minimize risk and to reduce the stress of the annual re-compliance process, the PCI programme should be followed and managed throughout the year.  This includes, amongst others, staying on top of security testing, patching, user management, logging and 3rd party vendor management.

Thumbnail of the Blog Illustration
Information Security
updateD:
5/8/2022
How can URM help you to achieve PCI compliance and what is our approach?

In our previous blog, we looked at where your PCI compliance journey starts. The first step is understanding the flow of your payment card data – by that we mean where payment card information...

Read more
Thumbnail of the Blog Illustration
Information Security
updateD:
4/8/2022
PCI DSS Remediation and Implementation

PCI remediation is an essential activity for any organisation wishing to fully comply with the applicable 12 technical and operational control requirements of the PCI DSS. Whilst many PCI remediation

Read more
Thumbnail of the Blog Illustration
Information Security
updateD:
9/8/2022
PCI DSS: Pros and Cons of Outsourcing

In this blog, we address one of the big questions facing organisations which accept payment cards and are looking to comply with the PCI DSS. Should we outsource the storing, processing and...

Read more
"
Moving from our existing Pen Testers after 10 years was a difficult decision but I am really glad we did. It's been a pleasure working with you. The Pen Testing was extremely thorough and as hoped you were open to a collaborative deeper delve, far beyond what we were required to do for PCI DSS, which has been very useful.
Payment Service Provider
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.