The first quarter of the year 2022 should be an exciting time for everyone working with PCI DSS. The PCI Security Standards Council is scheduled to release first a “Stakeholder Preview” of the long-awaited PCI DSS v4.0, and then, presumably some weeks later, the official v4.0 release, with validation documents.
While the process of preparing the move from the current PCI DSS v3.2.1 to PCI DSS v4.0 has been a long one, this is simply a sign of PCI Security Standards Council’s dedication to its mission to “enhance global payment account data security by developing standards and supporting services that drive education, awareness, and effective implementation by stakeholders.” For an overview and historical perspective, our PCI DSS Guide provides a look at PCI DSS development from v1.0 to the present day.
PCI DSS v4.0 should reflect a broad spectrum of industry voices, as the council represents a global forum of industry stakeholders, and the development process included extensive inputs from the Request for Comments process.
Introducing Flexibility to Enhance Security
The big question, of course, is: What’s new? The answer could be summed up: Flexibility.
Many things won’t change. From early on the PCI Security Standards Council stated “The 12 core PCI DSS requirements are not expected to fundamentally change with PCI DSS v4.0, as these are still the critical foundation for securing payment card data.” But the Council went on to say: “Based on feedback received, PCI SSC is evaluating how to evolve the standard to accommodate changes in technology, risk mitigation techniques, and the threat landscape. PCI SSC is also looking at ways to introduce greater flexibility to support organizations using a broad range of controls and methods to meet security objectives.”
While we must wait until next year to get a better understanding of the areas in which, and the degree to which, flexibility will be allowed, the introduction of flexibility to PCI DSS compliance is good news. Flexibility and support of additional methodologies to achieve—and maintain—PCI DSS compliance, and overall security, is absolutely essential today because of the nonstop global cyberattacks coming from hackers, criminal organizations, and other bad actors.
The threatscape within which we all operate is simply too dynamic, too ever changing. While it’s anticipated the Council will continue to provide proscriptive step-by-step guidance to implement security and compliance measures, the introduction of flexibility should be embraced by security and compliance professionals. We know that it is no longer enough to receive an annual Attestation of Compliance. Achieving PCI DSS compliance is a good start, but the battle to protect credit card data, personally identifiable information, intellectual property, and all the other mission critical information held within an organization’s digital infrastructure, must be ongoing—24x7.
Preparing for Version 4.0
The PCI Security Standards Council recognizes that change takes time to implement across large organizations, which is why PCI DSS v3.2.1 isn’t scheduled for official retirement until the first quarter of 2024. But organizations should begin exploring their opportunities for enhancing security to prepare for Version 4.0 today.
The PCI Security Standards Council has indicated that one of its goals for v4.0 is to “promote security as a continuous process.” This recognizes the fact that organizations with high-value data to protect can never sit still. This is because our adversaries never sit still.
Middle school hackers can log onto the dark web and purchase kits designed to automatically detect and attack out-of-date, or unpatched, operating systems and other applications. Criminal organizations and other bad actors, including organizations operating from unfriendly nations, continually invest in developing more efficient tools to penetrate and exploit corporate networks. Artificial intelligence is being harnessed to create more convincing e-mails to trick employees into taking actions that can download malicious software—which remains a major avenue of attack.
While awaiting the release of v4.0, here are some things you can do now:
To summarize, in today’s digital environment, being compliant doesn’t automatically translate to being secure. Compliance and security must be ongoing efforts. The good news is that flexibility and support of additional methodologies to achieve security will be part of v4.0. This makes today a good time to begin working with your internal team, third-party security professionals, and a QSA to assess your current security profile, and begin planning for how to make your IT environment ever more secure.