PCI DSS 4.0 Webinar Slides
PCI DSS 4.0 Webinar Slides
0
Everything You Need to Know About The Transformational
Changes Required of Your Business
May 3, 2022
mwe.com
SPEAKERS
TODD ALAN
MCCLELLAND GUTIERREZ-
ARANA
Partner Principal
tmcclelland@mwe.com Alan.gutierrezarana@rsmus.com
MARK
SCHREIBER ROBERT DUFFY BRIAN LONG
McDermott Will & Emery McDermott Will & Emery McDermott Will & Emery
2 mwe.com
AGENDA
• Introduction / Overview
• Key Changes
• Legal Risks
• Closing Thoughts
• Q&A
3 mwe.com
KEY CHANGES IN
PCI DSS 4.0
4 mwe.com
PCI DSS VERSION 4.0 TIMELINE
9 mwe.com
PCI APPLICABILITY AND SCOPE CLARIFICATIONS
(CONT.)
10 mwe.com
PCI APPLICABILITY AND SCOPE CLARIFICATIONS
(CONT.)
• Service providers that can affect the security of the CDE, now
explicitly in scope (p. 16)
– For example, a loyalty provider who connects to a POS is in scope
11 mwe.com
UPDATED “SIGNIFICANT CHANGE” GUIDANCE
• “Significant Change” is not new; it is an important trigger for timing certain PCI DSS requirements, e.g., perform new
scope validation, vulnerability scans, confirm PCI controls. However, the term’s definition is dependent on the
environment
• Significant Changes determine the timing of requirements such as vulnerability scanning, log review, and Targeted
Risk Analyses
• Significant Change must now include all of the following:
– New hardware, software, or networking equipment added to the CDE
– Any replacement or major upgrades of hardware and software in the CDE
– Any changes in the flow or storage of account data
– Any changes to the boundary of the CDE and/or to the scope of the PCI DSS assessment
– Any changes to the underlying supporting infrastructure of the CDE (including, but not limited to, changes to directory services,
time servers, logging, and monitoring)
– Any changes to third party vendors/service providers (or services provided) that support the CDE or meet PCI DSS requirements
on behalf of the entity
• Significant Change is still “highly dependent” on an environment’s configuration, activities, and impacts on the CDE
(p. 26)
12 mwe.com
IMPLEMENTATION AND VALIDATION APPROACHES
(CUSTOMIZED APPROACH)
• PCI DSS 4.0 introduces a new way to implement and validate its
requirements: the Customized Approach
Defined Approach (Legacy Approach) Customized Approach
• Implement requirements in a prescriptive manner • Implement requirements using a customized
as done in prior PCI DSS versions control that implements the Customized Control
• Many controls (with some exceptions, such as Objective listed with the requirement
SAD) can be met with a compensating control if • No compensating controls allowed
prescriptive control cannot be implemented • Requires a targeted risk analysis for each control
• Control validation uses defined testing steps or • Customized control defined by entity; testing
compensating control evaluation using the procedure defined by assessor (e.g. QSA)
compensating control worksheet and risk • Intended for risk-mature organizations
assessments • Must meet or exceed the security provided by the
• Annual requirement to document and validate any requirement in the Defined Approach
compensating control and include in the ROC • Expected to be greater effort for documentation
and validation
13 mwe.com
VALIDATION TO THE CUSTOMIZED APPROACH
15 mwe.com
TARGETED RISK ANALYSES (CONT.)
• Targeted Risk Analyses do not have to have a specific format but must
include all the information defined in the template provided in E2
Sample Targeted Risk Analysis Template, p. 337. These include:
– PCI Requirement, Control Objective, and the “mischief” the requirement
was designed to prevent
– Proposed Solution, including what parts of the requirement change, and
how the proposed solution solves the mischief
– Likelihood analysis
– Impact analysis
– Risk approval and review
16 mwe.com
TARGETED RISK ANALYSES TEMPLATE
• Best practices until 31 March 2025, after which these requirements will
be required and must be fully considered during a PCI DSS
assessment (51 requirements)
21 mwe.com
NOTABLE REQUIREMENT CHANGES
High Level Requirement PCI DSS 3.2.1 PCI DSS 4.0 Notable Changes and Updates
Build and Maintain a Secure 1. Install and maintain a 1. Install and Maintain • Focus on a broader range of security controls beyond
Network and Systems firewall configuration to Network Security firewalls and routers using new term “Network Security
protect cardholder data Controls. Controls (NSC)”
• Greater clarity on placement of NSCs between trusted and
untrusted networks
• Clarifications regarding devices that connect to the CDE
and other untrusted networks.
22 mwe.com
NOTABLE REQUIREMENT CHANGES (CONT.)
High Level Requirement PCI DSS 3.2.1 PCI DSS 4.0 Notable Changes and Updates
Protect Cardholder Data [3.2.1] 3. Protect stored 3. Protect Stored • Document roles and responsibilities^
cardholder data Account Data. • Protect SAD prior to authorization^*
Protect Account Data [4.0] • Added issuer requirements for storage of SAD
• Clarifications for PAN masking
• Protect PAN from remote access^*
• Keyed cryptographic hashes for PAN^*
• Disk-level or partition-level encryption only used for on
removable media; additional encryption needed for non-
removable media^*
• Service providers must document the use of the same
cryptographic keys in production and test is prevented^*
23 mwe.com
NOTABLE REQUIREMENT CHANGES (CONT.)
High Level Requirement PCI DSS 3.2.1 PCI DSS 4.0 Notable Changes and Updates
Maintain a Vulnerability 5. Protect all systems 5. Protect All Systems • Document roles and responsibilities^
Management Program against malware and and Networks from • Replaced anti-virus with anti-malware
regularly update anti-virus Malicious Software. • Clarifications regarding documentation required for systems
software or programs not at risk for malware and period review based on risk^*
• Frequency of periodic malware scans based on risk^*
• Malware solution required for electronic media^*
• Detect and protect personnel against phishing^*
8. Identify and authenticate 8. Identify Users and • Document roles and responsibilities^
access to system Authenticate Access • Clarification: this requirement does not apply to consumers
components to System • Increased password length to 12 characters^*
Components. • Service providers provide guidance on password changes^*
• MFA required for all access to the CDE^*
• Requirements for MFA and interactive logins^*
• No hard-coding of passwords into scripts^*
• Password change / complexity requirements for system and
application accounts^*
11. Regularly test security 11. Test Security of • Document roles and responsibilities^
systems and processes Systems and • Must scan for wireless even when wireless not used and
Networks Regularly. policy against wireless^*
• Internal vulnerability scans via authenticated scanning^*
• Clarifications regarding penetration testing requirements
• Multi-tenant service providers must support customers for
external penetration testing^*
• Service Providers must use intrusion-detection or intrusion-
prevention techniques to address covert malware
communication channels^*
• Change-and-tamper-detection mechanism deployed to alert
for modifications to HTTP headers and content of payment
pages received by consumer browser^*
^Designates new requirement
*Designates best practice until March 31, 2025
26 mwe.com
NOTABLE REQUIREMENT CHANGES (CONT.)
High Level Requirement PCI DSS 3.2.1 PCI DSS 4.0 Notable Changes and Updates
Maintain an Information 12. Maintain a 12. Support • Clarified that use of a PCI DSS compliant TPSP does not make an entity
Security Policy policy that Information compliant or remove responsibility for compliance from entity.
addresses Security with • Formal organization-wide risk assessment changed to targeted risk analyses^
(which includes many more information Organizational • Personnel must formally acknowledge responsibilities^
requirements about security for all Policies and • Targeted risk analysis required for any requirement that has flexibility in
managing the security personnel Programs. frequency of performance^*
program and third-party • Targeted risk analysis for any customized approach control^
vendors) • Review cryptographic cypher suites and protocols at least every 12 months^*
• Review hardware and software technologies at least every 12 months^*
• Document and confirm PCI Scope at least every 12 months and after
significant change^
• Service Provider document and confirm scope at least every 6 months
and on significant change^*
• Service Providers must review impact to PCI of every significant change^*
• Review and update security awareness program at least every 12 months^*
• Security Awareness training includes threats and vulnerabilities that could
impact CDE^*
• TPSPs must support entity’s requirements for PCI compliance for tasks
they perform or share with entity^
• Targeted risk analysis to determine frequency of training^*
28 mwe.com
LEGAL RISKS
• What constitutes “reasonable security?” Has the bar (now) been
raised?
– FTC’s unfair and deceptive practices standard
– US state incorporation of or safe harbor for PCI DSS (Nevada,
Washington, Minnesota, Ohio, Utah, Connecticut)
– Implications of 4.0’s “clarifications” on existing 3.2.1 compliance
29 mwe.com
LEGAL RISKS (CONT.)
• Risk Analyses and Management
– Who performs (in-house / third party vendor)?
– Drafts of Targeted Risk Analyses and readiness exercises may be
discoverable outside of attorney-client privilege
– Final Targeted Risk Analyses are likely discoverable
30 mwe.com
LEGAL RISKS (CONT.)
• Contracting with or as Third-Party Service Providers (TPSPs)
– Need to evaluate which third parties are in scope
– Need requisite terms in place that complies with PCI DSS Req. 12
31 mwe.com
LEGAL RISKS (CONT.)
• Risk considerations between the prescriptive and customized
approaches
• Governance issues
– Board reporting
– Roles and responsibilities
– Policies
32 mwe.com
CLOSING
THOUGHTS
33 mwe.com
THANK YOU /
QUESTIONS
This material is for general information purposes only and should not be construed as legal advice or any other advice on any specific facts or circumstances.
No one should act or refrain from acting based upon any information herein without seeking professional legal advice. McDermott Will & Emery* (McDermott)
makes no warranties, representations, or claims of any kind concerning the content herein. McDermott and the contributing presenters or authors expressly
disclaim all liability to any person in respect of the consequences of anything done or not done in reliance upon the use of contents included herein.
*For a complete list of McDermott entities visit mwe.com/legalnotices.
©2021 McDermott Will & Emery. All rights reserved. Any use of these materials including reproduction, modification, distribution or republication, without the
prior written consent of McDermott is strictly prohibited. This may be considered attorney advertising. Prior results do not guarantee a similar outcome.
34 mwe.com