Welcome!

Cloud Security Authors: Liz McMillan, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

PCI Security Standards Council Adds PIN Entry Device (PED) Security Requirements

The Council Will Manage Security Standard and Streamline Testing Process

WAKEFIELD, Mass., Sept. 11 /PRNewswire-FirstCall/ -- The PCI Security Standards Council, an independent industry standards body providing management of the Payment Card Industry Data Security Standard on a global basis, today announced it has assumed responsibility for the PIN Entry Device (PED) Security Requirements that were previously administered under the auspices of JCB, MasterCard International and Visa International.

The PED Security Requirements are designed to secure personal identification number (PIN)-based transactions globally and apply to devices that accept PIN entry for all PIN based transactions.

"Adding the PED Security Requirements reinforces and expands our commitment to securing the payment process globally," said Bob Russo, general manager, PCI Security Standards Council. "The addition of the PED Security Requirements under the PCI Security Standards Council will remove conflicting requirements, simplify the testing process and maintain consistent security measures to improve the overall security of payment transactions."

With the PED Security Requirements administered by the Council, all founding payment brands will recognize PED certification; streamlining the testing process, reducing costs for vendors, and leading to the proliferation of a wider selection of PED products. PED manufacturers submitting devices for security testing will be able to rely on a single set of requirements, helping ensure cardholder security and providing opportunities for faster deployment. Under the Council's stewardship, each payment brand will bring its own PED expertise and this, when combined with market feedback from POS and terminal vendors will help strengthen the evolving security of these devices.

Implementation of the PED Security Requirements under the PCI Security Standards Council will happen over the next few months. During this time, all devices previously approved and designated as compliant to the existing PCI PED requirements will automatically be grandfathered into the new program. The Council will be honoring existing compliance agreements, with these devices listed on the PCI Security Standards Council approval list until their current existing approvals expire.

The PCI Security Standards Council will also continue to recognize laboratories previously accepted by JCB, MasterCard International and Visa International for PED security testing.

"The addition of the PED Security Requirements brings a new group of stakeholders into the Council," said Russo. "Point of sale and terminal vendors will join solution providers, payment application vendors and others to contribute to the diversity of the Council. In the future, we will continue to explore assuming additional standards to aid us in our goal to enhance global payment data security."

About the PED Security Requirements PED Security Requirements are divided into the following categories: Device Characteristics: -- Physical Security Characteristics -- Logical Security Characteristics Device Management: -- Device Management During Manufacturing -- Device Management Between Manufacturing and Initial Key Loading

Device characteristics are those attributes of the PED that define its physical and its logical characteristics. The physical security characteristics of the device are those attributes that deter a physical attack on the device. Logical security characteristics include those functional capabilities that preclude, for example, allowing the device to output a cleartext PIN encryption key.

Device management relates to how the PED is produced, controlled, transported, stored and used throughout its life cycle. If the device is not properly managed, unauthorized modifications might be made to its physical or logical security characteristics.

For More Information:

If you would like more information about the PCI Security Standards Council or would like to become a Participating Organization so that you may attend the upcoming PCI SSC community meeting, please visit pcisecuritystandards.org, or contact the PCI Security Standards Council at [email protected].

About the PCI Security Standards Council

The mission of the PCI Security Standards Council is to enhance payment account security by fostering broad adoption of the PCI Data Security Standard and other standards that increase payment data security.

The PCI Security Standards Council was formed by the major payment card brands American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International to provide a transparent forum in which all stakeholders can provide input into the ongoing development, enhancement and dissemination of the Data Security Standard. Merchants, banks, processors and point of sale vendors are encouraged to join as Participating Organizations.

A 21 member Board of Advisors represents the current roster of more than 275 PCI SSC Participating Organizations and provides critical feedback to the ongoing enhancement of security standards managed by the Council. Board members include: APACS, Bank of America, British Airways PLC, Chase Paymentech Solutions, Citibank N.A., Global Consumer Group, Commonwealth Bank of Australia, European Payment Council (EPC) AISBL, Exxon Mobil Corporation, First Data Corporation, Interac Association, JPMorgan Chase and Co, McDonalds Corporation, Microsoft, Moneris Solutions Corporation, PayPal Inc., The Royal Bank of Scotland, Servicios Electronicos Globales S.A. De C.V., Tesco Stores Ltd., TSYS Acquiring Solutions, LLC, VeriFone, Inc. and Wal-Mart Stores, Inc.

Contact: Text 100 for PCI Security Standards Council US +1 2123318410 (Eastern U.S.) US +1 2062672004 (Western U.S.) [email protected]

The PCI Security Standards Council

CONTACT: Text 100 for PCI Security Standards Council, Eastern U.S.,
+1-212-331-8410, Western U.S., +1-206-267-2004, [email protected]

Web site: http://www.pcisecuritystandards.org/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
IT professionals are also embracing the reality of Serverless architectures, which are critical to developing and operating real-time applications and services. Serverless is particularly important as enterprises of all sizes develop and deploy Internet of Things (IoT) initiatives. Serverless and Kubernetes are great examples of continuous, rapid pace of change in enterprise IT. They also raise a number of critical issues and questions about employee training, development processes, and opera...
This month @nodexl announced that ServerlessSUMMIT & DevOpsSUMMIT own the world's top three most influential Kubernetes domains which are more influential than LinkedIn, Twitter, YouTube, Medium, Infoworld and Microsoft combined. NodeXL is a template for Microsoft® Excel® (2007, 2010, 2013 and 2016) on Windows (XP, Vista, 7, 8, 10) that lets you enter a network edge list into a workbook, click a button, see a network graph, and get a detailed summary report, all in the familiar environment of...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...