www.schellman.com
Open in
urlscan Pro
2606:2c40::c73c:671c
Public Scan
Submitted URL: https://www.schellman.com/e3t/Ctc/2E+113/c1n9s04/VXb2-T26r_67W7hF4Pl2CGW87W4FBnYy5cfn0fN37Jq6b3qgyTW8wLKSR6lZ3kZW2mGn4k6fM...
Effective URL: https://www.schellman.com/blog/pci-compliance/incident-response-in-pci-dss-v4?utm_campaign=Weekly%20Read&utm_medium=email&...
Submission: On March 29 via api from US — Scanned from DE
Effective URL: https://www.schellman.com/blog/pci-compliance/incident-response-in-pci-dss-v4?utm_campaign=Weekly%20Read&utm_medium=email&...
Submission: On March 29 via api from US — Scanned from DE
Form analysis
3 forms found in the DOM<form onsubmit="event.preventDefault();headerSearch(this);">
<input type="text" class="header--main--search--input--input" placeholder="Search">
<input type="submit" class="visuallyhidden" value="Submit">
</form>
<form onsubmit="event.preventDefault();mobileSearch(this);">
<input type="text" class="mobilenav--search--input" placeholder="Search">
<input type="submit" class="visuallyhidden" value="Submit">
<a class="mobilenav--search--submit">
<i class="fas fa-search mobilenav--search--submit--icon"></i>
</a>
</form>
/search
<form class="bop--mobilemenu--search" action="/search" type="POST">
<input class="bop--mobilemenu--search--input" name="term" placeholder="Search" type="text">
<input class="visuallyhidden" name="type" readonly="" type="text" value="BLOG_POST">
<input class="visuallyhidden" type="submit" value="Submit">
</form>
Text Content
Contact a Specialist Services SOC & Attestations Payment Card Assessments ISO Certifications Privacy Assessments Federal Assessments Healthcare Assessments Penetration Testing Cybersecurity Assessments Crypto and Digital Trust Schellman Training ESG & Sustainability AI Services Build Your Compliance Roadmap Industry Solutions Cloud Computing & Data Centers Meet a broad range of regulatory and industry compliance mandates for your customers Financial Services & Fintech Cybersecurity assessments for both the banking industry and the financial service providers Healthcare Reporting to manage risk and adhere to applicable laws and regulations Payment Card Processing Validate compliance with the various forms of the PCI DSS US Government Achieve authorization to work for federal agencies, DoD, and the associated contractor base Higher Education & Research Laboratories Reinforce your commitment to securing your student's and institution's data. View All Industry Solutions Learning Center Our Technology About Us Leadership Team Careers Corporate Social Responsibility Strategic Partnerships Visit About Us Services Industry Solutions Learning Center Our Technology About Us Contact a Specialist Services View All Services SOC & Attestations Payment Card Assessments ISO Certifications Privacy Assessments Federal Assessments Healthcare Assessments Penetration Testing Cybersecurity Assessments Crypto and Digital Trust Schellman Training ESG & Sustainability AI Services SOC & Attestations Payment Card Assessments ISO Certifications Privacy Assessments Federal Assessments Healthcare Assessments Penetration Testing Cybersecurity Assessments Crypto and Digital Trust Schellman Training ESG & Sustainability AI Services Industry Solutions View All Industry Solutions Cloud Computing & Data Centers Financial Services & Fintech Healthcare Payment Card Processing US Government Higher Education & Research Laboratories Cloud Computing & Data Centers Financial Services & Fintech Healthcare Payment Card Processing US Government Higher Education & Research Laboratories About Us About Schellman Leadership Team Careers Corporate Social Responsibility Strategic Partnerships Leadership Team Careers Corporate Social Responsibility Strategic Partnerships * « View All Posts By: Roberto Davila Print/Save as PDF INCIDENT RESPONSE IN PCI DSS V4.0: A BREAKDOWN OF REQUIREMENT 12.10 Payment Card Assessments * Share: * * * * Incident response has always been an important component of PCI DSS—in Requirement 12.10, the standard provides critical guidelines for the timeliness, preparedness, and continuous improvement of incident response management. That being said, new related requirements and clarifications have been introduced under v4.0 that add complexity and effort to the mandates from v3.2.1. As highly experienced PCI assessors, we have made a lot of effort to disseminate different aspects of the new version to assist organizations in their preparation. Now, we’re going to do the same for the incident response requirements. In this article, we’ll explore the intricacies of PCI DSS Requirement 12.10 through a breakdown of its sub-requirements and the role they play in supporting your data security and resilience against evolving threats. WHAT IS PCI DSS V4.0 REQUIREMENT 12.10? Altogether, Requirement 12.10 is made up of 7 sub-requirements: * Requirement 12.10.1 – What Should be Covered * Requirement 12.10.2 – Annual Reviews and Testing * Requirement 12.10.3 – 24/7 Availability * Requirement 12.10.4 – Training * Requirement 12.10.5 – Security Monitoring Systems and Alerting * Requirement 12.10.6 – Evolution * Requirement 12.10.7 – Response to Cardholder Data Discovery REQUIREMENT 12.10 – INCIDENT RESPONSE PLAN Nevertheless, the first notable change to incident response is in the base Requirement 12.10—in v4.0, the PCI SSC has clarified that organizations must respond immediately to not only confirmed security incidents but also suspected events. While this change does help those seeking compliance to be more proactive and agile when attempting to thwart attacks or limit damage caused by a breach—as noted in 12.10.5 and elsewhere—your immediate response to suspected events must include active monitoring of event logs and alerts from security monitoring systems. This includes: * Network security controls; * Intrusion detection and/or prevention systems (IDS/IPS); * File-integrity monitoring or change-detection mechanisms; * Anti-malware software, endpoint detection and response (EDR) solutions, and/or user behavior analytics (UBA) tools; * Anti-phishing mechanisms such as Domain-based Message Authentication, Reporting & Conformance (DMARC), Sender Policy Framework (SPF), and Domain Keys Identified Mail (DKIM); * Network access control (NAC) or wireless IDS/IPS; and * Change-and-tamper-detection mechanisms on payment pages. REQUIREMENT 12.10.1 – WHAT SHOULD BE COVERED Requirement 12.10 mandates an incident response plan (IRP) for both suspected and confirmed incidents. Requirement 12.10.1 in v4.0 lays out a bulleted list of what to actually include in IRP—that list includes the following: * Roles, responsibilities, communication duties, and contact strategies in the event of a suspected or confirmed security incident, including the notification of payment brands and acquirers, at a minimum: * Incident response procedures with specific containment and mitigation activities for different types of incidents * Business recovery and continuity procedures * Data backup processes * Analysis of legal requirements for reporting compromises * Coverage and responses of all critical system components * Reference to or inclusion of incident response procedures from the payment brands Each item on the above list should be addressed in detail to ensure you have a robust plan in place. For additional information and specific procedures to consider for your IRP, refer to NIST SP 800-61 Rev. 2 Computer Security Handling Guide. REQUIREMENT 12.10.2 – REVIEWS AND TESTING Once you’ve established your organization’s plan, Requirement 12.10.2 directs that you review, update, and test it annually. To do so, we recommend conducting a tabletop exercise: * Who Should Participate? Anyone who may be involved in the incident response process, which may mean team members from your information security, network, server administration, and legal teams (among others). * How Should It Work? Those taking part should follow the steps and procedures outlined in the IRP in dealing with a simulated problem—they should document meeting minutes for the exercise and complete an incident report as if it were a real-world incident. * What Should Happen After? A post-mortem or lessons learned should be conducted and documented to capture successes, failures, or gaps in the incident response plan. Any gaps or failures identified during IRP testing should be remediated, and the IRP itself updated to reflect new plan elements. Conducting a tabletop exercise with these steps will ensure that your incident response team is prepared to respond to security incidents promptly and efficiently. REQUIREMENT 12.10.3 – AVAILABILITY Speaking of your incident response team, Requirement 12.10.3 obligates personnel with responsibility for responding to suspected or confirmed incidents to be available 24/7. While this specifically applies to those who are trained in responding to alerts from security monitoring systems as your first line of defense, you should also consider making personnel from other teams similarly available if their actions may be required in the event of a compromise. REQUIREMENT 12.10.4 – TRAINING You’re also required to train your incident response team periodically and appropriately, as per Requirement 12.10.4—the key word here being “appropriate.” While you’re required to perform a targeted risk analysis to define and justify the frequency of this incident response training, it also won’t do to provide blanket education to everyone responsible for responding to incidents—no matter how frequently you’re training them. To comply with this stipulation, you must provide training that specifically applies to each individual’s incident response responsibilities, including instruction regarding the security monitoring tools and platforms used in your environment. REQUIREMENT 12.10.5 – SECURITY MONITORING SYSTEMS AND ALERTING Regarding those security monitoring systems mentioned above, Requirement 12.10.5 lists which are required—your incident response plan must include details for monitoring and responding to alerts from systems that include but are not limited to any of your: * Network security controls; * IDS/IPS; * File-integrity monitoring or change-detection mechanisms; * Anti-malware software, EDR solutions, and/or UBA tools; * Anti-phishing mechanisms; * NAC or wireless IDS/IPS; and * Change-and-tamper-detection mechanisms on payment pages. REQUIREMENT 12.10.6 – EVOLUTION Though 12.10.2 also requires updates to your incident response plan, Requirement 12.10.6 specifically calls for your plan to be modified and evolved to reflect changes in your organization’s environment, emerging threats, and lessons learned from the required testing or past incidents. We mentioned earlier that you should incorporate a post-mortem into your annual tabletop exercise—that is because it can help identify areas of improvement and gaps in your process to consider for updates to your incident response plan. REQUIREMENT 12.10.7 – RESPONSE TO CARDHOLDER DATA DISCOVERY And finally, Requirement 12.10.7 requires the implementation of specific incident response procedures upon the detection of Primary Account Number (PAN) data anywhere it’s not expected, including processes to address: * The retrieval and secure deletion of any PAN discovered outside the CDE, as well as how you’ll migrate it into your currently defined CDE (should that become applicable) * Identification of any sensitive authentication data stored with PAN * Determination of where the account data came from and how it ended up where it was not expected * Remediation of data leaks or process gaps that resulted in the account data being where it was not expected In the event cardholder data is discovered in unexpected locations, having the above incident response procedures in place will help to pinpoint the source of the data, identify control gaps that resulted in the data being where it should not be, and help to identify corrective actions to prevent future leaks. IMPORTANT NOTE REGARDING AUTOMATED DATA DISCOVERY SOLUTIONS: While these do facilitate the required actions in incident response in addition to supporting other PCI DSS requirements—such as scope validation—the standard does not currently require their use. Rather, it does require you to create and implement data discovery methodology to identify locations where account data is stored, processed, and transmitted (Requirement 12.5.2). MOVING FORWARD WITH PCI DSS V4.0 Incident response is an important component of cybersecurity—something PCI DSS v4.0 recognizes, given the complexities of its requirements for such. But now that you understand the changes to the standard and what you’ll need to create and implement for compliance, you can move forward more confidently. Of course, the approach incident response isn’t the only thing v4.0 has changed—to learn more about all the new and different aspects of this new version of the standard, check out our extensive library that breaks down all these PCI DSS v4.0. And if you find yourself with more specific questions, don’t hesitate to reach out to our dedicated PCI team, who would be happy to address any concerns you may have. ABOUT ROBERTO DAVILA Roberto Davila is a manager at Schellman. Prior to joining the firm, Roberto was the lead resource and Internal Security Assessor for a large cruise line where he specialized in security assessments and remediation activities for Payment Card Industry, HIPAA and Data Privacy. Before joining the cruise line, Roberto performed security and compliance services at a consulting agency where he gained experience in audit, compliance, and information security. * * * * SUBSCRIBE TO THE SCHELLMAN ADVANTAGE BLOG Get unique insights, industry news and exclusive advice from our highly experienced professionals. No thanks, I am not interested. SCHELLMAN 4010 W Boy Scout Boulevard, Suite 600 Tampa, FL 33607 U.S. 1.866.254.0000 Outside the U.S. 1.813.288.8833 SERVICES * SOC & Attestations * ISO Certifications * Federal Assessments * Payment Card Assessments * Healthcare Assessments * Privacy Assessments * Penetration Testing * Cybersecurity Assessments * Crypto and Digital Trust * Schellman Training INDUSTRIES * Cloud Computing & Data Centers * Financial Services & Fintech * Healthcare * Payment Card Processing * U.S. Government * Higher Education & Research Laboratories RESOURCES * Resources * OpenAPI COMPANY * About Us * Careers * Contact Us © SchellmanPrivacy PolicyTerms “Schellman” is the brand name under which Schellman & Company, LLC and Schellman Compliance, LLC provide professional services. Schellman & Company, LLC and Schellman Compliance, LLC practice as an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable law, regulations and professional standards. Schellman & Company, LLC is a licensed certified public accounting firm (Florida license number AD62941) registered with the Public Company Accounting Oversight Board (PCAOB) that provides attest services to its clients, and Schellman Compliance, LLC provides nonattest cybersecurity and compliance professional services to its clients. Schellman Compliance, LLC is not a licensed CPA firm. Schellman & Company, LLC and Schellman Compliance, LLC are independently owned and are not liable for the services provided by any other entity providing services under the Schellman brand. Our use of the terms “our firm” and “we” and “us” and terms of similar import, denote the alternative practice structure conducted by Schellman & Company, LLC and Schellman Compliance, LLC. Schellman uses cookies to enhance user experience and to analyze performance and traffic on our website. For more information, please review your cookie preferences options and Schellman’sPrivacy Notice Manage Choices Required only Accept all PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices