advertisement
advertisement

Complying With Visa’s July 1 PA-DSS Mandate

Written by Walter Conway
June 10th, 2010

A 403 Labs QSA, PCI Columnist Walt Conway has worked in payments and technology for more than 30 years, 10 of them with Visa.

In the same way you wouldn’t buy your gold Rolex from a street vendor, you shouldn’t buy a software payment application that is not on the PCI Council’s list of PA-DSS validated applications. My advice to retailers: If an application is not on the list, don’t even include it in an RFP. (For a look at the apps that were found to actually retain prohibited data, see our story about the Visa Bad Apps list.)

In October 2007, Visa issued a series of mandates to acquirers addressing merchant PCI compliance. The last of these mandates says acquirers have to ensure that their merchants who use third-party payment applications are using only PA-DSS-compliant versions by July 1, 2010. (Note: This date refers to Visa USA; other regions may have different timelines.)

Although originally aimed at smaller Level 3 and Level 4 merchants, a few nuances to this mandate have a number of Level 1 CIOs scratching their heads. Unfortunately, the mandate may also cause some CIOs to look for PA-DSS validated applications when they may not necessarily need to. In a few cases, it may even cause CIOs to reject a potential software application unnecessarily. To avoid either mistake, we should understand what Visa’s mandate does and does not cover, in addition to some nuances in the PA-DSS program.

The PA-DSS evolved from Visa’s Payment Application Best Practices (PABP) program, the goal of which was eliminating “vulnerable payment applications.” These apps are defined as those that store the magnetic stripe (or chip) information or other sensitive authentication data such as the three-digit security codes or PINs. Visa maintains a list of vulnerable payment applications and updates it quarterly. Although the brand does not release this list publicly, you can check the status of any application you have by contacting your acquirer.

The applications on the PA-DSS list are version-specific, so make sure your vendor delivers a compliant version. You want to avoid the pleasure of paying again for an upgrade to the PA-DSS validated one. Validated applications have an expiry date, so check that, too, when you are evaluating your purchase.


advertisement

5 Comments | Read Complying With Visa’s July 1 PA-DSS Mandate

  1. Chalky Says:

    This deadline date is interesting, guidance in Europe from VISA Europe is as follows (of course VISA Inc will have their own opinion) :

    Effective 1 July 2010, acquirers must ensure that all merchants using payment applications that store (or cause to be stored) sensitive authentication data post-authorisation, or applications that are listed as ‘‘vulnerable’’ by either Visa Europe or Visa Inc. must move to applications that do not store sensitive authentication data.

    Effective 1 July 2010, acquirers must ensure that all new merchants only use PA-DSS compliant applications
    ————————————————-
    But when you ask for further clarification they state reply with the following:

    New merchants applies to brand new merchants only, not merchants moving from one acquirer to another.

    Note the use of compliant, at this stage we are not mandating the certification of applications.
    ————————————————-
    So breaking it down further, Acquirers must ensure merchants dont use a listed ‘vulnerable’ paymwent app from July 1st. Then, new merchants, who have never had a bank acocunt or business before must use a compliant app but not one that has been certified from July 1st..

  2. Chalky Says:

    This deadline date is interesting, guidance in Europe from VISA Europe is as follows (of course VISA Inc will have their own opinion) :

    Effective 1 July 2010, acquirers must ensure that all merchants using payment applications that store (or cause to be stored) sensitive authentication data post-authorisation, or applications that are listed as ‘‘vulnerable’’ by either Visa Europe or Visa Inc. must move to applications that do not store sensitive authentication data.

    Effective 1 July 2010, acquirers must ensure that all new merchants only use PA-DSS compliant applications
    ————————————————-
    But when you ask for further clarification they state reply with the following:

    New merchants applies to brand new merchants only, not merchants moving from one acquirer to another.

    Note the use of compliant, at this stage we are not mandating the certification of applications.
    ————————————————-
    So breaking it down further, Acquirers must ensure merchants dont use a listed ‘vulnerable’ payment app from July 1st. Then, new merchants, who have never had a bank account or business before must use a compliant app but not one that has been certified from July 1st..

  3. Walt Conway Says:

    @Chalky,
    I find it very surprising that Visa or any brand or acquirer would draw a distinction between a new vs. existing merchant, especially when it comes to PCI. To me it makes no sense. In fact, with merchant IDs and retail locations coming and going, I’m not even sure I know what a “new merchant” would be in this context.

    In case you can’t tell, I’m really hoping that the person to whom you spoke misunderstood the question. Did you speak to a compliance/risk person? The answer you got is particularly confusing since several of the earlier mandates (that were part of the same release) dealt explicitly with “newly boarded merchants” as opposed to new merchants.

    Merchant risk and PCI compliance is too important to have all kinds of conditions attached. Let’s hope Visa Europe clarifies.

  4. Chalky Says:

    The repsonse came back via email from the compliance team for PA-DSS / Payment applications at VISA Europe……..I also asked to see the list of vulnerable ‘third-party apps’ mentioned in your article and they told me it doesnt get put on general release and only goes to the acquirers…….

  5. Walt Conway Says:

    Well, I guess Visa Europe did clarify their position as you say. I’m a little surprised, but it is their brand and their region, so I guess they get to make the rules. As for the list of known compromised apps, you got the standard response. Visa does not release that list, but as you say your acquirer has direct access to it and can advise you if any app (or version!) you have is known to have been compromised.

    Thanks for the update from Visa.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.