advertisement
advertisement

This is page 2 of:

Complying With Visa’s July 1 PA-DSS Mandate

June 10th, 2010

PA-DSS applies to third-party applications that store, process or transmit cardholder data as part of the authorization and settlement process. Importantly, this definition includes both standalone applications and payment modules of larger enterprise resource planning (ERP) systems. In all cases, though, you license and host these applications internally.

PA-DSS does not address applications built internally or those that have been extensively customized. These apps are in your PCI scope and are included as part of your annual assessment. Similarly, third-party hosted or Software-as-a-Service (SaaS) payment applications are not covered by PA-DSS because you do not host the application.

Also excluded from PA-DSS are back-office and other back-office types of applications that, while they may access cardholder data, are not directly involved in the authorization or settlement of card transactions.

Lastly, that an application is PA-DSS validated says nothing about its functionality. The application may or may not meet your needs; it may be a horrible application. All PA-DSS says is that app should be compliant and it doesn’t store sensitive cardholder data.

PA-DSS validated applications are not magic. They do not make you PCI compliant. The best you can get: If you install the application according to the vendor’s implementation guide (Hint: Get the guide before you buy!) and install it in a PCI-compliant environment, that application should facilitate and support your PCI DSS compliance. Does this sound a little vague? You bet; but again, it is the best you are going to get. You are still responsible for satisfying all PCI requirements throughout the environment and for maintaining the relevant controls within the PA-DSS application.

What if you have an application not on the PA-DSS list? You could upgrade your noncompliant application with one from the list. Alternatively, it’s important to remember that your acquirer has a critical role in PCI and that that role includes payment applications. If you read the fine print within Visa’s mandate, you’ll see that your acquirer may assess a payment application using its own, alternate, internal validation processes. So long as the acquirer confirms that an application meets all the PA-DSS requirements and facilitates the merchant’s PCI compliance, it meets Visa’s mandate. Some acquirers are doing precisely this, so you may want to check with them to see what program they may have in place.

Your last option is to take the application in-house and include it as part of your PCI DSS assessment, just as though you built it internally. This alternative is admittedly a last resort, and it only makes sense if your users really feel this is the only application on the planet that meets their needs. You will need to get the source code and the documentation, in addition to taking full responsibility for maintaining the application. This decision will also likely trigger a new round of penetration testing and vulnerability scanning, because the new application constitutes a significant change in your cardholder data environment.

As you look at Visa’s July 1 mandate, retail CIOs should keep a few things in mind. If you have a payment application (not back-office payment applications only) that is not PA-DSS validated, talk to your acquirer. After all, Visa’s mandate is between that brand and its acquirers. If your acquirer doesn’t have a solution, your most likely course will be to replace the application with a compliant one. Alternatively, you could outsource (including SaaS) the application. As a last resort, you could pull the application in-house and include it in your PCI assessment. When you use the PA-DSS list, make sure you understand which modules and specific versions are validated so you don’t have to replace the application a second time.

What do you think? I’d like to hear your thoughts. Either leave a comment or email me at wconway@403labs.com.


advertisement

5 Comments | Read Complying With Visa’s July 1 PA-DSS Mandate

  1. Chalky Says:

    This deadline date is interesting, guidance in Europe from VISA Europe is as follows (of course VISA Inc will have their own opinion) :

    Effective 1 July 2010, acquirers must ensure that all merchants using payment applications that store (or cause to be stored) sensitive authentication data post-authorisation, or applications that are listed as ‘‘vulnerable’’ by either Visa Europe or Visa Inc. must move to applications that do not store sensitive authentication data.

    Effective 1 July 2010, acquirers must ensure that all new merchants only use PA-DSS compliant applications
    ————————————————-
    But when you ask for further clarification they state reply with the following:

    New merchants applies to brand new merchants only, not merchants moving from one acquirer to another.

    Note the use of compliant, at this stage we are not mandating the certification of applications.
    ————————————————-
    So breaking it down further, Acquirers must ensure merchants dont use a listed ‘vulnerable’ paymwent app from July 1st. Then, new merchants, who have never had a bank acocunt or business before must use a compliant app but not one that has been certified from July 1st..

  2. Chalky Says:

    This deadline date is interesting, guidance in Europe from VISA Europe is as follows (of course VISA Inc will have their own opinion) :

    Effective 1 July 2010, acquirers must ensure that all merchants using payment applications that store (or cause to be stored) sensitive authentication data post-authorisation, or applications that are listed as ‘‘vulnerable’’ by either Visa Europe or Visa Inc. must move to applications that do not store sensitive authentication data.

    Effective 1 July 2010, acquirers must ensure that all new merchants only use PA-DSS compliant applications
    ————————————————-
    But when you ask for further clarification they state reply with the following:

    New merchants applies to brand new merchants only, not merchants moving from one acquirer to another.

    Note the use of compliant, at this stage we are not mandating the certification of applications.
    ————————————————-
    So breaking it down further, Acquirers must ensure merchants dont use a listed ‘vulnerable’ payment app from July 1st. Then, new merchants, who have never had a bank account or business before must use a compliant app but not one that has been certified from July 1st..

  3. Walt Conway Says:

    @Chalky,
    I find it very surprising that Visa or any brand or acquirer would draw a distinction between a new vs. existing merchant, especially when it comes to PCI. To me it makes no sense. In fact, with merchant IDs and retail locations coming and going, I’m not even sure I know what a “new merchant” would be in this context.

    In case you can’t tell, I’m really hoping that the person to whom you spoke misunderstood the question. Did you speak to a compliance/risk person? The answer you got is particularly confusing since several of the earlier mandates (that were part of the same release) dealt explicitly with “newly boarded merchants” as opposed to new merchants.

    Merchant risk and PCI compliance is too important to have all kinds of conditions attached. Let’s hope Visa Europe clarifies.

  4. Chalky Says:

    The repsonse came back via email from the compliance team for PA-DSS / Payment applications at VISA Europe……..I also asked to see the list of vulnerable ‘third-party apps’ mentioned in your article and they told me it doesnt get put on general release and only goes to the acquirers…….

  5. Walt Conway Says:

    Well, I guess Visa Europe did clarify their position as you say. I’m a little surprised, but it is their brand and their region, so I guess they get to make the rules. As for the list of known compromised apps, you got the standard response. Visa does not release that list, but as you say your acquirer has direct access to it and can advise you if any app (or version!) you have is known to have been compromised.

    Thanks for the update from Visa.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.