• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

PCI DSS Version 3.2 Released – Key Changes

PCI DSS Version 3.2 Released – Key Changes

 Alpine Security offers PCI Compliance Audit Assistance

The PCI Security Standards Council published version 3.2 of PCI DSS this week on April 28, 2016. Organizations should implement version 3.2 as soon as possible to prevent, detect, and respond to cyberattacks that can lead to payment data breaches. Key differences between version 3.1 and version 3.2 include:

  • Revised Secure Sockets Layer (SSL) and early Transport Layer Security (TLS) sunset dates as outlined in the Bulletin on Migrating from SSL and Early TLS.

  • Formal processes for detection and reporting on failures of critical security controls.

  • Expansion of requirement 8.3 to include use of multi-factor authentication for administrators accessing the cardholder data environment.

  • Penetration testing to validate cardholder data network segmentation and isolation is now required every six months instead of annually.

  • Additional security validation steps for service providers and others, including the “Designated Entities Supplemental Validation” (DESV) criteria, which was previously a separate document.

PCI SSC released a full summary of changes from version 3.1 to version 3.2.  Version 3.1 expires on October 31, 2016, however organizations have until February 1, 2018 to fully implement PCI DSS version 3.2.  These key dates are outlined below:

  • April 2016: PCI DSS 3.2, as well as all supporting documents and SAQs, will be released.

  • October 2016: PCI DSS 3.1 will retire six months after the release of PCI DSS 3.2, and all assessments or SAQs taken after that time will need to use version 3.2. This is significant for those with year-end annual assessment cycles.

  • February 2018: All new requirements within PCI DSS 3.2 will become effective. (Prior to that they will be considered “best practices.”)

PCI DSS version 3.2 can be found here:

https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2.pdf

Resources

  • PCI Compliance Services

Tags: AuditComplianceCredit CardsPCI DSS
Share

You also might be interested in

Who Needs Pen Testing? 3 Industries that Rely on It
World Network Safety Concept. Global Internet Network Conceptual Modern Technology Illustration.

Who Needs Pen Testing? 3 Industries that Rely on It

Mar 16, 2018

Nobody Likes a Compliance Audit… and Why You Should Do Them Anyway!
High quality 3d render of a modern keyboard with blue compliance button on a blue background and copy space. Blue compliance keyboard button has a text and an icon on it. Compliance keyboard button is in focus, Horizontal composition with copy space.

Nobody Likes a Compliance Audit… and Why You Should Do Them Anyway!

Apr 4, 2018

GDPR Overview and Compliance
General Data Protection Regulation (GDPR) to do list

GDPR Overview and Compliance

Apr 15, 2018

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company

Prev Next