2 min read

PCI Compliance Challenges for Banks and Credit Unions

PCI Compliance Challenges for Banks and Credit Unions


Here are the key takeaways from this blog:

  • Financial institutions benefit from established GLBA-compliant security programs and rigorous audits, giving them a strong foundation for PCI compliance
  • Card brands focus more on retail, but banks and credit unions must prioritize PCI compliance due to key differences in requirements beyond GLBA
  • Key PCI focus areas for financial institutions include encrypting data at rest, network segmentation to limit cardholder data scope, and robust file integrity monitoring to protect audit logs
  • Staying updated with PCI DSS v4 and seeking expert guidance can streamline compliance efforts and reduce risks related to cardholder data security

 

Simplifying PCI Compliance 

Learn how to manage PCI compliance with less effort in our webinar

Watch Webinar  SCHEDULE A DEMO

 

Regarding PCI compliance, financial institutions have an advantage. Having complied with GLBA for several years, banks and credit unions have relatively robust and complete information security programs in place. They are audited several times per year by FDIC, NCUA, State, external firms, internal auditors, SOX audits, etc.

 

The problem is card brands like Visa and MasterCard have been focused on the retail industry as a major trouble area. Compared to most retailers, financial institutions are more mature in their Information Security Management and Audit programs, less likely to cause a breach, and are therefore not the initial priority.

 

Even with a head start, financial institutions still need to put PCI compliance and PCI Assessments high on the list of projects.

 

The good news is many PCI controls are in place: firewalls, change management, policy documents, etc. However, there are three areas where GLBA audits and PCI requirements don’t overlap - making it high potential areas where examiners will likely focus their questions.

 

1. Encrypting Data at Rest. PCI requirement 3.4 requires the primary account number to be rendered unreadable (e.g. encrypted, truncated, tokenized) anywhere it is stored unless it is in non-persistent memory (RAM Volatile Memory. However, it is essential to implement appropriate controls to guarantee that memory remains in a non-persistent state. Once the business objective is fulfilled, (transaction completed)  data should be promptly cleared from volatile memory.

FFIEC and other banking guidance reference encryption, but examiners typically do not document exceptions if the data are internal and appropriate access controls are effective.

 

2. Network Segmentation. While not a direct requirement, limiting the scope of the cardholder data environment (CDE) is desirable to limit the compliance scope and save costs. 

 

Segmentation can be accomplished through various physical or logical means, like appropriately configured internal network security controls, access-restricted routers, or other technologies. For PCI DSS compliance, a system component is deemed out of scope if it's effectively isolated from the Cardholder Data Environment (CDE), ensuring that any compromise of that component wouldn't affect the CDE's security.

 

In many cases based on traditional network architecture and a business need to see full card numbers, the entire network may be in scope. Not completely horrible by itself, but cybersecurity compliance efforts could get expensive where multiple branches and facilities are involved.

 

3. File Integrity Monitoring. PCI section 10.3 requires that audit logs are protected from destruction and unauthorized modifications. 

 

This requirement emphasizes the importance of logging mechanisms for tracking user activities, which play a vital role in preventing, detecting, or mitigating the effects of a data breach. Having logs across all system components and within the cardholder data environment (CDE) enables comprehensive tracking, alerting, and analysis in the event of an incident, facilitating the identification of the compromise's root cause.

*Auditing system-level events can be done natively in Windows, but introduces performance issues. Many institutions will be better off with a commercial FIM solution like Bit9 or Verdasys.

 

If you haven’t yet looked at PCI DSS v4, I highly recommend downloading it from the PCI Security Standards Council website.


If you're seeking guidance on navigating and implementing your own organization, reach out to us for expert guidance on a PCI self-assessment or support with your ongoing cybersecurity compliance.

 

Simplifying PCI Compliance 

Learn how to manage PCI compliance with less effort in our webinar

Watch Webinar  SCHEDULE A DEMO

 

 

What is PCI DSS Level 1 Compliance?

What is PCI DSS Level 1 Compliance?

Payment Card Industry Data Security Standard, also known as PCI DSS, is the set of requirements established by an independent council that ensures...

Read More
How to Fix PCI Compliance Issues

1 min read

How to Fix PCI Compliance Issues

Here are the key takeaways from this blog: PCI compliance is more than checking boxes—missteps like unclear scope, outdated processes, or incorrect...

Read More
PCI Data Security Compliance Standards for 2022

1 min read

PCI Data Security Compliance Standards for 2022

Here are the key takeaways from this blog: PCI compliance remains essential for any organization handling credit card data, with standards covering...

Read More