What are the most commonly accepted database security controls used to comply with PCI DSS? I'm concerned that since there is some subjectivity involved, our assessor won't be OK with our choices.
Ask the expert!
Got a vexing problem for Mike Chapple or any of our other experts? Ask your enterprise-specific questions today! (All questions are anonymous.)
If the database in question is contained within a cardholder data environment, you must comply with each and every provision of the Payment Card Industry Data Security Standard (PCI DSS). In such a case, review the PCI DSS guidelines thoroughly and ensure that the operating environment complies with each requirement contained within the standard.
That being said, there are some common steps that can ease the burden of achieving a PCI-compliant database. First, carefully consider whether it is necessary to store sensitive cardholder information, particularly account numbers, in the database. If business practices can be modified so that this information is not stored in electronic form, the number of actions that must be taken to maintain PCI DSS compliance will be reduced dramatically. For example, many organizations are choosing to outsource portions of their credit card operations and do not retain anything other than the last four digits of credit card numbers to simplify their compliance environments.
If an organization does choose to store credit card information in its database, payment account numbers must be encrypted at all times using strong encryption and appropriate key management practices that maintain the security of this highly sensitive information. Additionally, it is never permissible to store the security code associated with a credit card or the complete contents of the magnetic strip on a credit card.
Beyond the steps required to protect credit card data, secure system administration practices must also be applied as described in PCI DSS to database servers, including implementing strong authentication, ensuring the use of encryption for nonconsole administrative access and maintaining a detailed log history for the organization's database servers. Databases must be implemented on servers dedicated to that function and placed in a network zone where they may not be directly accessed from the Internet.
Maintaining a PCI-compliant database is a complex undertaking and a responsibility that should not be assumed lightly. I strongly recommend that any organization undergoing this process carefully evaluates its business practices to determine whether the use of a database to store credit card information is absolutely necessary. If it is, engage in a methodical risk assessment and review the database security controls already in place against the PCI DSS requirements.
Dig deeper on PCI Data Security Standard
Related Q&A from Mike Chapple, Enterprise Compliance
Should companies obtain U.S. security clearance to join the Enhanced Cybersecurity Services program? Mike Chapple offers his perspective.continue reading
Does a Web application security assessment termed 'compliance ready' seem too good to be true? Learn its role in an enterprise compliance program.continue reading
Learn how hiring the right PCI DSS-compliant service providers, especially payment services providers, can reduce your compliance burden.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.