"For wireless networks transmitting cardholder data or connected to cardholder environments, verify that appropriate encryption methodologies are used for any wireless transmissions, such as: Wi-Fi Protected Access (WPA or WPA2), IPSEC VPN, or SSL/TLS."
It's unlikely that the PCI Security Standards Council will ever require the use of encryption over dedicated lines....
The passing of unencrypted data over a closed network carries only a small risk, and there are simply much greater threats that the PCI DSS must protect against. We're far more likely to see changes similar to the stricter revisions of the PCI Data Security Standard version 1.1. For example, we might see additional requirements limiting the storage of cardholder data or requiring more stringent reviews of security controls.
The implications of such an encryption requirement would be broad and far-reaching. Consider, for example, the public switched telephone network (PSTN). As a closed, non-public system, you're not currently required to use encryption when passing cardholder information over it. If the PCI DSS required encryption over telephone lines, virtually every dial-up credit card terminal in the world would need to be replaced with a model that supports encryption. And that's just one example. So in my opinion, it's unlikely to happen, and enterprises shouldn't spend time planning for this scenario.
Related Q&A from Mike Chapple
The updated HITRUST Common Security Framework allows organizations to manage privacy, security and compliance with one framework. Here's how it works...continue reading
A HIPAA audit covers privacy compliance, and organizations need to be prepared. Expert Mike Chapple discusses privacy in the audits.continue reading
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.