I read recently that a PCI DSS official recommended a "risk-based approach" to PCI that allows for partial compliance...
by meeting the compliance obligations in stages. Is there such a thing, and is it a practical way to achieve PCI compliance?
Ask the Expert!
Have questions about regulatory compliance? Send them via email today! (All questions are anonymous.)
The short answer to your question is no. There is no way to achieve PCI DSS compliance other than to achieve 100% compliance with the portions of the standard that are relevant to your organization. When it comes to PCI DSS compliance, there are no "shades of gray." You are either compliant or noncompliant.
My guess is the PCI DSS official you read about was referring to the Prioritized Approach to PCI DSS Compliance. This guide is meant to provide organizations with a risk-based approach to becoming compliant by having them address the most important items first, thereby reducing the likelihood of a breach. This approach has six milestones:
- Remove sensitive authentication data and limit data retention.
- Protect the perimeter, internal and wireless networks.
- Secure payment card applications.
- Monitor and control access to your systems.
- Protect stored cardholder data.
- Finalize remaining compliance efforts, and ensure all controls are in place.
The "catch" is milestone six, which basically says, "Do everything else you need to do to become compliant." To be clear, while this approach allows you to meet specific requirements in stages, it does not mean you are compliant during the process. Your organization is subject to fines and other noncompliance sanctions until you are fully compliant. The PCI DSS Prioritized Approach document sums this up well with a disclaimer reading, in part, "To achieve PCI DSS compliance, an organization must meet all PCI DSS requirements, regardless of the order in which they are satisfied or whether the organization seeking compliance follows the PCI DSS Prioritized Approach."
Dig Deeper on PCI Data Security Standard
Related Q&A from Mike Chapple
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading