"For wireless networks transmitting cardholder data or connected to cardholder environments, verify that appropriate encryption methodologies are used for any wireless transmissions, such as: Wi-Fi Protected Access (WPA or WPA2), IPSEC VPN, or SSL/TLS."
It's unlikely that the PCI Security Standards Council will ever require the use of encryption over dedicated lines....
The passing of unencrypted data over a closed network carries only a small risk, and there are simply much greater threats that the PCI DSS must protect against. We're far more likely to see changes similar to the stricter revisions of the PCI Data Security Standard version 1.1. For example, we might see additional requirements limiting the storage of cardholder data or requiring more stringent reviews of security controls.
The implications of such an encryption requirement would be broad and far-reaching. Consider, for example, the public switched telephone network (PSTN). As a closed, non-public system, you're not currently required to use encryption when passing cardholder information over it. If the PCI DSS required encryption over telephone lines, virtually every dial-up credit card terminal in the world would need to be replaced with a model that supports encryption. And that's just one example. So in my opinion, it's unlikely to happen, and enterprises shouldn't spend time planning for this scenario.
Dig Deeper on Disk and file encryption tools
Related Q&A from Mike Chapple
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between ... Continue Reading
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ... Continue Reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ... Continue Reading