Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Why Data Discovery is Essential for PCI DSS Compliance

Published October 4, 2021
Author

Omer Imran Malik

Senior Data Privacy Consultant at Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

Companies are producing and processing data in massive volumes. This data is then scattered across a multitude of environments, such as on-premise infrastructure, SaaS applications, or across multi-cloud IaaS platforms. Apart from a company’s regulated environment on-premises, a significant part of data also exists across unregistered devices such as smartphones, emails, etc. This ultimately results in data sprawl, which in turn leads to a lack of visibility into personal information (PI) as well as sensitive data.

When companies deal with PI and sensitive data, such as customers’ financial information, it requires optimal protection against cyber security threats as well as strict compliance with privacy laws and industry standards, such as Payment Card Industry Data Security Standard (PCI DSS). Weak data protection strategies may lead to security breaches, which could be very harmful to the customers - leading to ID thefts, increased risk of fraud, and even harm to the reputation of the enterprises.

In some cases, customers may even sue an organization for its security failures and this could lead to massive financial damage and loss of consumer trust. In the case of payment processing services, a company might even lose important channels of business altogether. For example, not being able to protect cardholders’ data as per the PCI DSS standard may lead to prohibitions from processing further payments through credit and debit cards.

PCI DSS Compliance and Its Data Security Requirements

While most data privacy protection laws provide coverage for a broad range of personal data attributes, the PCI DSS governs only payment card processing-related attributes, mandating them to ensure the security of stored sensitive data resulting from payment card transactions.

When companies process payment card transactions, two types of sensitive data are generated: authentication data and non-authentication data. The authentication data is prohibited to be stored, as per PCI DSS regulations, and needs to be erased from every storage system immediately. This type of data includes Card Verification Value (CVV), Primary Account Number (PAN), and Personal Identification Number (PIN).

The non-authentication data includes the cardholder’s name, card expiration date, and service code. PCI DSS regulations allow the storage and processing of non-authentication data as long as it is protected and the organization’s information security standards in relation to this data comply with its policies.

12 PCI Data Security Requirements

PCI DSS mandates all sellers or payment card processing services ensure the safe and secure collection, transmission, and processing of cardholders’ data. PCI DSS has laid down 12 requirements, which are grouped under 6 goals. Every payment card processing service must comply with the defined security requirements:

Build and Maintain a Secure Network

  • Payment card processing services and merchants are required to ensure strict security measures by setting up firewalls. Firewalls are the first line of defense against unauthorized incoming and outgoing traffic on a network. By setting up rules and policies, firewall configuration can be hardened for improved data security.
  • PCI DSS further mandates that default security configurations shouldn't be left unattended and should be modified on existing and new systems. The regulatory authority further requires merchants and service providers to maintain a record of all systems and configurations.

Protect Cardholder Data

  • Merchants and sellers are required to ensure optimal protection of cardholders’ data. This can be achieved by locating where the data resides and determining whether it needs to be truncated, encrypted, hashed, or erased altogether.
  • Apart from ensuring the protection of data at rest, it is integral that merchants and service providers should encrypt the data when it is in transit. Whenever a cardholder’s data moves across any public or open networks, it needs to be encrypted via encryption standards, such as SSH and TLS, to name a few.

Maintain a Vulnerability Management Program

  • All systems, both on-premises and remote, need to have an antivirus or an anti-malware application installed. These applications further need to be kept up to date with the latest virus definition so the systems and the residing data of cardholders stay protected against known and new virus threats.
  • Merchants and service providers need to develop and maintain a security system that regularly scans and protects against security vulnerabilities. It is critical that all systems, such as POS terminals, computers, or routers, have the latest security patches installed.

Implement Strong Access Control Measures

  • A strict access control system should be maintained to ensure that the cardholders’ data is accessible to users on a need-to-know basis. Access control allows system administrators to reduce the chances of unauthorized access to cardholders’ sensitive information. This further requires the concerned entities to maintain a record of each person, their role, and access privileges.
  • The same requirement further mandates that the system administrators must assign unique IDs and passwords to users with access to sensitive information. This allows administrators to maintain a strict record of all activities and trace any abnormality or security breach.
  • PCI DSS requires merchants and service providers to restrict users’ physical access to sensitive data. This can be done by ensuring physical access control practices, such as keeping logs, using CCTV surveillance, etc.

Regularly Monitor and Test Networks

  • This PCI DSS data security requirement warrants strict service providers and merchants to have an audit policy and to maintain system logs. This will allow the information security teams to effectively monitor the logs for any suspicious activities.
  • The requirement further requires frequent monitoring of systems and tests for security vulnerabilities and exploits.

Maintain an Information Security Policy

  • The final requirement mandates that the merchants and service providers must establish and implement security policies for every employee, vendor, and contractor. This calls for background checks on personnel, regular risk assessments, etc.

The Need of Effective Data Discovery for PCI DSS Compliance

PCI DSS regulations require that the sensitive data of a cardholder which is collected, stored, and processed by the organization during and after a transaction, must be protected at all times. In order for organizations to comply with PCI DSS regulations, they must meet the established data security requirements, as discussed above.

In summary, the security requirements boil down to the following:

  • Access control
  • Security posture/assessment
  • Encryption or alternate security implementation
  • Vulnerability assessment

Assurance of these security requirements is only possible when the merchant or the service provider knows where cardholder data resides in its systems, and this is especially a problem due to data sprawl. For example, when data is accessed or used by multiple processes, it tends to spread to other systems. Apart from residing in the data assets in a known environment, a cardholder’s data may make its way to other devices inadvertently, such as a smartphone, personal laptop, or a BYOD machine due to the aforementioned data sprawl. Such data sprawl or leak is possible due to the cross-platform auto-synchronization.

Therefore, to ‘discover’ in which data systems customers’ cardholder data is stored, organizations must devise a method to scan data within their data systems to determine which of them falls within the definition of cardholder data or not and which of them is more sensitive than the other.

This is where PCI DSS card data discovery comes into play.

Data discovery starts with the identification of data assets across the network. It creates visibility into data assets by first gathering and building a catalog of all cloud-native and non-native data assets that could be across SaaS applications, IaaS data stores across multiple cloud providers, or on-premises. Effective data discovery systems allow identification of critical information, such as cardholder’s name, card expiration date, and other details in structured forms (tables and columns) or unstructured forms (spreadsheets, emails, etc).

Once the data assets are mapped and cataloged, the next step is to discover and classify the data within assets or object stores. Data classification helps categorize data as per its sensitivity or security risk. As a result, teams can determine the types of security measures that need to be implemented.

It’s only after an effective data discovery mechanism that the organization can assess the security posture of that database and the vulnerabilities that it may have. This provides a reliable basis for which the organization can implement security measures and other risk mitigations to ensure it remains protected.

Important Data Discovery Considerations for PCI Compliance

Before starting the PCI DSS card data discovery process, it is vital to define the scope of cardholder data (CHD) discovery and classification. Seller and service providers can attempt to define an accurate scope by taking into account the following important considerations:

  • Data discovery requires scanning of data across all the data assets and object stores. Organizations shouldn’t limit their card discovery scan to their card data environment (CDE). There are many ways through which card data can make its way out of the existing or pre-defined CDE. Therefore, it is vital for the service provider to conduct organization-wide data discovery.
  • Apart from taking an organization-wide scan, the discovery process should cover all the devices, platforms, and operating systems where the data may exist. Ruling out any device or platform may result in exposure to security risks.
  • Another important factor to consider is the file type and format. A cardholder’s data could exist in any format or type. The data discovery process should be able to recognize and classify every type of format so that no data remains undetected, and thus, exposed.
  • A cardholder’s sensitive data can exist anywhere in structured and unstructured systems. It is because of that, there’s a high chance that the discovery tool may result in False Positives. The false-positive refers to the data that incorrectly matches with the data that the tool is searching for.
  • If a cardholder’s data is breached, the organization might have to provide notification to the cardholder as per applicable data breach notification laws and might even have to offer risk mitigation services (ID theft insurance, etc.). Thus the data discovery tool should be able to link cardholder’s data back to the cardholder’s identity, using auto PI linking and sensitive data intelligence, to ease reporting requirements.

Sellers and service providers should use the right data discovery tool that can integrate natively with their card data environment and the cloud data assets. The tool should also offer a deep discovery feature that can scan and discover different personal and sensitive data attributes, use Machine Learning, AI, and contextual analysis to reduce false positives, identify security and privacy metadata within the data, and classify the risk posed by the data.

All in all, the data discovery tool should give detailed insights into the data type, its sensitivity level, security posture, and compliance.

Securiti Data Discovery Finds Personal and Sensitive Data Across SaaS, Hybrid, and Multi-Cloud

Securiti offers an AI-powered robotic data discovery tool, built to scan data in structured and unstructured systems across an organization’s dynamic environment. Along with sensitive data intelligence and Personal Information auto-linking, Securiti’s data discovery tool discovers Personal Information within structured or unstructured databases, identifies the type of data, appends its security, and privacy metadata, scores it according to the risk it poses, and auto-links it to the data subject’s ID. Thus, with our Data Discovery tool, organizations can:

  • Discover and catalog cardholder data (CHD) in their data assets, which is spread across their dynamic environments, under one roof.
  • Use native connectors to integrate with data assets for efficient cardholder data discovery.
  • Remove false positives using contextual inference that assesses detections.
  • Label predefined attributes to discovered cardholder data.
  • Identify authentication and non-authentication data attributes for PCI regulatory compliance.
  • Link card data to relevant cardholders for compliance with breach notification, consent management, and other applicable data privacy obligations.
  • Assess the security posture of the assessed cardholder data to recommend security measures.
  • Govern access control to cardholders’ data from a single dashboard.

See our Demo to watch our Data Discovery solution in action.


Frequently Asked Questions (FAQs)

PCI discovery refers to the process of identifying and locating sensitive payment card data within an organization's systems. It is crucial for ensuring compliance with the Payment Card Industry Data Security Standard (PCI DSS).

PCI (Payment Card Industry) data refers to sensitive information related to credit card payments, including cardholder names, card numbers, expiration dates, and security codes.

Card data discovery is the process of identifying and securing payment card data to protect it from unauthorized access and to comply with data security standards like PCI DSS.

PCI stands for Payment Card Industry, and it refers to the industry responsible for credit card and payment card processing.

PCI is needed to ensure the security of payment card data and protect cardholders from fraud and unauthorized transactions. Compliance with PCI standards is required for organizations that handle payment card information.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigation OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View
Spotlight 59:55

Building Safe
Enterprise AI

Watch Now View

Latest

Automating EU AI Act Compliance View More

Automating EU AI Act Compliance: A 5-Step Playbook for GRC Teams

Artificial intelligence is revolutionizing industries, driving innovation in healthcare, finance, and beyond. But with great power comes great responsibility—especially when AI decisions impact health,...

Gencore AI Customers Can Now Securely Use DeepSeek R1 View More

Gencore AI Customers Can Now Securely Use DeepSeek R1

Enterprises are under immense pressure to use Generative AI to deliver innovative solutions, extract insights from massive volumes, and stay ahead of the competition....

Best Practices for Microsoft 365 Copilot View More

Data Governance Best Practices for Microsoft 365 Copilot

Learn key governance best practices for Microsoft 365 Copilot to ensure security, compliance, and effective implementation for optimal business performance.

View More

An Overview of South Korea’s Basic Act on the Development of Artificial Intelligence and Creation of a Trust Base (Basic AI Act)

Gain insights into South Korea’s Basic Act on the Development of Artificial Intelligence and Creation of a Trust Base (Basic AI Act).

5-Step AI Compliance Automation Playbook View More

EU AI Act: 5-Step AI Compliance Automation Playbook

Download the whitepaper to learn about the EU AI Act & its implication on high-risk AI systems, 5-step framework for AI compliance automation and...

A 6-Step Automation Guide View More

Say Goodbye to ROT Data: A 6-Step Automation Guide

Eliminate redundant obsolete and trivial (ROT) data with a strategic 6-step automation guide. Download the whitepaper today to discover how to streamline data management...

Texas Data Privacy and Security Act (TDPSA) View More

Navigating the Texas Data Privacy and Security Act (TDPSA): Key Details

Download the infographic to learn key details about Texas’ Data Privacy and Security Act (TDPSA) and simplify your compliance journey with Securiti.

Oregon’s Consumer Privacy Act (OCPA) View More

Navigating Oregon’s Consumer Privacy Act (OCPA): Key Details

Download the infographic to learn key details about Oregon’s Consumer Privacy Act (OCPA) and simplify your compliance journey with Securiti.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New