PCI Secure Software Lifecycle Standard eligible for more software vendors

3. March 2021

Recently the PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Lifecycle (Secure SLC) Standard and the corresponding Program Guide. This company certification out of the PCI Software Security Framework (PCI SSF) allows software vendors to prove that they have integrated comprehensive security measures into their complete software lifecycle.

Our accredited Secure SLC assessors have reviewed the key changes compared to the original version for you:

The majority of the changes were made to correct minor errors and to sharpen definitions and important terms. But the following expansion of the definition, concerning the eligibility, has exciting implications.

For purposes of this document (including Section A.3 of Appendix A hereto):
“Eligible Software” means any software or software component that may be present in a payment environment and either (a) is directly involved in storing, processing, or transmitting payment data (“Payment Software”) or (b) does not directly handle payment data but may share resources defined within a payment environment;

[Source: https://www.pcisecuritystandards.org/documents/PCI-Secure-SLC-Program-Guide-v1_1.pdf]

The standard is therefore no longer limited to providers of payment software that directly stores, processes or transmits payment data. The addition of part (b) will make it easier for other software vendors to participate in the Secure SLC program and achieve validation according to it.


Do you have questions about a certification according to the PCI Secure Software Lifecycle Standard or do you need support? Contact us, we are happy to help.

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories