Version 1.1 Extends Scope of Secure Software Standard

5. May 2021

The PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Standard and associated Program Guide last week. This standard is part of the PCI Software Security Framework and will completely supersede the previous payment application standard, the PCI PA-DSS, as of October 28, 2022.  

The Secure Software Standard has a modular structure. Each module contains a set of requirements that address a specific use cases. This design makes the Secure Software Standard much more dynamic and adaptable for updates and changes reflecting future developments. So far, the PCI Council has published two modules: The “Core” module with general security requirements for all payment applications and the “Account Data Protection” module, which includes specific requirements for payment applications that store, process, or transmit cardholder data or sensitive authentication data.

The new version 1.1 now introduces the previously announced additional module “Terminal Software“. It contains a number of requirements for payment applications intended for deployment and operation on PCI-approved card readers, for example. Explicitly excluded from this is the firmware of these devices. Applications intended for deployment and operation on other platforms are also not affected by this module.

Beyond that, the revised version sharpens some of the terms and definitions used and contains some minor corrections.


icon symbol orange 007

Reminder:

Submissions of new payment applications for certification according to PA-DSS are only possible until 30 June, 2021. Newly submitted payment applications must then be certified directly according to the new Secure Software Standard.

Read how to make the transition from PA-DSS to the Secure Software Standard here.

Do you have questions about the Secure Software Standard or need assistance with transitioning? Get in touch, we are happy to help.

Also interesting:

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Categories

Categories