Version 1.1 Extends Scope of Secure Software Standard

5. May 2021

The PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Standard and associated Program Guide last week. This standard is part of the PCI Software Security Framework and will completely supersede the previous payment application standard, the PCI PA-DSS, as of October 28, 2022.  

The Secure Software Standard has a modular structure. Each module contains a set of requirements that address a specific use cases. This design makes the Secure Software Standard much more dynamic and adaptable for updates and changes reflecting future developments. So far, the PCI Council has published two modules: The “Core” module with general security requirements for all payment applications and the “Account Data Protection” module, which includes specific requirements for payment applications that store, process, or transmit cardholder data or sensitive authentication data.

The new version 1.1 now introduces the previously announced additional module "Terminal Software". It contains a number of requirements for payment applications intended for deployment and operation on PCI-approved card readers, for example. Explicitly excluded from this is the firmware of these devices. Applications intended for deployment and operation on other platforms are also not affected by this module.

Beyond that, the revised version sharpens some of the terms and definitions used and contains some minor corrections.


Reminder:

Submissions of new payment applications for certification according to PA-DSS are only possible until 30 June, 2021. Newly submitted payment applications must then be certified directly according to the new Secure Software Standard.

Read how to make the transition from PA-DSS to the Secure Software Standard here.

Do you have questions about the Secure Software Standard or need assistance with transitioning? Get in touch, we are happy to help.

Also interesting:

Security Advisories on Entra ID and Tenable Nessus Manager

Security Advisories on Entra ID and Tenable Nessus Manager

The pentest professionals at usd HeroLab identified a vulnerability during a cloud pentest that allows the circumvention of conditional access policies for privileged identities in Microsoft Entra ID through the combination of role-based policy assignment and...

Categories

Categories