Version 1.1 Extends Scope of Secure Software Standard

5. May 2021

The PCI Security Standards Council (PCI SSC) released version 1.1 of the Secure Software Standard and associated Program Guide last week. This standard is part of the PCI Software Security Framework and will completely supersede the previous payment application standard, the PCI PA-DSS, as of October 28, 2022.  

The Secure Software Standard has a modular structure. Each module contains a set of requirements that address a specific use cases. This design makes the Secure Software Standard much more dynamic and adaptable for updates and changes reflecting future developments. So far, the PCI Council has published two modules: The “Core” module with general security requirements for all payment applications and the “Account Data Protection” module, which includes specific requirements for payment applications that store, process, or transmit cardholder data or sensitive authentication data.

The new version 1.1 now introduces the previously announced additional module "Terminal Software". It contains a number of requirements for payment applications intended for deployment and operation on PCI-approved card readers, for example. Explicitly excluded from this is the firmware of these devices. Applications intended for deployment and operation on other platforms are also not affected by this module.

Beyond that, the revised version sharpens some of the terms and definitions used and contains some minor corrections.


Reminder:

Submissions of new payment applications for certification according to PA-DSS are only possible until 30 June, 2021. Newly submitted payment applications must then be certified directly according to the new Secure Software Standard.

Read how to make the transition from PA-DSS to the Secure Software Standard here.

Do you have questions about the Secure Software Standard or need assistance with transitioning? Get in touch, we are happy to help.

Also interesting:

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

Users of the SWIFT network are required to demonstrate compliance with the mandatory security controls through an annual independent audit in accordance with the Customer Security Control Framework (CSCF). As part of this SWIFT Assessment, the security of an...

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened systems. One such vulnerability lies in invalid character encodings that violate the UTF-8 standard. While overlong UTF-8...

Categories

Categories