SSL / TLS 1.0 Deadline for PCI DSS

22. January 2018

The Secure Socket Layer (SSL) protocol developed by Netscape and the Transport Layer Security (TLS) protocol standardised by the Internet Engineering Taskforce (IETF) are encryption protocols that provide authentication and data encryption. Developed in the early 1990s, SSL is the predecessor of TLS and has undergone several revisions over the past few years to address security vulnerabilities and support stronger, more secure cipher suites and algorithms. Among the most important ones are SSL 3.0 (1996), TLS 1.0 (1999), TLS 1.1 (2006) and TLS 1.2 (2008).

Many organisations today still use the early versions of the protocol (<TLS 1.1). In this case, PCI DSS previously required organisations to implement a “risk mitigation” and a “migration plan” in order to maintain PCI DSS compliance. These include the following requirements:

Requirement 2.2.3Implement additional security features for any required services, protocols, or daemons that are considered to be insecure.
Requirement 2.3Encrypt all non-console administrative access using strong cryptography.
Requirement 4.1Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks.

 
The PCI SSC (Security Standards Council) has set 30 June 2018 as the deadline, after the expiration of which NONE of the early versions of the protocol may any longer be used in the context of the above requirements in order to be PCI DSS compliant. This applies to all versions prior to TLS 1.1.
The PCI SSC wants to take action against known exploits such as POODLE or BEAST, which exploit the vulnerabilities associated with the early protocol versions.
This rule can only be circumvented by using point of interaction (POI) terminals and proving that the terminals in use, including the termination points to which they connect, are not susceptible to known exploits.
 
(Source: https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls)
 
About the PCI Expert Tips:
With our PCI Expert Tips, we would like to keep you informed about changes to the PCI Security Standards and provide you with initial explanations as to what the changes entail and how they may affect you. Please always take our articles only as a general reference – they do not replace individual case-by-case evaluations.
 
Should you have any questions or need assistance with your scope definition, please contact us. Our specialists are happy to help you,
+49 6102 8631-190
sales@usd.de

Also interesting:

PCI DSS v4.0: INFI Worksheet Discontinued

PCI DSS v4.0: INFI Worksheet Discontinued

The Payment Card Industry Security Standards Council (PCI SSC) announced it is discontinuing the Items Noted for Improvement (INFI) Worksheet. INFI, a template for documenting items for improvement, had been introduced with PCI DSS v4.0. Effective immediately, QSAs...

Cloud Provider plusserver Certified According to PCI DSS v4.0

Cloud Provider plusserver Certified According to PCI DSS v4.0

At the beginning of 2024, the leading German cloud provider plusserver was certified by usd AG according to the globally mandatory PCI DSS v4.0 credit card security standard. With its cloud platforms, plusserver provides its customers with a data-sovereign and...

Categories

Categories