« Microsoft Patch Tuesday: Microsoft releases four critical patches | Main | Tools: Peach 2.1 Fuzzing Framework BETA3 Released »

Payment Card Industry (PCI) Mandate Stresses Importance of Web Application Security: Recommended Becomes Required

"On June 30, another refresh of the Payment Card Industry (PCI) Data Security Standards (PCI DSS) will upgrade Web application security testing from a best practice to a mandatory practice. The deadline forces merchants and vendors to take a closer look at application-layer security and emphasizes its importance in fighting increasing online threats.

The Payment Card Industry Data Security Standards were developed by the five leading payment card brands – American Express Co., Visa International, MasterCard Worldwide, Discover Financial Services LLC, and Japan-based JCB International Credit Card Co. Ltd - now organized as the PCI Security Standards Council, to ensure the protection of consumer credit card information and to set a global standard for security."

"The original PCI documentation stated that “the most elusive vulnerabilities are those introduced through custom-developed e-commerce applications.” Gartner Inc. has estimated that 75 percent of online attacks target Web applications, specifically. As such, the new PCI mandate recognizes the critical importance of securing applications in an effort to maintain a vulnerability management program by offering more clarity around what is required for Web application security compliance.

It mandates that all web applications are protected against known attacks by applying either application code review or a web application firewall. To further clarify the requirements, the PCI security Standards Council issued an addendum in April of this year explaining what qualifies as a code review: 1) manual review of application source code; 2) proper use of automated application source code analyzer (scanning) tools; 3) manual Web application security vulnerability assessment; or 4) proper use of automated Web application security vulnerability assessment scanning tools."

Article Link: http://www.net-security.org/article.php?id=1143


Feed You can follow this conversation by subscribing to the comment feed for this post.

All Comments are Moderated and will be delayed!