What Is Sensitive Authentication Data in PCI Compliance?
Sensitive authentication data, aka SAD, in PCI compliance is data used by the issuers of cards to...
2 min read
David Gamey
:
Jun 8, 2022 12:00:00 AM
PCI DSS can be hard and not preparing for it just makes things harder. Following this advice is guaranteed to make it both more exciting and painful.
Don’t get us wrong, many new technologies are great and can really improve security. Much of it leverages cloud technologies. But just because it’s new and sexy doesn’t mean it gets a pass on PCI DSS. Products and services must be fit for purpose and that includes supporting your regulatory obligations. Many of these solutions directly impact security or may even access cardholder data. Here are some considerations for your due diligence:
Some examples: next generation anti-virus and endpoint defense.
Seriously, if you want your assessment to be smooth and boring you may find these articles useful.
If you'd like more entertaining reads, try these:
Original Publication: 2022-06-08
Updated PCI FAQ & Learn More links: 2023-06-16
Compliance can seem as dry as toast. Normally, it only gets exciting when things go wrong like when you find problems during an annual assessment, facing a looming deadline, with senior management breathing down your neck expecting a pass. Last minute discovery of problems gets extremely stressful. Failure becomes an option. Remediation is not guaranteed and can often be risky, sub-optimal, and expensive.
PCI DSS has 12 high-level requirements and over 250 sub-requirements each of which is an opportunity for failure. The kinds of challenges we describe are often avoidable and manageable. After all, PCI is an open book exam and there should be no excuse for not being prepared. If you are struggling with business-as-usual compliance, or have challenges, we can help.
David Gamey :
Dec 20, 2020 10:07:00 PM
Sensitive authentication data, aka SAD, in PCI compliance is data used by the issuers of cards to...
Username enumeration (sometimes called account enumeration) is when it is possible for a hacker to...
David Gamey :
Jul 19, 2017 12:00:00 AM
Now is the time to stop using 64-bit block length ciphers such as 3DES (TDEA) and Blowfish in...