Vendor Management and Third-Party Risks in PCI DSS Compliance
Vendor Management and Third-Party Risks in PCI DSS Compliance Shubhi Bhargava April 12, 2025...
Processing of cardholder data (CHD) for services and goods is widespread across business sectors, requiring companies to ensure protection of their customers’ payment card details. The Payment Card Industry Data Security Standard (PCI DSS) aims to ensure protection of the cardholder data and prevent credit card fraud. It provides a security standard to organizations that handle, process, store, or transmit payment card information, establishing a secure framework.
A well-structured Vendor Risk Management Program is a must for companies under PCI DSS compliance. Through proactive vendor selection, ongoing due diligence, periodic auditing, and risk reporting automation, organizations can protect CHD, mitigate third-party risk, and enjoy a robust security stance. Incorporating a VRM program specifically designed for PCI DSS compliance not only ensures compliance with regulatory requirements but also reinforces customer confidence in their payment security environment.
Third-party risk management can be difficult, particularly for organizations with a high volume of vendors. Typical challenges are:
TPSPs play a crucial role in payment security and can be categorized based on their involvement in handling cardholder data:
Organizations must ensure that all TPSPs comply with PCI DSS requirements to maintain a secure payment ecosystem and mitigate third-party risks. PCI Requirement 12.8 specifically addresses the third-party vendor management, suggesting policies and controls for services with whom cardholder data is shared or the services that have an impact on cardholders’ data security.
12.8 Risk to information assets associated with third-party service provider (TPSP) relationships is managed.
Maintaining a list of all TPSPs identifies where potential risk extends outside the organization and defines the organization’s extended attack surface.
A TPSP’s written acknowledgment confirms its commitment to securing account data and recognizing the assets affected while providing services. The level of responsibility depends on the agreed service scope and contractual obligations with the assessed entity.
A comprehensive process for involving TPSPs, with information for selection and screening before engagement, ensures that a TPSP is properly screened internally by an organization before a formal relationship is formed and that the risk to cardholder data involved in the engagement of the TPSP is known.
Records are kept of which PCI DSS requirements are handled by which TPSP, which are handled by the entity, and any that are shared between the entity and TPSP. Entities may record these responsibilities matrix that lists all PCI DSS requirements that apply and for each requirement shows whether the entity or TPSP is responsible for completing that requirement or if it is a shared responsibility.
PCI DSS Requirement 12.9 mandates that TPSPs support their customers’ PCI DSS compliance by ensuring security controls are in place for cardholder data. Organizations must establish clear agreements with TPSPs to define security responsibilities, ensuring compliance obligations are met.
PCI DSS Requirement 6.3.2 mandates that an inventory of bespoke and custom software, and third-party software components incorporated into bespoke and custom software is maintained to facilitate vulnerability and patch management.
To ensure proper vulnerability and patch management, organizations need to have an inventory of custom and bespoke software, including third-party components. Such an inventory facilitates the identification of potential security vulnerabilities in custom as well as third-party software. Through monitoring and the application of security patches to third-party components, organizations are able to remedy vulnerabilities and protect their software against attacks.
TPSPs should prove PCI DSS compliance upon request by organizations that operate compliance programs (e.g., payment brands, acquirers). When offering services that affect a customer’s PCI DSS requirements or security of cardholder data, the services fall under the customer’s PCI DSS audit criteria. TPSPs have two methods of proving compliance:
Annual Assessment: The TPSP completes a yearly PCI DSS assessment and provides proof to customers to indicate compliance.
On-Demand Assessments: If no annual assessment occurs, the TPSP undergoes assessments upon customer request or participates in customer assessments, sharing the results.
In the event the TPSP performs its own evaluation, it should evidence that the scope included the related services and PCI DSS requirements. This should include offering an Attestation of Compliance (AOC) or applicable portions of the Report on Compliance (ROC) as requested. Where the TPSP lacks an AOC, it should evidence compliance with relevant PCI DSS requirements.
When a TPSP provides services that help meet PCI DSS requirements or impact the security of cardholder and authentication data. Both parties must clearly identify and understand:
For example, a cloud provider must define which of its IP addresses are included in the scope of the PCI DSS assessment.
Tags :
Vendor Management and Third-Party Risks in PCI DSS Compliance Shubhi Bhargava April 12, 2025...
India’s Digital Personal Data Protection Act (DPDPA) – What You Need to Know! Sandbox...
Familiarizing yourself with the Payment Card Industry Data Security Standard (PCI DSS) 4.0.1 Sandbox...