{"id":4160,"date":"2022-02-25T18:06:52","date_gmt":"2022-02-25T18:06:52","guid":{"rendered":"https:\/\/iqcol.com\/?p=4160"},"modified":"2024-02-28T13:37:12","modified_gmt":"2024-02-28T18:37:12","slug":"responding-to-a-cardholder-data-breach","status":"publish","type":"post","link":"https:\/\/iqcol.com\/en\/responding-to-a-cardholder-data-breach\/","title":{"rendered":"Responding to a Cardholder Data Breach"},"content":{"rendered":"<p>This guide is intended to help merchants and\u00a0 service providers with incident response<br \/>\npreparation. This guide also describes how and when a Payment Card Industry Forensic<br \/>\nInvestigator (PFI) should be engaged to assist.<\/p>\n<p>Only PFIs listed on the PCI SSC website are approved by PCI SSC to provide forensic<br \/>\ninvestigation services in the event of a payment card breach.<\/p>\n<p><strong>PREPARATION FOR DATA BREACH MANAGEMENT<\/strong><\/p>\n<p>Implement an Incident Response Plan Your organization should ensure that effective incident-management controls are in place. PCI DSS Requirement 12.10 is essential in this effort. It requires entities to \u201cImplement an incident response plan. Be prepared to respond immediately to a system breach.\u201d<\/p>\n<p>Guidance in this PCI DSS requirement notes that this should be a \u201cthorough incident response<br \/>\nplan that is properly disseminated, read, and understood by the parties responsible.\u201d It should<br \/>\ninclude proper testing exercises at least annually to ensure the process works as designed and to<br \/>\nmitigate any missed steps to limit exposure.<\/p>\n<p><strong>Limit Data Exposure<\/strong><\/p>\n<p>Knowing how to limit data exposure and minimize data loss while preserving evidence is essential.<br \/>\nFor example, make sure you know how to isolate systems without simply powering them off.<br \/>\nTurning systems off may make the investigation more difficult and result in lost evidence or data.<br \/>\nFor more information about evidence preservation, see the section titled &#8220;Working With Your PFI&#8221;<br \/>\non page 3.<\/p>\n<p>Understand Notification Requirements Be prepared to alert necessary parties immediately. Having a plan and ensuring current and accurate contact information for each party must be validated regularly. This plan will include payment card brands, acquirers (merchant banks), and any other entities that may require notification, whether by contract or law<\/p>\n<p><strong>Manage Third-Party Contracts<\/strong><\/p>\n<p>Make sure that all contracts with third-party service providers, hosting providers, integrators\/resellers, and other relevant parties address incident-response management sufficiently. Contracts should include specific provisions on how evidence from those environments will be accessed and reviewed, such as allowing your PFI access to the environments. Contracts should include provisions to require the third party\u2019s cooperation and allow a PFI to broaden the investigative scope to the third party if the third party is found to be the source of (or contributed to) an event that impacted cardholder data security.<\/p>\n<p><strong>IDENTIFY A PFI<\/strong><\/p>\n<p>Some PFIs offer their services on retainer. You can consider such an agreement so that you have a<br \/>\nPFI company ready to call when you need it.<\/p>\n<p>You may also consider identifying and talking to several PFI companies qualified to serve in your<br \/>\nregion in case one is unavailable when you need it or if you have specific needs that can be served<br \/>\nonly by certain PFIs.<\/p>\n<p>Keep in mind that all PFIs are required to meet strict independence requirements to prevent<br \/>\nconflicts of interest. Therefore, a company you use for other PCI services (for example, QSA<br \/>\nservices) cannot also be used for your PFI investigation<\/p>","protected":false},"excerpt":{"rendered":"<p>This guide is intended to help merchants and\u00a0 service providers with incident response preparation. This guide also describes how and when a Payment Card Industry Forensic Investigator (PFI) should be engaged to assist. Only PFIs listed on the PCI SSC website are approved by PCI SSC to provide forensic investigation services in the event of [&hellip;]<\/p>","protected":false},"author":1,"featured_media":4157,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-4160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts\/4160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/comments?post=4160"}],"version-history":[{"count":0,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/posts\/4160\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/media\/4157"}],"wp:attachment":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/media?parent=4160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/categories?post=4160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/tags?post=4160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}