<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>pci-hsm &#8211; VeriTeknik</title>
	<atom:link href="https://www.veriteknik.net.tr/en/tag/pci-hsm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.veriteknik.net.tr/en/</link>
	<description>VeriTeknik Bilişim &#124; VeriTeknik Bilişim</description>
	<lastBuildDate>Tue, 06 Nov 2018 14:18:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Reminder About PCI-DSS and PCI-HSM</title>
		<link>https://www.veriteknik.net.tr/en/pci-dss-hsm/</link>
					<comments>https://www.veriteknik.net.tr/en/pci-dss-hsm/#respond</comments>
		
		<dc:creator><![CDATA[Mustafa Emre Aydın]]></dc:creator>
		<pubDate>Fri, 07 Sep 2018 14:04:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[pa-dss]]></category>
		<category><![CDATA[PCI]]></category>
		<category><![CDATA[PCI-DSS]]></category>
		<category><![CDATA[pci-hsm]]></category>
		<guid isPermaLink="false">https://www.veriteknik.net.tr/?p=4040</guid>

					<description><![CDATA[<p>We&#8217;ve felt the need to post this reminder about the changes to the PCI-DSS standards to answer a few possible questions. Please note that it is possible that only some of the information provided below is directly related to your infrastructure, if not none. After PCI-DSS v3.2, the SCC has announced v3.2.1. This update does not [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/pci-dss-hsm/">Reminder About PCI-DSS and PCI-HSM</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We&#8217;ve felt the need to post this reminder about the changes to the PCI-DSS standards to answer a few possible questions. Please note that it is possible that only some of the information provided below is directly related to your infrastructure, if not none.</p>
<ul>
<li>After PCI-DSS v3.2, the SCC has announced v3.2.1. This update does not add new requirements, yet it contains updated dates and some technical clarification. PCI-DSS v3.2 will be valid through 31 December 2018 and retired at 1 January 2019.</li>
<li>PCI-DSS v.3.2.1 updates will not affect PA-DSS. PA-DSS will remain at v3.2.</li>
<li>PCI-HSM v1.x will expire at <span id="OBJ_PREFIX_DWT207_com_zimbra_date" class="Object" role="link">April 2019</span>. Therefore it is best to use a device compatible with PCI-HSMv2.x at any PCI audit after <span id="OBJ_PREFIX_DWT208_com_zimbra_date" class="Object" role="link">April 2018</span>. It would be wise to take the changes between PCI-HSM v1.x and v2.x (such as Key Lengths, usage of TR-31&#8230;) into account and revise your algorithms accordingly.</li>
<li>For the list of PCI-HSM expiry dates, see PTS Device Testing and Approval Program Guide (<span id="OBJ_PREFIX_DWT209_com_zimbra_url" class="Object" role="link"><a href="https://www.pcisecuritystandards.org/documents/PTS_Program_Guide_v1-8.pdf" target="_blank" rel="noopener">https://www.pcisecuritystandards.org/documents/PTS_Program_Guide_v1-8.pdf</a></span>) Appendix A.12.</li>
<li>With PCI-DSS v3.1, mechanisms using SSL/early TLS are forced to be removed from the system at <span id="OBJ_PREFIX_DWT210_com_zimbra_date" class="Object" role="link">30 June 2016</span>. The industry&#8217;s response was that the date was too early, therefore the dates shifted from <span id="OBJ_PREFIX_DWT211_com_zimbra_date" class="Object" role="link">30 June 2016</span> to <span id="OBJ_PREFIX_DWT212_com_zimbra_date" class="Object" role="link">30 June 2018</span>. As of <span id="OBJ_PREFIX_DWT213_com_zimbra_date" class="Object" role="link">30 June 2018</span>, you shouldn&#8217;t be using SSL/early TLS in your cryptographic algorithms.</li>
<li>Since vulnerabilities and exploits due to the usage of SSL/early TLS are usually based on browsers (such as POODLE, BEAST), proving that there&#8217;s no such threat for them, POS POI devices can continue to use SSL/early TLS. Even if this is allowed, weak cipher usage (ex. RC4, MD5) is not allowed for these devices either.</li>
<li>We&#8217;ve seen that for some of our customers the term SSL/early TLS is not clear enough. Safe TLS versions are TLS v1.1 and above. It should be noted that the recommended versions are TLS v1.2 and above.</li>
<li>For further information about SSL/early TLS, please see PCI SSC&#8217;s relevant article: <span id="OBJ_PREFIX_DWT214_com_zimbra_url" class="Object" role="link"><a href="https://www.pcisecuritystandards.org/documents/Migrating-from-SSL-Early-TLS-Info-Supp-v1_1.pdf" target="_blank" rel="noopener">https://www.pcisecuritystandards.org/documents/Migrating-from-SSL-Early-TLS-Info-Supp-v1_1.pdf</a></span></li>
</ul>
<p><img fetchpriority="high" decoding="async" class="alignnone size-medium wp-image-4041" src="https://www.veriteknik.net.tr/wp-content/uploads/2018/09/PCI-DSS-Version-3.2.1-300x195.png" alt="" width="300" height="195" srcset="https://www.veriteknik.net.tr/wp-content/uploads/2018/09/PCI-DSS-Version-3.2.1-300x195.png 300w, https://www.veriteknik.net.tr/wp-content/uploads/2018/09/PCI-DSS-Version-3.2.1-768x499.png 768w, https://www.veriteknik.net.tr/wp-content/uploads/2018/09/PCI-DSS-Version-3.2.1.png 770w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>The post <a rel="nofollow" href="https://www.veriteknik.net.tr/en/pci-dss-hsm/">Reminder About PCI-DSS and PCI-HSM</a> appeared first on <a rel="nofollow" href="https://www.veriteknik.net.tr/en/">VeriTeknik</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.veriteknik.net.tr/en/pci-dss-hsm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4040</post-id>	</item>
	</channel>
</rss>
