Concerned about the PCI DSS 4.0.1 lookback period starting in March of 2025? LEARN MORE

Merchants have until June 2018 to migrate their security protocols

  • Team Omega
  • January 12, 2016

The Payment Card Industry Security Standards Council (PCI SSC) released an update to its vulnerability standards and is giving merchants until June 2018 to migrate their security protocols, even though waiting is not recommended.

Security Sockets Layer (SSL) and some Transport Layer Security (TLS) encryption protocols have held known vulnerabilities for many years. Following a slew of high-profile breaches caused by POODLE, Heartbleed and Freak, the PCI SSC took action in April 2015, mandating that all SSL and early TLS be replaced with new technology by before June 30, 2016. That date, at least for merchants, has been postponed until June 30, 2018.

The PCI SSC has released several statements regarding this migration extension. In total, the revisions state:

For Merchants:

  • Merchants are encouraged to migrate to a TLS 1.1 or greater service offering as soon as possible, but the deadline for migration has been extended to June 2018. For merchants continuing to use SSL and early TLS, and implemented Risk Mitigation and Migration Plan will be required until migration is completed.
  • All new implementations must be enabled with TLS 1.1 or greater

For Service Providers (including acquirers, processors, gateways, and those offering payments services):

  • All service providers MUST provide a TLS 1.1 or greater service offering by June 2016 for merchants that wish to migrate prior to the June 2018 deadline.
  • Patches to legacy service offerings in production prior to Dec. 18, 2015, to support TLS 1.1 or TLS 1.2 are not considered new implementations, but are considered a TLS 1.1 or greater service offering.
  • New service offerings must meet the directive to only support TLS v1.1 and greater.
  • For those service providers continuing to support SSL and early TLS, an implemented Risk Mitigation and Migration Plan will be required until SSL and early TLS are no longer supported.

Which Environments are Most Vulnerable?

Because virtually all ecommerce websites are SSL/TLS-enabled for cryptography, they are at highest risk from SSL/TLS vulnerabilities. Other applications that likely use SSL/TLS are:

  • Virtual payment terminals
  • Back-office servers
  • Web/application services

The PCI Council reported that, as of November 2015, there were still 200,000 vulnerable devices on the Internet, which is likely what led to this deadline extension.

How Do I Find Out If I’m Using SSL/TLS?

You could contact your terminal providers, gateways, service providers, vendors, and acquiring bank to determine if the applications and devices you use have the updated encryption protocol. However, a much easier, more thorough, and less time-consuming option would be to conduct a penetration test on all of your systems to find any known vulnerabilities.

What do I do If I’m Using SSL/TLS?

If you’re using an existing implementations of SSL and early TLS and you need to continue using it, you must have a Risk Mitigation and Migration Plan in place. Some key points to consider before implementing new software and hardware are:

  • Identify all system components and data flows relying on or supporting the vulnerable protocols.
  • For each identified system component or data flow, identify and prioritize the business need.
  • Immediately remove or disable non-critical vulnerable protocols.
  • Identify technologies to replace the vulnerable protocols, such as cloud-based databases, point-to-point encryption, and encrypted virtual terminals.

Omega customers may contact us anytime. Call Omega at 636-557-7777 or email Security@OmegaSecure.com.

Read news item from the PCI Council. For more information, call Omega ATC at 636-557-7777.