Best Practices Securing Ecommerce
Best Practices Securing Ecommerce
Best Practices Securing Ecommerce
Information Supplement:
Best Practices for Securing
E-commerce
Information Supplement Best Practices for Securing E-commerce April 2017
Document Changes
Date Document Version Description Pages
The intent of this document is to provide supplemental information. Information provided here does ii
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Table of Contents
The intent of this document is to provide supplemental information. Information provided here does iii
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The intent of this document is to provide supplemental information. Information provided here does iv
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1 Introduction
Electronic commerce, commonly known as e-commerce, is the use of the Internet to facilitate transactions for
the sale and payment of goods and services. E-commerce is a card-not-present (CNP) payment channel and
may include:
E-commerce websites accessible from any web-browser, including mobile-device friendly versions
accessible via the browser on smart phones, tablets, and other consumer mobile devices
App versions of your e-commerce website, i.e., apps downloadable to the consumers mobile device or
saving of the URL as an application icon on a mobile device that has online payment functionality
(consumer mobile payments)
The objective of this information supplement is to update and replace the PCI DSS E-commerce Guidelines
published in 2013. This information supplement offers additional guidance to that provided in PCI DSS and is
written as general best practices for securing e-commerce implementations. All references in this document
are for PCI DSS Version 3.2.
Different e-commerce methods, including the risks and benefits associated with each implementation as
well as the merchants responsibilities
The selection of public key certificates and certificate authorities appropriate for a merchants
environment
Questions a merchant should ask its service providers (certificate authorities, e-commerce solution
providers, etc.)
1.1 Background
An e-commerce solution comprises the software, hardware, processes, services, and methodology that
enable and support these transactions. Merchants choosing to sell their goods and services online have a
number of methods to consider, for example:
Merchants may develop their own e-commerce payment software, use a third-party developed solution,
or use a combination of both.
Merchants may use a variety of technologies to implement e-commerce functionality, including payment-
processing applications, application-programming interfaces (APIs), Inline Frames (iFrames), or
payment pages hosted by a third party.
Merchants may also choose to maintain different levels of control and responsibility for managing the
supporting information technology infrastructure. For example, a merchant may choose to manage all
networks and servers in-house, outsource management of all systems and infrastructure to hosting
The intent of this document is to provide supplemental information. Information provided here does 5
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
providers and/or e-commerce payment processors, or manage some components in house while
outsourcing other components to third parties.
Merchants may also decide to engage a third party to perform services that support their e-commerce
solution. The service provider or the services may be considered in scope for a merchants PCI DSS
compliance if the security of the solution is impacted by this service and the service provider has not
performed its own assessment. For more information, see the section on Use of Third-Party Service
Providers/Outsourcing in the PCI DSS. Examples of common e-commerce support services that may affect
cardholder data security include:
d) Shopping-cart software (including software that hands off transactions or customer information to other
systems)
e) Order-management software such as chargebacks, returns, etc. that may have access to cardholder
data
f) Other hosting options (offline data storage, backups, etc.)depending on whether the data is encrypted
and whether the service provider has access to the decryption keys
i) Any service that transmits cardholder data (CHD) or handles this data in some other fashion on behalf of
the merchant services that have access to the checkout or payment-processing flow, including those
without a need to access cardholder data, third-party fraud analysis, or analytics tools
No matter which option a merchant may choose, there are several key considerations to keep in mind
regarding the security of cardholder data, including:
No option completely removes a merchants PCI DSS responsibilities. Regardless of the extent of
outsourcing to third parties, the merchant retains responsibility for ensuring that payment card data is
protected. A merchant is responsible for performing due diligence to ensure the service provider is
protecting the CHD shared with it in accordance with PCI DSS. It is the acquirer or payment card brand,
that determines whether a merchant must conduct an onsite assessment or is eligible for a Self-
Assessment Questionnaire (SAQ).
Third-party relationships and the PCI DSS responsibilities of the merchant and each third party should
be clearly documented in a contract or service-level agreement to ensure that each party understands
and implements the appropriate PCI DSS controls. More information on these relationships can be found
in the Third-Party Security Assurance Information Supplement on the PCI SSC website.
The intent of this document is to provide supplemental information. Information provided here does 6
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
It is recommended the merchant monitor connections and redirections between the merchant and the
third party since the connections can be compromised. The merchant should ensure no changes have
occurred and that the integrity of the e-commerce solution is maintained.
The guidance is applicable to merchants of all sizes, budgets, and industries. This document will be most
useful to those merchants that have a solid understanding of their current e-commerce solution and
environment. For small-to-medium sized merchants who do not know their e-commerce solution or
environment, the recommendation is to review the PCI SSC Payment Protection for Small Merchants1 first
and then review the guidance in this document.
This document is not intended as an endorsement for any specific technologies, products, or services but
rather as recognition that these technologies exist and may influence the security of payment card data.
1.3 Terminology
The following term is used throughout this document:
Payment Service Provider (PSP): A PSP offers a service that directly facilitates e-commerce
transactions online via its relationship with acquiring member banks of payment card brands. This
category includes online payment processors, payment gateway service providers, virtual terminal
services, and certain e-wallet or prepaid services that also process credit card payment for non-account
holders at the point of sale. PSP services are discussed in this document.
For additional information on terms or definitions, please review the PCI DSS and PA-DSS Glossary of
Terms, Abbreviations, and Acronyms.
1 This family of documents includes Guide to Safe Payments, Common Payment Systems, Questions to ask Your Vendors,
and Glossary of Payment and Information Security Terms
The intent of this document is to provide supplemental information. Information provided here does 7
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
o An Inline Frame (or iFrame) that allows a payment form hosted by a third party to be
embedded within the merchants web page(s)
o JavaScript Form
These examples represent some of the most common implementations and are not all inclusive of every
deployment option that may exist. Each implementation of hardware components, software applications, and
hosting/service models will need to be individually evaluated to determine how this guidance may apply.
The following sections discuss these common e-commerce implementations in detail and include basic PCI
DSS scoping guidance.
In the URL redirection model, the cardholder is redirected from the merchants website to a third-party
page. The cardholder then enters their account data into a payment page hosted by the third-party
payment service provider (PSP). This may also be called a punch out since customers and application
users are sent to a PSPs web pages. This is generally noticeable to the customer as the merchants
website URLe.g., http://www.merchant.example.comchanges to that of the PSPe.g.,
https://www.psp.example.com.
The intent of this document is to provide supplemental information. Information provided here does 8
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
2. The customers browser then requests a payment form from the PSP.
3. The PSP creates the payment form and sends to the customers browser.
6. The PSP receives the account data and sends it to the payment system for authorization.
The intent of this document is to provide supplemental information. Information provided here does 9
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
As account data is not collected, stored, processed, or transmitted by the merchants system, fewer
systems need security controls. As redirects are commonly used by small and medium business
organizations with lower-than-average cardholder data volume, it is less likely an attacker would target a
merchant with this type of payment method. However, it is still important for merchants using a URL
redirect to ensure their websites are secure, as a compromised web server could mean the redirect is
changed to a bogus payment site in order to steal cardholder datae.g., man-in-the-middle attacks
wherein the web server collects and sends data to malicious individuals.
This e-commerce option provides an easier way for merchants to provide security for cardholder data, as
most of the cardholder data security is performed by the PSP. As the PSP collects, stores, processes,
and transmits cardholder data on behalf of the merchant, it is strongly recommended that a merchant
ensure the PSP is validated as a PCI DSS compliant service provider to protect the merchants
cardholder data and enable an easier PCI DSS compliance route.
Merchants using a URL redirect e-commerce implementation may be eligible for PCI SAQ A or SAQ A-
EP, providing they meet the eligibility criteria of that SAQ. Merchants should consult with their acquirer
(merchant bank) or with the payment brands directly to determine whether they are required to validate
their PCI DSS compliance and which reporting method they should use. The PCI SAQ A v3.2 currently
includes as few as 22 PCI DSS requirements.
2.1.4 Recommendations
Since the redirect e-commerce method is usually easier for merchants to secure and results in fewer
applicable PCI DSS requirements and lower risk of merchant systems being compromised, this method
may be the best option for merchants with limited security or technical ability. However, this option may
not suit many merchants wishing to provide advanced features or a more customizable customer
payment experience. Merchants should consider the benefits and costs of customization versus the
increased need for security controls and resulting increase in the security responsibility and number of
applicable PCI DSS requirements.
An iFrame (or Inline Frame) is a method of seamlessly embedding a web page within another web
pagethe iFrame becomes a frame for displaying another web page. The iFrame is unique. iFrame
provides sandboxing to isolate content of the embedded frame from the parent web page, thus ensuring
that information is not accessible or cannot be manipulated through various exploits by malicious
individuals.
In e-commerce payments, the pages delivered during the checkout process would be supplied by the
merchant's website, with an embedded iFrame supplied by the PSP within that process. The PSPs
iFrame receives all cardholder data entered by the customer.
The intent of this document is to provide supplemental information. Information provided here does 10
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1. The merchant website creates an iFrame within the current webpage. The customers browser
requests the payment form from the PSP.
2. The PSP creates a payment form and sends to the customers browser within the iFrame.
3. The customers browser displays the payment form within the iFrame located on the merchant page.
4. The customer enters their payment details into the iFrame containing the PSPs payment form.
5. The PSP receives the account data and sends it to the payment system for authorization.
The intent of this document is to provide supplemental information. Information provided here does 11
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
At present, a merchant implementing an e-commerce solution that uses iFrames to load all payment
content from a PCI DSS compliant service provider may be eligible to assess its compliance using a
reduced list of controls identified in SAQ A, the smallest possible subset of PCI DSS requirements,
because most of the PCI DSS requirements are outsourced to the PSP. The full list of eligibility
requirements for use of this reduced self-assessment questionnaire is outlined within the SAQ A
document.
However, despite the fact that merchants using iFrame implementations may be eligible for SAQ A, these
types of e-commerce solutions are susceptible to compromise by a determined attacker, and merchants
should ensure that they are appropriately addressing this risk. To that extent, SAQ A 3.2 was updated
with additional requirements including changing default passwords (Requirement 2) and implementing
some basic authentication requirements, such as requiring a unique user ID and strong password
(Requirement 8). These requirements are intended to help protect merchant websites from compromise
and maintain the integrity of the redirection mechanism. Additional information can be found in the PCI
SSC FAQ knowledgebase found on the PCI SSC website document library.
iFrames provide a degree of security by relying on a technique known as the same-origin policy, which is
enforced by all modern web browsers. The assessor will need to verify the merchant is getting the
protection expected. This prevents malicious scripts on the merchants website from interacting with the
contents of the third-party content (i.e., the payment form) in the frame. This makes it more difficult for an
attacker with control of the merchants website or other third-party content providers to silently monitor
and steal cardholder data.
If an attacker has compromised the merchants website, however, they can create alternative content for
the frame, which then allows completion of the payment process as well as creation of a copy of the
cardholder data for the attacker. Without monitoring and alerting controls on the merchants infrastructure,
attacks of this nature might be impossible to detect.
Merchants should consider complementing their PCI DSS compliance program with additional security
controls to reduce e-commerce risk, even if such controls are not stated as required by SAQ A. Hardening
of servers, vulnerability management, and monitoring of server activity are effective controls for these
implementations.
Merchants should also consider the use of additional layers of monitoring and defense provided by their
PSP to promote additional security for the iFrame implementation. While not required under PCI DSS, it is
recommended that PSPs provide configurable tools that detect and report suspicious transactions or
unusual activity that may be indicators of compromised systems. While PCI DSS does not prescribe
specific controls to monitor suspicious activity, it is a best practice for merchants to make use of PSP
tools that are applicable to the merchants e-commerce implementation. Some of these methods are
discussed in Section 2.11.2, Payment Service Provider Best Practices to Detect Suspicious Activity.
The intent of this document is to provide supplemental information. Information provided here does 12
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
This architecture is limited in PCI DSS scope and is significantly lower risk for merchants than accepting
payment information directly such as with the Direct Post Method or API. Payment card data is not
collected, stored, processed, or transmitted by the merchant, so there are fewer systems that need
security controls and lower risk of the merchants systems being compromised.
This e-commerce option provides an easier way for merchants to provide security for cardholder data as
most of the cardholder data security is performed by the PSP. However, as the PSP stores, processes,
and transmits cardholder data on behalf of the merchant, it is strongly recommended that a merchant
ensure the PSP is validated as a PCI DSS compliant service provider to protect the merchants
cardholder data and enable an easier PCI DSS compliance route.
Merchants using an iFrame e-commerce implementation may be eligible for PCI SAQ A, providing they
meet the eligibility criteria of that SAQ. Merchants should consult with their acquirer (merchant bank) or
with the payment brands directly to determine whether they are required to validate their PCI DSS
compliance, and which reporting method they should use. The PCI SAQ A for PCI DSS v3.2
questionnaire currently includes as few as 22 requirements.
2.2.5 Recommendations
The iFrame e-commerce method is usually easier for merchants to secure, and results in fewer applicable
PCI DSS requirements and lower risk of merchant systems being compromised (although not as low as
the redirect method). However, this method also offers a better customer payment experience, as the
customer remains on the merchant website throughout. The inline payment form can provide a better
look and feel than the redirect payment method as the payment page can be customized to match the
website design.
The Direct Post Method for e-commerce payment is generally used by larger merchants that require more
control over their payment form look and feel and are able to understand and implement the extra PCI
DSS security controls that are required to protect their systems.
The Direct Post Method uses the merchants website to generate the shopping cart and payment web
pages. The merchants payment form, loaded in the customers browser, sends the cardholder data
directly to the PSPnot via the merchants website or systemsensuring cardholder data is not stored,
processed, or transmitted via the merchant systems. However, the payment form is provided by the
merchant; therefore, the merchants systems are in scope for additional PCI DSS controls, which are
necessary to protect the merchant website against malicious individuals changing the form and capturing
cardholder data.
The intent of this document is to provide supplemental information. Information provided here does 13
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
2. The customers browser displays the payment page and sends cardholder data directly to the PSP.
3. The PSP receives the cardholder data and sends it to the payment system for authorization.
The intent of this document is to provide supplemental information. Information provided here does 14
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
As account data is not stored, processed, or transmitted on the merchants e-commerce systems, a
subset of security controls is required to protect the web server and, in particular, the payment form due
to the merchants control over the manner in which cardholder data is collected and transmitted to the
PSP. Because of this, there is an associated security effort, such as network and firewall security, secure
software development, vulnerability scanning/penetration testing, and vulnerability and patch
management. For a full list of requirements, please see the applicable SAQ.
Merchants using a Direct Post e-commerce implementation may be eligible for PCI SAQ A-EP, providing
they meet the eligibility criteria of that SAQ. Merchants should consult with their acquirer (merchant bank)
or with the payment brands directly to determine whether they are required to validate their PCI DSS
compliance and which reporting method they should use. SAQ A-EP for PCI DSS v3.2 currently includes
191 requirements.
2.3.4 Recommendations
This architecture may be suitable for e-commerce implementations where the merchant prefers more
control over the website look and feel and is comfortable with the additional responsibility for securing its
website. The organizations appetite for payment-card data risk and PCI DSS scope may require
avoidance of a fully merchant managed solution.
The Direct Post Method has a higher security responsibility for and higher risk of merchant system
compromise than the URL redirect or iFrame methods, as the merchants web server controls the
payment form, which is often a target for criminals. More PCI DSS requirements apply to the Direct Post
Method than the URL redirect and iFrame methods.
Increased security is required to protect the website and its code, raising operational and audit costs for
the merchant; however, this needs to be balanced against the design and use benefits of merchant-
created forms. It is recommended additional security controls above those required by PCI DSS be
implemented.
Similar to the Direct Post Method, the JavaScript payment page originates from the merchants website
and requests the customers browser execute JavaScript code from the PSP to create the payment form.
Entered cardholder data is then sent directly to the PSP in the same way as the Direct Post Method.
Also similar to the Direct Post Method, a JavaScript form is generally used by larger merchants that
require more control over their payment form look and feel and are able to understand and implement the
extra PCI DSS security controls that are required to protect their systems.
The intent of this document is to provide supplemental information. Information provided here does 15
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
2. Payment page on the customers browser requests JavaScript from the PSP.
4. The customers browser uses JavaScript to create the payment form within the payment page.
5. The customer completes payment by entering payment details into the form, which is sent directly to
the PSP.
6. The PSP receives cardholder data and sends to payment system for authorization.
The intent of this document is to provide supplemental information. Information provided here does 16
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
As the merchant controls the manner in which cardholder data is collected and transmitted to the PSP,
the same PCI DSS controls apply as with the Direct Post Method described above (Section 2.3).
Merchants using a JavaScript e-commerce implementation may be eligible for PCI SAQ A-EP, providing
they meet the eligibility criteria of that SAQ. Merchants should consult with their acquirer (merchant bank)
or with the payment brands directly to determine whether they are required to validate their PCI DSS
compliance and which reporting method they should use. SAQ A-EP for PCI DSS v3.2 currently includes
191 requirements.
2.4.4 Recommendations
All recommendations for the Direct Post Method also apply to the JavaScript Form payment method. The
decision to choose one method over the other may be an architectural decision overall. With Direct Post,
the merchant will lose control over the session momentarily, whereas with JavaScript, the merchant can
maintain some level of control over the session by watching for a timeout and seamlessly delivering an
error message to the customer. The decision also depends on the PSP and how the PSP has built what
the merchant is using. The merchant should discuss with its PSP.
In the payment methods discussed earlier in this document, risks are minimized due to payment service
providers receiving cardholder data directly from the customer, reducing security responsibility for merchant
systems.
The merchant systems handling of cardholder data in the API method may require that the entire set of PCI
DSS controls be applied to the merchants in-scope systems, people, and processes.
The payment page and form are hosted and supplied by the merchant website with all cardholder data
processed by the merchant web server (and possibly other system components) before being sent to the
payment solution provider.
The intent of this document is to provide supplemental information. Information provided here does 17
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
3. The customer enters cardholder data into the payment form and the data is sent to merchant web
server.
5. The PSP receives cardholder data and sends it to the payment system for authorization.
The intent of this document is to provide supplemental information. Information provided here does 18
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
This architecture carries a high risk for merchants as their systems will receive and transmit, and may
also store and process, cardholder data. Hackers target websites using this payment method because
there is a greater chance of larger amounts of valuable cardholder data being available, and the attack
can be easier due to varying levels of security controls among merchants. Due to the higher risk of
compromise to merchant systems, the level of security responsibly for the merchant is high.
Merchants using the API e-commerce payment method may be eligible for SAQ D, providing they meet
the eligibility criteria of that SAQ. Merchants should consult with their acquirer (merchant bank) or with the
payment brands directly to determine whether they are required to validate their PCI DSS compliance and
which reporting method they should use. SAQ D for Merchants for PCI DSS v3.2 currently includes 250
questions.
2.5.4 Recommendations
For smaller merchants, this may not be a cost-effective e-commerce payment route due to the associated
level of security responsibly. The API method is generally used by larger
organizations with specific processing needs, or organizations that wish Note: Some merchants may
to retain cardholder data. reduce the number of
applicable requirements by
The applicable controls to secure all systems, people, and processes
leveraging tokenization to
within an organization for PCI DSS compliance should not be
eliminate payment card data
underestimated.
storage. See Section 2.11.3,
Merchants are advised not to store, process, or transmit cardholder Tokenization for more
within their own systems unless the nature of their payment acceptance information.
is not compatible with any of the other models described previously.
A hosted shopping cart is an e-commerce system that is hosted entirely on the service providers
technological infrastructure. The e-commerce is not seamlessly integrated into the merchants website and
the consumer is often directed off-site to select product and complete checkout.
The use of such a solution can alleviate many but not all of the merchants PCI DSS responsibilities. All
merchants have a responsibility to implement policies and procedures that govern safe handling of cardholder
data even if they never expect to encounter credit cards. Furthermore, it is the responsibility of the merchant
to vet the service provider and monitor its compliance to PCI DSS. See SAQ A for more information on
assessing compliance for merchants who use these solutions.
The intent of this document is to provide supplemental information. Information provided here does 19
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The intent of this document is to provide supplemental information. Information provided here does 20
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
May be required to complete an onsite assessment documented via a PCI DSS Report on Compliance
(ROC) or
Is eligible to complete a self-assessment documented via one of the PCI DSS Self-Assessment
Questionnaires (SAQs).
Merchants eligible to self-assess their PCI DSS compliance should work with their acquirers or payment
brands to determine which SAQ type is appropriate, based on the e-commerce implementation method used.
The table below summarizes the relevant PCI DSS documentation for merchants that may be required to
submit a ROC, as well as for those that may be eligible to self-assess via an SAQ. The corresponding number
of PCI DSS requirements is included for each reporting method.
iFrame SAQ A
The intent of this document is to provide supplemental information. Information provided here does 21
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
E-commerce is the use of the Internet to facilitate online transactions for the sale and payment of goods
and services. E-commerce is a card-not-present (CNP) payment channel and includes:
E-commerce websites accessible from any web browser, including mobile-device friendly
versions accessible via the browser on smart phones, tablets, and other consumer mobile devices
App versions of the merchants e-commerce website, i.e., apps downloadable to the consumers
mobile device that have online payment functionality (consumer mobile payments)
The merchant may be involved in initiating or triggering the transaction; however, it is always the
cardholder who enters the payment information (i.e., cardholder data) on a device that is not controlled or
provided by the merchant. For example, the merchant may instigate the sales process (i.e., invoicing) by
sending the cardholder an e-mail message with a unique payment URL for them to complete the credit
card transaction via the Internet. Alternatively, for example, the merchant may retain payment card details
initially submitted by the cardholder for an e-commerce payment in order to initiate ongoing recurring
transactions, such as subscriptions. Depending on how the card details are stored and recurring
transactions processed, these recurring payments may also be considered e-commerce.
Some merchants have introduced e-commerce payments into what are traditionally card-present
environmentsfor example, quick-service restaurants. While present on the merchant premises, the
consumer initiates a card payment using their own mobile device via the mobile-friendly merchant
website or app.
Payment channels and methods that could be confused with but are not e-commerce include:
o With a card reader (connected to the mobile device via cable to the radio jack, or using
Bluetooth):
Card data is captured through dip or swipe of the payment card.
o Merchant manually enters the consumers payment card details into web browsere.g., via
its online order management website or a third-party virtual terminal.
The intent of this document is to provide supplemental information. Information provided here does 22
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Consumer-initiated payments using a web browser on the merchants payment kiosk on the
merchants premises or merchant-provided payment device (such as tablets for payment at a
restaurant table):
o Consumer manually enters their payment card details into the web browser on the
merchants payment kiosk or through the provided payment device.
In some scenarios, e-commerce websites not connected to a payment gateway or payment service provider
offer the consumer other order/booking options in addition to the submission of card details to guarantee an
order. For example, merchants in the hotel or car rental sectors may offer:
1. Advanced Purchase: Card details are provided with the order; the cardholders expectation is that the
merchant will take the full value of the order/booking up-front.
2. Deposit Booking: Card details are provided with the order; the cardholders expectation is that the
merchant will take a deposit amount (percentage of the order/booking value) up-front.
These order/booking options usually set the consumer expectation that the card details supplied will be
charged at the time of the order/sale. Both options 1 and 2 should be considered e-commerce
transactions since they are online CNP transactions where card data is submitted by the consumer with
an expectation of real-time authorization of the agreed amount. However, if the e-commerce site has no
connectivity to a payment gateway or payment service provider, the merchant processes the consumers
payment offlinefor example, as a re-key submitted manually using a payment terminal or via a virtual
terminal. As these payment card transactions are not flagged as e-commerce, be aware that this may be
a breach of payment brand rules for the processing of e-commerce transactions. Merchants should
contact their acquiring bank or the applicable payment brand to determine whether offline authorization of
e-commerce card payments is permitted.
As mentioned above, when a merchant is scoping its e-commerce payment channel for compliance
assessment, it is necessary to consider of all card data flows and all aspects of payment card processing that
may affect its scope, not just the e-commerce website itself.
The intent of this document is to provide supplemental information. Information provided here does 23
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
A merchant considering its e-commerce payment channel in isolation from its other payment card
handling activities may conclude that the scope of assessment is as shown in the blue area below,
because the e-commerce website is set up to redirect the consumer to a PSP payment page.
The merchant may decide that SAQ A is applicable for this channel:
All processing of cardholder data is entirely outsourced to PCI DSS compliant third-party service
providers (SP).
All SPs handling storage, processing, and/or transmission of cardholder data are PCI DSS
compliant.
All elements of the payment page(s) delivered to the consumers browser originate only and directly
from a PCI DSS compliant SP.
Merchant does not electronically store, process, or transmit any cardholder data on merchant
systems or premises, but relies entirely on a SP to handle all these functions.
Any cardholder data the merchant retains is on paper (for example, printed reports or receipts), and
these documents are not received electronically. This information must be stored in accordance
with the applicable PCI DSS requirements.
As a reminder, merchants may be eligible for SAQ A, providing they meet the eligibility criteria of that
SAQ. Merchants should consult with their acquirer (merchant bank) or with the payment brands directly to
determine whether they are required to validate their PCI DSS compliance and which reporting method
they should use.
The intent of this document is to provide supplemental information. Information provided here does 24
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
2.10.2 Scoping E-commerce in Conjunction with all Card Data Flows and Payment
Channels
However, in reality, a merchants e-commerce payment channel and website may not be operating in
isolation from other payment card handling activities. The merchant may operate other payment channels
and there may be other cardholder data flows related to or supporting the e-commerce payment channel
that need to be taken into consideration when scoping the merchants PCI DSS environment.
The diagram below illustrates some of other payment methods and cardholder data flows that may be
present:
Figure 7 E-commerce in Conjunction with all Card Data Flows and Payment Channels
By considering all payment methods and cardholder data flows, the merchant may find that despite the
fact that the e-commerce website is set up to redirect the consumer to a hosted payment page, it is not
eligible for SAQ A. For example, because of the following payment card handling activities, other PCI
DSS requirements may be applicable:
Telephone orders:
o The merchants call center staff provide support for consumers having difficulty ordering
online. The call center can take orders and payments for these consumers. In this example
the call center uses a mail order/telephone order (MOTO) portal (web application) supported
from the same e-commerce infrastructure as the consumer storefront. (See PCI SSC FAQ
The intent of this document is to provide supplemental information. Information provided here does 25
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1439 for more information.) The MOTO portal is also configured to redirect to the PSPs
hosted payment page. The merchant will need to consider the scope implications of taking
payments on corporate PCs, through a VoIP telephone system (transmitting CHD), and
whether they are recording the calls. In all cases, they may be capturing cardholder data and
sensitive authentication data.
o Call center staff also have a back-up payment terminal for use when the website is out of
service. The merchant will need to consider how is this connected, and whether the receipts
contain the full card number.
Refund requests:
o The merchants customer service team process refunds for online orders. In this example,
they manually rekey the customer card details into the PSPs virtual terminal. The merchant
should consider whether there is an alternative method that allows it to refund a transaction
without re-entering the cardholder data; if not it will need to consider the scope implications
as with the call center.
o The merchants finance team may receive retrieval requests and chargeback letters from its
acquirer. Typically, these contain the full card number. The merchant will need to consider
how these letters are handled. Are the letters retained in hard or soft copy? Are the letters
scanned or e-mailed? Scanned chargeback letters containing the full card number (instead of
only the last four digits or a replacement token) would be considered electronic storage of
cardholder data, negating eligibility for any SAQ other than D. The acquirer may offer
alternative methods for the merchant to eliminate handling of full card numbers, such as an
acquirer extranet chargeback notification service.
From these examples, we can see that although the merchant has outsourced the handling of e-
commerce payment card data to the PSP, merchant PCI DSS compliance assessment using only the
SAQ A is no longer appropriate as is does not cover all of its payment card handling activities.
As a standard business practice, companies must implement and consistently manage some level of an
adequate governance program. This would include the execution of compliance, training, and audit
programs in order to protect a companys assetsthe most important being the consumer and the
The intent of this document is to provide supplemental information. Information provided here does 26
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
consumers data. Consequently, many aspects of an entitys governance program can be outsourced to
minimize scope and exposure. If a company decides to manage its own anti-fraud program with respect
to CHD and has CHD in the clear (instead of a replacement token), this may mean that its scope has
been expanded to include its corporate structure. Therefore, companies must determine whether and how
they will conduct their own anti-fraud programs. Some service providers manage the overall processing,
transmitting, and/or storage of cardholder data along with anti-fraud tools and analytics as a value-added
service.
Anti-Fraud Measures
As a CNP channel, e-commerce does not have access to the cardholders PIN or signature for verification
of the cardholder. Instead, e-commerce payments rely on the merchant capturing the card security code
(the three-digit number printed on the card signature panel or four-digit number on the front of an
American Express card). A cardholder verification method to confirm that the consumer has the card in-
hand and is not using a stolen account number is requesting the card security code for e-commerce
payments; it provides some merchant protection.
E-commerce payments can use additional, stronger cardholder verification methods including address
verification, which checks the address provided by the consumer against the billing information on file
with the card issuer. Other methods provide additional cardholder verification using a customers pre-
defined password like 3-D Secure or other payment brand or issuer payer authentication methods. 3-D
Secure is not available if a merchant processes the consumer e-commerce payment offline. Address
verification is no guarantee against fraud because criminals frequently sell address and other cardholder
information together with card account information.
3-D Secure is a protocol designed to be an additional security layer for online payment card transactions,
enabling consumers to authenticate their card directly with their card issuer when shopping online. 3-D
Secure is offered under different names by each of the payment brands.
It is the expressed intent of the PCI SSC to address matters of account data security, preventing valuable
cardholder data and sensitive authentication data from being stolen. In doing so, the PCI DSS identifies
security controls that must be in place to ensure that card data is sufficiently protected. In addition,
Requirement 12.8.5 requires merchants to maintain a clear understanding of which controls the service
provider will meet on their behalf. This can be achieved by consulting the service providers AOC and/or
responsibility matrix.
Concepts such as detection and prevention of fraud (the use of account data that has already been stolen
elsewhere) are out of scope for PCI DSS. Nonetheless, fraud and data security are tightly linked.
Increased adoption of fraud-detection and prevention methods will ultimately improve the effectiveness of
data security efforts, as widespread industry use of such tools devalues cardholder data in the eyes of
fraudsters who can no longer easily abuse stolen information online. Transaction monitoring and alerting
services provided by PSPs for fraudulent transactions may also be used to track security incidents.
The intent of this document is to provide supplemental information. Information provided here does 27
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
For these reasons, the table of common security and fraud controls below has been included that
supplement existing guidance. This information may be especially relevant to merchants who are
evaluating the use of a service provider to provide secure e-commerce payment processing solutions
through APIs, redirects, and Direct Posts (see Section 2).
Service Description
Instant Merchant A feedback loop from the PSP to the merchant ensures that the merchant is immediately
Notification informed of transactions, and can raise alerts when suspicious activity is observed that is
not otherwise detected. Where this notification is passed programmatically to a merchant
API endpoint (e.g., postback), the PSP should provide a mechanism to ensure that the
destination is not changed by a malicious user or that the postback does not contain
account data.
Authentication It is recommended that PSPs support the use of a limited-use token that can be retrieved
or generated. This method may be used to authenticate the source of the transaction.
Data Verification PSPs may support the use of cryptographic hashes to verify that important data passed
from the merchant to the PSP remains unaltered in the hand-off (e.g., shipping
information). Verification failures should be logged to alert merchants to possible man-in-
the-middle attacks.
Address Verification AVS is a system supported by the card brands, where numeric address information from
Service (AVS) the street address and postal code are passed to the issuing bank for verification. This
control may be very effective for preventing fraud or redirected shipping information from
a man-in-the-middle.
CVV2 Verification CVV2 verification is the recommended cardholder verification method for card-not-
present merchants. Card data stolen from card-present merchants should not contain
this value, and thus should be unusable online if proper verification is performed. Note
that CVV2 is considered sensitive authentication data (SAD) and should never be stored
by the PSP after authorization.
Transaction Amount Blocking or reviewing transactions that fall outside minimum and maximum transactions
Floors/Limits amounts can prevent carding, where fraudsters attempt to identify which of their stolen
cards are still active.
The intent of this document is to provide supplemental information. Information provided here does 28
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Service Description
Transaction Volume Blocking or reviewing transactions that fall below or exceed expected transaction count
Floors/Limits thresholds is a common way to alert merchants of abnormal activity associated with
compromise or fraud. Granular configurations often exist to measure similar transactions
within a short time frames (e.g., transactions per second, transactions per hour) based
on common source, type, or other attribute. These features are often called velocity
controls.
Brute Force / Trial- Duplicate transactions with altered information (different source IP, different expiration
and-error Detection date, or different CVV2) should be cause for suspicion. These may indicate attempts to
bypass other fraud tests or verify stolen card data that may be incomplete or expired.
E-mail Verification Some PSPs may offer verification services to confirm whether an ISP e-mail account
originates from the IP of the ISP itself or whether fraudsters commonly use that e-mail
domain. This test is insufficient to identify fraud but may be used in fraud scoring.
Geographic Common geography verifications include comparing the provided physical address with
Verification the geographic region associated with the source IP, or the area code of the provided
phone number.
IP Blacklisting Manual blocking of IPs and IP ranges allows the merchant to prevent abuse from known
sources. Some PSPs offer access to known sources of suspicious activity, such as
proxies or regions known for malicious activity.
IP Whitelisting For merchants who send transactions to the PSP via API, an IP whitelist is crucial to
confirm that the transactions originate from the trusted system(s), and not from a man-in-
the-middle attacker.
HTTP Header For merchants who use redirect (including iFrame), Direct Post, or JavaScript methods to
Verification pass customer data from the browser to the service provider, the PSP may monitor the
incoming HTTP headers to ensure that the customer originated from the expected e-
commerce site or is using a common browser. Some browsers will hide this information
for privacy reasons so it cannot be relied upon with full accuracy, but an increase in
missing referrer information or non-standard browsers can be an indication of fraud or
compromise.
Identity Verification While somewhat more expensive than other verification methods, confirming the identity
of the customer against third-party sources such as credit files or public records can
reduce fraud. Verification may also include checking the validity of address information
against postal system databases or validating phone numbers through text or voice
confirmation.
Prohibited Data Blocking specific cardholder name, credit card BINs, card types, e-mail domains, phone
numbers, addresses, etc. may be useful for merchants that need to block transactions
manually based on known customer characteristics or history of abuse. PSPs may also
offer access to databases with known abuse data.
Other Proprietary Some fraud detection may occur based on algorithms or heuristic transaction evaluation
Filters that is based on proprietary methods. While the approach itself may not be disclosed to
the merchant, these services can vary in their effectiveness at identifying fraud.
The intent of this document is to provide supplemental information. Information provided here does 29
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
PSPs should also implement multiple transaction security and fraud controls to provide merchants with
options to configure and respond to suspicious activity:
Scoring Many of the tests above cannot be acted on alone, as they may do not constitute a clear
indication fraud or security compromise. In addition, excessive false positive alerts tend
to lead to monitoring complacency. Scoring systems generally assign risk to each marker
or transaction and raise alerts or take automated action only when a designated
threshold is met within a single transaction, or between multiple transactions.
Alert An e-mail alert or other notification may be sent to the merchant for any transaction that
fails one or more tests, allowing for human review or verification of the transaction and
prompt escalation for fraud or security incident response.
Reject It is recommended merchants reject transactions that are clearly fraudulent or exceed
merchant risk tolerance; however, legitimate sales could also be rejected. Rejections
should always be accompanied by alerts or reporting to ensure spikes in rejected
transactions over time are cause for review.
These services are not required for PCI DSS compliance, but complement any e-commerce merchants
security program and should be considered as a part of the merchants risk analysis and incident
response plan.
2.11.3 Tokenization
Tokenization at a high level allows businesses to avoid having to access or store CHD. Tokenization
allows for the replacement of the payment card number with a token (referred to as an acquiring token
for more information see FAQ 1384) that may be used post-authorization but only by the merchant to
whom the token is issued. If a merchants environment were breached, the tokens would be useless for
purchases at any other merchant, CP or CNP; hence, there is no incentive for criminals to steal tokens.
Keep in mind that the initiation of a transaction begins with actual CHD, which is still transmitted along a
secure network to the tokenization providers secure vault. Subsequently, a token is then derived and
sent to the merchant who can then use the token internally without concern of having CHD transmitted
throughout its network. Depending on the service provider offering, merchants may or may not be
provided with encryption keys which would allow them to request access to the sensitive information
stored within the providers vault if a business need were to arise. Processes and systems used by the
merchant to handle that de-tokenized payment card data would then be subject to PCI DSS
requirements. This is something to consider in the event of addressing a chargeback. Typically, the final
four digits of a card number are sufficient for managing chargebacks and refunds. Merchants still face
some challenges. Regardless, potential solutions exist that may help even though the merchants receive
payments originating from various card brands and organizations.
The intent of this document is to provide supplemental information. Information provided here does 30
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Encryption is a vital aspect for protecting a merchants cardholder data environment, including e-
commerce implementations. Encryption of CHD does not remove it from scope of the PCI DSS.
Merchants must carefully consider the capabilities of the e-commerce solution to ensure that strong
cryptography is used to secure CHD. This includes data in transit and in storage (even temporarily) and
must be able to maintain and monitor the security of encrypted CHD in accordance to PCI DSS.
Encrypted Transmission
Per PCI DSS Requirement 4.1, cardholder data must be encrypted across open, public networks.
Businesses must question potential SPs with respect to their adherence to this PCI DSS requirement. As
noted further in PCI DSS Appendix A2 regarding SSL, all service providers must provide a secure
service offeringthis includes acquirers, processors, and gateways as well. If a service provider is not
able to verify that a merchant has indeed adhered to this mandate and is not able to supply a remediation
plan to support its activities towards meeting this requirement, the merchant should consider selecting a
different SP. It is also recommended that merchants ensure their systems are using a secure protocol
and, if applicable, the service provider can support that protocol.
Encrypted Storage
Many merchants who opt to utilize an e-commerce solution may not consider the potential for the e-
commerce solution to store CHD in some manner. Even if the merchant has received a fully outsourced
e-commerce solution, unless specifically noted as a service option, the merchant should ask the potential
SP for specifications regarding the manner in which CHD is handled from acceptance to transmission.
Many e-commerce solutions may store CHD and sensitive authentication data (SAD) prior to
authorization, and that data must be secured in compliance with applicable PCI DSS requirements. This
may become a larger issue if the same data remains on the SPs servers post-authorization, as it is
prohibited to store SAD post-authorization. Questions a merchant may want to ask its service provider
include the following:
Does the solution ever receive CHD or is a redirect or payment iFrame used for the payment
process?
Is CHD ever stored temporarily in memory or on disk before it is transmitted for processing? If so,
what efforts are made to remove the data properly? Is this data encrypted while at rest?
If SAD (for example, CVV2) is collected for authorization, is the data securely removed once the
solution gives up trying to authorize the transaction? What is the defined retention period for CHD
and what is the process for securely deleting this data?
What cryptographic architecture is used to secure the stored CHD? (After 30 June 2018, SPs are
required to document this as noted in PCI DSS Requirement 3.5.1.)
The intent of this document is to provide supplemental information. Information provided here does 31
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
E-commerce solutions should be developed in a manner that minimizes the risk of caching CHD in
intermediate consumer systems.
Web forms should disable autocomplete for fields accepting payment details, as this may cause the web
browser to store a copy of those details after submission.
Merchants may consider the use of password-type fields for sensitive information. The fields have the
benefit of masking input as it is typed, defending against shoulder-surfing attacks; however, this may also
increase the incidence of errors during the payment process as the cardholder makes typing mistakes.
Form submission should use POST methods rather than GET methods, as described in the HTTP
specification. In addition to being semantically correct, it is common for browsers, proxies, and web
servers to cache or log the contents of GET variables or query strings, which may result in clear-text CHD
being stored in numerous locations for a single payment. These systems are generally not designed to
store POST variables, as these often contain other sensitive data (such as passwords).
Note that in some implementations, the use of POST is infeasible. This is common in the case of payment
processors providing support for legacy browsers, as the same-origin policy (SOP) prevents a website
hosted on one domain (e.g., the merchant) from using POST to send data to another domain (e.g., the
payment processor). Cross-Origin Resource Sharing (CORS) was designed to allow domains to
communicate with each other in a controlled manner and bypass this restriction, but is not supported by
some older browsers. In these cases, merchants and service providers should aim to support POST
wherever possible, supporting GET only where strictly necessary, and never by sending the data in a
URL query string. Use of older browsers may also create difficulty meeting applicable PCI DSS
requirements.
Payment forms should be developed to avoid the inclusion of any third-party content, or to
restrict any third-party content to only that which has been thoroughly vetted and is trusted.
Any third-party content (images, scripts, or other content) included on a payment form is an opportunity
for an attacker to silently steal CHD.
Third-party content may include analytics, testing packages, content optimization, fraud detection, or any
other service. In some cases, service providers providing logos (e.g. security seals) deliver these as
scripts. Scripts included in a merchant website in this fashion run with the same permission as the
merchants website, so in this way the merchant is not protected by the SOP.
The net result of this is that these scripts can modify any element on the page, including monitoring all
keyboard input and copying the contents of the page or payment forms to other servers. Effectively, any
script running on a website has complete control over that website. If payment websites include content
from third parties, a compromise of the third party will result in an attacker gaining control over the
payment website.
The intent of this document is to provide supplemental information. Information provided here does 32
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Although this is a relatively obvious attack vector, similar problems can be caused by elements other than
scripts. Attacks have at various points in history been executed from images, style sheets (CSS), and
other HTML elements using browser content-type sniffing. Merchants developing e-commerce solutions
should assume that any third-party element might be unsafe.
Merchants and service providers can use a Content Security Policy (CSP) to limit the inclusion or
behavior of some third-party elements, but this is not a fail-safe.
The intent of this document is to provide supplemental information. Information provided here does 33
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
In other words, having a certificate on a website provides for the encryption of data being transmitted from the
browser to the web server (so the data cannot be intercepted over the Internet by an eavesdropper), and the
certificate authenticates the web server (so the sender knows that the CHD or other data the browser is
sending to the web server is actually going to the right web server, and not a phisher or a cyber-thief). This is
true for both SSL and TLS certificates, which are often referred to as certs, SSL certs, and TLS certs.
Nevertheless, when talking about the security protocol that is used between the browser and the web server
for encryption of data, SSL and TLS have different meanings. Appendix A2 to PCI DSS 3.2 provides
guidelines for replacing TLS 1.0 and any version of the SSL protocol (e.g., SSL 1.0, SSL 2.0, or SSL 3.0) with
a secure alternative, such as TLS 1.1 or higher (TLS 1.2 recommended). To check the protocol used on a
given website, see the discussion about tools in Section 3.4, Tools for Monitoring and Managing E-
commerce Implementations.
c) It provides 24/7/365 customer support that is readily availablefor example, by e-mail, phone, and chat.
g) It provides highly reliable Certificate Revocation Listing and Online Certificate Status Protocol services.
The intent of this document is to provide supplemental information. Information provided here does 34
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
a) Authentication method (Refer to Section 4.1, Certificate types (DV, OV, EV) and associated risks.)
d) Pricing:
i. Brand-related pricing
ii. Authentication method-related pricing
iii. Volume discount-related pricing
iv. Validity period-related pricing
v. Support level-related pricing
The intent of this document is to provide supplemental information. Information provided here does 35
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Check the certificate (common name, key size/type, certificate transparency, validity period).
o These checks ensure the common name syntax is correct, the key size meets the minimum
length requirements, the type is valid (e.g., RSA or ECC), the certificate transparency
timestamp is included, and the validity period does not exceed the maximum allowed.
o These checks verify that the certificate has a proper chain, and that the chain is to a known
intermediate and public root.
o These checks verify that the cryptographic cyphers and protocols are of the allowed type.
It is recommended that merchants schedule periodic tests to ensure the quality of the TLS certificate
implementation and to also schedule tests after changes to certificates, web servers, load
balancers/application delivery controllers, network changes and any other major change.
The intent of this document is to provide supplemental information. Information provided here does 36
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
One may argue that secure e-commerce is possible only when there is a high level of trust in the transaction.
How is that level of trust defined, what are the proper security criteria, and are there different types of e-
commerce which merit different conditions of trust? The following paragraphs discuss certificate types and
how they may be used to identify, evaluate, and authorize parties to a transaction. Please note while all
certificate types may be able to meet the PCI DSS requirements for encryption of transmissions over public
networks, certain certificates may not always be appropriate for a particular circumstance.
For example, one type of certificate may be practical in the context of a typical business-to-consumer (B2C)
e-commerce transaction (i.e., a website accessed by a person with a browser or mobile device), but may not
apply for machine-to-machine (e.g., B2B) or an automated API-based transaction where a human is not
involved. In the latter, the digital certificate is there to provide only encryption, not authentication.
Only recommendations on the use of digital certificates are being presented; it will be up to the merchant to
determine ultimately, which type of certificate best meets its needs.
Historical Perspective
In the early days of the Internet, the only type of SSL certificate available was an OV certificate. With this type
of certificate, the CA would validate certain business information along with the domain name to ensure not
only the chain of trust but also that the entity is who it says it is. For example, to purchase a website
certificate for example.com, Example Inc. would send the CA some information from the web server along
with proof that it was a real company. In addition, the person requesting the certificate was verified to be an
employee of the company. The CA would validate this data (this could take 2-5 business days) and then issue
the certificate to the organization for the website.
This worked fine for many years but some organizations complained about the time involved to verify
business details and wondered whether someone could come up with a quicker solution that still provided the
necessary encryption. In the early 2000s, a new type of certificate, called DV, appeared on the market. This
certificate was issued very rapidly because it required only that the applicant evidence its ability to use a
domain name; there was no validation or verification of any other business information. For example, if
someone purchased the domain www.example.com, they could obtain a DV SSL certificate for that domain
The intent of this document is to provide supplemental information. Information provided here does 37
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
In response to complaints from various parties, as well as to strengthen the authentication processes and
Internet data-in-transit security, CAs and browsers formed an industry association called the CA/Browser
Forum in 2006 to address matters such as this. Early participants of this forum included Microsoft, Symantec,
Comodo, Entrust, and Mozilla. The first contribution from this industry group was specifications for the EV
certificate. In this case, the CA performs enhanced vetting of the applicant to increase the level of confidence
in the legitimacy of the business. The browser display is enhanced, and a user can readily discern the
difference via visual indicatorsusually a green lock or address bar, which indicates that the website is using
an EV certificate. This makes it much easier for the consumer to know that the identity of the website has
been thoroughly verified. All browsers show the organization name to the left or right of the URL. Enhanced
vetting makes EV certificates much harder to obtain, in part because phishers and cyber-criminals do not
want to share information about their real identities.
"In a study of phishing sites using HTTPS between March 2014 and June 2015, Netcraft found that more than
77% of the SSL/TLS certificates used were domain validated (DV), according to Robert Duncan of Netcraft.
Current statistics on the certificates used by phishing sites blocked by Netcraft can be found at
http://toolbar.netcraft.com/stats/certificate_authorities.
Recommendations
For a relatively small additional cost (compared to a DV certificate), a legitimate business conducting e-
commerce could purchase an OV or EV certificate. This would prove to the consumer the business was
validated by the CA and has provided address and other independently verified contact information in the
certificate that the consumer could use in case of questions or problems. In addition, EV certificates provide
another benefit: a visual cue (the green bar) in the browser tells the consumer the business has gone through
the effort to obtain this enhanced certificate, the information has been verified by the CA, and there is a higher
probability that online trust can be established. The table below summarizes the various certificate levels.
The intent of this document is to provide supplemental information. Information provided here does 38
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
DV: The lowest level of authentication, for situations only where trust and credibility have low risk, e.g.,
B2B or machine-to-machine type of communication where a consumer is not directly involved. DV certs
are acceptable when used between entities that have a formal business relationship and contract in
place (which authenticates and documents the relationship between the entities), and the DV certs role
is that of encrypting data-in-motion between the parties.
OV: A more secure step where the CA vets the business before issuance of the certificate,
recommended for public-facing websites dealing with less sensitive information.
EV: The highest level of authentication of the business by the CA, recommended for websites handling
CHD, PII, and other sensitive data.
It is recommended the certificates (certs) be configured to use the highest level of security available
regardless of the type of certificate used.
PCI DSS Requirement 3 broadly delves into the protection methods for safeguarding stored CHD. In
particular, Requirements 3.5 and 3.6 speak to the requirement to secure cryptographic keys and replace
them when their integrity is weakened. In order to assure an orderly transition when a class of keys
becomes weakened or an algorithm is no longer considered a strong cryptographic function, it is
important that organizations enable support for modern encryption methods with high integrity well ahead
of older algorithms being deprecated or disallowed. As an example, organizations deploying TLS need to
be aware that different versions and configurations of TLS vary in the level of integrity provided, and
simply deploying TLS does not protect against deprecation. The PCI SSC published Migrating from SSL
and Early TLS to help organizations understand how to go about deprecation planning. Additional
guidance and/or recommendations regarding modern TLS configurations can be found in NIST Special
Publication 800-52 Revision 1, Guidelines for the Selection, Configuration, and Use of Transport Layer
Security (TLS) Implementations. (This publication provides a general TLS overview, recommended
minimum server/cryptographic/TLS extensions requirements, and general operational considerations. As
with all special publications, it is recommended that organizations periodically follow up with the source to
determine whether any document revisions have been issued.)
Organizations deploying TLS should ensure that they are using best practices for modern TLS. These
may include:
Using and supporting only TLS 1.2, to ensure that modern encryption methods can be utilized for
protecting data.
Separating authentication and key-agreement protocols to use different cryptographic keys, serving
to reduce the impact of unauthorized key usage or key disclosure.
The intent of this document is to provide supplemental information. Information provided here does 39
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Choosing key sizes and hash functions for digital signature generation and key agreement rated as
acceptable by NIST Special Publication 800-57 Part 1 Revision 4, Recommendation for Key
Management to assure integrity of the transaction.
Ensuring clients utilize current TLS options and ensuring servers select current TLS options when
negotiating with clients.
By adopting these practices now, organizations conducting e-commerce can help maintain trust by
assuring continued protection of customer data and avoid compatibility challenges as older encryption
algorithms weaken.
The main advantage to CT is that an enterprise could monitor the CT log files and discover issuances of
SSL/TLS certificates in its name that were not approved. For example, a company like Example Inc. might
have a policy that we only work with a particular CA, and any SSL/TLS certificate for
https://*.example.com must be issued solely by that CA. Example Inc. could then monitor the CT log files
and learn that an SSL/TLS certificate for https://phishingserver.example.com was issued by a CA other
than its approved CA, and take steps to have that SSL/TLS certificate revoked.
A number of companies, in multiple sectors (banking and financial services, e-commerce, payment
processing, content-delivery services, etc.) have expressed objections to the public availability of their
web servers domain names being, and have chosen to opt out of using CT. If the company chooses to
opt out, Google Chrome today makes the EV cert look like a non-EV cert (no green bar). A new CT spec
is being reviewed and once it is approved and is deployed, customers who choose the privacy feature
will be able to redact some portion of the fully qualified domain names in their CN and SubjectAltNames,
but the domain name will still appear in the CT log file (so phishingserver.example.com will appear as
example.com).
This is an initial set of questions or concerns that a merchant might have, followed by some helpful guidance:
I am a small business so surely no one is going to attack me if I continue to use SSL and early
TLS.
Unfortunately, small businesses are just as susceptible to attack as larger organizations. Hackers use
computer programs that systematically perform exhaustive searches for targets that are misconfigured
or contain exploitable vulnerabilities. Hackers and their computers do not care how big or small an
organization is that is utilizing a vulnerable system. We tend not to hear about small merchant
The intent of this document is to provide supplemental information. Information provided here does 40
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
breaches because the businesses are not well known and the breaches too numerous. It is just a
matter of time before any vulnerable system is exploited.
The cost of a breach, even for a business storing a small number of credit cards, will far outweigh the
cost it will take to migrate to TLS 1.2. For the small business that has outsourced all or part of its
payment processing to a PCI DSS compliant SP, the service provider will mandate the migration to TLS
1.1 and/or TLS 1.2. The merchant will be required to adhere to the SPs timeline for migration to ensure
connection protocols for payment transactions continue to function.
My SP tells me that it supports later versions of TLSis that all I need to do to meet the PCI DSS
requirements on TLS?
While support for the later versions of TLS (1.1 and 1.2) is good, the retention of support for the TLS 1.0
and any version of SSL still introduces a potential weakness in the environment unless appropriate
compensating controls are implemented and maintained. In terms of PCI DSS compliance, then, SPs
must support the use of later versions of TLS (currently 1.1 and 1.2) and must only support later
versions of TLS for new implementations. Service providers can still offer SSL and TLS v1.0 up to 30
June 2018 for existing services, provided the SP has implemented appropriate risk-mitigation controls.
How can I find out what SSL/TLS protocols and versions I support?
Although there are companies that provide testing services, one way of finding out whether your
website supports a particular version of SSL or TLS is to use a computer browser to connect to the site
and actually establish a secure connection. If you can connect using https, not http, and you can see
the locked padlock, you have successfully established a secure connection. Note: Only TLS 1.1 or 1.2
connections are considered strong cryptography and supported secure encryption protocols. Each type
of browser provides options that enable you to select specific versions of both SSL and TLS, so by a
process of elimination you can quickly establish what is actually supported.
The best solution is to (1) develop a TLS mitigation plan to disable all early versions of TLS and migrate
to TLS 1.2; (2) until the migration is complete, the merchant must address the vulnerabilities associated
with the use of insecure protocols through risk-mitigating compensating controls. The PCI Information
Supplement, Migrating from SSL and Early TLS, provides guidance on developing the migration plan
and implementing risk-mitigating controls, including control recommendations for small merchant
environments.
Organizations that are unable to discontinue use of solutions that do not support the latest version of
TLS must perform an ASV scan quarterly to verify that compensating controls continue to effectively
mitigate known and newly discovered vulnerabilities associated with the insecure protocols. Merchants
should contact their acquirer to discuss business requirements, limitations of current solutions, and
compensating controls in place or planned to address risk to the merchant environment.
The intent of this document is to provide supplemental information. Information provided here does 41
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
I am a small business and will need to upgrade my systems to support the latest versions of
TLS at great expense. What can I do to remain secure until I can upgrade?
Until the migration to TLS 1.1/1.2 is complete, a small business must address the vulnerabilities
associated with the use of insecure protocols. The PCI SSC Information Supplement, Migrating from
SSL and Early TLS, provides guidance on implementing risk-mitigating controls, including
recommendations for small merchant environments. Merchants should also talk to their acquiring bank
or payment card brand to determine whether there are any other requirements that must be met.
If I stop taking card payments and only accept payments through alternative methods, do I still
need to do anything about SSL/TLS?
Engaging with e-commerce SPs to handle all or part of the payment processing will most likely reduce
the PCI scope and costs associated with PCI compliance for the merchant; however, it does not relieve
the merchant of the ultimate responsibility to meet at PCI DSS requirements including any related to
SSL/TLS security:
o The mobile wallet pay technologies utilize protocols already in place with most swipe and
EMV payment terminals. In fact, these implementations, including transactions utilizing the
older magnetic swipe terminals, are more secure than regular card-present transactions. This
is because tokenization and biometrics on the user device provide a unique, surrogate value
that is a substitute for the payment card information (see Section 2.11.3, Tokenization). The
payment card information is not available to the merchant or the acquirer, and it cannot be
reversed engineered to reveal the CHD. This has the benefit of reducing the scope of the
cardholder data environment (CDE). Merchants utilizing payment terminals to enable Apple
Pay and Samsung Pay transactions that can be verified as not being susceptible to all known
exploits for SSL and early TLS may continue using these protocols as a security control.
Merchants should contact their acquirer to ensure terminals are PCI validated.
Can I create my own SSL certificates or must I buy them from a commercial CA to be compliant?
When the owner of the web server creates SSL/TLS certificates, they are called self-signed
certificates. There are two very significant problems created by doing this:
o Lack of recognition by browsers: The browsers do not know about self-signed certificates,
and users will receive scary dialogs that a particular website is not trustworthy. This alone
should guide legitimate e-commerce merchants to use commercially available SSL/TLS
certificates.
o Lack of independent verification: If the only form of authenticating a website is the owner
saying, trust me because I am who I say I am, then the merchant knows nothing about that
site (or its owner). This is what phishers and cyber-thieves want: lack of insight into who
operates the web server that is purporting to be legitimate.
The SSL certificate demonstrates to your customers that your site is a safe place to conduct e-
commerce transactions. In effect, easily verifiable certificates show that your site is to be trustworthy.
While self-certification is operationally allowable and technically feasible, a third-party certificate
The intent of this document is to provide supplemental information. Information provided here does 42
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
authority adopting universally accepted standards and practices can more effectively and clearly
demonstrate the safety and security of your site. Hence self-certification in e-commerce is not
recommended.
Are SSL Certificates still OK to use? All the technology, marketing, and instructional
literature I see references SSL Certificates. What is the difference between an SSL 3.0
certificate and a digital certificate?
Most digital certificates are advertised as SSL Certificates even if they are not using the SSL protocol.
These may be acceptable to use only if they are actually using TLS 1.1 or higher as the security
protocol.
Also, most offers for free SSL certificates refer to domain-validated (DV) certificates, which were
covered in Section 4.1, Certificate Types (DV, OV, EV) and Associated Risks. DV certs are not
recommended for e-commerce transactions. For e-commerce transactions, use OV or EV authenticated
SSL/TLS certificates.
The intent of this document is to provide supplemental information. Information provided here does 43
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
A PA-DSS validated shopping cart may be one of the tools used for e-commerce. This may include
situations where the SP is responsible for the installation, maintenance, and development of the e-
commerce platform, including the shopping-cart functionality. In this case, the question should be asked
whether the shopping cart has been validated per and can be verified by looking for the software on the
PA-DSS Validated Applications listing. Additional questions/assurance should be obtained to ensure the
PA-DSS application was installed as per the implementation guide (IG). Expiration dates of the PA-DSS
application should be recorded, and updated documentation should be obtained to ensure the PA-DSS
application remains on the List of Validated Payment Applications.
As per PCI DSS Requirement 12.8.3, the merchant should develop a process to engage service
providers. This engagement process should consider validation level of the service provider. While the
DSS itself does not set validation levels, the card brands may set guidance on the level of validation
required for compliance, for both merchants and service providers. Merchants should look at whether any
SP should meet the same level of validation as the merchant must, which may require inquiries to the
card brands or acquiring banks. If additional requirements must be met, this may influence the selection
of a SP.
Additional factors that may influence this decision include the merchants appetite for risk, additional
internal pressures driving the level of acceptable assurance, and any needs of the merchants customers.
Ultimately, the merchant is responsible for its PCI DSS compliance, which may be impacted by the SP
PCI DSS compliance status, and must therefore exercise careful due diligence.
Where service providers have not undertaken their own PCI DSS assessment, the merchant should make
sufficient enquiries to understand the security controls the service provider has in place and perform a
The intent of this document is to provide supplemental information. Information provided here does 44
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
risk assessment as to whether or not those controls meet PCI DSS requirements. The outcome of these
inquiries should be taken into account before signing any contracts.
PCI DSS is not the only set of standards that exist for e-commerce and security purposes. If your industry
or business requires additional guidelines for a solution, care should be taken to ensure that any provider
chosen meets these requirements as well. However, it is important to keep in mind that meeting other
security compliance guidelines and security certifications does not guarantee PCI DSS guidelines are
met.
PCI DSS does not require service providers to undergo a self-assessment or QSA-led PCI DSS
assessment. This is an acquirer or payment brand determination. There are multiple reasons why it may
be advantageous for a service provider to undergo such a PCI DSS assessment.
Where PA-DSS applications support services provided, the applications in use and any expiry dates can be
confirmed though the PCI SSC websites List of Validated Applications.
It is recommended the supplied documents be checked to ensure they cover a valid version of the PCI DSS,
when the documents are dated, and cover the services provided. Best practice is to record the dates on these
documents so revalidation can be checked on the anniversary dates.
In addition to the PCI DSS documentation to support the service provider validation, the service provider may
be asked to provide supporting documentation to help the merchant work on Requirement 12.8.5, which
requires the merchant to identify which PCI DSS requirements are managed by the entity, the service
provider, or both. (See the Sample PCI DSS Responsibility Matrix in Appendix B of the Third-Party Security
Assurance Information Supplement.2)
The intent of this document is to provide supplemental information. Information provided here does 45
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The PCI DSS scope of the solution, the requirements covered by the service provider, the joint
services, and use of compensating controls should be covered in the service providers AOC.
Per PCI DSS Requirement 12.8.5, the merchant needs to understand any requirements it is responsible
for meeting.
The merchant is responsible for understanding how both internal and external ASV scans and
penetration tests are conducted, who will maintain copies of test results, whether the service provider
will assist the merchant in remediating any failed tests, and whether the merchant will have access to
copies of the test results to meet its obligations for PCI DSS Requirements 11.2 and 11.3.
It is highly recommended a merchant understands whether the service provider will have access to its
account data or its cardholder data environment, and what risk that may involve the merchant.
The merchant should be aware of nested service provider arrangementsi.e., a service provider
outsourcing to another service providerand should be aware of how those relationships affect the
services being provided to the merchant.2
Merchant and service provider should both understand and have documented who is responsible for
what, exactly what requirements each must meet, and how they will meet any joint requirements.
Legal and contractual questions should be raised when selecting a service provider as well. The Third-
Party Security Assurance document3 expounds on questions and guidelines a merchant may use.
Additionally, any consultation on contracts or requirements may raise the following additional questions:
What information disclosure can be given as part of an audit or investigation that is not normally
disclosed or is redacted due to security concerns?
What support, feedback, or general inquiry SLAs are defined as part of the service agreement?
Does this include support or assistance in case of an audit or PFI investigation?
The intent of this document is to provide supplemental information. Information provided here does 46
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Case Introduction
ABC Retailer is a typical brick-and-mortar designer clothing retailer. Over the past five years, ABC has
expanded to more than 20 retail outlets, offering designer clothing at discount prices. Recently, ABC
expanded into the e-commerce market, offering customers a feature-rich website that allows them to pay for
goods online with either click-and-collect or delivery options available.
Merchants often want to simplify their security and PCI DSS assessment efforts. For purposes of this case
study, simplification is achieved using a redirect to a service providers (SP) payment page or by utilizing an
embedded payment form within an iFrame on the merchants website.
Description of Environment
ABC has outsourced its e-commerce website to a third-party company called PCIWeb Hosting Co. PCIWeb
Hosting Co. is responsible for the installation, management, and maintenance of the web-hosting platform
and for all development work for the ABC website. A firewall is deployed between the Internet and the ABC
website, which is running on a virtual private server (VPS) within its own isolated virtual network. The web
server is deployed with a LAMP (Linux, Apache, MySQL, PHP) stack, running Magento as the content
management system (CMS) driving the ABC e-commerce site.
A URL redirect is utilized to redirect users to ABCs payment service provider (PSP), XYZ PSP Co., for all
cardholder data submissions.
Payment Flow
The following diagram depicts the customer journey and cardholder data flow for ABCs URL Redirect e-
commerce implementation.
The intent of this document is to provide supplemental information. Information provided here does 47
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1. The user browses ABCs website to build a shopping cart. This website is hosted by PCIWeb Hosting
Co., which is a third-party hosting company.
2. The ABC website issues a redirect to the XYZ PSP Co. payment page, which is displayed within the
customers web browser.
3. The customer enters all CHD into this PSPs payment page, which is submitted directly to the PSP, who
is then responsible for handling the payment functions.
No CHD is submitted to the merchant; therefore, the merchant has no cardholder data environment. ABC may
be eligible to validate PCI DSS compliance via self-assessment, SAQ A, which is applicable to outsourced e-
commerce environments using redirection mechanisms to redirect customers to a PCI DSS compliant
payment service provider. For merchants with such implementations that are required to validate PCI DSS
compliance via an onsite assessment and a Report on Compliance (ROC), SAQ A can be used as a
reference for applicable PCI DSS requirements. SAQ A for PCI DSS version 3.2 includes additional PCI DSS
requirements to address ongoing threats to merchant web servers that redirect customers to third parties for
payment processing.
The intent of this document is to provide supplemental information. Information provided here does 48
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Merchants often want to simplify their security and PCI DSS assessment efforts. For purposes of this case
study, simplification is achieved using an embedded payment form within an iFrame on the merchants
website.
Description of Environment
The hosting and website is fully managed and maintained by ShoesInc staff. A firewall is deployed between
the Internet and the ShoesInc website, which is running in a demilitarized zone (DMZ) within ShoesIncs
offices. On the internal network, an ERP system is used to manage stock within the warehouse. The web
server is deployed on a Windows 2012 operating system running on Microsoft IIS. The ERP software has a
front-end web service component running on the DMZ web server that links to the internal ERP.
A payment page iFrame is rendered within the customer browser to accept cardholder data. This payment
page iFrame is received from ShoesIncs Payment Service Provider, XYZ PSP Co. All CHD is submitted from
the customers web browser to the PSP.
Payment Flow
The following diagram depicts the customer journey and cardholder data flow for ShoesIncs iFrame e-
commerce implementation.
The intent of this document is to provide supplemental information. Information provided here does 49
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1. The cardholder browses ShoesIncs website, filling a shopping basket before reaching the payment
page.
2. ShoesIncs shopping cart embeds an iFrame with a payment form (received, in its entirety, from the PSP
web server) to the customers web browser.
3. The customer enters all CHD into this embedded iFrame, which is submitted directly to the XYZ PSP
Co., who is then responsible for handling the payment functions.
4. This link shows communication between the website and the ERP Server.
No CHD is submitted to the merchant; therefore, the merchant has no cardholder data environment. ShoesInc
may be eligible to validate PCI DSS compliance via self-assessment, SAQ A, which is applicable to
outsourced e-commerce environments using iFrames to redirect customers to a PCI DSS compliant payment
service provider. For merchants with such implementations that are required to validate PCI DSS compliance
via an onsite assessment and a Report on Compliance (ROC), SAQ A can be used as a reference for
applicable PCI DSS requirements. SAQ A for PCI DSS version 3.2 includes additional PCI DSS requirements
to address ongoing threats to merchant web servers that redirect customers to third parties for payment
processing.
The intent of this document is to provide supplemental information. Information provided here does 50
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Description of Environment
The hosting and e-commerce platform (website) is fully managed and maintained by an outsourced company
called PCIData Hosting. A firewall is deployed between the Internet and the AutoRental website. The
AutoRental website is housed within an AutoRental demilitarized zone (DMZ) with a Microsoft SQL Server
2015 server housed within an AutoRental internal zone. The website is running on a Windows 2012 Server,
using Microsoft Internet Information Services (IIS) and Microsoft ASP (Active Server Pages). The AutoRental
DMZ and internal zone are both isolated networks for just AutoRentals use.
A payment page is generated by the website using a JavaScript payment form served from AutoRentals
PSP, XYZ PSP Co. All CHD is entered into the payment form, which is built by the website using the PSPs
JavaScript payment form. With the JavaScript payment form, the AutoRentals website is responsible for
building the payment page, albeit with JavaScript code downloaded from the PSP. The cardholder data for
payment is sent from the customers web browser to the PSP.
Payment Flow
The following diagram depicts the customer journey and cardholder data flow for AutoRentals JavaScript
Created Form implementation with a payment service provider for its e-commerce platform.
The intent of this document is to provide supplemental information. Information provided here does 51
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1. The cardholder browses AutoRentals website, filling a shopping basket before reaching the payment
page.
2. The creation of AutoRentals payment page includes building a payment form through JavaScript
(received from the PSP web server) in the customers web browser.
3. The customer enters all CHD into this JavaScript-generated payment form, which is submitted directly to
the XYZ PSP Co., who is then responsible for handling the payment functions.
4. This link shows communication between the website and the Microsoft SQL Server.
Although no CHD is submitted to the AutoRental website, the payment page and form are generated per
instructions from the AutoRental website. This is different from Case Study Two because here the merchants
website produces some or all of the web page that is used to accept payment data and then passes it directly
to the third-party payment processor. In this implementation, the customer never leaves the merchants
website. For merchants eligible to validate PCI DSS compliance via self-assessment, SAQ A-EP is applicable
to outsourced e-commerce environments. Merchants are responsible for some or all elements in the payment
page used to collect cardholder data and then pass it to a PCI DSS compliant payment service provider. For
merchants with such implementations that are required to validate PCI DSS compliance via an onsite
assessment and a Report on Compliance (ROC), SAQ A-EP can be used as a reference for applicable PCI
DSS requirements.
The intent of this document is to provide supplemental information. Information provided here does 52
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Description of Environment
The hosting and e-commerce platform (website) is fully managed and maintained by LensInc staff within
BigGuy Cloud Solution to provide a highly resilient infrastructure capable of dynamically increasing service
capacity when required. BigGuy security groups are used to provide firewalling features along with BWS WAF
(Web Application Firewalling) services to provide public-facing web application defenses. BigGuy Relational
Database Services (BigGuy RDS) is used as the backend database for the web server on an internal network
zone. The front-end web server utilizes Apache web server running PHP within a demilitarized zone (DMZ).
A payment page and payment form are generated by the LensInc website. CHD is submitted to the LensInc
web server, where it is then submitted to one of the PSPs for authorization and settlement through an API call
to the PSP. Encrypted CHD is stored in LensIncs backend database to provide easy checkout options where
customers only need to provide the card verification value (CVV2/CVC2/CAV2/CID).
Payment Flow
The following diagram depicts the customer journey and cardholder data flow for an organization using an API
implementation with a payment service provider for its e-commerce platform.
The intent of this document is to provide supplemental information. Information provided here does 53
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
1. The user browses LensIncs website, filling a shopping basket and browsing to the payment page,
issued by LensIncs website.
2. The customer enters all CHD into the LensInc generated payment form, which is submitted directly to
the LensInc web server.
3. The LensInc web server stores the CHD (PAN Only) before submitting the information (including the
card verification value) to the Level 1 Compliant Payment Service Provider, XYZ PSP Co., through an
API.
This link shows communication between the website and the BigGuy RDS server, where CHD is stored
(encrypted CHD storage, no sensitive authentication data).
For merchants eligible to validate PCI DSS compliance via self-assessment, SAQ D is applicable in this
scenario. The payment brands or the merchants acquirer may determine the merchant must complete a
Report on Compliance (ROC) instead of SAQ D.
The intent of this document is to provide supplemental information. Information provided here does 54
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
7 Best Practices
In addition to meeting the PCI DSS requirements applicable to a specific merchant e-commerce
implementation, e-commerce merchants should consider implementing the additional PCI DSS requirements
and some or all of the security best practices noted in this section.
Identify each system involved in the storing, processing and transmission of cardholder data (CHD).
Identify any system connected to the systems that store, process, or transmit cardholder data.
Illustrate how cardholder data is processed, such as how CHD is managed within a web applications
functionality, and page along with how data flows within a network or across multiple networks.
Illustrate and make a clear distinction between payments processed under the merchants responsibility
(whether developed internally or purchased from a third party and integrated with a shopping cart) and
payments processed solely within third-party environments.
The flow and storage of cardholder data should be accurately documented as part of this risk assessment
process to ensure that all components and third parties are identified and properly secured or managed. Once
implemented, e-commerce environments should be included in an organizations annual risk-assessment
process per PCI DSS Requirement 12.2.
The intent of this document is to provide supplemental information. Information provided here does 55
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Ensure that ASV scanning is being carried out as specified by PCI DSS Requirement 11.2.
If a merchants e-commerce site is hosted in a shared environment (more than one merchants website
on the same server), there are two options available for scanning:
o The hosting provider can undergo ASV scans on its own and provide evidence of compliant
scans to the merchant; or
o The hosting provider can undergo an ASV scan as part of each of its merchants ASV scans.
Determine whether the service provider will provide scan reports and whether the service provider will
assist with any vulnerability corrections/remediation.
Ultimately, it is the merchants responsibility to ensure its hosted environment receives a passing result on a
quarterly basis from appropriately scoped ASV scans.
Ensure the service provider is conducting the annually required penetration tests per PCI DSS
Requirement 11.3.
Understand and be notified when the test will be performed to ensure minimal downtime for customers.
Understand whether the service provider will assist with any remediation necessary to correct findings
or whether the merchant is fully responsible for correction.
The intent of this document is to provide supplemental information. Information provided here does 56
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Ensure the service provider provides enough information on the systems to be tested to cover those
services and systems provided to the merchant.
Additional information on penetration testing can be found on the PCI SSC website document library.
Due to the dynamic nature of e-commerce environments and frequent changes to websites and web
applications, consider implementing a web application firewall (WAF) per PCI DSS Requirement 6.6 or
additional intrusion-detection technologies per PCI DSS Requirement 11.4.
It is also recommended that firewall rules be configured to ensure unwanted traffic does not access
(both ingress and egress) the network per PCI DSS Requirement 1.2. It is important to understand the
type and nature of any firewalls installed in a service provider environment that controls access to
services or environments provided to the merchant.
Follow PA-DSS when internally developing and implementing payment applications/shopping carts to
help ensure that the application will follow good coding practices and support PCI DSS compliance per
PCI DSS Requirement 6.3 and PA-DSS Requirement 5.
Consider using third-party payment applications that are PA-DSS validated and noted on the List of
Validated Payment Applications as acceptable for new deployments (see the PCI Council website for
the current List of Validated Payment Applications).
o Note that some payment brands require the use of PA-DSS validated payment applications
where third-party payment applications are in use. Merchants should consult with their
acquirers or the payment brands to understand applicable requirements.
o The correct installation of a payment application is critical to the protection of card data. The
payment applications PA-DSS Implementation Guide (obtained from the payment application
vendor) should be followed when installing and configuring the payment application to ensure
that the product is implemented securely and in a manner that supports PCI DSS
compliance.
Regularly review any links (such as URLs, iFrames, APIs etc.), from the merchants website to the
payment gateway to confirm the links have not been altered to redirect to unauthorized locations.
Per PCI DSS Requirement 5, it is recommended the merchant check with its service provider to ensure
anti-virus/anti-malware software is running on the systems provided to the merchant. If the service
provider is not running AV software on the merchants behalf, it is recommended the merchant
understand why and implement a solution of its own for those systems. It is also recommended a
merchant have AV software running on the systems it manages.
PCI DSS Requirement 10 details that a change-detection solution be in place. Typically, existing
logging and monitoring tools can be configured to comply with PCI DSS requirements but it is worth
explicitly asking the service provider whether a change-detection solution is in place.
The intent of this document is to provide supplemental information. Information provided here does 57
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Merchants are advised to ask their service providers about the intrusion-detection/prevention systems
and file-integrity monitoring in place according to PCI DSS Requirement 11.4 and 11.5. They are also
advised to ensure their own systems are being monitored for intrusions.
Train technical staff to manage properly security including firewalls, digital certificates, and encryption.
(PCI DSS Requirement 12.6.1)
Train all internal staff to be aware of general security issues such as social engineering techniques
used by unauthorized individuals to gain access to areas with cardholder data.
Consider implementing an additional firewall between the application server and the database server to
reduce further risks from the Internet-connected web server. (PCI DSS Requirement 1.3)
Limit displays of PAN to the minimum necessary for the consumer to complete their purchase. For
example, once the PAN is verified, dont display full PAN back to the consumer in the order summary or
receipt. (PCI DSS Requirement 3.4)
Even though it is not a PCI DSS requirement, network segmentation is an important subject to discuss
with the service provider. Segmentation may help reduce PCI DSS scope if implemented properly. A
merchant is advised to ensure it understands any segmentation controls a service provider has
implemented.
Do not use public, untrusted computers for e-commerce transactions. Public computers may not be
secure and could be capturing payment card data as it is being entered.
Do not make purchases when connected to an unsecured wireless network (for example, using your
laptop computer with a public Wi-Fi connection), unless you have a personal firewall on your computer.
Always ensure your computer is running anti-virus software that is updated with the most recent virus
signatures and definitions before connecting to the Internet.
The intent of this document is to provide supplemental information. Information provided here does 58
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Always check for signs of a secure web page, For example, look for the "HTTPS" prefix in the web
address, the little padlock icon at the top or bottom of the web browser, a green address bar, or a
security seal before entering your payment card data.
Use strong passwords that cannot be easily guessed (for example, do not use your date of birth or your
name as a password).
Keep your passwords private. For example, do not write them on a piece of paper attached to your
computer (especially if you are in a public place), and do not save them in a file on a computer that is
shared with others.
7.11 Resources
Organizations should familiarize themselves with industry-accepted best practices and guidelines for securing
e-commerce environments. There is a wide range of resources at varying levels of depth and technical detail.
Examples of resources that may provide guidance and technical security data breach reports include:
Information security resources provide an in-depth review of topics important to e-commerce, such as
secure application development, analysis of attack patterns, and alerts on emerging threats:
Open Web Application Security Project (OWASP) (www.owasp.org): OWASP is a global not-for-
profit organization focused on improving the security of web applications. OWASPs mission is to
make application security visible so that individuals and organizations worldwide can make
informed decisions about the true risks surrounding application development and security. OWASP
provides a number of resources for training and application security awareness, including podcasts,
e-books, online publications, news feeds, blogs, videos, conferences, and in-person classroom
training.
The SysAdmin, Audit, Network, and Security (SANS) Institute (www.sans.org): The SANS
Institute is a privately held, U.S. company providing information security resources, training, and
certifications, as well as operating the Internet's early warning systemthe Internet Storm Center.
SANS develops, maintains, and makes available (at no cost) a large collection of research
documents about various aspects of information security. SANS learning formats, include
instructor-led training, webinars, and blogs.
The intent of this document is to provide supplemental information. Information provided here does 59
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The Center for Internet Security (CIS) (www.cisecurity.org): CIS is a not-for-profit organization
focused on enhancing cyber security readiness and response. In addition to hardening guides, daily
tips, bi-monthly webcasts, and an Awareness Toolkit, CIS provides a list of products that were
awarded CIS Security Benchmarks certifications.
ISACA (previously known as the Information Systems Audit and Control Association)
(www.isaca.org): ISACA is a nonprofit, independent membership association and a global provider
of knowledge, certifications, community, advocacy, and education covering information systems
assurance, control and security, enterprise governance of IT, and IT-related risk and compliance.
ISACA-administered certification programs include the Certified Information Systems Auditor
(CISA) and Certified Information Security Manager (CISM) designations. ISACAs learning formats
include conferences, webinars, online certification courses, chapter review sessions, virtual
conferences, and symposiums both live and online. ISACA also offers a broad view of the
challenges associated with e-commerce in its book: e-Commerce Security: A Global Status Report.
The PCI Security Standards Council publishes resources such as FAQs, guidance documents, and
Information Supplements to assist merchants, service providers, and assessors with a variety of PCI-
related information security initiatives. This E-commerce Information Supplement builds upon and is
supported by a number of the resources provided by the PCI Security Standards Council. The following
list is a sample of PCI SSC documents relevant to various technologies and PCI DSS requirements that
may be particularly pertinent to e-commerce merchants. These documents (and many others) can be
found in the Document Library on the PCI SSCs website:
PCI DSS Guidance: Small Merchant Guidance Four documents that provide additional
guidance and payment protection resources for small businesses. This family of documents
includes Guide to Safe Payments, Common Payment Systems, Questions to ask Your Vendors,
and Glossary of Payment and Information Security Terms.
PCI DSS Guidance: Third-Party Security Assurance Provides additional guidance for meeting
PCI DSS Requirement 12.8 and 12.9 to ensure payment data and systems entrusted to third
parties are maintained in a secure and compliant manner.
PCI DSS Guidance: Penetration Testing Guidance Provides additional guidance on PCI DSS
Requirement 11.3, Penetration Testing, which is different than the external and internal
vulnerability assessments required by PCI DSS Requirement 11.2.
The intent of this document is to provide supplemental information. Information provided here does 60
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Qualified Integrators and Resellers (QIR) Program Guide Provides an overview of the PCI
SSC Qualified Integrators and Resellers Program operated and managed by PCI Security
Standards Council. QIRs are organizations that are qualified by PCI SSC to implement, configure,
and/or support validated PA-DSS validated payment applications on behalf of merchants and
service providers. The quality, reliability, and consistency of a QIRs work provide confidence that
the application has been implemented in a manner that supports the customers PCI DSS
compliance. See also the QIR Implementation Statement and QIR Implementation Instructions.
Approved Scanning Vendors (ASV) Program Guide Explains the purpose and scope of PCI
DSS external vulnerability scans for merchants and service providers undergoing scans as part of
validating PCI DSS compliance, and provides guidance and requirements for ASVs who perform
these scans.
PCI DSS and PA-DSS Glossary of Terms, Abbreviations, and Acronyms Provides definitions
of terms and acronyms commonly used throughout the PCI standards, programs, and supporting
documentation.
PCI SSC also provides a variety of training and educational resources to further security awareness
within the payment card industry. These offerings include PCI Awareness, PCI Professional (PCIP), and
PCI DSS training for Internal Security Assessors (ISA).
The intent of this document is to provide supplemental information. Information provided here does 61
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
Acknowledgments
PCI SSC would like to acknowledge the contribution of the Best Practices for Secure e-commerce Special
Interest Group (SIG) in the preparation of this document. The Best Practices for Secure e-commerce SIG
consists of representatives from the following organizations:
The intent of this document is to provide supplemental information. Information provided here does 62
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The intent of this document is to provide supplemental information. Information provided here does 63
not replace or supersede requirements in any PCI SSC Standard.
Information Supplement Best Practices for Securing E-commerce April 2017
The intent of this document is to provide supplemental information. Information provided here does 64
not replace or supersede requirements in any PCI SSC Standard.