PCI issues guidelines for payment security in mobile apps

The Payment Card Industry Security Standards Council (PCI SSC), an industry body which manages payment data security guidelines, released best practices for mobile app developers and device manufacturers.

The main focus of the guidelines is to provide direction on securing mobile device payment processes, as well as the payment environment itself, by educating developers in the emerging mobile app market.

Bob Russo, the general manager of the PCI SSC, told SCMagazine.com on Friday that the new guidelines are particularly relevant today.

“I tell people that convenience trumps security all the time, and people are running quickly to use these new devices and technology, without even thinking about security,” Russo said. “This guidance is actually for the developers of those devices. We are purposely being cautious. It's such a changing market – you'll put something out today and tomorrow people are using it.”

Mobile devices have become payment vehicles and, accordingly, warrant strategies for security, he added.

Key recommendations of the report include isolating sensitive functions and data in trusted environments, implementing secure coding best practices and eliminating unnecessary third-party access and privilege escalation. Developing ways to remotely disable payment functions, in addition to creating tools for mobile apps to monitor and report suspicious activity were also among the recommendations.

The guidelines focus on ways to prevent account data from being intercepted while sent or received on mobile devices or from being compromised while being processed or stored on them.

Troy Leach, the chief technology officer of the council, told SCMagazine.com on Friday that the most recent guidelines reinforce the council's standard payment security goals, while applying them to a mobile space.

“We have a brand new group of developers that aren't of aware of their responsibility,” Leach said. “They are designing good code, but don't know all it's being used for.”

(责任编辑:)

分享到:

更多
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
  • 微笑/wx
  • 撇嘴/pz
  • 抓狂/zk
  • 流汗/lh
  • 大兵/db
  • 奋斗/fd
  • 疑问/yw
  • 晕/y
  • 偷笑/wx
  • 可爱/ka
  • 傲慢/am
  • 惊恐/jk
用户名: 验证码:点击我更换图片
资料下载专区
图文资讯

英国官员:让华为参与英国5G建设风险可控

西媒:以色列打造网络安全“硅谷”

俄罗斯力推脱离互联网计划 确保应急状态下

GSMA呼吁欧洲守住网络安全和网络基建供应竞

涉嫌窃取近千政界人士信息 德国20岁黑客遭

返回首页 返回顶部