Although credit and debit card data continue to be a prime target for attackers, organizational adherence to the Payment Card Industry Data Security Standard (PCI DSS) remains surprisingly low. Despite prior work showing that PCI DSS can reduce card fraud, only 32.4% of organizations were fully compliant in 2022, suggesting possible deficiencies in enforcement mechanisms. This study compares PCI DSS with three data security frameworks, HIPAA, NIS2, and GDPR, to examine how enforcement mechanisms relate to implementation success. The analysis reveals that PCI DSS significantly lags far behind these security frameworks and that its sanctions are orders of magnitude smaller than those under GDPR and NIS2. The findings indicate a positive association between stronger, multi-modal enforcement (including public disclosure, license actions, and imprisonment) and higher implementation rates, and highlights the structural weakness of PCI DSS's bank-dependent monitoring model. Enhanced non-monetary sanctions and the creation of an independent supervisory authority are recommended to increase transparency, reduce conflicts of interest, and improve PCI DSS compliance without discouraging card acceptance.
翻译:尽管信用卡和借记卡数据仍是攻击者的主要目标,但组织对支付卡行业数据安全标准(PCI DSS)的遵循程度却出人意料地低。尽管先前研究表明 PCI DSS 能够减少卡片欺诈,但 2022 年仅有 32.4% 的组织完全合规,这暗示了其执行机制可能存在缺陷。本研究将 PCI DSS 与三种数据安全框架——HIPAA、NIS2 和 GDPR 进行比较,以探讨执行机制与实施成功之间的关系。分析显示,PCI DSS 显著落后于这些安全框架,其制裁力度远低于 GDPR 和 NIS2 的规定,相差数个数量级。研究结果表明,更强有力、多模式的执行(包括公开披露、许可证行动和监禁)与更高的实施率呈正相关,并突显了 PCI DSS 依赖银行的监控模式在结构上的弱点。建议加强非货币性制裁并设立独立的监管机构,以提高透明度、减少利益冲突,并在不抑制卡片受理意愿的前提下改善 PCI DSS 的合规性。