PCI DSS Myths 2009: Myths and Reality

Anton Chuvakin
Anton ChuvakinSecurity Strategy
PCI DSS Myths 2009:  Fiction and Reality Dr. Anton Chuvakin Security Warrior Consulting www.securitywarriorconsulting.com   November 2009
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is PCI DSS or PCI? ,[object Object],[object Object],[object Object],[object Object],[object Object]
PCI DSS is based on basic data security practices! ,[object Object],[object Object],Protect Cardholder Data ,[object Object],Maintain an Information Security Policy ,[object Object],[object Object],Regularly Monitor and  Test Networks ,[object Object],[object Object],[object Object],Implement Strong Access Control Measures ,[object Object],[object Object],Maintain a Vulnerability Management Program ,[object Object],[object Object],Build and Maintain a  Secure Network
Ceiling vs Floor ,[object Object],[object Object],[object Object],[object Object],[object Object]
M1 - PCI just  doesn’t apply to us … ,[object Object],[object Object],Reality:  PCI DSS  DOES  apply to you if you “ accept, capture, store, transmit  or  process credit and debit card data ”, no exceptions! At some point, your acquirer will make it clear to you!
M2 - PCI is confusing ,[object Object],[object Object],[object Object],Reality:  PCI DSS documents explain both what to do and how to validate it; take some time to read and understand it. <- Also, read our book on PCI!  
M3 - PCI is  too hard ,[object Object],[object Object],Reality:  PCI DSS is basic, common sense, baseline security practice; it is only hard if you were not doing it before. It is no harder than running your business or IT – and you’ve been doing it!
M4 - Breaches  prove PCI irrelevant ,[object Object],[object Object],Reality:  Data breaches prove that basic PCI DSS security is not enough, but you have to start from the basics. PCI is actually easier to understand than other advanced security and risk matters. Start there!
M5 –  PCI is Easy :  Just Say “YES” ,[object Object],[object Object],Reality:  Not exactly - you need to: a) Get a scan – and then  resolve  the vulnerabilities found b)  Do the things  that the questions refer to – and  prove it c)  Keep doing  a) and b) forever!
M6 –  My tool is PCI  compliant ,[object Object],[object Object],[object Object],Reality:  There is no such thing as “PCI compliant tool, network”, PCI DSS compliance applies to  organizations . PCI DSS combines technical AND process, policy, management issues; awareness and practices as well.
M7 – PCI Is  Enough Security  ,[object Object],[object Object],Reality:  PCI is  basic  security, it is a  necessary baseline, but NOT  sufficient  (floor – not the ceiling!)  PCI is also about  cardholder data security , not the rest of private data, not your intellectual property, not SSNs, etc. It also covers  confidentiality , and NOT integrity and availability. There is  more to security  than PCI!
M8 – PCI DSS Is  Toothless ,[object Object],[object Object],Reality:  Possible fines + lawsuits + breach disclosure costs + investigation costs + CC rate increases + contractual breaches + cost of more security measures + cost of credit monitoring = will you risk  ALL  that?
Summary: Eight Common PCI Myths ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your Approach To PCI DSS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Continuous Compliance vs Validation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PCI and Security Today ,[object Object],[object Object],[object Object],[object Object]
Conclusions and Action Items ,[object Object],[object Object],[object Object]
Get More Info! ,[object Object],[object Object],[object Object]
About Anton Chuvakin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For more:  http://www.chuvakin.org
More on Anton ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Warrior Consulting Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1 of 22

More Related Content

What's hot(17)

Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats93 views
RSA 2017 - CISO's 5 steps to SuccessRSA 2017 - CISO's 5 steps to Success
RSA 2017 - CISO's 5 steps to Success
Gary Hayslip CISSP, CISA, CRISC, CCSK935 views
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
Paul Hastings1.7K views
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
Gary Hayslip CISSP, CISA, CRISC, CCSK557 views
Helping SME’S to face cybersecurity threatsHelping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threats
Agence du Numérique (AdN)219 views
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
Media Sonar524 views
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
Eryk Budi Pratama1.1K views
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats115 views
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
Digital Guardian1.2K views
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
Robert Kloots4K views

Similar to PCI DSS Myths 2009: Myths and Reality(20)

More from Anton Chuvakin(20)

Recently uploaded(20)

METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation24 views
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya59 views
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver24 views
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman161 views

PCI DSS Myths 2009: Myths and Reality

  • 1. PCI DSS Myths 2009: Fiction and Reality Dr. Anton Chuvakin Security Warrior Consulting www.securitywarriorconsulting.com November 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.