Spirit of PCI DSSorThe REAL Goal of PCIDr. Anton ChuvakinSecurity Warrior Consultingwww.securitywarriorconsulting.comAuthor of “PCI Compliance” book Keynote at PCI in Higher Education WorkshopIndianapolis, IN  -  May 2010
“PCI Is The Devil !!!”
Inspiration….“Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. “PCI Knowledge Base by late David Taylor
OutlineBackground and context around PCIWhy are we doing it?Accept risk … of others?Security as a checklist?PCI -> security? Conclusions: Simplify PCI?
What is PCI DSS or PCI?Payment Card Industry Data Security StandardPayment Card  = Payment Card Industry = Data Security = Data Security Standard =
PCI Regime vs DSS GuidanceThe PCI Council publishes  PCI DSS Outlined the minimumdata security protections measures for payment card data.Defined Merchant & Service Provider Levels, and compliance validation requirements.Left the enforcement to card brands (Council doesn’t fine anybody!)Key point: PCI DSS (document) vs PCI (validation regime)
Install and maintain a firewall confirmation to protect data
Do not use vendor-supplied defaults for system passwords and other security parametersBuild and Maintain a Secure NetworkProtect stored data
Encrypt transmission of cardholder data and sensitiveinformation across public networksProtect Cardholder DataUse and regularly update anti-virus software
Develop and maintain secure systems and applicationsMaintain a Vulnerability Management ProgramRestrict access to data by business need-to-know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder dataImplement Strong Access Control MeasuresTrack and monitor all access to network resources andcardholder data
Regularly test security systems and processesRegularly Monitor and Test NetworksMaintain a policy that addresses information securityMaintain an Information Security PolicyPCI DSS  = Basic Security Practices!
PCI Game: The PlayersPCI Security Standards Council
Why Are We Doing It?Risk of DEATHVs Risk of $60 fine?
My Data – Their Risk!?*I* GIVE *YOU* DATA*YOU* LOSE IT*ANOTHER* SUFFERS!
Key Point: What Do You Protect?
2/3 Value vs ½ ProtectionWhat is VALUED vswhat isPROTECTEDLack of Balance!
Observations…
Leaders vs Losers
Extra Dimension: Fraud?Disconnect of fraud and PCI?Ideas:Deploy PCI DSS controls
Measure their impact on fraud
Rinse, repeat!Compliance vs SecurityX
Ceiling vs FloorPCI is the “floor” of securityThis is fundamental reality of PCI DSS!However, many prefer to treat it as a “ceiling”Result: security breaches
PCI and Security Today              <- This is the enemy!This is NOT the enemy! ->Remember:security first, compliance as a result.
Checklist Mentality IS Evil!
“Whack-an-assessor”PCI “game” as “whack-an-assessor” = PAIN, PAIN, PAIN, PAIN, PAIN, PAIN!Do it for security – justify it for PCI DSS!
How To “Profit” From PCI DSS?Everything you do for PCI DSS, MUST have security benefit for your organization!Examples: log management, IDS/IPS, IdM, application security , etc
In Other Words…Every time you think “PCI DSS OR security,” god kills a kitten!
The Spirit of PCI DSS?PCI DSS = Motivating FORCE for CUSTODIAN data security, thus customer TRUST!Can learn to protect YOUR data too!

Spirit of PCI DSS by Dr. Anton Chuvakin

  • 1.
    Spirit of PCIDSSorThe REAL Goal of PCIDr. Anton ChuvakinSecurity Warrior Consultingwww.securitywarriorconsulting.comAuthor of “PCI Compliance” book Keynote at PCI in Higher Education WorkshopIndianapolis, IN - May 2010
  • 2.
    “PCI Is TheDevil !!!”
  • 3.
    Inspiration….“Too many havelost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. “PCI Knowledge Base by late David Taylor
  • 4.
    OutlineBackground and contextaround PCIWhy are we doing it?Accept risk … of others?Security as a checklist?PCI -> security? Conclusions: Simplify PCI?
  • 5.
    What is PCIDSS or PCI?Payment Card Industry Data Security StandardPayment Card = Payment Card Industry = Data Security = Data Security Standard =
  • 6.
    PCI Regime vsDSS GuidanceThe PCI Council publishes PCI DSS Outlined the minimumdata security protections measures for payment card data.Defined Merchant & Service Provider Levels, and compliance validation requirements.Left the enforcement to card brands (Council doesn’t fine anybody!)Key point: PCI DSS (document) vs PCI (validation regime)
  • 7.
    Install and maintaina firewall confirmation to protect data
  • 8.
    Do not usevendor-supplied defaults for system passwords and other security parametersBuild and Maintain a Secure NetworkProtect stored data
  • 9.
    Encrypt transmission ofcardholder data and sensitiveinformation across public networksProtect Cardholder DataUse and regularly update anti-virus software
  • 10.
    Develop and maintainsecure systems and applicationsMaintain a Vulnerability Management ProgramRestrict access to data by business need-to-know
  • 11.
    Assign a uniqueID to each person with computer access
  • 12.
    Restrict physical accessto cardholder dataImplement Strong Access Control MeasuresTrack and monitor all access to network resources andcardholder data
  • 13.
    Regularly test securitysystems and processesRegularly Monitor and Test NetworksMaintain a policy that addresses information securityMaintain an Information Security PolicyPCI DSS = Basic Security Practices!
  • 14.
    PCI Game: ThePlayersPCI Security Standards Council
  • 15.
    Why Are WeDoing It?Risk of DEATHVs Risk of $60 fine?
  • 16.
    My Data –Their Risk!?*I* GIVE *YOU* DATA*YOU* LOSE IT*ANOTHER* SUFFERS!
  • 17.
    Key Point: WhatDo You Protect?
  • 18.
    2/3 Value vs½ ProtectionWhat is VALUED vswhat isPROTECTEDLack of Balance!
  • 19.
  • 20.
  • 21.
    Extra Dimension: Fraud?Disconnectof fraud and PCI?Ideas:Deploy PCI DSS controls
  • 22.
  • 23.
  • 24.
    Ceiling vs FloorPCIis the “floor” of securityThis is fundamental reality of PCI DSS!However, many prefer to treat it as a “ceiling”Result: security breaches
  • 25.
    PCI and SecurityToday <- This is the enemy!This is NOT the enemy! ->Remember:security first, compliance as a result.
  • 26.
  • 27.
    “Whack-an-assessor”PCI “game” as“whack-an-assessor” = PAIN, PAIN, PAIN, PAIN, PAIN, PAIN!Do it for security – justify it for PCI DSS!
  • 28.
    How To “Profit”From PCI DSS?Everything you do for PCI DSS, MUST have security benefit for your organization!Examples: log management, IDS/IPS, IdM, application security , etc
  • 29.
    In Other Words…Everytime you think “PCI DSS OR security,” god kills a kitten!
  • 30.
    The Spirit ofPCI DSS?PCI DSS = Motivating FORCE for CUSTODIAN data security, thus customer TRUST!Can learn to protect YOUR data too!
  • 31.
    CSR Goes Far?CorporateSocial Responsibility?GreenSustainable“Fair” tradeLOSES CUSTOMER DATA!!!Secure data -> trust!
  • 32.
    The Whining ofPCI DSSW1: Why don’t the brands “fix the system?”A1: They will.W2: Can we have “a risk based” standard?A2: No. 91% of people can’t spell “risk”W3: Can we do something simpler?A3: Yes! Cash.
  • 33.
    Conclusions and ActionItemsKill the data! Outsource!PCI is basic security; stop complaining about it - start doing it!Develop “security and risk” mindset, not “compliance and audit” mindset.If you are doing PCI DSS and not getting a security benefit, please STOP!
  • 34.
    Get The PCIBook!“PCI Compliance” by Anton Chuvakin and Branden WilliamsUseful reference for merchants, vendors – and everybody else in PCI-landReleased December 2009!www.pcicompliancebook.info
  • 35.
    Questions?Dr. Anton ChuvakinEmail:anton@chuvakin.orgSite:http://www.chuvakin.orgBlog:http://www.securitywarrior.orgTwitter:@anton_chuvakinConsulting:http://www.securitywarriorconsulting.com
  • 36.
    More on AntonNow:independent consultantBook author: “Security Warrior”, “PCI Compliance”, “Information Security Management Handbook”, “Know Your Enemy II”, “Hacker’s Challenge 3”, etcConference speaker: SANS, FIRST, GFIRST, ISSA, CSI, Interop, many, many others worldwideStandard developer: CEE, CVSS, OVAL, etcCommunity role: SANS, Honeynet Project, WASC, CSI, ISSA, OSSTMM, InfraGard, ISSA, othersPast roles: Researcher, Security Analyst, Strategist, Evangelist, Product Manager
  • 37.
    Security Warrior ConsultingServicesLogging and log management policyDevelop logging policies and processes, log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validationCustomize industry “best practices” related to logging and log review to fit your environment, help link these practices to business services and regulationsHelp integrate logging tools and processes into IT and business operationsContent developmentDevelop of correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needsCreate and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulationsMore at www.SecurityWarriorConsulting.com

Editor's Notes

  • #4 http://www.pciknowledgebase.com/index.php?option=com_mtree&amp;task=viewlink&amp;link_id=1366&amp;Itemid=0As a banker who has been involved in audit and risk management for 20+ years, I have a beef with PCI. Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. We have removed the acceptance of risk as an option by insisting on 100% compliance. That was not the intent.
  • #12 Forrester“Value of Data” report: “Custodial data has little intrinsic value in and of itself. But when it is obtained by an unauthorized party, misused, lost, or stolen, it changes state. Data that is ordinarily benign transforms into something harmful. When custodial data isspilled, it becomes “toxic” and poisons the enterprise’s air in terms of press headlines, fines, and customer complaints.Outsiders, such as organized criminals, value custodial data because they can make money with it. Custodial data alsoaccrues indirect value to the enterprise based on the costs of fines, lawsuits, and adverse publicity.”
  • #13 Forrester report:2/3of value in OWN data, ½ is spent protecting it!
  • #14 + not have OWN DATA+ not have CUSTODIAN DATA+ removes CUSTODIAN DATA = protects CUSTODIAN DATA!+ protects key business processes
  • #15 While many hope for gaussian, in security – counter to intuition! – most people are below average!
  • #16 Example controls deemed useful for fraud:LoggingUser access configuration, logging and monitoringLimiting access to data –e.g. encryption, tokenization, etcSecurity awareness – unavoidable punishment for internal fraudDefine an incentive program to enforce policies. About two months ago in this column I wrote about he importance of “deputizing” store managers to watch for security breaches. Since I have discussed such programs with leading retailers, it’s become clear that in order to change the culture, retailers have to provide incentives to these “deputies” in order to actually impact key metrics such as shrinkage, fraud and chargeback rates. The other important technique is to link the PCI compliance initiative to these same security metrics. For example, a PCI project manager who wants to “embed” PCI compliance into the corporate culture would be well advised to spend about 20 hours, spread over several weeks, to create a presentation for management which shows how PCI compliance can not only reduce risk, but also can impact key financial metrics such as fraud and chargeback rates. I have talked to three PCI managers who also own fraud management and report into the CFO. All three have found that linking PCI compliance to financial performance is a great way to get executive attention, and budget. And since all these metrics are key to individual store performance, this is one of the ways to gain the support of store management for PCI compliance – circling back to the whole “deputize” argument.  Pasted from &lt;http://pciknowledgebase.com/index.php?option=com_content&amp;view=article&amp;id=121:pci-compliance-whos-re-minding-the-store&amp;catid=28:myblog&amp;Itemid=132&gt;WE ARE LOOKING TO LINK PCI COMPLIANCE TO FRAUD REDUCTION: You cannot simply say that PCI compliance leads to reduced fraud rates. You have to prove it. Because PCI is so detailed, it&apos;s not ALL of the controls that can be proven to reduce fraud. However, one of the controls that we believe has the most direct impact are #3, encryption, #10, monitoring and logging access, #7, access controls, and #11 vulnerability testing. If just those 4 are done well, we believe that we can prove those controls in PCI can lead directly to reduced fraud rates. However, we still cannot prove it statistically. We have case study data that suggest it however.  Pasted from &lt;http://www.pciknowledgebase.com/index.php?option=com_mtree&amp;task=viewlink&amp;link_id=3195&amp;Itemid=0&gt; “Merchants have implemented PCI-mandated security controls in order to reduce fraud and security breaches. However, a weak connection between the PCI controls and fraud management by many merchants has left PCI compliance ineffective at catching external fraud on a day-to-day basis. Some merchants run PCI compliance as an IT project, leaving other operations groups fewer opportunities to get involved. PCI managers also need better understanding of fraud and risk managers&apos; functions to benefit from PCI-mandated reporting.”  Pasted from &lt;http://blog.intellitactics.com/blog/new-intellitactics-blog/0/0/catching-fraud-pci-dss-compliance-software&gt;
  • #24 REAL Spirit of PCITrust in business transactions&quot;Corporate Social Responsibility&quot;They trusted you with their data!You give me data. I lose it. Another suffers.
  • #25 This comes from the PCI book www.pcicompliancebook.info
  • #27 + After validating that you are compliant, don’t stop: continuous compliance AND security is your goal, not “passing an audit.”See “How to STAY PCI Compliant?”