Credit-card security standard issued after much debate
End-to-end encryption and virtualization security on horizon for credit/debit card handlers
By Ellen Messmer , Network World , 10/01/2008
Share/Email Buzz up! 3 Comments Print
The Payment Card Industry Security Standards Council, the organization that sets technical requirements for processing credit- and debit-cards, last week issued revised security rules. The council also indicated that next year it will focus on new guidelines for end-to-end encryption, payment machines and virtualization.
Adherence to PCI rules could play a key role in preventing big data thefts, like the 2005 TJX breach, security experts say.
New! Watch this Network World Webcast – Minimizing the Risk of Information Security Breaches: Best Practices for SOA Governance and Compliance – Live October 21
The PCI 1.2 data security standard (DSS) seeks to clarify several pieces of the earlier 12-part PCI 1.1 standard that had many confused. Among other things, Version 1.2 clarifies that all operating systems associated with card processing have to run antivirus software, while many had thought this was only about Microsoft Windows.
"That sounds like a sensible piece of advice," says Sushila Nair, product manger at BT, who says organizations often deploy antivirus on Windows but erroneously believe Unix and Macs and other operating systems are somehow more invulnerable. However, she notes accommodating the clarified PCI rule on antivirus in many places will be "expensive."
The PCI 1.2 standard from the PCI Security Standards Council
Hannaford discloses data breach
Details emerging on Hannaford data breach
New payment-card rules on tap
Spyware: Know Your EnemyWHITEPAPER
Credit card skimming: How thieves can steal your card info without you knowing itSLIDESHOW
TriCipher launches hosted identity federation service
IBM software bundle targets retail theft, data breaches
Sun goes commercial with OpenSSO
IT Search: What it is and how it helpsWHITEPAPER
Start-up adds SSO to cloud integration platform
Retail security: ‘Knee-jerk’ standards compliance isn’t enough
View all related articles
Click to see: Chart of what's new with PCI standard
One of the biggest topics of debate at last month's PCI Council meeting was how to determine what "network segmentation" means since the standard is aimed at trying to devise technical methods to cordon off where credit cards are stored so that PCI compliance assessment can be focused on specific parts of a merchant's network involved with cardholder data.
"There was a lot of talk about network segmentation," says Sumedh Thakar, PCI solutions manager at vulnerability management and policy compliance product company Qualys. "A lot of merchants were trying to get answers. The guidelines now are to restrict access using firewalls."
The PCI 1.2 standard advises the use of "internal firewalls, routers with strong access control" and other network-restricting technologies to assure internal network segmentation for card-processing purposes.
Some IT managers say the PCI-based reviews that their organizations are now undergoing are already based on PCI 1.2 as the baseline. Such reviews are typically carried out by PCI Council-certified assessors if self-assessment procedures aren't applicable.
"It was in draft form so we decided to use that since there seemed to be no point in using 1.1 anymore," says one IT manager, who preferred not to be named. But he says his organization is finding it very difficult to isolate the network to protect specific servers and applications associated with cardholder data, plus monitor and log according to the PCI 1.2 guidelines.