Containing — and reducing — the burden of PCI DSS
By Craig Tieken, [email protected]
According to VeriSign Global Security Consulting Services, the leading reason why companies fail their PCI assessment is the failure to protect cardholder data. This comes as little surprise; the charge to protect such sensitive data is quite a broad challenge that can increase exponentially. Not only is cardholder data used to authenticate a transaction, but it is also used for settlements, reconciliation and chargebacks, as well as in other business processes such as loyalty rewards programs, marketing, sales auditing and loss prevention.
Understanding cardholder data vulnerabilities
Merchant-based vulnerabilities may appear almost anywhere in the card-processing ecosystem. This includes point-of-sale (POS) devices, PCs or servers, wireless hot spots, Web-based shopping applications, paper-based storage systems and the transmission of cardholder data to service providers. Vulnerabilities can extend to outside systems operated by service providers and often lead to the exposure or theft of sensitive cardholder data, especially at the merchant level.
Merchants need to understand that sensitive data is vulnerable in the following three states:
- In transit: When moving from one device, application or system to another — such as from the POS endpoint device to the POS server — data can be surreptitiously copied and sent to a thief’s computer.
- At rest: Whether stored online (e.g. file server) or offline (e.g. file cabinet) for later use or archival purposes, data is vulnerable to accidental exposure or loss and to intentional theft.
- In use: When used in purposes other than simply authorizing a transaction (e.g. a marketing department’s loyalty rewards program) or analyzed for loss-prevention purposes, data may be replicated or used in ways in which the company isn’t even aware.
The PCI Data Security Standard (DSS) provides guidelines to help merchants understand how to protect or limit the exposure of the data.
Defining the cardholder data environment
Every computer system and filing cabinet, along with every application, that uses or stores sensitive card data is part of the overall cardholder data environment (CDE) and in scope for PCI DSS compliance. Even if sensitive data is encrypted within the CDE, it is still within scope of PCI DSS requirement No. 3: Protect stored cardholder data. As cardholder data is used beyond the POS and for more purposes beyond transaction authentication, the CDE grows, and likewise PCI DSS compliance and validation grow more complex and costly.
Impact on PCI DSS compliance
The extent of CDE is frequently underestimated when merchants conduct their initial appraisal on the resources needed to achieve PCI DSS compliance. In many cases it’s not known that actual cardholder data is used in various business applications until the first thorough PCI DSS assessment is conducted. According to Verizon Business Risk Team research, two-thirds of data breach cases involved data that the organization didn’t know was on the compromised system. When the data is discovered, the scope of the CDE grows to incorporate the data’s host systems and applications, and the requirements and costs to meet PCI DSS grow as well.
For example, data encryption may need to be employed on a tape storage system used by the marketing department, which uses cardholder data to evaluate marketing campaigns. Even though the tape storage system is not connected in any way to the POS system, it still holds data that is required to be protected under PCI DSS.
Limiting — even shrinking — the CDE
Every merchant accepting payments cards has a CDE under PCI DSS purview. However, merchants can limit — and even shrink — the scope of the CDE in order to reduce or minimize the merchant’s PCI DSS compliance and validation burden.
For example, merchants can restrict the use of cardholder data to only those applications directly pertaining to payments: transaction authentication, daily settlements, chargebacks, add-ons for items such as gratuities or recurring payments, and so on. Such restrictions can help limit the environment of the data to the POS system, related applications and a storage system. The specifications of PCI DSS 1.2 provide guidelines on how to secure this rather than limited CDE.
Each business application that uses the cardholder data pushes the boundary of the CDE outward. That is, these applications and their related storage and data flows are now in scope for all PCI DSS assessments. But what if these applications could function exactly as they need to without the use of actual cardholder data? What if some representation of the cardholder data would act as a suitable stand-in? This is the principle behind tokenization technology.
“Token” solution advantages
In the process of tokenization, a credit card is used in a transaction and, once authorized, the cardholder data is sent to a centralized and highly secure server called a “vault.” Immediately after, a random unique number is generated and returned to the merchant’s systems for use wherever the cardholder data would be used. Essentially, credit-card data has been removed from various business applications and replaced with a token. The token can be used by an authorized application to retrieve the stored cardholder data if necessary; otherwise the business application simply uses the token instead of the cardholder data.
There are two significant advantages of this approach. First, the token has no meaning whatsoever to a hacker who might siphon it from a server or application, thus dramatically reducing the impact of a data breach. Second, the business application using the token data is not included in the CDE, since there is no cardholder data present. Merchants that replace cardholder data with tokens in all their business applications can significantly reduce the scope of the CDE, and subsequently reduce the scope and cost of PCI DSS compliance and annual assessment/quarterly scan.
Further benefit is achieved if the merchant outsources the data vault to a third party. Removing the data vault from the CDE — and handing the responsibility (and liability) for it over to the third-party service provider — even further shrinks the environment that is subject to PCI compliance.
Many industry experts believe that tokenization and other up-and-coming techniques and technologies offer the promise to reduce the scope of the CDE in far more extensive ways than current solutions, allowing potentially significant savings to merchants striving to meet PCI DSS requirements. I encourage all merchants to learn more about PCI DSS compliance, and to develop and implement a strategy to reduce and protect the cardholder data environment — or the ramifications of a breach could become a reality.
Craig Tieken is VP merchant product management, First Data. He can be reached at [email protected].
NRF urges House rejection of healthcare bill
WASHINGTON The National Retail Federation announced that it has asked lawmakers to reject healthcare reform legislation expected to receive a vote in the House this weekend, saying the measure would drive up labor costs to the point of forcing job losses and that a “transparent procedural ploy” for passing the package would harm Congress’ reputation.
“NRF has worked tirelessly to promote effective healthcare reforms that would lower the cost of medical care and expand access to coverage,” NRF SVP for government relations Steve Pfister said. “We are disappointed by the direction of the congressional debate, particularly its punitive focus against employers. It is an economic certainty that if labor costs significantly increase, retailers – who operate on razor-thin profit margins – will have no choice but to reduce the size of their work forces. This is an outright tax on jobs, a dangerous strategy when our economy so clearly needs to grow through job creation. Health care reform in its current form will become the biggest anti-stimulus legislation imaginable.”
The House is expected to vote as soon as Sunday on whether to send H.R. 3590, the Patient Protection and Affordable Care Act – the healthcare bill passed by the Senate on Christmas Eve – to President Obama for his signature.
Pfister said NRF strongly opposes the Senate legislation because of its lack of greater and more immediate cost savings for employer-sponsored healthcare coverage, its conditional mandate for employers to provide insurance coverage to full-time workers, and higher taxes that would pass through to both employers and consumers, among other reasons.
Blockbuster gets ready for ‘New Moon’
DALLAS Blockbuster announced that it will keep its stores open past midnight on March 19 for the 12:01 a.m. March 20 release of “The Twilight Saga: New Moon.”
Select Blockbuster stores will host midnight DVD release parties and carry collectibles, including exclusive tote bags with “Team Edward” and “Team Jacob” slogans and Edward/Jacob two-sided pillows and two-sided door posters.