SlideShare a Scribd company logo
1 of 7
Myths of PCI DSS
Dr. Anton Chuvakin @ Security Warrior Consulting
DISCLAIMER:
Securityisa rapidlychangingfieldof humanendeavor.Threatswe face literallychange everyday;
moreover,manysecurityprofessionalsconsiderthe rate of change to be accelerating. On topof that,
to be able to stay intouch withsuchever-changingreality,one hastoevolve withthe space aswell.
Thus,eventhoughI hope thatthisdocumentwill be usefulfortomy readers,please keepinmindthatis
was possiblywrittenyearsago.Also,keepinmindthatsome of the URL mighthave gone 404, please
Google around.
Introduction
Payment Card Industry Data Security Standard (PCI DSS or,, just PCI) has transformed
the way many organizations view information security. While we‘ve heard that something
will “take information security from the wire closet to the boardroom” many times before,
PCI actually accomplishes this for many organizations – both large and small. While
following all of the PCI DSS guidance will not magically make your organization secure or
prevent all incidents, the standard contains many of the common sense security
requirements that are essential for protecting cardholder data.
PCI DSS was unified from card brand individual security mandates such as CISP and
SDP and established to increase the security of card-accepting merchants and thus
reduce the risk of card transactions and resulting fraud. As of today, “PCI DSS
compliance includes merchants and service providers who accept, capture, store,
transmit or process credit and debit card data.” The above quote from the PCI DSS
document makes it clear that the applicability of PCI is nearly universal.
In this paper we look at common PCI DSS myths and misconceptions. We will also dispel
those myths and provide a few useful tips on approaching to PCI DSS.
Let’s get to the myths.
Myth #1 is pretty simple, but, sadly, very common: “PCI DSS just doesn’t apply to us,
because we are small, or we are a University, or we don’t do e-commerce, or we
outsource “everything”, or we don’t store cards, or we are not a permanent entity,
etc.” This myth takes over an organization and makes it oblivious to PCI DSS
requirements and, almost always, to information security risk in general.
The reality, as we mentioned above is pretty simple: PCI DSS DOES apply to your
organization if you “accept, capture, store, transmit or, process credit and debit card data”
with no exceptions.
Admittedly, different things needs to happen at your organization if you have absolutely
no electronic processing or storage of digital cardholder data compared to having an
Internet-connected payment application system. The scope of compliance validation will
be much more limited in the former case. For example, if a small merchant “does not
store, process, or transmit any cardholder data on merchant premises but relies entirely
on third party service providers to handle these functions” he is only responsible for
validating the parts of “Requirement 9: Restrict physical access to cardholder data” as
well as a small part of “Requirement 12: Maintain a policy that addresses information
security for employees and contractors” via a Self-Assessment Questionnaire (SAQ)
Type A (13 questions overall).
Overall, the choice is pretty simple: either you comprehend PCI DSS now and start
working on security and PCI requirements or your acquirer will make it clear to you at
some point when you won’t have much room to maneuver.
Myth #2 is just as pervasive: PCI is confusing and not specific. This myth seems to be
purposefully propagated bysome people inorder to “muddy the waters” and thus to make
PCI DSS seem impossible to achieve and thus worthy of even trying. Namely, those
under its influence often proclaim things like:
 “We don’t know what to do, who to ask, what exactly to change.”
 “Just give us a checklist and we will do it. Promise!”
 “PCI just confuses us – we can’t do it.”
The reality is quite different: PCI DSS documents explain both what to do and how to then
validate it. Apart from people who propagate this myth, you just need to take the time to
understand the “why” (the spirit of the standard and cardholder data security), the “what”
(the list of PCI DSS requirements) and “how” (common approaches and practices related
to PCI).
PCI is actually much easier to understand than other existing security and risk
management frameworks and regulatory guidance. Looking at some of the advanced
information risk management document such as ISO27005 “Information security risk
management” or NIST 800-30 “Risk Management Guide for Information Technology
Systems” with their hundreds of pages of sometimes esoteric guidance is a refreshing
reminder that PCI DSS is, in fact, pretty simple and straightforward.
Finally, security cannot and will not ever be reduced to a simple checklist. Even today
some criticize PCI DSS for being a manifestation of “checklist security” which does not
account for individual organization’s risk profile. PCIguidance is as close to a checklist as
we can get without actually leading to increased, not reduced, risk.
The next myth, Myth #3 is closely related to the above: PCI DSS is too hard. Sometimes
it becomes PCI DSS is too expensive, too complicated, too burdensome, just too much
for a small business, too many technologies or even just “unreasonable.”
The reality is that PCIDSS exemplifies commonsense, baseline securitypractices, which
every organization needs to take into account when planning their IT and business
operations. PCI only seems hard if you were not doing anything for security of your data
before. Still, it might not be easy for a large, distributed organization, but it clearly much
easier than creating and running a well-managed security program based on a good
understanding of your risk.
Still, you can make PCI harder for making the wrong decisions. For example, developing
your own web application complete with credit card processing will increase your PCI
scope likely beyond your ability to handle. On the opposite, using a 3rd party checkout
service will do just the opposite and make PCI and data security easier.
Myth #4 seems mostly driven by the media: it claims that “Recent card data breaches
prove PCI irrelevant.” I suspect it stems from the fact that reporting failures and other
“bad stuff” typically draws more listeners, readers and watchers compared to reporting
successes and thus attracts more media attention. However, it encourages some
organizations to develop a negative mindset and thus to perform a bad job with PCI DSS
and data security and then suffer from a devastating data breach.
Again, the reality is exactly the opposite: data breaches remind us that basic security,
mandated by PCI DSS, is necessary, not sufficient, but you have to start from the basics
before you can advance in your securityeducation. As you learn more about security, you
usually come to realize that nothing guarantees breach free operation.
Finally, one of my colleagues likes to say that every breach proves that PCI DSS is even
more necessary. PCI DSS is a great start for security, but a really bad finish, as we
discover in the next myth
Myth #5 is probably the scariest one: PCI is all we ever need to do for security. People
in the grasp of this myth would proclaim dangerous things such as:
 “We have PCI handled - we are secure now”
 “We worked hard and we passed an ‘audit’; now we are secure!”
Or even, in its more extreme form,
 “I filed my PCI compliance documents; now I am compliant and secure”
It often leads organizations to focus on “pleasing the auditor” and then forgetting that a
happy assessor does not mean that your organization is protected from information risks.
This myth is actually wrong on multiple levels! First, validating PCI DSS via an
assessment or self-assessment does not mean that you are done with PCI DSS (since
you now need to maintain compliance) and it certainly does not mean that you are done
with security. In addition, it doesn’t mean that you are secure, just that you validated PCI
compliance and hopefully made an honest step towards reducing your risk!
The reality is again different. As we mentionabove, PCI is basic security; it is a necessary
baseline, a lower watermark, which was never meant to be the “end state” of guaranteed
secure data. No external document, even well-written and followed with utmost diligence,
can guarantee that, just as excellent police work can never guarantee “crime-free”
environment.
Finally, PCI is about cardholder data security, not the rest of your private or regulated
information, not your organization intellectual property, not identity information such as
SSNs, etc. It also covers confidentiality, and not availability of such data. These quick
examples show that there is a lot more to data security than PCI DSS and there are clear
areas where PCI does not focus.
Thus, you are certainly not “done with security” even if you maintain ongoing PCI
compliance. For example, one of notable PCI QSAs likes to say that you likely need PCI+”
or even “PCI++” to deal with risks to your data today.
The next myth, #6, is the opposite of myth #4: PCI is easy: we just have to “say Yes”
on a questionnaire and “get scanned.” As merchants become more familiar with PCI
DSS, some start to feel that PCI is not that scary, because they succumb to
misconceptions such as:
 “What do we need to do - get a scan and answer some questions? Sure!’”
 “PCI is about scanning and questionnaires, right?”
For smaller merchants, PCI DSS compliance is indeed validated via external vulnerability
scanning and self-assessment questionnaire (SAQ). However, it is worthwhile to mention
that there is some work involved before many of the merchant can truthfully answer “yes”
to those question AND would be able to prove this, if requested.
A slightly simplified reality is that a typical small merchant which processes cards online
would at least need to do the following:
a) Get a network vulnerability scan of the external systems, resolve the vulnerabilities
found and then rescan to verify that.
b) Do the things that the SAQ questions refer to and maintain evidence that they were
performed; then answer the questions affirmatively
c) Keep doing a) every quarter and b) every year until you no longer wish to accept
credit cards.
In other words, achieve PCI DSS validation and then maintain PCI DSS compliance for as
long as you plan to accept cards. You can only answer ‘yes’ if you have ground for saying
‘yes’ on the questionnaire and can prove it, even with no auditors or acquiring banks
looking over your shoulder.
Specifically, even on the vulnerability scanning side, a typical perception that “get a PCI
scan and you are done” is essential misguided. PCI DSS requires you run both Internal
and external network vulnerability scans at least quarterly (in reality, twice a quarter since
you’d need to fix the vulnerabilities and then rescan to confirm it!) as well as after every
major network change. Internal scans can be run by in house security staff, while the
external scans must be performed by an Approved Scanning Vendor (ASV), and are then
used to satisfy your PCI Validation Requirements and are submitted to your acquiring
bank. By default, all Internet-facing IP addresses are ‘in-scope.’
Myth #7 is in believing that your network, application, tool is PCI compliant with the
resulting conclusion that this achieves compliance for your organization. This myth
manifests itself in statements from merchants such as “My payment application vendor
said this tool is ‘PCI compliant’” or “They put together a network and it is PCI compliant.”
However, no tool can make you compliant. In fact, people often confuse PA DSS certified
application withPCIDSS compliance, which literally have little to do with each other, even
though both come from PCI Council.
In reality, there is no such thing as “PCI compliant tool, application, configuration or
network,” PCI DSS compliance applies to organizations only. You can struggle toward,
achieve and validate PCI DSS compliance only as an organization. Using PA
DSS-compliant application is only a small piece of the whole puzzle.
Moreover, PCI DSS combines technology, process, policy, awareness and practices as
wel. For example, Requirement 12 covers security policy, incident response practices,
security awareness and other non-technical safeguards and controls.
For example, I was once asked the following: if we connect this server to this other
servers and have a firewall in between, is this PCI compliant? The only genuine response
is that one can’t tell. What if those servers have blank passwords? What if there is no
logging? There is no way to judge PCI compliance on just isolated servers.
Myth #8 is simply a view that “PCI DSS Is Toothless.” This myth shows a completely
wrong worldview of PCI DSS and security; a dangerous delusion which is wrong on
several levels. First, it embodies the view that data security can only happen due to
regulatory pressure. This myth is often used to justify not doing anything about data
security with examples like these:
 “Even if breached and also found non-compliant, our business will not suffer.”
 “We read that companies are breached and then continue being profitable; so why
should we care?”
Second, in addition to it being a wrong mindset, it is also simply wrong. PCI DSS packs
a lot of bite which includes fines, possible lawsuits, mandatory breach disclosure costs,
investigation costs, possible card processing rate increases, cost of additional security
measures and cost of victim credit monitoring. To top it off, a victim merchant can be
labeled “Level 1” and thus subjected to an annual QSA audit - at their own expense.
Admittedly, not every breach will incur all of the above, but some are simply unavoidable.
Overall, it is much more useful to think of customer and cardholder data protection as your
“social responsibility” and not as something you do because of some scary “PCI teeth”
somewhere!
Conclusion: Eight Common PCI Myths – All Wrong!
Here are all the myths again:
 PCI just doesn’t apply to us, because…we are special.
 PCI is confusing and not specific!
 PCI is too hard
 Recent breaches prove PCI irrelevant
 PCI is easy: we just have to “say Yes” on SAQ and “get scanned”
 My network, application, tool is PCI compliant
 PCI is all we need to do for security!
 Even if breached and then found non-compliant, our business will not suffer
Now that you know what the myths are and what the reality is, you are one step closer to
painless, effective PCI DSS program as well as to secure and compliant organization
which cares about its customers by protecting their data.
ABOUT AUTHOR:
This is an updated authorbio,added to thepaperat thetime of reposting in 2009.
Dr. AntonChuvakin(http://www.chuvakin.org)isarecognizedsecurityexpertandbookauthor.He isan
author of books"SecurityWarrior"and "PCICompliance"andacontributorto "Know Your EnemyII",
"InformationSecurityManagementHandbook","Hacker'sChallenge 3","OSSECHIDS" andothers.
Antonhas publisheddozensof papersonlogmanagement,correlation,dataanalysis,PCIDSS,security
management,etc- see all paperslinkedfromhisportal http://www.info-secure.org).Inhisspare time,
he also blogsat http://www.securitywarrior.org Inaddition, Antonhaspresentedandtaught
tutorialsatmany securityconferencesacrossthe world. Hisrecentengagementsinclude speakingat
eventsinthe UnitedStates,UK,Singapore,Spain,Canada,the Netherlands,Poland,CzechRepublic,
Russiaand othercountries. In addition,Antonalsoworkswithstandardsorganizationsonemerging
securitystandardsandservesonthe advisoryboardsof several securitystart-ups.
At thistime,Antonisbuildinghissecurityconsultingpractice,focusingonloggingandPCIDSS
compliance forsecurityvendorsandFortune 500 organizations.Dr.AntonChuvakinwasformerlya
Directorof PCICompliance SolutionsatQualys.PriortoQualys,AntonworkedatLogLogic,where he
heldthe title of Chief LoggingEvangelist,taskedwitheducatingthe worldaboutthe importance of
loggingforsecurity,compliance andoperations. Before LogLogic,Antonwasemployedbyasecurity
informationmanagementvendorinastrategicproductmanagementrole. AntonholdsaPh.D.degree
fromStonyBrook University.

More Related Content

What's hot

Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedVISTA InfoSec
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for DummiesLiberteks
 
Dlp content-discovery-best-practices
Dlp content-discovery-best-practicesDlp content-discovery-best-practices
Dlp content-discovery-best-practiceslookout4raj
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
BIZGrowth Strategies Winter 2019
BIZGrowth Strategies Winter 2019BIZGrowth Strategies Winter 2019
BIZGrowth Strategies Winter 2019CBIZ, Inc.
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...ISHIR
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering AuthoritySteve Waldman
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Permissonless & Permissioned blockchain
Permissonless & Permissioned blockchainPermissonless & Permissioned blockchain
Permissonless & Permissioned blockchainVikas Pandey
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...D1Conf
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 

What's hot (20)

Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Bridger Insight brochure
Bridger Insight brochureBridger Insight brochure
Bridger Insight brochure
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Dlp content-discovery-best-practices
Dlp content-discovery-best-practicesDlp content-discovery-best-practices
Dlp content-discovery-best-practices
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
BIZGrowth Strategies Winter 2019
BIZGrowth Strategies Winter 2019BIZGrowth Strategies Winter 2019
BIZGrowth Strategies Winter 2019
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...Why is it critical for your enterprise to understand Blockchain technology an...
Why is it critical for your enterprise to understand Blockchain technology an...
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering Authority
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Permissonless & Permissioned blockchain
Permissonless & Permissioned blockchainPermissonless & Permissioned blockchain
Permissonless & Permissioned blockchain
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...
D1Conf 2018 |The incumbents view: how is the insurance industry using blockch...
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 

Similar to Myths of PCI DSS

PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityAnton Chuvakin
 
Payment account data security – PCI DSS
Payment account data security – PCI DSSPayment account data security – PCI DSS
Payment account data security – PCI DSSsocassurance
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Versionguest3af00b8
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Versionguest3af00b8
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Versionguest3af00b8
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionAnton Chuvakin
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Versionguest3af00b8
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinAnton Chuvakin
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinAnton Chuvakin
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesAnton Chuvakin
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS-based Security: Is This For Real? by Dr. Anton ChuvakinPCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS-based Security: Is This For Real? by Dr. Anton ChuvakinAnton Chuvakin
 
PCI DSS Slidecast
PCI DSS SlidecastPCI DSS Slidecast
PCI DSS SlidecastRobertXia
 
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsFit Small Business
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notCheapSSLsecurity
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS ComplianceTripwire
 

Similar to Myths of PCI DSS (20)

PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and Reality
 
Payment account data security – PCI DSS
Payment account data security – PCI DSSPayment account data security – PCI DSS
Payment account data security – PCI DSS
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
 
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER VersionPCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
PCI DSS: Myths, Mistakes, Misconceptions 2009 - TEASER Version
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS-based Security: Is This For Real? by Dr. Anton ChuvakinPCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
 
PCI DSS Slidecast
PCI DSS SlidecastPCI DSS Slidecast
PCI DSS Slidecast
 
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance
 

More from Anton Chuvakin

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsAnton Chuvakin
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinAnton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC Anton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Myths of PCI DSS

  • 1. Myths of PCI DSS Dr. Anton Chuvakin @ Security Warrior Consulting DISCLAIMER: Securityisa rapidlychangingfieldof humanendeavor.Threatswe face literallychange everyday; moreover,manysecurityprofessionalsconsiderthe rate of change to be accelerating. On topof that, to be able to stay intouch withsuchever-changingreality,one hastoevolve withthe space aswell. Thus,eventhoughI hope thatthisdocumentwill be usefulfortomy readers,please keepinmindthatis was possiblywrittenyearsago.Also,keepinmindthatsome of the URL mighthave gone 404, please Google around. Introduction Payment Card Industry Data Security Standard (PCI DSS or,, just PCI) has transformed the way many organizations view information security. While we‘ve heard that something will “take information security from the wire closet to the boardroom” many times before, PCI actually accomplishes this for many organizations – both large and small. While following all of the PCI DSS guidance will not magically make your organization secure or prevent all incidents, the standard contains many of the common sense security requirements that are essential for protecting cardholder data. PCI DSS was unified from card brand individual security mandates such as CISP and SDP and established to increase the security of card-accepting merchants and thus reduce the risk of card transactions and resulting fraud. As of today, “PCI DSS compliance includes merchants and service providers who accept, capture, store, transmit or process credit and debit card data.” The above quote from the PCI DSS document makes it clear that the applicability of PCI is nearly universal. In this paper we look at common PCI DSS myths and misconceptions. We will also dispel those myths and provide a few useful tips on approaching to PCI DSS. Let’s get to the myths. Myth #1 is pretty simple, but, sadly, very common: “PCI DSS just doesn’t apply to us, because we are small, or we are a University, or we don’t do e-commerce, or we outsource “everything”, or we don’t store cards, or we are not a permanent entity, etc.” This myth takes over an organization and makes it oblivious to PCI DSS requirements and, almost always, to information security risk in general.
  • 2. The reality, as we mentioned above is pretty simple: PCI DSS DOES apply to your organization if you “accept, capture, store, transmit or, process credit and debit card data” with no exceptions. Admittedly, different things needs to happen at your organization if you have absolutely no electronic processing or storage of digital cardholder data compared to having an Internet-connected payment application system. The scope of compliance validation will be much more limited in the former case. For example, if a small merchant “does not store, process, or transmit any cardholder data on merchant premises but relies entirely on third party service providers to handle these functions” he is only responsible for validating the parts of “Requirement 9: Restrict physical access to cardholder data” as well as a small part of “Requirement 12: Maintain a policy that addresses information security for employees and contractors” via a Self-Assessment Questionnaire (SAQ) Type A (13 questions overall). Overall, the choice is pretty simple: either you comprehend PCI DSS now and start working on security and PCI requirements or your acquirer will make it clear to you at some point when you won’t have much room to maneuver. Myth #2 is just as pervasive: PCI is confusing and not specific. This myth seems to be purposefully propagated bysome people inorder to “muddy the waters” and thus to make PCI DSS seem impossible to achieve and thus worthy of even trying. Namely, those under its influence often proclaim things like:  “We don’t know what to do, who to ask, what exactly to change.”  “Just give us a checklist and we will do it. Promise!”  “PCI just confuses us – we can’t do it.” The reality is quite different: PCI DSS documents explain both what to do and how to then validate it. Apart from people who propagate this myth, you just need to take the time to understand the “why” (the spirit of the standard and cardholder data security), the “what” (the list of PCI DSS requirements) and “how” (common approaches and practices related to PCI). PCI is actually much easier to understand than other existing security and risk management frameworks and regulatory guidance. Looking at some of the advanced information risk management document such as ISO27005 “Information security risk management” or NIST 800-30 “Risk Management Guide for Information Technology Systems” with their hundreds of pages of sometimes esoteric guidance is a refreshing reminder that PCI DSS is, in fact, pretty simple and straightforward. Finally, security cannot and will not ever be reduced to a simple checklist. Even today some criticize PCI DSS for being a manifestation of “checklist security” which does not
  • 3. account for individual organization’s risk profile. PCIguidance is as close to a checklist as we can get without actually leading to increased, not reduced, risk. The next myth, Myth #3 is closely related to the above: PCI DSS is too hard. Sometimes it becomes PCI DSS is too expensive, too complicated, too burdensome, just too much for a small business, too many technologies or even just “unreasonable.” The reality is that PCIDSS exemplifies commonsense, baseline securitypractices, which every organization needs to take into account when planning their IT and business operations. PCI only seems hard if you were not doing anything for security of your data before. Still, it might not be easy for a large, distributed organization, but it clearly much easier than creating and running a well-managed security program based on a good understanding of your risk. Still, you can make PCI harder for making the wrong decisions. For example, developing your own web application complete with credit card processing will increase your PCI scope likely beyond your ability to handle. On the opposite, using a 3rd party checkout service will do just the opposite and make PCI and data security easier. Myth #4 seems mostly driven by the media: it claims that “Recent card data breaches prove PCI irrelevant.” I suspect it stems from the fact that reporting failures and other “bad stuff” typically draws more listeners, readers and watchers compared to reporting successes and thus attracts more media attention. However, it encourages some organizations to develop a negative mindset and thus to perform a bad job with PCI DSS and data security and then suffer from a devastating data breach. Again, the reality is exactly the opposite: data breaches remind us that basic security, mandated by PCI DSS, is necessary, not sufficient, but you have to start from the basics before you can advance in your securityeducation. As you learn more about security, you usually come to realize that nothing guarantees breach free operation. Finally, one of my colleagues likes to say that every breach proves that PCI DSS is even more necessary. PCI DSS is a great start for security, but a really bad finish, as we discover in the next myth Myth #5 is probably the scariest one: PCI is all we ever need to do for security. People in the grasp of this myth would proclaim dangerous things such as:  “We have PCI handled - we are secure now”  “We worked hard and we passed an ‘audit’; now we are secure!” Or even, in its more extreme form,  “I filed my PCI compliance documents; now I am compliant and secure”
  • 4. It often leads organizations to focus on “pleasing the auditor” and then forgetting that a happy assessor does not mean that your organization is protected from information risks. This myth is actually wrong on multiple levels! First, validating PCI DSS via an assessment or self-assessment does not mean that you are done with PCI DSS (since you now need to maintain compliance) and it certainly does not mean that you are done with security. In addition, it doesn’t mean that you are secure, just that you validated PCI compliance and hopefully made an honest step towards reducing your risk! The reality is again different. As we mentionabove, PCI is basic security; it is a necessary baseline, a lower watermark, which was never meant to be the “end state” of guaranteed secure data. No external document, even well-written and followed with utmost diligence, can guarantee that, just as excellent police work can never guarantee “crime-free” environment. Finally, PCI is about cardholder data security, not the rest of your private or regulated information, not your organization intellectual property, not identity information such as SSNs, etc. It also covers confidentiality, and not availability of such data. These quick examples show that there is a lot more to data security than PCI DSS and there are clear areas where PCI does not focus. Thus, you are certainly not “done with security” even if you maintain ongoing PCI compliance. For example, one of notable PCI QSAs likes to say that you likely need PCI+” or even “PCI++” to deal with risks to your data today. The next myth, #6, is the opposite of myth #4: PCI is easy: we just have to “say Yes” on a questionnaire and “get scanned.” As merchants become more familiar with PCI DSS, some start to feel that PCI is not that scary, because they succumb to misconceptions such as:  “What do we need to do - get a scan and answer some questions? Sure!’”  “PCI is about scanning and questionnaires, right?” For smaller merchants, PCI DSS compliance is indeed validated via external vulnerability scanning and self-assessment questionnaire (SAQ). However, it is worthwhile to mention that there is some work involved before many of the merchant can truthfully answer “yes” to those question AND would be able to prove this, if requested. A slightly simplified reality is that a typical small merchant which processes cards online would at least need to do the following: a) Get a network vulnerability scan of the external systems, resolve the vulnerabilities found and then rescan to verify that.
  • 5. b) Do the things that the SAQ questions refer to and maintain evidence that they were performed; then answer the questions affirmatively c) Keep doing a) every quarter and b) every year until you no longer wish to accept credit cards. In other words, achieve PCI DSS validation and then maintain PCI DSS compliance for as long as you plan to accept cards. You can only answer ‘yes’ if you have ground for saying ‘yes’ on the questionnaire and can prove it, even with no auditors or acquiring banks looking over your shoulder. Specifically, even on the vulnerability scanning side, a typical perception that “get a PCI scan and you are done” is essential misguided. PCI DSS requires you run both Internal and external network vulnerability scans at least quarterly (in reality, twice a quarter since you’d need to fix the vulnerabilities and then rescan to confirm it!) as well as after every major network change. Internal scans can be run by in house security staff, while the external scans must be performed by an Approved Scanning Vendor (ASV), and are then used to satisfy your PCI Validation Requirements and are submitted to your acquiring bank. By default, all Internet-facing IP addresses are ‘in-scope.’ Myth #7 is in believing that your network, application, tool is PCI compliant with the resulting conclusion that this achieves compliance for your organization. This myth manifests itself in statements from merchants such as “My payment application vendor said this tool is ‘PCI compliant’” or “They put together a network and it is PCI compliant.” However, no tool can make you compliant. In fact, people often confuse PA DSS certified application withPCIDSS compliance, which literally have little to do with each other, even though both come from PCI Council. In reality, there is no such thing as “PCI compliant tool, application, configuration or network,” PCI DSS compliance applies to organizations only. You can struggle toward, achieve and validate PCI DSS compliance only as an organization. Using PA DSS-compliant application is only a small piece of the whole puzzle. Moreover, PCI DSS combines technology, process, policy, awareness and practices as wel. For example, Requirement 12 covers security policy, incident response practices, security awareness and other non-technical safeguards and controls. For example, I was once asked the following: if we connect this server to this other servers and have a firewall in between, is this PCI compliant? The only genuine response is that one can’t tell. What if those servers have blank passwords? What if there is no logging? There is no way to judge PCI compliance on just isolated servers. Myth #8 is simply a view that “PCI DSS Is Toothless.” This myth shows a completely wrong worldview of PCI DSS and security; a dangerous delusion which is wrong on
  • 6. several levels. First, it embodies the view that data security can only happen due to regulatory pressure. This myth is often used to justify not doing anything about data security with examples like these:  “Even if breached and also found non-compliant, our business will not suffer.”  “We read that companies are breached and then continue being profitable; so why should we care?” Second, in addition to it being a wrong mindset, it is also simply wrong. PCI DSS packs a lot of bite which includes fines, possible lawsuits, mandatory breach disclosure costs, investigation costs, possible card processing rate increases, cost of additional security measures and cost of victim credit monitoring. To top it off, a victim merchant can be labeled “Level 1” and thus subjected to an annual QSA audit - at their own expense. Admittedly, not every breach will incur all of the above, but some are simply unavoidable. Overall, it is much more useful to think of customer and cardholder data protection as your “social responsibility” and not as something you do because of some scary “PCI teeth” somewhere! Conclusion: Eight Common PCI Myths – All Wrong! Here are all the myths again:  PCI just doesn’t apply to us, because…we are special.  PCI is confusing and not specific!  PCI is too hard  Recent breaches prove PCI irrelevant  PCI is easy: we just have to “say Yes” on SAQ and “get scanned”  My network, application, tool is PCI compliant  PCI is all we need to do for security!  Even if breached and then found non-compliant, our business will not suffer Now that you know what the myths are and what the reality is, you are one step closer to painless, effective PCI DSS program as well as to secure and compliant organization which cares about its customers by protecting their data. ABOUT AUTHOR: This is an updated authorbio,added to thepaperat thetime of reposting in 2009.
  • 7. Dr. AntonChuvakin(http://www.chuvakin.org)isarecognizedsecurityexpertandbookauthor.He isan author of books"SecurityWarrior"and "PCICompliance"andacontributorto "Know Your EnemyII", "InformationSecurityManagementHandbook","Hacker'sChallenge 3","OSSECHIDS" andothers. Antonhas publisheddozensof papersonlogmanagement,correlation,dataanalysis,PCIDSS,security management,etc- see all paperslinkedfromhisportal http://www.info-secure.org).Inhisspare time, he also blogsat http://www.securitywarrior.org Inaddition, Antonhaspresentedandtaught tutorialsatmany securityconferencesacrossthe world. Hisrecentengagementsinclude speakingat eventsinthe UnitedStates,UK,Singapore,Spain,Canada,the Netherlands,Poland,CzechRepublic, Russiaand othercountries. In addition,Antonalsoworkswithstandardsorganizationsonemerging securitystandardsandservesonthe advisoryboardsof several securitystart-ups. At thistime,Antonisbuildinghissecurityconsultingpractice,focusingonloggingandPCIDSS compliance forsecurityvendorsandFortune 500 organizations.Dr.AntonChuvakinwasformerlya Directorof PCICompliance SolutionsatQualys.PriortoQualys,AntonworkedatLogLogic,where he heldthe title of Chief LoggingEvangelist,taskedwitheducatingthe worldaboutthe importance of loggingforsecurity,compliance andoperations. Before LogLogic,Antonwasemployedbyasecurity informationmanagementvendorinastrategicproductmanagementrole. AntonholdsaPh.D.degree fromStonyBrook University.