Virtualization Technology News and Information
Article
RSS
Are You Making These Common PCI Compliance Mistakes?

By Rob Chapman, Director of Security Architecture, Cybera

Whether you work at a large company or a small business, it isn't always a world of sunshine and rainbows when you're the primary PCI compliance person. On the regulatory side, you have to keep up with all kinds of guidelines, not to mention the various standards bodies. In fact, you almost have to be a PCI-DSS guidelines guru if you truly want to be successful.

From the company perspective, it can be a lonely job. Maybe you're the entire PCI team by yourself. But even if you're on a larger team, you likely get a lot of blank faces or glossy-eyed stares when you mention PCI compliance to anyone else in the company. The same might apply to some of the vendors you work with, many of whom somehow seem to regard PCI as a four-letter word.

At a minimum, being the PCI "expert" means carrying a lot of burden and responsibility. It also means feeling like you're on an island by yourself much of the time. But I hope you don't feel too isolated. There are a lot of us out here, and we tend to have a lot of shared experiences.

Dispelling the Myths around PCI Compliance

Going back to the types of responses you get when you mention PCI, odds are that you've heard a variety of strange questions, comments, and theories when it comes to PCI compliance. To many, it's some abstract concept that generally has to do with credit cards or customer payments.

Having worked with a ton of PCI folks across all types of industries and IT environments, I've probably heard enough weird stories to fill 20 blog posts. That's why I wanted to share a few insights I've gathered over the years, so consider these my tips on how to avoid some very basic but common PCI mistakes.

Mistake 1: Don't Assume Something Is Beyond the Scope of PCI Compliance

This is something you need to be careful with, especially around your vendors and their products. Just because a certain device or application doesn't process or transmit card data, that doesn't mean it's immune from PCI compliance. When it comes to PCI scope, any system that directly touches card information is unquestionably in scope. And if that system touches any larger connected systems, those systems are therefore in scope as well.

Sometimes you'll need to educate your vendors and co-workers so they understand that any object that communicates directly with a POS or similar card processing system is, by definition, in PCI scope. The same goes for whatever that object touches, as a connected system. If you're not sure about whether something is in scope, err on the side of caution and treat it like it is.

Mistake 2: Don't Assume Your CDE Is Accurately Defined

This potential mistake involves the fundamental objectives of PCI compliance and what we're trying to protect. In the PCI-DSS guidelines, the scope is intentionally narrowed to your payment card data environment (CDE). Properly defining your CDE is the foundation for everything else you do in regard to PCI compliance.

That's why you must clearly understand how credit card transactions are created and transmitted-all the way from the customer to the processing bank and back. Following the complete journey of the data will show you exactly what is in PCI scope and what isn't. When you can, simplify that journey to reduce your overall PCI scope (and better protect cardholder data).

Mistake 3: Don't Blur the Lines between PA-DSS and PCI-DSS

The third mistake to avoid is mixing up the PA-DSS (which certifies payment solutions) and the PCI-DSS (which determines how well you adhere to published standards). For example, there are certain cases where a system with PA-DSS certification will fail to meet PCI-DSS compliance standards.

This often involves vendor-related situations. For example, during a compliance review, a QSA might ask for verification that you've applied a certain security patch on the operating system for your POS system. But if you've had no control or insight into those system updates, what do you do? After all, vendors typically handle those types of baseline updates to the platform on which their system runs.

Even when the lines of system responsibility start to blur, however, you're ultimately on the hook. As a result, work closely with any vendors whose systems are in PCI scope and make sure they're certified for PA-DSS.

One Last Takeaway: Don't Outsource Ownership

If you can avoid those three common mistakes, you'll be well on your way to PCI compliance. That's important, because you're ultimately responsible for everything when it comes to compliance. Even if you decide to outsource certain elements of compliance, you can never outsource ownership. But don't worry-you're ready for it.

##

About the Author

Rob Chapman 

As Director of Security Architecture at Cybera, Rob Chapman is responsible for the company's overall cybersecurity architecture and PCI compliance initiatives. During his career, he has focused on areas ranging from academic and enterprise technologies to big data and audiovisual systems. Chapman has a Masters in Educational Leadership and Instructional Technology from Tennessee Technological University. He currently resides in Columbia, TN.

Published Wednesday, July 29, 2020 7:35 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<July 2020>
SuMoTuWeThFrSa
2829301234
567891011
12131415161718
19202122232425
2627282930311
2345678