Security Controls Are Useless If They’re Not Turned On
Written by Evan SchumanGuest Columnist David Taylor is Research Director of the PCI Alliance, Founder of the PCI Knowledge Base, and a former E-Commerce and Security analyst with Gartner.
If you’re thinking that the Hannaford security breach is a very isolated "blip" and that PCI compliance is the same as securing the enterprise against security breaches, you’d better think again. Why? It’s not uncommon for merchants to turn on security controls shortly before an audit, and turn them off afterward.
In fact, one of the most surprising findings from the PCI Knowledge Base is that there are many security controls that spend most of their time "switched off" — and it turns out that they’re not very effective when they’re switched off. Seriously; it’s true. Here are some examples of controls that are could be more effective than they are today:
So you can buy an application firewall, set it up and start "teaching" it about good and bad content, but while it’s learning, it’s not actually blocking any of the bad content. Here’s the problem: the vast majority of companies leave their application firewalls in "learning" mode, for fear of pissing off the business units by stopping legitimate traffic. The business managers are fine with this "unobtrusive" security.
The only problem is, you just wasted $30K to $100K on a security control that’s adding zero benefit. Given that PCI DSS 6.6 will require either application firewalls or external code review as of this June, I’d have to vote for doing the external code review, since the application firewall is likely to be one of those "special needs" security tools, destined to repeat the fourth grade, over and over.
Over the years, companies have implemented many changes that require modifications to firewall rules (e.g., opening up ports, enabling special protocols) and the documentation on all this is often pretty weak. Companies cannot depend on relatively simple quarterly network scans and an annual review by an assessor—who is rarely a "firewall geek"—to catch all the problems. I recommend bringing in Certified Ethical Hackers who will go beyond standardized, automated penetration tests and actually find the problems with the network.
The closest thing most have is Microsoft Active Directory, which does not provide the level of security against privileged users exceeding their authority that is needed. Although PCI does require that access controls be managed outside of the directory system, it does not mandate the level of identity management/access control integration that would be needed to stop a privileged user from breaking into a database containing sensitive information and then using his/her permission level to cover his/her tracks. I recommend that readers investigate some of the access control tools specifically designed to control and monitor data access by privileged users.
If you want to discuss this column or any other security or compliance issues, please send me an E-mail at David.Taylor@PCIAlliance.org or visit www.KnowPCI.com to join the PCI Knowledge Base.