advertisement
advertisement

This is page 2 of:

An SLA Starter For PCI Compliance In The Cloud

April 6th, 2011

Therefore, I’d like now to introduce a third column to our spreadsheet that will further inform our SLA. That column has the details on how you will validate the CSP is indeed meeting that particular requirement every day of the year.

I have trouble understanding how any CSP will help a merchant meet some particular PCI requirements. The example that comes to mind is the requirement for daily log review (10.6). I wonder how a merchant can reasonably outsource that requirement or even why it would want to. A multi-tenant cloud compounds the problem, because the vendor’s logs will have information on the other organizations sharing the cloud. In this case, the vendor will understandably be reluctant to share the logs, but PCI requires it. I still haven’t completely figured that one out.

I cannot see how any CSP can be expected to monitor your logs effectively. The reason is the provider has no context to evaluate the alerts. For example, how can a CSP know to red flag an admin logging in at 3 A.M. when only you know that person is on vacation?

Substitute “File Integrity Monitoring” (Requirements 11.5 and 10.5.5) for “daily log review” in the above paragraphs, and you have another awkward situation. And in no situation that I can imagine will a merchant be able to outsource its security policies (Requirement 12)—in particular, incident response planning. More likely, the CSP and the customer will need to coordinate their respective response plans to reconcile differences in policy, procedure, disclosure, legal issues and forensics. I would not underestimate the importance of coordinating incident response planning, given the extreme sensitivity of any data breach.

If I were a merchant looking at a cloud vendor, I would not be afraid to ask a lot of questions and make a lot of demands. At the recent RSA Conference, I heard one prominent CSP tell an audience of potential customers that they (the audience) needed to start making tougher demands and asking hard questions of their cloud providers. Otherwise, his company and others would never provide the necessary functions and services. That was a refreshing bit of honesty that too many people in the audience may not have heard. If so, that’s too bad, because I agree with that speaker.

Another person I spoke with at RSA was Bob Russo, General Manager of the PCI Security Standards Council. I asked him if he thought PCI DSS was ready for cloud computing. He thoughtfully turned the question back at me. He said that PCI as a standard was definitely ready for the cloud, but the better question might be: Is the cloud ready for PCI?

That is a good question, and one that many potential cloud customers and their QSAs will be asking, too. The emergence of PCI-compliant cloud providers is a positive sign. But it is not a free ride on PCI requirements. Even in the most full service of SaaS clouds a merchant will have some PCI responsibilities. If nothing else, there will be Requirement 12.

Merchants using clouds of all flavors will need to validate that their cloud provider performs per their contract and PCI requirements. Simply taking the cloud provider’s Attestation of Compliance and checking the “yes” box on all the PCI requirements will not cut it with too many QSAs. Like I’ve said many times, PCI has outlawed silver bullets.

What do you think? Are you considering a cloud-based payment solution? I’d like to hear your thoughts and experiences. Either leave a comment or E-mail me at wconway@403labs.com.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.