advertisement
advertisement

This is page 2 of:

New PCI Edict: Tokens Can Be Out-Of-Scope

August 12th, 2011

The guideline itself says that token programs “do not eliminate the need to maintain and validate PCI DSS compliance, but they may simplify a merchant’s validation efforts by reducing the number of system components for which PCI DSS requirements apply. Verifying the effectiveness of a tokenization implementation is necessary and includes confirming that PAN is not retrievable from any system component removed from the scope of PCI DSS.”

Typically, tokens merely replace the storage of sensitive card information. But some approaches enable the token to, theoretically, be able to make transactions directly. If that’s the case, it needs additional safeguards. Indeed, such transaction-capable tokens may thrust that chain right back into PCI scope.

“An important consideration when evaluating tokenization is whether the token itself can be used in lieu of cardholder data to perform a transaction. Tokens that can be used as payment instruments (sometimes called high-value tokens) could potentially be monetized or used to generate fraudulent transactions, and may therefore have the same value to an attacker as the data they are intended to replace,” the guidance says.

“Tokenization [packages] that support these types of tokens should have additional controls in place to detect and prevent attempted fraudulent activities. Additionally, tokens that can be used to initiate a transaction might be in scope for PCI DSS, even if they cannot directly be used to retrieve PAN or other cardholder data. Merchants should therefore consult with their acquirer and/or the payment brands directly to determine specific requirements for tokens that can be used as payment instruments.”

The guidance also gets very specific about how tokens would have to act and be used to keep a retailer out of PCI danger. “Recovery of the PAN value associated with a token must not be computationally feasible through knowledge of only the token, multiple tokens or other token-to-PAN combinations. The PAN cannot be retrieved even if the token and the systems it resides on are compromised.”

Another key out-of-scope issue deals with the reversible-encryption token approach, which the Council document describes as one “where the token is mathematically derived from the original PAN through the use of an encryption algorithm and cryptographic key.” In those instances, the document says, “the resultant token is an encrypted PAN and may be subject to PCI DSS considerations in addition to those included in this document. The PCI SSC is further evaluating how these considerations may impact PCI DSS scope for reversible, encryption-based tokens.”

The report also encourages retailers to have a precise method to distinguish between tokens and actual PANs.

“Without the ability to distinguish between a PAN and a token, the merchant or service provider may not realize that the tokenization system isn’t functioning as intended. Additionally, PANs could be mistakenly identified as tokens, which can lead to mis-scoping of the CDE and the possibility that PANs are left unprotected and open to compromise,” it says. “Note that some tokens are designed to mimic the type and format of the original PANs, and it may not be possible for a human reviewer to distinguish between the two types of data. In this instance, a specific tool may need to be utilized or a function performed to verify that an alleged token is actually a token and not a PAN. The mechanism or method for distinguishing between tokens and PANs for a particular tokenization [approach] should be shared with the merchants using that [token application] to allow merchants the ability to verify that their CDE has been accurately defined and scoped.”


advertisement

2 Comments | Read New PCI Edict: Tokens Can Be Out-Of-Scope

  1. Steve Sommers Says:

    We have several issues with the Tokenization Guideline as published by PCI SSC. Basically they took a simple concept that helped merchants with security and compliance, added some lard, and now the “simple concept” allows for “valuable tokens”, opening security holes and complicating compliance. Not good. On page 20, we find this little gem: “Additionally, tokens that can be used to initiate a transaction might be in scope for PCI DSS.” Might? Wasn’t the whole purpose of this document to take what “might” be true and determine what really is true? What was released today was not an industry standard, and it was not a guideline. It was an eloquently worded, poorly veiled passing of the buck from the PCI SSC to individual acquirers and QSAs.

  2. Sue Zloth Says:

    Well, I don’t think I would speak as harshly about the guidelines as Steve. I think they are a good first step. However, I do have an issue with the last section, which as it is currently written will introduce a lot of fear, uncertainty and doubt into many merchant’s minds regarding how to keep the systems they have which are storing only tokens out of scope. For solutions which support these types of tokens, the guidelines state that there must be additional controls in place to detect and prevent fraudulent transactions. This is where I feel the Council’s document fell short…when they introduced this concept that tokens may potentially be back in scope without providing guidance as to how to keep them out of scope.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.