advertisement
advertisement

This is page 2 of:

PCI And Cloud Computing: It’s All About Scope

March 18th, 2010

The PCI Council is still addressing virtualization and its role in PCI-compliant approaches. As such, there may be some uncertainty about the ultimate acceptance of cloud computing. That uncertainty should be lifted soon, hopefully no later than the announcement of the revised PCI DSS this fall (or May for Participating Organizations).

Once your scope is addressed, you can tackle the other PCI questions, like separation of duties, encryption, key management, governance and the ability to conduct forensic investigation. You also will need to include due diligence of your cloud provider in your procedures for engaging a new service provider (Requirement 12.8). Personally, I’d like to know who else is sharing “my” cloud.

Again, the PCI compliance questions are the same. It is only the context, and maybe the technology of the answer, that will change.

When you look at the cloud, keep your security expectations realistic. Don’t expect 100 percent security. You don’t have 100 percent security anywhere, so don’t expect it in the cloud. What you want is the same, hopefully very high, level of security you have now or maybe a little higher.

At RSA, I heard one speaker make the argument that cardholder data might actually be more secure in the cloud because all the sensitive data would be in one place, albeit a cloud, and not spread across the enterprise as we often see today. He reasoned that the data would, therefore, be easier to monitor and manage. This is an intriguing argument, and with proper controls and auditability I can see how it might make some sense. Then again, it’s also creating an extremely tempting target.

Going beyond PCI, I would want to have a service level agreement (SLA) that includes notification of any security or data breach of the cloud provider. It may not affect your own data (or network or application or development platform) directly, but the SLA should ensure that you know about any breach promptly. I also suggest you make sure that if the authorities subpoena or even confiscate an entire server to get the records for another company sharing the cloud with you (it has happened!), your business will not be interrupted.

The cloud might be the ultimate form of outsourcing, and outsourcing is a good way to reduce your PCI scope. On one level, cloud computing is an updated, Internet-based version of the old timesharing model. Certainly there are risks.

Regardless of whether the cloud is new or not, the PCI and security questions you have to address remain the same. It is just the context in which you answer these questions that is different and perhaps a bit challenging. In many ways, the users are ready. It is the cloud providers that need to get their security and compliance act together.

Are you “in the cloud” yet? Are you considering it? What data, applications or activities would you put there? I’d like to hear your thoughts. Either leave a comment or E-mail me at wconway@403labs.com.


advertisement

2 Comments | Read PCI And Cloud Computing: It’s All About Scope

  1. Cranston Snoard Says:

    Thank you, Walt! It is refreshing to read an article (and a good one at that!) that discusses cloud computing and security which doesn’t get caught up in the industry hype.

  2. Joshua Corman Says:

    One thing you didn’t cover here, but is crucial…
    Will the Cloud provider *allow* audits?

    There are cases where you cannot be compliant because they will not let you audit them – as a mater of policy. Layer 8+

    Several of the “newer” challenges are Legal/Contract/Audit issues. Hosting and CoLo give us glimpses into these challenges, but this is still a big reason why many are not yet willing to put regulated data into clouds.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.